{"id":"https://openalex.org/W4293704646","doi":"https://doi.org/10.1109/tii.2022.3202968","title":"A Provably Secure Lightweight Key Agreement Protocol for Wireless Body Area Networks in Healthcare System","display_name":"A Provably Secure Lightweight Key Agreement Protocol for Wireless Body Area Networks in Healthcare System","publication_year":2022,"publication_date":"2022-08-30","ids":{"openalex":"https://openalex.org/W4293704646","doi":"https://doi.org/10.1109/tii.2022.3202968"},"language":"en","primary_location":{"id":"doi:10.1109/tii.2022.3202968","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tii.2022.3202968","pdf_url":null,"source":{"id":"https://openalex.org/S184777250","display_name":"IEEE Transactions on Industrial Informatics","issn_l":"1551-3203","issn":["1551-3203","1941-0050"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Industrial Informatics","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5110594862","display_name":"Maryam Zia","orcid":null},"institutions":[{"id":"https://openalex.org/I16076960","display_name":"COMSATS University Islamabad","ror":"https://ror.org/00nqqvk19","country_code":"PK","type":"education","lineage":["https://openalex.org/I16076960"]}],"countries":["PK"],"is_corresponding":true,"raw_author_name":"Maryam Zia","raw_affiliation_strings":["Department of Computer Science, COMSATS University Islamabad, Sahiwal, Pakistan"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, COMSATS University Islamabad, Sahiwal, Pakistan","institution_ids":["https://openalex.org/I16076960"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5051195514","display_name":"Mohammad S. Obaidat","orcid":"https://orcid.org/0000-0002-1569-9657"},"institutions":[{"id":"https://openalex.org/I92403157","display_name":"University of Science and Technology Beijing","ror":"https://ror.org/02egmk993","country_code":"CN","type":"education","lineage":["https://openalex.org/I92403157"]},{"id":"https://openalex.org/I114972647","display_name":"University of Jordan","ror":"https://ror.org/05k89ew48","country_code":"JO","type":"education","lineage":["https://openalex.org/I114972647"]},{"id":"https://openalex.org/I191972202","display_name":"Amity University","ror":"https://ror.org/02n9z0v62","country_code":"IN","type":"education","lineage":["https://openalex.org/I191972202"]},{"id":"https://openalex.org/I114580094","display_name":"The University of Texas of the Permian Basin","ror":"https://ror.org/051smbs96","country_code":"US","type":"education","lineage":["https://openalex.org/I114580094"]}],"countries":["CN","IN","JO","US"],"is_corresponding":false,"raw_author_name":"Mohammad S. Obaidat","raw_affiliation_strings":["Department of Computer Science, and Cybersecurity Center, University of Texas-Permian Basin, Odessa, TX, USA","King Abdullah II School of Information Technology, University of Jordan, Amman, Jordan","Amity University, Noida, UP, India","School of Computer and Communication Engineering, University of Science and Technology Beijing, Beijing, China"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, and Cybersecurity Center, University of Texas-Permian Basin, Odessa, TX, USA","institution_ids":["https://openalex.org/I114580094"]},{"raw_affiliation_string":"King Abdullah II School of Information Technology, University of Jordan, Amman, Jordan","institution_ids":["https://openalex.org/I114972647"]},{"raw_affiliation_string":"Amity University, Noida, UP, India","institution_ids":["https://openalex.org/I191972202"]},{"raw_affiliation_string":"School of Computer and Communication Engineering, University of Science and Technology Beijing, Beijing, China","institution_ids":["https://openalex.org/I92403157"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5023371922","display_name":"Khalid Mahmood","orcid":"https://orcid.org/0000-0001-5046-7766"},"institutions":[{"id":"https://openalex.org/I75357094","display_name":"National Yunlin University of Science and Technology","ror":"https://ror.org/04qkq2m54","country_code":"TW","type":"education","lineage":["https://openalex.org/I75357094"]}],"countries":["TW"],"is_corresponding":false,"raw_author_name":"Khalid Mahmood","raw_affiliation_strings":["Future