{"id":"https://openalex.org/W2337833343","doi":"https://doi.org/10.1109/jsyst.2016.2544805","title":"Anonymous Authentication for Wireless Body Area Networks With Provable Security","display_name":"Anonymous Authentication for Wireless Body Area Networks With Provable Security","publication_year":2016,"publication_date":"2016-04-22","ids":{"openalex":"https://openalex.org/W2337833343","doi":"https://doi.org/10.1109/jsyst.2016.2544805","mag":"2337833343"},"language":"en","primary_location":{"id":"doi:10.1109/jsyst.2016.2544805","is_oa":false,"landing_page_url":"https://doi.org/10.1109/jsyst.2016.2544805","pdf_url":null,"source":{"id":"https://openalex.org/S95999327","display_name":"IEEE Systems Journal","issn_l":"1932-8184","issn":["1932-8184","1937-9234","2373-7816"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Systems Journal","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5025668908","display_name":"Debiao He","orcid":"https://orcid.org/0000-0002-2446-7436"},"institutions":[{"id":"https://openalex.org/I5343935","display_name":"Guilin University of Electronic Technology","ror":"https://ror.org/05arjae42","country_code":"CN","type":"education","lineage":["https://openalex.org/I5343935"]},{"id":"https://openalex.org/I37461747","display_name":"Wuhan University","ror":"https://ror.org/033vjfk17","country_code":"CN","type":"education","lineage":["https://openalex.org/I37461747"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Debiao He","raw_affiliation_strings":["Guangxi Key Laboratory of Trusted Software, Guilin University of Electronic Technology, Guilin, China","State Key Laboratory of Software Engineering, Computer School, Wuhan University, Wuhan, China"],"affiliations":[{"raw_affiliation_string":"Guangxi Key Laboratory of Trusted Software, Guilin University of Electronic Technology, Guilin, China","institution_ids":["https://openalex.org/I5343935"]},{"raw_affiliation_string":"State Key Laboratory of Software Engineering, Computer School, Wuhan University, Wuhan, China","institution_ids":["https://openalex.org/I37461747"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5002810652","display_name":"Sherali Zeadally","orcid":"https://orcid.org/0000-0002-5982-8190"},"institutions":[{"id":"https://openalex.org/I143302722","display_name":"University of Kentucky","ror":"https://ror.org/02k3smh20","country_code":"US","type":"education","lineage":["https://openalex.org/I143302722"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Sherali Zeadally","raw_affiliation_strings":["College of Communication and Information, University of Kentucky, Lexington, KY, US"],"affiliations":[{"raw_affiliation_string":"College of Communication and Information, University of Kentucky, Lexington, KY, US","institution_ids":["https://openalex.org/I143302722"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100409306","display_name":"Neeraj Kumar","orcid":"https://orcid.org/0000-0002-3020-3947"},"institutions":[{"id":"https://openalex.org/I162030827","display_name":"Thapar Institute of Engineering & Technology","ror":"https://ror.org/00wdq3744","country_code":"IN","type":"education","lineage":["https://openalex.org/I162030827"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"Neeraj Kumar","raw_affiliation_strings":["Department of Computer Science and Engineering, Thapar University, Patiala, India"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science and Engineering, Thapar University, Patiala, India","institution_ids":["https://openalex.org/I162030827"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5040263146","display_name":"Jong\u2010Hyouk Lee","orcid":"https://orcid.org/0000-0002-1753-1284"},"institutions":[{"id":"https://openalex.org/I157264075","display_name":"Sangmyung University","ror":"https://ror.org/01x4whx42","country_code":"KR","type":"education","lineage":["https://openalex.org/I157264075"]}],"countries":["KR"],"is_corresponding":false,"raw_author_name":"Jong-Hyouk Lee","raw_affiliation_strings":["Department of Computer Science and Engineering, Sangmyung, Cheonan, South"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science and Engineering, Sangmyung, Cheonan, South","institution_ids":["https://openalex.org/I157264075"]}]}],"institutions":[],"countries_distinct_count":4,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5025668908"],"corresponding_institution_ids":["https://openalex.org/I37461747","https://openalex.org/I5343935"],"apc_list":null,"apc_paid":null,"fwci":64.6812,"has_fulltext":false,"cited_by_count":434,"citation_normalized_percentile":{"value":0.99948886,"is_in_top_1_percent":true,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":99,"max":100},"biblio":{"volume":"11","issue":"4","first_page":"2590","last_page":"2601"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11504","display_name":"Advanced Authentication Protocols