{"id":"https://openalex.org/W4404030857","doi":"https://doi.org/10.1109/icccnt61001.2024.10726219","title":"A Hybrid Cryptographic Protocol for Secure and Efficient Data Transmission for Wireless Body Area Network","display_name":"A Hybrid Cryptographic Protocol for Secure and Efficient Data Transmission for Wireless Body Area Network","publication_year":2024,"publication_date":"2024-06-24","ids":{"openalex":"https://openalex.org/W4404030857","doi":"https://doi.org/10.1109/icccnt61001.2024.10726219"},"language":"en","primary_location":{"id":"doi:10.1109/icccnt61001.2024.10726219","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icccnt61001.2024.10726219","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2024 15th International Conference on Computing Communication and Networking Technologies (ICCCNT)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5088242809","display_name":"Bhavana Alte","orcid":"https://orcid.org/0000-0001-7521-057X"},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Bhavana Alte","raw_affiliation_strings":["Ramrao Adik of Technology,Department of Computer Engineering,Navi Mumbai,India"],"affiliations":[{"raw_affiliation_string":"Ramrao Adik of Technology,Department of Computer Engineering,Navi Mumbai,India","institution_ids":[]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5049940196","display_name":"Amarsinh Vidhate","orcid":"https://orcid.org/0000-0003-4954-7560"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Amarsinh V. Vidhate","raw_affiliation_strings":["Ramrao Adik of Technology D Y Patil Deemed to be University,Department of Computer Engineering,Navi Mumbai,India"],"affiliations":[{"raw_affiliation_string":"Ramrao Adik of Technology D Y Patil Deemed to be University,Department of Computer Engineering,Navi Mumbai,India","institution_ids":[]}]}],"institutions":[],"countries_distinct_count":0,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5088242809"],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":0.3911,"has_fulltext":false,"cited_by_count":2,"citation_normalized_percentile":{"value":0.58528042,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":95},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"7"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11932","display_name":"Wireless Body Area Networks","score":0.9915000200271606,"subfield":{"id":"https://openalex.org/subfields/2204","display_name":"Biomedical Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11932","display_name":"Wireless Body Area Networks","score":0.9915000200271606,"subfield":{"id":"https://openalex.org/subfields/2204","display_name":"Biomedical Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11504","display_name":"Advanced Authentication Protocols Security","score":0.98580002784729,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":0.902899980545044,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7557446956634521},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.6729177832603455},{"id":"https://openalex.org/keywords/cryptographic-protocol","display_name":"Cryptographic protocol","score":0.6575183868408203},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.6150356531143188},{"id":"https://openalex.org/keywords/wireless-transport-layer-security","display_name":"Wireless Transport Layer Security","score":0.5908801555633545},{"id":"https://openalex.org/keywords/protocol","display_name":"Protocol (science)","score":0.5676197409629822},{"id":"https://openalex.org/keywords/data-transmission","display_name":"Data transmission","score":0.4598788321018219},{"id":"https://openalex.org/keywords/wireless-network","display_name":"Wireless network","score":0.4477354884147644},{"id":"https://openalex.org/keywords/transmission","display_name":"Transmission (telecommunications)","score":0.44406041502952576},{"id":"https://openalex.org/keywords/wireless","display_name":"Wireless","score":0.41441625356674194},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.29841071367263794},{"id":"https://openalex.org/keywords/key-distribution-in-wireless-sensor-networks","display_name":"Key distribution in wireless sensor networks","score":0.24360114336013794},{"id":"https://openalex.org/keywords/telecommunications","display_name":"Telecommunications","score":0.1474454700946808}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7557446956634521},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.6729177832603455},{"id":"https://openalex.org/C33884865","wikidata":"https://www.wikidata.org/wiki/Q1254335","display_name":"Cryptographic protocol","level":3,"score":0.6575183868408203},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.6150356531143188},{"id":"https://openalex.org/C173104861","wikidata":"https://www.wikidata.org/wiki/Q1476032","display_name":"Wireless Transport Layer Security","level":5,"score":0.5908801555633545},{"id":"https://openalex.org/C2780385302","wikidata":"https://www.wikidata.org/wiki/Q367158","display_name":"Protocol (science)","level":3,"score":0.5676197409629822},{"id":"https://openalex.org/C557945733","wikidata":"https://www.wikidata.org/wiki/Q389772","display_name":"Data