Technology Research Center, National Yunlin University of Science and Technology, Yunlin, Taiwan"],"affiliations":[{"raw_affiliation_string":"Future Technology Research Center, National Yunlin University of Science and Technology, Yunlin, Taiwan","institution_ids":["https://openalex.org/I75357094"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5017367371","display_name":"Salman Shamshad","orcid":"https://orcid.org/0000-0002-8984-3199"},"institutions":[{"id":"https://openalex.org/I142204992","display_name":"University of Lahore","ror":"https://ror.org/051jrjw38","country_code":"PK","type":"education","lineage":["https://openalex.org/I142204992"]}],"countries":["PK"],"is_corresponding":false,"raw_author_name":"Salman Shamshad","raw_affiliation_strings":["Department of Software Engineering, The University of Lahore, Lahore, Pakistan"],"affiliations":[{"raw_affiliation_string":"Department of Software Engineering, The University of Lahore, Lahore, Pakistan","institution_ids":["https://openalex.org/I142204992"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5035264127","display_name":"Muhammad Asad Saleem","orcid":"https://orcid.org/0009-0001-0308-601X"},"institutions":[{"id":"https://openalex.org/I16076960","display_name":"COMSATS University Islamabad","ror":"https://ror.org/00nqqvk19","country_code":"PK","type":"education","lineage":["https://openalex.org/I16076960"]}],"countries":["PK"],"is_corresponding":false,"raw_author_name":"Muhammad Asad Saleem","raw_affiliation_strings":["Department of Computer Science, COMSATS University Islamabad, Sahiwal, Pakistan"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, COMSATS University Islamabad, Sahiwal, Pakistan","institution_ids":["https://openalex.org/I16076960"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5047048551","display_name":"Shehzad Ashraf Chaudhry","orcid":"https://orcid.org/0000-0002-9321-6956"},"institutions":[{"id":"https://openalex.org/I282159120","display_name":"\u0130stanbul Ni\u015fanta\u015f\u0131 \u00dcniversitesi","ror":"https://ror.org/04tah3159","country_code":"TR","type":"education","lineage":["https://openalex.org/I282159120"]},{"id":"https://openalex.org/I117222138","display_name":"Abu Dhabi University","ror":"https://ror.org/01r3kjq03","country_code":"AE","type":"education","lineage":["https://openalex.org/I117222138"]}],"countries":["AE","TR"],"is_corresponding":false,"raw_author_name":"Shehzad Ashraf Chaudhry","raw_affiliation_strings":["Department of Computer Science and Information Technology, College of Engineering, Abu Dhabi University, Abu Dhabi, UAE","Department of Computer Engineering, Faculty of Engineering and Architecture, Nisantasi University, Istanbul, Turkey"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science and Information Technology, College of Engineering, Abu Dhabi University, Abu Dhabi, UAE","institution_ids":["https://openalex.org/I117222138"]},{"raw_affiliation_string":"Department of Computer Engineering, Faculty of Engineering and Architecture, Nisantasi University, Istanbul, Turkey","institution_ids":["https://openalex.org/I282159120"]}]}],"institutions":[],"countries_distinct_count":8,"institutions_distinct_count":6,"corresponding_author_ids":["https://openalex.org/A5110594862"],"corresponding_institution_ids":["https://openalex.org/I16076960"],"apc_list":null,"apc_paid":null,"fwci":2.931,"has_fulltext":false,"cited_by_count":38,"citation_normalized_percentile":{"value":0.91519354,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":89,"max":100},"biblio":{"volume":"19","issue":"2","first_page":"1683","last_page":"1690"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11932","display_name":"Wireless Body Area Networks","score":0.9991999864578247,"subfield":{"id":"https://openalex.org/subfields/2204","display_name":"Biomedical Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11932","display_name":"Wireless Body Area Networks","score":0.9991999864578247,"subfield":{"id":"https://openalex.org/subfields/2204","display_name":"Biomedical Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11504","display_name":"Advanced Authentication Protocols