Secure and low computation authentication protocol for Wireless Body Area Network with ECC and 2D hash chain.
Soohyeon ChoiSangwon ShinXiaozhu JinSung ShinPublished in: RACS (2020)
Keyphrases
- authentication protocol
- security analysis
- hash functions
- smart card
- public key
- lightweight
- password authentication
- mobile communication
- authentication scheme
- security protocols
- authentication mechanism
- rfid tags
- network traffic
- user authentication
- secret key
- mutual authentication
- rfid systems
- wireless communication
- computer networks
- trusted third party
- wireless sensor networks
- cryptographic protocols
- peer to peer
- key distribution
- wireless networks
- private key
- diffie hellman
- digital signature
- elliptic curve
- security requirements