transmission","level":2,"score":0.4598788321018219},{"id":"https://openalex.org/C108037233","wikidata":"https://www.wikidata.org/wiki/Q11375","display_name":"Wireless network","level":3,"score":0.4477354884147644},{"id":"https://openalex.org/C761482","wikidata":"https://www.wikidata.org/wiki/Q118093","display_name":"Transmission (telecommunications)","level":2,"score":0.44406041502952576},{"id":"https://openalex.org/C555944384","wikidata":"https://www.wikidata.org/wiki/Q249","display_name":"Wireless","level":2,"score":0.41441625356674194},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.29841071367263794},{"id":"https://openalex.org/C41971633","wikidata":"https://www.wikidata.org/wiki/Q6398155","display_name":"Key distribution in wireless sensor networks","level":4,"score":0.24360114336013794},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.1474454700946808},{"id":"https://openalex.org/C204787440","wikidata":"https://www.wikidata.org/wiki/Q188504","display_name":"Alternative medicine","level":2,"score":0.0},{"id":"https://openalex.org/C71924100","wikidata":"https://www.wikidata.org/wiki/Q11190","display_name":"Medicine","level":0,"score":0.0},{"id":"https://openalex.org/C142724271","wikidata":"https://www.wikidata.org/wiki/Q7208","display_name":"Pathology","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/icccnt61001.2024.10726219","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icccnt61001.2024.10726219","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2024 15th International Conference on Computing Communication and Networking Technologies (ICCCNT)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.5699999928474426,"id":"https://metadata.un.org/sdg/7","display_name":"Affordable and clean energy"}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":12,"referenced_works":["https://openalex.org/W2943946327","https://openalex.org/W3184143869","https://openalex.org/W4311548093","https://openalex.org/W4317398999","https://openalex.org/W4318464971","https://openalex.org/W4318472895","https://openalex.org/W4328088859","https://openalex.org/W4384131590","https://openalex.org/W4389159135","https://openalex.org/W4392470213","https://openalex.org/W4396759233","https://openalex.org/W4399113532"],"related_works":["https://openalex.org/W2289378658","https://openalex.org/W1531360494","https://openalex.org/W2093529019","https://openalex.org/W1982325601","https://openalex.org/W4240432851","https://openalex.org/W154233216","https://openalex.org/W2793769208","https://openalex.org/W2626486901","https://openalex.org/W1988007309","https://openalex.org/W2372438076"],"abstract_inverted_index":{"Wireless":[0],"Body":[1],"Area":[2],"Networks":[3],"are":[4],"a":[5,43,136,142,149],"revolutionary":[6],"advancement":[7],"in":[8,30,144,151,170],"modern":[9],"healthcare":[10,38],"that":[11,58],"enable":[12],"the":[13,86,164],"continuous":[14],"and":[15,24,36,64,76,84,102,106,120,148,166],"real-time":[16],"monitoring":[17],"of":[18,88,134,140,168],"patients\u2019":[19],"physiological":[20],"data":[21,28,82,90,173],"using":[22],"wearable":[23],"implantable":[25],"sensors.":[26],"Securing":[27],"transmission":[29,174],"WBAN":[31,176],"is":[32],"essential":[33],"for":[34,97,100,104,175],"reliable":[35],"effective":[37],"monitoring.":[39],"This":[40,115],"work":[41],"utilized":[42],"hybrid":[44],"cryptographic":[45,122],"model":[46],"known":[47],"as":[48],"Secure":[49],"End":[50],"to":[51,79,158],"end":[52],"Emergency":[53],"Network":[54],"Data":[55,180],"Transmission":[56],"(SENDT)":[57],"incorporated":[59],"Elliptic":[60,65],"Curve":[61,66],"Cryptography":[62],"(ECC)":[63],"Digital":[67],"Signature":[68],"Algorithm":[69],"(ECDSA).":[70],"The":[71,93,124,161],"suggested":[72],"solution":[73],"integrates":[74],"ECC":[75],"ECDSA":[77,103],"algorithms":[78],"efficiently":[80],"preserve":[81],"privacy":[83],"guarantee":[85],"integrity":[87],"transferred":[89],"among":[91],"nodes.":[92],"approach":[94],"utilizes":[95],"AES-128":[96],"encryption,":[98],"SHA-2":[99],"hashing,":[101],"authentication":[105],"verification,":[107],"guaranteeing":[108],"strong":[109],"security":[110],"with":[111,130],"minimum":[112],"computation":[113],"overhead.":[114],"research":[116],"compares":[117],"HECC,":[118],"CLAKA,":[119],"SENDT":[121,169],"protocols.":[123,160],"proposed":[125],"technique":[126],"exhibits":[127],"exceptional":[128],"performance,":[129],"an":[131],"impressive":[132],"throughput":[133],"85%,":[135],"packet":[137],"delivery":[138],"ratio":[139],"95%,":[141],"reduction":[143],"latency":[145],"by":[146,154],"30%,":[147],"decrease":[150],"energy":[152],"usage":[153],"25%":[155],"when":[156],"compared":[157],"alternative":[159],"results":[162],"emphasise":[163],"effectiveness":[165],"dependability":[167],"ensuring":[171],"secure":[172],"applications.":[177],"Keywords\u2014":[178],"WBAN,":[179],"Security,":[181],"ECC,":[182],"ECDSA,":[183],"AES":[184]},"counts_by_year":[{"year":2025,"cited_by_count":1},{"year":2024,"cited_by_count":1}],"updated_date":"2025-12-21T23:12:01.093139","created_date":"2025-10-10T00:00:00"}