Security","score":0.9980000257492065,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11800","display_name":"User Authentication and Security Systems","score":0.9916999936103821,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7598082423210144},{"id":"https://openalex.org/keywords/protocol","display_name":"Protocol (science)","score":0.6710429191589355},{"id":"https://openalex.org/keywords/body-area-network","display_name":"Body area network","score":0.6504132747650146},{"id":"https://openalex.org/keywords/scalability","display_name":"Scalability","score":0.6238885521888733},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.6011369824409485},{"id":"https://openalex.org/keywords/key-agreement-protocol","display_name":"Key-agreement protocol","score":0.5880830883979797},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.5838655233383179},{"id":"https://openalex.org/keywords/authentication","display_name":"Authentication (law)","score":0.5527023673057556},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.5132808685302734},{"id":"https://openalex.org/keywords/wireless","display_name":"Wireless","score":0.4384562075138092},{"id":"https://openalex.org/keywords/wireless-sensor-network","display_name":"Wireless sensor network","score":0.4281122088432312},{"id":"https://openalex.org/keywords/authentication-protocol","display_name":"Authentication protocol","score":0.4132338762283325},{"id":"https://openalex.org/keywords/public-key-cryptography","display_name":"Public-key cryptography","score":0.17842265963554382},{"id":"https://openalex.org/keywords/key-distribution","display_name":"Key distribution","score":0.1600913107395172},{"id":"https://openalex.org/keywords/medicine","display_name":"Medicine","score":0.09793928265571594},{"id":"https://openalex.org/keywords/telecommunications","display_name":"Telecommunications","score":0.09148311614990234},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.08738338947296143}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7598082423210144},{"id":"https://openalex.org/C2780385302","wikidata":"https://www.wikidata.org/wiki/Q367158","display_name":"Protocol (science)","level":3,"score":0.6710429191589355},{"id":"https://openalex.org/C88737568","wikidata":"https://www.wikidata.org/wiki/Q890056","display_name":"Body area network","level":3,"score":0.6504132747650146},{"id":"https://openalex.org/C48044578","wikidata":"https://www.wikidata.org/wiki/Q727490","display_name":"Scalability","level":2,"score":0.6238885521888733},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.6011369824409485},{"id":"https://openalex.org/C135530808","wikidata":"https://www.wikidata.org/wiki/Q3306713","display_name":"Key-agreement protocol","level":5,"score":0.5880830883979797},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5838655233383179},{"id":"https://openalex.org/C148417208","wikidata":"https://www.wikidata.org/wiki/Q4825882","display_name":"Authentication (law)","level":2,"score":0.5527023673057556},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.5132808685302734},{"id":"https://openalex.org/C555944384","wikidata":"https://www.wikidata.org/wiki/Q249","display_name":"Wireless","level":2,"score":0.4384562075138092},{"id":"https://openalex.org/C24590314","wikidata":"https://www.wikidata.org/wiki/Q336038","display_name":"Wireless sensor network","level":2,"score":0.4281122088432312},{"id":"https://openalex.org/C21564112","wikidata":"https://www.wikidata.org/wiki/Q4825885","display_name":"Authentication protocol","level":3,"score":0.4132338762283325},{"id":"https://openalex.org/C203062551","wikidata":"https://www.wikidata.org/wiki/Q201339","display_name":"Public-key cryptography","level":3,"score":0.17842265963554382},{"id":"https://openalex.org/C160333310","wikidata":"https://www.wikidata.org/wiki/Q6398153","display_name":"Key distribution","level":4,"score":0.1600913107395172},{"id":"https://openalex.org/C71924100","wikidata":"https://www.wikidata.org/wiki/Q11190","display_name":"Medicine","level":0,"score":0.09793928265571594},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.09148311614990234},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.08738338947296143},{"id":"https://openalex.org/C142724271","wikidata":"https://www.wikidata.org/wiki/Q7208","display_name":"Pathology","level":1,"score":0.0},{"id":"https://openalex.org/C204787440","wikidata":"https://www.wikidata.org/wiki/Q188504","display_name":"Alternative