{"id":"https://openalex.org/W2954926012","doi":"https://doi.org/10.4018/ijisp.201907010104","title":"A Priority Based Efficient Secure Framework for WBANs","display_name":"A Priority Based Efficient Secure Framework for WBANs","publication_year":2019,"publication_date":"2019-06-26","ids":{"openalex":"https://openalex.org/W2954926012","doi":"https://doi.org/10.4018/ijisp.201907010104","mag":"2954926012"},"language":"en","primary_location":{"id":"doi:10.4018/ijisp.201907010104","is_oa":false,"landing_page_url":"https://doi.org/10.4018/ijisp.201907010104","pdf_url":null,"source":{"id":"https://openalex.org/S191782446","display_name":"International Journal of Information Security and Privacy","issn_l":"1930-1650","issn":["1930-1650","1930-1669"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320547","host_organization_name":"Taylor & Francis","host_organization_lineage":["https://openalex.org/P4310320547"],"host_organization_lineage_names":["Taylor & Francis"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"International Journal of Information Security and Privacy","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5101812549","display_name":"Vinay Kumar Pathak","orcid":"https://orcid.org/0000-0002-5364-6281"},"institutions":[{"id":"https://openalex.org/I152429107","display_name":"Jawaharlal Nehru University","ror":"https://ror.org/0567v8t28","country_code":"IN","type":"education","lineage":["https://openalex.org/I152429107"]}],"countries":["IN"],"is_corresponding":true,"raw_author_name":"Vinay Pathak","raw_affiliation_strings":["JNU, New Delhi, India"],"affiliations":[{"raw_affiliation_string":"JNU, New Delhi, India","institution_ids":["https://openalex.org/I152429107"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":1,"corresponding_author_ids":["https://openalex.org/A5101812549"],"corresponding_institution_ids":["https://openalex.org/I152429107"],"apc_list":null,"apc_paid":null,"fwci":0.1769,"has_fulltext":false,"cited_by_count":1,"citation_normalized_percentile":{"value":0.5238747,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":94},"biblio":{"volume":"13","issue":"3","first_page":"60","last_page":"73"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10273","display_name":"IoT and Edge/Fog Computing","score":0.9987000226974487,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10273","display_name":"IoT and Edge/Fog Computing","score":0.9987000226974487,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11932","display_name":"Wireless Body Area Networks","score":0.9937999844551086,"subfield":{"id":"https://openalex.org/subfields/2204","display_name":"Biomedical Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11800","display_name":"User Authentication and Security Systems","score":0.9933000206947327,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8861707448959351},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.6908799409866333},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.5605935454368591},{"id":"https://openalex.org/keywords/wearable-computer","display_name":"Wearable computer","score":0.5232407450675964},{"id":"https://openalex.org/keywords/cloud-computing","display_name":"Cloud computing","score":0.5224398970603943},{"id":"https://openalex.org/keywords/scheme","display_name":"Scheme (mathematics)","score":0.4987809658050537},{"id":"https://openalex.org/keywords/point","display_name":"Point (geometry)","score":0.47549188137054443},{"id":"https://openalex.org/keywords/transmission","display_name":"Transmission (telecommunications)","score":0.44565582275390625},{"id":"https://openalex.org/keywords/access-control","display_name":"Access control","score":0.4166445732116699},{"id":"https://openalex.org/keywords/embedded-system","display_name":"Embedded system","score":0.12876072525978088},{"id":"https://openalex.org/keywords/telecommunications","display_name":"Telecommunications","score":0.11248672008514404}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8861707448959351},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.6908799409866333},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5605935454368591},{"id":"https://openalex.org/C150594956","wikidata":"https://www.wikidata.org/wiki/Q1334829","display_name":"Wearable computer","level":2,"score":0.5232407450675964},{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.5224398970603943},{"id":"https://openalex.org/C77618280","wikidata":"https://www.wikidata.org/wiki/Q1155772","display_name":"Scheme (mathematics)","level":2,"score":0.4987809658050537},{"id":"https://openalex.org/C28719098","wikidata":"https://www.wikidata.org/wiki/Q44946","display_name":"Point (geometry)","level":2,"score":0.47549188137054443},{"id":"https://openalex.org/C761482","wikidata":"https://www.wikidata.org/wiki/Q118093","display_name":"Transmission (telecommunications)","level":2,"score":0.44565582275390625},{"id":"https://openalex.org/C527821871","wikidata":"https://www.wikidata.org/wiki/Q228502","display_name":"Access control","level":2,"score":0.4166445732116699},{"id":"https://openalex.org/C149635348","wikidata":"https://www.wikidata.org/wiki/Q193040","display_name":"Embedded