{"id":"https://openalex.org/W4398152708","doi":"https://doi.org/10.1109/access.2024.3402691","title":"Data Privacy Technique for the Data Transmitted in Wireless Body Area Network","display_name":"Data Privacy Technique for the Data Transmitted in Wireless Body Area Network","publication_year":2024,"publication_date":"2024-01-01","ids":{"openalex":"https://openalex.org/W4398152708","doi":"https://doi.org/10.1109/access.2024.3402691"},"language":"en","primary_location":{"id":"doi:10.1109/access.2024.3402691","is_oa":true,"landing_page_url":"https://doi.org/10.1109/access.2024.3402691","pdf_url":"https://ieeexplore.ieee.org/ielx7/6287639/6514899/10534773.pdf","source":{"id":"https://openalex.org/S2485537415","display_name":"IEEE Access","issn_l":"2169-3536","issn":["2169-3536"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Access","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://ieeexplore.ieee.org/ielx7/6287639/6514899/10534773.pdf","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5103081982","display_name":"S. Divya","orcid":null},"institutions":[{"id":"https://openalex.org/I164861460","display_name":"Manipal Academy of Higher Education","ror":"https://ror.org/02xzytt36","country_code":"IN","type":"education","lineage":["https://openalex.org/I164861460"]}],"countries":["IN"],"is_corresponding":true,"raw_author_name":"S. Divya","raw_affiliation_strings":["Department of Information and Communication Technology, Manipal Institute of Technology, Manipal Academy of Higher Education, Manipal, Karnataka, India"],"raw_orcid":"https://orcid.org/0000-0003-1353-5891","affiliations":[{"raw_affiliation_string":"Department of Information and Communication Technology, Manipal Institute of Technology, Manipal Academy of Higher Education, Manipal, Karnataka, India","institution_ids":["https://openalex.org/I164861460"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5057241688","display_name":"K. V. Prema","orcid":null},"institutions":[{"id":"https://openalex.org/I164861460","display_name":"Manipal Academy of Higher Education","ror":"https://ror.org/02xzytt36","country_code":"IN","type":"education","lineage":["https://openalex.org/I164861460"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"K. V. Prema","raw_affiliation_strings":["Department of Computer Science and Engineering, Manipal Institute of Technology Bengaluru, Manipal Academy of Higher Education, Manipal, Karnataka, India"],"raw_orcid":"https://orcid.org/0000-0002-8847-0749","affiliations":[{"raw_affiliation_string":"Department of Computer Science and Engineering, Manipal Institute of Technology Bengaluru, Manipal Academy of Higher Education, Manipal, Karnataka, India","institution_ids":["https://openalex.org/I164861460"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5030599123","display_name":"Balachandra Muniyal","orcid":null},"institutions":[{"id":"https://openalex.org/I164861460","display_name":"Manipal Academy of Higher Education","ror":"https://ror.org/02xzytt36","country_code":"IN","type":"education","lineage":["https://openalex.org/I164861460"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"Balachandra Muniyal","raw_affiliation_strings":["Department of Information and Communication Technology, Manipal Institute of Technology, Manipal Academy of Higher Education, Manipal, Karnataka, India"],"raw_orcid":"https://orcid.org/0000-0002-4839-0082","affiliations":[{"raw_affiliation_string":"Department of Information and Communication Technology, Manipal Institute of Technology, Manipal Academy of Higher Education, Manipal, Karnataka, India","institution_ids":["https://openalex.org/I164861460"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5103081982"],"corresponding_institution_ids":["https://openalex.org/I164861460"],"apc_list":{"value":1850,"currency":"USD","value_usd":1850},"apc_paid":{"value":1850,"currency":"USD","value_usd":1850},"fwci":0.8677,"has_fulltext":false,"cited_by_count":5,"citation_normalized_percentile":{"value":0.6950118,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":96,"max":99},"biblio":{"volume":"12","issue":null,"first_page":"75208","last_page":"75219"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11932","display_name":"Wireless Body Area Networks","score":0.9994000196456909,"subfield":{"id":"https://openalex.org/subfields/2204","display_name":"Biomedical Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11932","display_name":"Wireless Body Area