medicine","level":2,"score":0.0},{"id":"https://openalex.org/C77088390","wikidata":"https://www.wikidata.org/wiki/Q8513","display_name":"Database","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/tii.2022.3202968","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tii.2022.3202968","pdf_url":null,"source":{"id":"https://openalex.org/S184777250","display_name":"IEEE Transactions on Industrial Informatics","issn_l":"1551-3203","issn":["1551-3203","1941-0050"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Industrial Informatics","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":21,"referenced_works":["https://openalex.org/W2029693536","https://openalex.org/W2130851966","https://openalex.org/W2557978403","https://openalex.org/W2756359791","https://openalex.org/W2800426337","https://openalex.org/W2803406207","https://openalex.org/W2810202339","https://openalex.org/W2901557799","https://openalex.org/W2954321248","https://openalex.org/W2971337410","https://openalex.org/W2974672782","https://openalex.org/W3015083928","https://openalex.org/W3028449155","https://openalex.org/W3035397172","https://openalex.org/W3048149989","https://openalex.org/W3135865669","https://openalex.org/W3171160034","https://openalex.org/W3198859501","https://openalex.org/W4206975148","https://openalex.org/W4210243669","https://openalex.org/W4225524969"],"related_works":["https://openalex.org/W2034419863","https://openalex.org/W2397688129","https://openalex.org/W3007106793","https://openalex.org/W2296396257","https://openalex.org/W2132505069","https://openalex.org/W1965515427","https://openalex.org/W2547137208","https://openalex.org/W2116285675","https://openalex.org/W2054202867","https://openalex.org/W2109882692"],"abstract_inverted_index":{"Wireless":[0],"Body":[1],"Area":[2],"Network":[3],"(WBAN)":[4],"is":[5,63,84,104,153],"a":[6,17,22,73],"vital":[7],"application":[8],"of":[9,12,127,134,143,151],"the":[10,57,101,140,144,148,156],"Internet":[11],"Things":[13],"(IoT)":[14],"that":[15,100],"plays":[16],"significant":[18],"role":[19],"in":[20,109,125],"gathering":[21],"patient's":[23],"healthcare":[24],"information.":[25,69],"This":[26,70],"collected":[27],"data":[28],"helps":[29],"special":[30],"professionals":[31],"like":[32],"doctors":[33],"or":[34],"physicians":[35],"analyze":[36],"patients'":[37],"health":[38],"status":[39],"to":[40,56,65,90],"cure":[41],"different":[42],"diseases.":[43],"However,":[44],"collecting":[45],"such":[46],"information":[47],"from":[48,147],"an":[49],"insecure":[50],"channel":[51],"can":[52],"be":[53],"threatening":[54],"due":[55],"potential":[58],"security":[59,97],"threats.":[60],"Therefore,":[61],"it":[62],"crucial":[64],"secure":[66,74],"this":[67],"sensitive":[68],"article":[71],"proposes":[72],"and":[75,87,107,129,136],"lightweight":[76,88],"authentication":[77],"protocol":[78,83,103,146],"for":[79],"WBAN.":[80],"The":[81,95,114],"devised":[82],"scalable,":[85],"secure,":[86,106],"compared":[89],"various":[91,111,122],"relevant":[92],"competing":[93,123],"protocols.":[94],"informal":[96],"analysis":[98,116],"shows":[99],"designed":[102,145],"lightweight,":[105],"efficient":[108],"resisting":[110],"major":[112],"attacks.":[113],"performance":[115,142],"demonstrates":[117],"our":[118],"protocol's":[119],"supremacy":[120],"over":[121],"protocols":[124],"terms":[126],"computation":[128],"communication":[130],"costs,":[131],"inducing":[132],"efficiency":[133],"20.3%":[135],"12.3%,":[137],"respectively.":[138],"Moreover,":[139],"practical":[141],"network":[149],"point":[150],"view":[152],"measured":[154],"using":[155],"widely":[157],"recognized":[158],"NS3":[159],"simulation":[160],"tool.":[161]},"counts_by_year":[{"year":2026,"cited_by_count":2},{"year":2025,"cited_by_count":13},{"year":2024,"cited_by_count":12},{"year":2023,"cited_by_count":10},{"year":2022,"cited_by_count":1}],"updated_date":"2026-03-05T09:29:38.588285","created_date":"2025-10-10T00:00:00"}
