{"id":"https://openalex.org/W4360585307","doi":"https://doi.org/10.1109/ic3i56241.2022.10072838","title":"A Survey on Encryption Algorithm with Hybrid Block Chain in Wireless Body Area Network","display_name":"A Survey on Encryption Algorithm with Hybrid Block Chain in Wireless Body Area Network","publication_year":2022,"publication_date":"2022-12-14","ids":{"openalex":"https://openalex.org/W4360585307","doi":"https://doi.org/10.1109/ic3i56241.2022.10072838"},"language":"en","primary_location":{"id":"doi:10.1109/ic3i56241.2022.10072838","is_oa":false,"landing_page_url":"http://dx.doi.org/10.1109/ic3i56241.2022.10072838","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2022 5th International Conference on Contemporary Computing and Informatics (IC3I)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5075502436","display_name":"S. Kayalvizhi","orcid":null},"institutions":[{"id":"https://openalex.org/I4210093364","display_name":"Arunai Engineering College","ror":"https://ror.org/00m5dhe11","country_code":"IN","type":"education","lineage":["https://openalex.org/I4210093364"]}],"countries":["IN"],"is_corresponding":true,"raw_author_name":"S. Kayalvizhi","raw_affiliation_strings":["Vaigai Engineering College,Department of CSE,Madurai,625014"],"affiliations":[{"raw_affiliation_string":"Vaigai Engineering College,Department of CSE,Madurai,625014","institution_ids":["https://openalex.org/I4210093364"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5052695122","display_name":"S. Mythili","orcid":null},"institutions":[{"id":"https://openalex.org/I4210119396","display_name":"Social Service Sericulture Project Trust","ror":"https://ror.org/02sb4r018","country_code":"IN","type":"nonprofit","lineage":["https://openalex.org/I4210119396"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"S. Mythili","raw_affiliation_strings":["PSNA College of Engineering,Department of ECE,Dindigu","Department of ECE, PSNA College of Engineering, Dindigu"],"affiliations":[{"raw_affiliation_string":"PSNA College of Engineering,Department of ECE,Dindigu","institution_ids":["https://openalex.org/I4210119396"]},{"raw_affiliation_string":"Department of ECE, PSNA College of Engineering, Dindigu","institution_ids":[]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5075502436"],"corresponding_institution_ids":["https://openalex.org/I4210093364"],"apc_list":null,"apc_paid":null,"fwci":0.303,"has_fulltext":false,"cited_by_count":1,"citation_normalized_percentile":{"value":0.66859424,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":91,"max":95},"biblio":{"volume":"14","issue":null,"first_page":"1158","last_page":"1162"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10270","display_name":"Blockchain Technology Applications and Security","score":0.9990000128746033,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10270","display_name":"Blockchain Technology Applications and Security","score":0.9990000128746033,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10273","display_name":"IoT and Edge/Fog Computing","score":0.998199999332428,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T13038","display_name":"Internet of Things and AI","score":0.9876999855041504,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7901722192764282},{"id":"https://openalex.org/keywords/body-area-network","display_name":"Body area network","score":0.5976578593254089},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.5770096778869629},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.5729621648788452},{"id":"https://openalex.org/keywords/hash-function","display_name":"Hash function","score":0.49539077281951904},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.45557111501693726},{"id":"https://openalex.org/keywords/authentication","display_name":"Authentication (law)","score":0.4507017135620117},{"id":"https://openalex.org/keywords/block","display_name":"Block (permutation group theory)","score":0.4366523027420044},{"id":"https://openalex.org/keywords/data-security","display_name":"Data security","score":0.4180183708667755},{"id":"https://openalex.org/keywords/data-sharing","display_name":"Data sharing","score":0.41572651267051697},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.3962794244289398},{"id":"https://openalex.org/keywords/distributed-computing","display_name":"Distributed computing","score":0.3313559293746948},{"id":"https://openalex.org/keywords/wireless-sensor-network","display_name":"Wireless sensor network","score":0.19172269105911255}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7901722192764282},{"id":"https://openalex.org/C88737568","wikidata":"https://www.wikidata.org/wiki/Q890056","display_name":"Body area network","level":3,"score":0.5976578593254089},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.5770096778869629},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.5729621648788452},{"id":"https://openalex.org/C99138194","wikidata":"https://www.wikidata.org/wiki/Q183427","display_name":"Hash function","level":2,"score":0.49539077281951904},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.45557111501693726},{"id":"https://openalex.org/C148417208","wikidata":"https://www.wikidata.org/wiki/Q4825882","display_name":"Authentication (law)","level":2,"score":0.4507017135620117},{"id":"https://openalex.org/C2777210771","wikidata":"https://www.wikidata.org/wiki/Q4927124","display_name":"Block (permutation group theory)","level":2,"score":0.4366523027420044},{"id":"https://openalex.org/C10511746","wikidata":"https://www.wikidata.org/wiki/Q899388","display_name":"Data security","level":3,"score":0.4180183708667755},{"id":"https://openalex.org/C2779965156","wikidata":"https://www.wikidata.org/wiki/Q5227350","display_name":"Data