{"id":"https://openalex.org/W2995013646","doi":"https://doi.org/10.1109/tencon.2019.8929338","title":"Chaotic Map based Privacy Preservation User Authentication Scheme for WBANs","display_name":"Chaotic Map based Privacy Preservation User Authentication Scheme for WBANs","publication_year":2019,"publication_date":"2019-10-01","ids":{"openalex":"https://openalex.org/W2995013646","doi":"https://doi.org/10.1109/tencon.2019.8929338","mag":"2995013646"},"language":"en","primary_location":{"id":"doi:10.1109/tencon.2019.8929338","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tencon.2019.8929338","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"TENCON 2019 - 2019 IEEE Region 10 Conference (TENCON)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5042562507","display_name":"Shreeya Swagatika Sahoo","orcid":"https://orcid.org/0000-0003-0087-101X"},"institutions":[{"id":"https://openalex.org/I16292982","display_name":"National Institute of Technology Rourkela","ror":"https://ror.org/011gmn932","country_code":"IN","type":"education","lineage":["https://openalex.org/I16292982"]}],"countries":["IN"],"is_corresponding":true,"raw_author_name":"Shreeya Swagatika Sahoo","raw_affiliation_strings":["National Institute of Technology, Rourkela, India"],"affiliations":[{"raw_affiliation_string":"National Institute of Technology, Rourkela, India","institution_ids":["https://openalex.org/I16292982"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5101473793","display_name":"Sujata Mohanty","orcid":"https://orcid.org/0000-0002-3502-8201"},"institutions":[{"id":"https://openalex.org/I16292982","display_name":"National Institute of Technology Rourkela","ror":"https://ror.org/011gmn932","country_code":"IN","type":"education","lineage":["https://openalex.org/I16292982"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"Sujata Mohanty","raw_affiliation_strings":["National Institute of Technology, Rourkela, India"],"affiliations":[{"raw_affiliation_string":"National Institute of Technology, Rourkela, India","institution_ids":["https://openalex.org/I16292982"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5042562507"],"corresponding_institution_ids":["https://openalex.org/I16292982"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.23884925,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"138","issue":null,"first_page":"1037","last_page":"1042"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11800","display_name":"User Authentication and Security Systems","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11800","display_name":"User Authentication and Security Systems","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11504","display_name":"Advanced Authentication Protocols Security","score":0.9994000196456909,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":0.9923999905586243,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/body-area-network","display_name":"Body area network","score":0.7815736532211304},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7583122253417969},{"id":"https://openalex.org/keywords/authentication","display_name":"Authentication (law)","score":0.6035416722297668},{"id":"https://openalex.org/keywords/scheme","display_name":"Scheme (mathematics)","score":0.5826675295829773},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.5475547909736633},{"id":"https://openalex.org/keywords/wireless","display_name":"Wireless","score":0.5279628038406372},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.49289631843566895},{"id":"https://openalex.org/keywords/chaotic","display_name":"Chaotic","score":0.4741898477077484},{"id":"https://openalex.org/keywords/wireless-sensor-network","display_name":"Wireless sensor network","score":0.42283231019973755},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.09138420224189758},{"id":"https://openalex.org/keywords/telecommunications","display_name":"Telecommunications","score":0.08769389986991882}],"concepts":[{"id":"https://openalex.org/C88737568","wikidata":"https://www.wikidata.org/wiki/Q890056","display_name":"Body area network","level":3,"score":0.7815736532211304},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7583122253417969},{"id":"https://openalex.org/C148417208","wikidata":"https://www.wikidata.org/wiki/Q4825882","display_name":"Authentication (law)","level":2,"score":0.6035416722297668},{"id":"https://openalex.org/C77618280","wikidata":"https://www.wikidata.org/wiki/Q1155772","display_name":"Scheme (mathematics)","level":2,"score":0.5826675295829773},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.5475547909736633},{"id":"https://openalex.org/C555944384","wikidata":"https://www.wikidata.org/wiki/Q249","display_name":"Wireless","level":2,"score":0.5279628038406372},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.49289631843566895},{"id":"https://openalex.org/C2777052490","wikidata":"https://www.wikidata.org/wiki/Q5072826","display_name":"Chaotic","level":2,"score":0.4741898477077484},{"id":"https://openalex.org/C24590314","wikidata":"https://www.wikidata.org/wiki/Q336038","display_name":"Wireless sensor network","level":2,"score":0.42283231019973755},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.09138420224189758},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.08769389986991882},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.0},{"id":"https://openalex.org/C134306372","wikidata":"https://www.wikidata.org/wiki/Q7754","display_name":"Mathematical analysis","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/tencon.2019.8929338","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tencon.2019.8929338","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"TENCON 2019 - 2019 IEEE Region 10 Conference (TENCON)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":26,"referenced_works":["https://openalex.org/W1524160594","https://openalex.org/W1526070463","https://openalex.org/W1974831485","https://openalex.org/W1987185773","https://openalex.org/W1994358831","https://openalex.org/W2014209446","https://openalex.org/W2014783154","https://openalex.org/W2029693536","https://openalex.org/W2034523001","https://openalex.org/W2047541340","https://openalex.org/W2049851136","https://openalex.org/W2062821710","https://openalex.org/W2096426839","https://openalex.org/W2105114022","https://openalex.org/W2113446256","https://openalex.org/W2117064875","https://openalex.org/W2127593133","https://openalex.org/W2137407364","https://openalex.org/W2141134830","https://openalex.org/W2154909745","https://openalex.org/W2155392226","https://openalex.org/W2337399354","https://openalex.org/W2743834871","https://openalex.org/W2746329303","https://openalex.org/W6677372913","https://openalex.org/W6682554491"],"related_works":["https://openalex.org/W2141892890","https://openalex.org/W2004708907","https://openalex.org/W2084708142","https://openalex.org/W1975289146","https://openalex.org/W2889393088","https://openalex.org/W4285196759","https://openalex.org/W2551879879","https://openalex.org/W1975451135","https://openalex.org/W2242172122","https://openalex.org/W2397688129"],"abstract_inverted_index":{"The":[0,102,140],"rapid":[1],"development":[2],"of":[3,24,43,46,65,75,83,106,137,145],"wireless":[4],"communication":[5],"technologies":[6],"provides":[7,27],"convenient":[8],"and":[9,30,54,123,142],"efficient":[10],"online":[11],"services":[12],"to":[13,38,59,81,152],"make":[14],"life":[15],"easier.":[16],"Wireless":[17],"body":[18,53],"area":[19],"network":[20],"(WBAN)":[21],"such":[22],"type":[23],"service":[25],"which":[26,48],"a":[28,44,88],"simple":[29],"low-cost":[31],"strategy":[32],"for":[33,95,133],"health":[34],"monitoring":[35],"without":[36],"going":[37],"the":[39,51,56,60,63,66,73,99,107,134,146],"hospital.":[40],"WBAN":[41,96],"consists":[42],"number":[45],"sensors,":[47],"embedded":[49],"into":[50],"patient's":[52,76],"send":[55],"collected":[57],"information":[58],"server.":[61],"However,":[62],"privacy":[64,89],"patient":[67],"is":[68,131,149],"an":[69],"essential":[70],"feature":[71],"as":[72],"leakage":[74],"sensitive":[77],"data":[78],"cause":[79],"threats":[80],"tampering":[82],"health.":[84],"This":[85],"study":[86],"proposes":[87],"preservation":[90],"user":[91],"authentication":[92],"scheme":[93,108,148],"(PUASW)":[94],"based":[97],"on":[98],"chaotic":[100],"map.":[101],"formal":[103,135],"security":[104,121],"analysis":[105],"has":[109],"been":[110],"done":[111],"using":[112],"ROR":[113],"model.":[114],"In":[115],"addition,":[116],"PUASW":[117],"can":[118,124],"achieve":[119],"several":[120,126],"features":[122],"withstand":[125],"well-known":[127],"attacks.":[128],"AVISPA":[129],"tool":[130],"used":[132],"verification":[136],"our":[138],"scheme.":[139],"communicational":[141],"computational":[143],"cost":[144],"proposed":[147],"less":[150],"compared":[151],"other":[153],"related":[154],"schemes.":[155]},"counts_by_year":[],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