system","level":1,"score":0.12876072525978088},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.11248672008514404},{"id":"https://openalex.org/C134306372","wikidata":"https://www.wikidata.org/wiki/Q7754","display_name":"Mathematical analysis","level":1,"score":0.0},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.0},{"id":"https://openalex.org/C2524010","wikidata":"https://www.wikidata.org/wiki/Q8087","display_name":"Geometry","level":1,"score":0.0},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.4018/ijisp.201907010104","is_oa":false,"landing_page_url":"https://doi.org/10.4018/ijisp.201907010104","pdf_url":null,"source":{"id":"https://openalex.org/S191782446","display_name":"International Journal of Information Security and Privacy","issn_l":"1930-1650","issn":["1930-1650","1930-1669"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320547","host_organization_name":"Taylor & Francis","host_organization_lineage":["https://openalex.org/P4310320547"],"host_organization_lineage_names":["Taylor & Francis"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"International Journal of Information Security and Privacy","raw_type":"journal-article"},{"id":"pmh:oai:RePEc:igg:jisp00:v:13:y:2019:i:3:p:60-73","is_oa":false,"landing_page_url":"https://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/IJISP.201907010104","pdf_url":null,"source":{"id":"https://openalex.org/S4306401271","display_name":"RePEc: Research Papers in Economics","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I77793887","host_organization_name":"Federal Reserve Bank of St. Louis","host_organization_lineage":["https://openalex.org/I77793887"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"article"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/17","score":0.49000000953674316,"display_name":"Partnerships for the goals"}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":24,"referenced_works":["https://openalex.org/W104388124","https://openalex.org/W126559538","https://openalex.org/W166538240","https://openalex.org/W1975767766","https://openalex.org/W1982170863","https://openalex.org/W1985337793","https://openalex.org/W1990243826","https://openalex.org/W1997761926","https://openalex.org/W2001291669","https://openalex.org/W2044520096","https://openalex.org/W2050003166","https://openalex.org/W2065064909","https://openalex.org/W2069819474","https://openalex.org/W2088464403","https://openalex.org/W2104556933","https://openalex.org/W2108978118","https://openalex.org/W2116046740","https://openalex.org/W2127641629","https://openalex.org/W2131496831","https://openalex.org/W2139863669","https://openalex.org/W2152997435","https://openalex.org/W2156877380","https://openalex.org/W2419534323","https://openalex.org/W3163671086"],"related_works":["https://openalex.org/W4244478748","https://openalex.org/W4223488648","https://openalex.org/W2134969820","https://openalex.org/W2251605416","https://openalex.org/W4389340727","https://openalex.org/W4205786897","https://openalex.org/W3150465815","https://openalex.org/W2802581102","https://openalex.org/W1997222214","https://openalex.org/W2070395303"],"abstract_inverted_index":{"In":[0],"this":[1],"article,":[2],"the":[3,43,93,120,123,126,141,153,156],"authors":[4],"propose":[5,18],"a":[6,46,67,73],"system":[7,83],"to":[8,60,102,118],"gather":[9],"patient":[10],"information":[11,65,88],"continuously,":[12],"perform":[13],"proper":[14],"non-intrusive":[15],"checking,":[16],"and":[17,30,42,78,95,125],"restorative":[19],"or":[20,108],"potentially":[21],"way":[22],"of":[23,49,100,122],"life":[24],"engagements,":[25],"at":[26],"whatever":[27],"point":[28],"required":[29],"proper.":[31],"The":[32],"structure,":[33,124],"which":[34],"depends":[35],"on":[36],"administration":[37],"arranged":[38],"service":[39],"as":[40],"application(SOAs)":[41],"Cloud,":[44],"permits":[45],"consistent":[47],"combination":[48],"various":[50],"innovations,":[51],"applications,":[52],"also,":[53],"administrations.":[54],"It":[55,151],"additionally":[56],"integrates":[57],"mobile":[58],"advances":[59],"easily":[61],"gather,":[62],"convey":[63],"imperative":[64],"from":[66],"patient's":[68],"wearable":[69],"biosensors":[70],"while":[71],"considering":[72],"cell":[74],"phones'":[75],"restricted":[76],"abilities":[77],"control":[79],"seepage,":[80],"notwithstanding":[81],"discontinuous":[82],"detachments.":[84],"At":[85],"that":[86,129],"point,":[87],"is":[89],"put":[90],"away":[91],"in":[92,155],"Cloud":[94],"made":[96],"accessible":[97],"by":[98,105],"means":[99],"SOA":[101],"permit":[103],"access":[104],"doctors,":[106],"paramedics,":[107],"other":[109],"approved":[110],"authorities.":[111],"A":[112],"contextual":[113],"investigation":[114],"has":[115],"been":[116,131],"created":[117],"assess":[119],"convenience":[121],"preparatory":[127],"outcomes":[128],"have":[130,145],"broken":[132],"down":[133],"are":[134],"demonstrating":[135],"exceptionally":[136],"encouraging":[137],"outcomes.":[138],"To":[139],"secure":[140],"data":[142,148],"transmission,":[143],"they":[144],"applied":[146],"identity-based":[147],"encryption":[149],"scheme.":[150],"enhances":[152],"security":[154],"authors'":[157],"framework.":[158]},"counts_by_year":[{"year":2022,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