Security","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11504","display_name":"Advanced Authentication Protocols Security","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11932","display_name":"Wireless Body Area Networks","score":0.9991999864578247,"subfield":{"id":"https://openalex.org/subfields/2204","display_name":"Biomedical Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11800","display_name":"User Authentication and Security Systems","score":0.9991000294685364,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/body-area-network","display_name":"Body area network","score":0.7421607971191406},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7224042415618896},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.6461800336837769},{"id":"https://openalex.org/keywords/authentication","display_name":"Authentication (law)","score":0.6225987076759338},{"id":"https://openalex.org/keywords/confidentiality","display_name":"Confidentiality","score":0.5506311655044556},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.5312554240226746},{"id":"https://openalex.org/keywords/provable-security","display_name":"Provable security","score":0.5290580987930298},{"id":"https://openalex.org/keywords/scheme","display_name":"Scheme (mathematics)","score":0.4985949993133545},{"id":"https://openalex.org/keywords/wireless","display_name":"Wireless","score":0.47952723503112793},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.4771977365016937},{"id":"https://openalex.org/keywords/wireless-network","display_name":"Wireless network","score":0.41531702876091003},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.41268616914749146},{"id":"https://openalex.org/keywords/wireless-sensor-network","display_name":"Wireless sensor network","score":0.3934362530708313},{"id":"https://openalex.org/keywords/telecommunications","display_name":"Telecommunications","score":0.14171931147575378},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.10363036394119263}],"concepts":[{"id":"https://openalex.org/C88737568","wikidata":"https://www.wikidata.org/wiki/Q890056","display_name":"Body area network","level":3,"score":0.7421607971191406},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7224042415618896},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.6461800336837769},{"id":"https://openalex.org/C148417208","wikidata":"https://www.wikidata.org/wiki/Q4825882","display_name":"Authentication (law)","level":2,"score":0.6225987076759338},{"id":"https://openalex.org/C71745522","wikidata":"https://www.wikidata.org/wiki/Q2476929","display_name":"Confidentiality","level":2,"score":0.5506311655044556},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.5312554240226746},{"id":"https://openalex.org/C131672422","wikidata":"https://www.wikidata.org/wiki/Q852594","display_name":"Provable security","level":3,"score":0.5290580987930298},{"id":"https://openalex.org/C77618280","wikidata":"https://www.wikidata.org/wiki/Q1155772","display_name":"Scheme (mathematics)","level":2,"score":0.4985949993133545},{"id":"https://openalex.org/C555944384","wikidata":"https://www.wikidata.org/wiki/Q249","display_name":"Wireless","level":2,"score":0.47952723503112793},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.4771977365016937},{"id":"https://openalex.org/C108037233","wikidata":"https://www.wikidata.org/wiki/Q11375","display_name":"Wireless network","level":3,"score":0.41531702876091003},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.41268616914749146},{"id":"https://openalex.org/C24590314","wikidata":"https://www.wikidata.org/wiki/Q336038","display_name":"Wireless sensor network","level":2,"score":0.3934362530708313},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.14171931147575378},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.10363036394119263},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.0},{"id":"https://openalex.org/C134306372","wikidata":"https://www.wikidata.org/wiki/Q7754","display_name":"Mathematical analysis","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/jsyst.2016.2544805","is_oa":false,"landing_page_url":"https://doi.org/10.1109/jsyst.2016.2544805","pdf_url":null,"source":{"id":"https://openalex.org/S95999327","display_name":"IEEE Systems Journal","issn_l":"1932-8184","issn":["1932-8184","1937-9234","2373-7816"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Systems