Networks","score":0.9994000196456909,"subfield":{"id":"https://openalex.org/subfields/2204","display_name":"Biomedical Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11800","display_name":"User Authentication and Security Systems","score":0.9962999820709229,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11504","display_name":"Advanced Authentication Protocols Security","score":0.9959999918937683,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8434110879898071},{"id":"https://openalex.org/keywords/wearable-computer","display_name":"Wearable computer","score":0.7532713413238525},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.7253240346908569},{"id":"https://openalex.org/keywords/body-area-network","display_name":"Body area network","score":0.6906328201293945},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.5201835632324219},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.4762822985649109},{"id":"https://openalex.org/keywords/information-privacy","display_name":"Information privacy","score":0.47529566287994385},{"id":"https://openalex.org/keywords/data-security","display_name":"Data security","score":0.446743369102478},{"id":"https://openalex.org/keywords/wearable-technology","display_name":"Wearable technology","score":0.4435601830482483},{"id":"https://openalex.org/keywords/process","display_name":"Process (computing)","score":0.42859700322151184},{"id":"https://openalex.org/keywords/wireless","display_name":"Wireless","score":0.41663533449172974},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.402576744556427},{"id":"https://openalex.org/keywords/wireless-sensor-network","display_name":"Wireless sensor network","score":0.3547999858856201},{"id":"https://openalex.org/keywords/embedded-system","display_name":"Embedded system","score":0.29209911823272705},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.11807966232299805}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8434110879898071},{"id":"https://openalex.org/C150594956","wikidata":"https://www.wikidata.org/wiki/Q1334829","display_name":"Wearable computer","level":2,"score":0.7532713413238525},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.7253240346908569},{"id":"https://openalex.org/C88737568","wikidata":"https://www.wikidata.org/wiki/Q890056","display_name":"Body area network","level":3,"score":0.6906328201293945},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5201835632324219},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.4762822985649109},{"id":"https://openalex.org/C123201435","wikidata":"https://www.wikidata.org/wiki/Q456632","display_name":"Information privacy","level":2,"score":0.47529566287994385},{"id":"https://openalex.org/C10511746","wikidata":"https://www.wikidata.org/wiki/Q899388","display_name":"Data security","level":3,"score":0.446743369102478},{"id":"https://openalex.org/C54290928","wikidata":"https://www.wikidata.org/wiki/Q4845080","display_name":"Wearable technology","level":3,"score":0.4435601830482483},{"id":"https://openalex.org/C98045186","wikidata":"https://www.wikidata.org/wiki/Q205663","display_name":"Process (computing)","level":2,"score":0.42859700322151184},{"id":"https://openalex.org/C555944384","wikidata":"https://www.wikidata.org/wiki/Q249","display_name":"Wireless","level":2,"score":0.41663533449172974},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.402576744556427},{"id":"https://openalex.org/C24590314","wikidata":"https://www.wikidata.org/wiki/Q336038","display_name":"Wireless sensor network","level":2,"score":0.3547999858856201},{"id":"https://openalex.org/C149635348","wikidata":"https://www.wikidata.org/wiki/Q193040","display_name":"Embedded system","level":1,"score":0.29209911823272705},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.11807966232299805}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1109/access.2024.3402691","is_oa":true,"landing_page_url":"https://doi.org/10.1109/access.2024.3402691","pdf_url":"https://ieeexplore.ieee.org/ielx7/6287639/6514899/10534773.pdf","source":{"id":"https://openalex.org/S2485537415","display_name":"IEEE Access","issn_l":"2169-3536","issn":["2169-3536"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Access","raw_type":"journal-article"},{"id":"pmh:oai:doaj.org/article:ea857e03b87448cd9cf528d51366fe68","is_oa":true,"landing_page_url":"https://doaj.org/article/ea857e03b87448cd9cf528d51366fe68","pdf_url":null,"source":{"id":"https://openalex.org/S4306401280","display_name":"DOAJ (DOAJ: Directory of Open Access Journals)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by-sa","license_id":"https://openalex.org/licenses/cc-by-sa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"IEEE Access, Vol 12, Pp 75208-75219 (2024)","raw_type":"article"}],"best_oa_location":{"id":"doi:10.1109/access.2024.3402691","is_oa":true,"landing_page_url":"https://doi.org/10.1109/access.2024.3402691","pdf_url":"https://ieeexplore.ieee.org/ielx7/6287639/6514899/10534773.pdf","source":{"id":"https://openalex.org/S2485537415","display_name":"IEEE Access","issn_l":"2169-3536","issn":["2169-3536"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Access","raw_type":"journal-article"},"sustainable_development_goals":[{"display_name":"Industry, innovation and infrastructure","score":0.44999998807907104,"id":"https://metadata.un.org/sdg/9"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":true},"content_urls":{"pdf":"https://content.openalex.org/works/W4398152708.pdf"},"referenced_works_count":31,"referenced_works":["https://openalex.org/W94530871","https://openalex.org/W1161316405","https://openalex.org/W1922973483","https://openalex.org/W2057457106","https://openalex.org/W2067706598","https://openalex.org/W2078185788","https://openalex.org/W2093000415","https://openalex.org/W2108038164","https://openalex.org/W2150010995","https://openalex.org/W2228026586","https://openalex.org/W2335588581","https://openalex.org/W2337719407","https://openalex.org/W2552699189","https://openalex.org/W2560195950","https://openalex.org/W2569689464","https://openalex.org/W2605747464","https://openalex.org/W2606509721","https://openalex.org/W2773695526","https://openalex.org/W2810919633","https://openalex.org/W2900190845","https://openalex.org/W2910864278","https://openalex.org/W2964064517","https://openalex.org/W2972036422","https://openalex.org/W2996506675","https://openalex.org/W3009715816","https://openalex.org/W3040173177","https://openalex.org/W3048149989","https://openalex.org/W3135922897","https://openalex.org/W4289443835","https://openalex.org/W4376472802","https://openalex.org/W4379537952"],"related_works":["https://openalex.org/W2161256549","https://openalex.org/W3090300519","https://openalex.org/W2514492205","https://openalex.org/W4250401876","https://openalex.org/W2943851981","https://openalex.org/W2566526749","https://openalex.org/W4382561546","https://openalex.org/W4384383135","https://openalex.org/W3047461507","https://openalex.org/W3126390843"],"abstract_inverted_index":{"Within":[0],"Wireless":[1],"Body":[2],"Area":[3],"Networks":[4],"(WBANs),":[5],"wearable":[6,24,74,110],"devices":[7],"(WDs)":[8],"capture":[9],"vital":[10],"parameters":[11],"and":[12,44,133,143],"process":[13],"this":[14,99],"information.":[15],"The":[16,47,96,138],"processed":[17],"data":[18,57,71,88],"is":[19,61,115,119,127,136],"then":[20],"conveyed":[21],"to":[22,86,93],"a":[23,33,64],"device":[25,75,111],"controller":[26,76,112],"(WDC)":[27],"before":[28,77],"being":[29],"securely":[30],"archived":[31],"within":[32,72,108],"medical":[34],"server.":[35],"Data":[36],"privacy":[37,107,118],"preservation":[38],"becomes":[39],"imperative,":[40],"preventing":[41],"unauthorized":[42],"access":[43,85],"potential":[45],"compromise.":[46],"focal":[48],"point":[49],"of":[50,98],"the":[51,70,73,80,87,109,149],"presented":[52],"research":[53],"centers":[54],"on":[55,105],"safeguarding":[56],"privacy.":[58],"This":[59],"objective":[60],"accomplished":[62],"through":[63],"two-fold":[65],"approach:":[66],"firstly,":[67],"by":[68,83,129],"encrypting":[69],"storage":[78],"in":[79,102],"server;":[81],"secondly,":[82],"regulating":[84],"for":[89],"different":[90],"entities":[91],"seeking":[92],"retrieve":[94],"it.":[95],"innovation":[97],"work":[100],"lies":[101],"its":[103],"emphasis":[104],"ensuring":[106],"itself.":[113],"It":[114],"shown":[116],"that":[117],"obtained":[120],"using":[121],"minimum":[122],"computations.":[123],"Also,":[124],"security":[125],"analysis":[126],"performed":[128],"identifying":[130],"various":[131],"threats":[132],"how":[134],"it":[135],"addressed.":[137],"encryption":[139],"process,":[140],"key":[141,144],"generation,":[142],"refreshing":[145],"are":[146],"executed":[147],"employing":[148],"MATLAB":[150],"programming":[151],"environment.":[152]},"counts_by_year":[{"year":2026,"cited_by_count":2},{"year":2025,"cited_by_count":3}],"updated_date":"2026-05-06T08:25:59.206177","created_date":"2025-10-10T00:00:00"}