sharing","level":3,"score":0.41572651267051697},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.3962794244289398},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.3313559293746948},{"id":"https://openalex.org/C24590314","wikidata":"https://www.wikidata.org/wiki/Q336038","display_name":"Wireless sensor network","level":2,"score":0.19172269105911255},{"id":"https://openalex.org/C204787440","wikidata":"https://www.wikidata.org/wiki/Q188504","display_name":"Alternative medicine","level":2,"score":0.0},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.0},{"id":"https://openalex.org/C142724271","wikidata":"https://www.wikidata.org/wiki/Q7208","display_name":"Pathology","level":1,"score":0.0},{"id":"https://openalex.org/C71924100","wikidata":"https://www.wikidata.org/wiki/Q11190","display_name":"Medicine","level":0,"score":0.0},{"id":"https://openalex.org/C2524010","wikidata":"https://www.wikidata.org/wiki/Q8087","display_name":"Geometry","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/ic3i56241.2022.10072838","is_oa":false,"landing_page_url":"http://dx.doi.org/10.1109/ic3i56241.2022.10072838","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2022 5th International Conference on Contemporary Computing and Informatics (IC3I)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/17","score":0.4000000059604645,"display_name":"Partnerships for the goals"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":29,"referenced_works":["https://openalex.org/W1998207654","https://openalex.org/W2669932771","https://openalex.org/W2764198340","https://openalex.org/W2777677181","https://openalex.org/W2887486920","https://openalex.org/W2891724828","https://openalex.org/W2899403103","https://openalex.org/W2914675235","https://openalex.org/W2919734217","https://openalex.org/W2946102439","https://openalex.org/W2949361785","https://openalex.org/W2961248373","https://openalex.org/W2978907169","https://openalex.org/W2981264364","https://openalex.org/W2981986159","https://openalex.org/W2995871203","https://openalex.org/W2997684140","https://openalex.org/W2999073610","https://openalex.org/W3013165931","https://openalex.org/W3024273769","https://openalex.org/W3082981149","https://openalex.org/W3089015787","https://openalex.org/W3124268289","https://openalex.org/W3203300008","https://openalex.org/W4210947348","https://openalex.org/W4211009111","https://openalex.org/W4254318721","https://openalex.org/W4285105914","https://openalex.org/W4289519727"],"related_works":["https://openalex.org/W4200536956","https://openalex.org/W1774328488","https://openalex.org/W2590947447","https://openalex.org/W2753087868","https://openalex.org/W2184053173","https://openalex.org/W2789176273","https://openalex.org/W3169084868","https://openalex.org/W4360994473","https://openalex.org/W3155344997","https://openalex.org/W2546552658"],"abstract_inverted_index":{"The":[0,28,53,94,159],"recent":[1,157],"electronic":[2],"Medical":[3],"monitoring":[4],"system":[5,96,180,204,229],"focuses":[6],"on":[7,98,123],"maintaining":[8],"the":[9,59,103,112,131,138,170,178,208,232],"database":[10,48],"of":[11,26,130,164,166,181,193,200,213,217,226,235],"patients":[12],"with":[13,23,72,78,145,148,196,210,231],"their":[14,245],"medical":[15],"history":[16],"and":[17,20,50,62,90,127,172,222],"up-to-date":[18],"prescriptions":[19],"treatment":[21],"maintained":[22],"high":[24,191],"degree":[25,192],"confidentiality.":[27],"E-Medical":[29],"services":[30],"where":[31,111],"Wireless":[32],"Body":[33],"Area":[34],"Network":[35],"(WBAN)":[36],"is":[37],"integrated":[38],"face":[39],"certain":[40],"challenges":[41],"such":[42],"as":[43],"data":[44,60,88,113,194],"sharing,":[45],"network":[46],"reliability,":[47],"management":[49],"so":[51],"on.":[52],"greatest":[54],"threat":[55],"in":[56,92,116,154,156,169,187,219,239,247],"WBAN":[57,155,188,209,248],"remained":[58],"security":[61,95],"integrity.":[63],"Several":[64],"new":[65],"methodologies":[66],"supports":[67,190],"to":[68,82,206,243],"overcome":[69,136],"these":[70],"threats":[71],"secure":[73,87],"hash":[74],"function,":[75],"digital":[76],"signature":[77,143],"effective":[79],"routing":[80],"protocols":[81],"provide":[83],"enhanced":[84],"solutions":[85],"for":[86,109],"maintenance":[89],"sharing":[91,225],"WBAN.":[93],"based":[97,151],"Block":[99],"Chain":[100],"Technology(BCT)":[101],"are":[102,114],"most":[104],"common":[105],"trust":[106],"building":[107],"measure":[108],"WBAN,":[110],"stored":[115],"distributed":[117,132,214],"ledgers.":[118],"This":[119,134,202,228],"technology":[120],"faces":[121,162],"problems":[122],"minimal":[124],"storage":[125,167,242],"size":[126],"unauthorized":[128],"access":[129,195,212],"data.":[133,227],"was":[135],"by":[137,177],"technique":[139],"called":[140],"sequential":[141],"aggregate":[142],"scheme":[144,161],"designated":[146],"verifier":[147],"block":[149,185,240],"chain":[150,186,241],"cloud":[152],"transaction":[153],"trends.":[158],"above":[160],"problem":[163],"wastage":[165],"space":[168],"ledgers":[171],"it":[173],"could":[174],"be":[175],"rectified":[176],"proposed":[179,203],"Encrypted":[182],"Multi":[183],"map":[184],"which":[189],"reduced":[197],"computational":[198],"complexity":[199],"storage.":[201],"aims":[205],"simulate":[207],"improved":[211],"authentication":[215],"key":[216],"users":[218],"ledger":[220],"pools":[221],"provides":[223],"confidential":[224],"deals":[230],"comparative":[233],"study":[234],"different":[236],"encryption":[237],"used":[238],"analyze":[244],"performance":[246]},"counts_by_year":[{"year":2025,"cited_by_count":1}],"updated_date":"2025-12-24T23:09:58.560324","created_date":"2025-10-10T00:00:00"}