Journal","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G4925959090","display_name":null,"funder_award_id":"61501333","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G8895439857","display_name":null,"funder_award_id":"U1536204","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G8938912181","display_name":null,"funder_award_id":"61572379","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"}],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":50,"referenced_works":["https://openalex.org/W1515956306","https://openalex.org/W1541380988","https://openalex.org/W1569083856","https://openalex.org/W1667889362","https://openalex.org/W1880212920","https://openalex.org/W1905187848","https://openalex.org/W1966132871","https://openalex.org/W1968306950","https://openalex.org/W1986771771","https://openalex.org/W1990273327","https://openalex.org/W1996360405","https://openalex.org/W1996912680","https://openalex.org/W1998971834","https://openalex.org/W2003736153","https://openalex.org/W2019258915","https://openalex.org/W2023097234","https://openalex.org/W2036378739","https://openalex.org/W2047392174","https://openalex.org/W2059980308","https://openalex.org/W2065043957","https://openalex.org/W2081784444","https://openalex.org/W2108834246","https://openalex.org/W2109631601","https://openalex.org/W2112320278","https://openalex.org/W2113445132","https://openalex.org/W2115027138","https://openalex.org/W2122235704","https://openalex.org/W2124926080","https://openalex.org/W2130851966","https://openalex.org/W2146108785","https://openalex.org/W2161455567","https://openalex.org/W2164209841","https://openalex.org/W2164891257","https://openalex.org/W2169194339","https://openalex.org/W2252576427","https://openalex.org/W2263562411","https://openalex.org/W2395541925","https://openalex.org/W2397798400","https://openalex.org/W2404046799","https://openalex.org/W2541517468","https://openalex.org/W3041379456","https://openalex.org/W4232836212","https://openalex.org/W4241406615","https://openalex.org/W6630838861","https://openalex.org/W6639761791","https://openalex.org/W6691126936","https://openalex.org/W6693027903","https://openalex.org/W6711845211","https://openalex.org/W6712219031","https://openalex.org/W6713063751"],"related_works":["https://openalex.org/W4387497383","https://openalex.org/W3183948672","https://openalex.org/W3173606202","https://openalex.org/W3110381201","https://openalex.org/W2948807893","https://openalex.org/W2935909890","https://openalex.org/W2778153218","https://openalex.org/W2758277628","https://openalex.org/W1531601525","https://openalex.org/W2091483479"],"abstract_inverted_index":{"Advances":[0],"in":[1,45,62,194],"wireless":[2,13],"communications,":[3],"embedded":[4],"systems,":[5],"and":[6,68,96,121,145,171],"integrated":[7],"circuit":[8],"technologies":[9],"have":[10,38],"enabled":[11],"the":[12,25,33,65,70,90,101,138,191,200],"body":[14,67],"area":[15],"network":[16],"(WBAN)":[17],"to":[18,53,73,114],"become":[19],"a":[20,165,205],"promising":[21],"networking":[22],"paradigm.":[23],"Over":[24],"last":[26],"decade,":[27],"as":[28],"an":[29,42,158],"important":[30],"part":[31],"of":[32,35,50,92,128],"Internet":[34],"Things,":[36],"we":[37,136,163],"witnessed":[39],"WBANs":[40,80,111,144,170],"playing":[41],"increasing":[43],"role":[44],"modern":[46],"medical":[47,60,75,124,154],"systems":[48],"because":[49],"its":[51],"capabilities":[52],"collect":[54],"real-time":[55],"biomedical":[56],"data":[57,72],"through":[58],"intelligent":[59],"sensors":[61],"or":[63],"around":[64],"patients'":[66,98,119],"send":[69],"collected":[71],"remote":[74],"personnel":[76],"for":[77,110,143,153,169],"clinical":[78],"diagnostics.":[79],"not":[81,132,151,188],"only":[82,189],"bring":[83,88],"us":[84],"conveniences":[85],"but":[86,197],"also":[87,198],"along":[89],"challenge":[91],"keeping":[93],"data's":[94],"confidentiality":[95],"preserving":[97],"privacy.":[99],"In":[100],"past":[102],"few":[103],"years,":[104],"several":[105],"anonymous":[106],"authentication":[107],"(AA)":[108],"schemes":[109,130,196],"were":[112],"proposed":[113,185],"enhance":[115],"security":[116,192],"by":[117,122,156],"protecting":[118],"identities":[120],"encrypting":[123],"data.":[125],"However,":[126],"many":[127],"these":[129],"are":[131],"secure":[133,152],"enough.":[134],"First,":[135],"review":[137],"most":[139],"recent":[140],"AA":[141,167,186],"scheme":[142,168,187],"point":[146],"out":[147],"that":[148,173,183],"it":[149,174],"is":[150,175],"applications":[155],"proposing":[157],"impersonation":[159],"attack.":[160],"After":[161],"that,":[162],"propose":[164],"new":[166],"prove":[172],"provably":[176],"secure.":[177],"Our":[178],"detailed":[179],"analysis":[180],"results":[181],"demonstrate":[182],"our":[184],"overcomes":[190],"weaknesses":[193],"previous":[195],"has":[199],"same":[201],"computation":[202],"costs":[203],"at":[204],"client":[206],"side.":[207]},"counts_by_year":[{"year":2026,"cited_by_count":3},{"year":2025,"cited_by_count":15},{"year":2024,"cited_by_count":25},{"year":2023,"cited_by_count":31},{"year":2022,"cited_by_count":43},{"year":2021,"cited_by_count":53},{"year":2020,"cited_by_count":51},{"year":2019,"cited_by_count":57},{"year":2018,"cited_by_count":56},{"year":2017,"cited_by_count":53},{"year":2016,"cited_by_count":47}],"updated_date":"2026-03-31T07:56:22.981413","created_date":"2025-10-10T00:00:00"}
