{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,6]],"date-time":"2026-02-06T06:23:15Z","timestamp":1770358995856,"version":"3.49.0"},"reference-count":34,"publisher":"Emerald","issue":"4","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024,11,8]]},"abstract":"<jats:sec>\n                  <jats:title>Purpose<\/jats:title>\n                  <jats:p>A wireless body area network (WBAN) is a collection of sensing devices attached to a person\u2019s body that is typically used during health care to track their physical state. This paper aims to study the security challenges and various attacks that occurred while transferring a person\u2019s sensitive medical diagnosis information in WBAN.<\/jats:p>\n               <\/jats:sec>\n               <jats:sec>\n                  <jats:title>Design\/methodology\/approach<\/jats:title>\n                  <jats:p>This technology has significantly gained prominence in the medical field. These wearable sensors are transferring information to doctors, and there are numerous possibilities for an intruder to pose as a doctor and obtain information about the patient\u2019s vital information. As a result, mutual authentication and session key negotiations are critical security challenges for wearable sensing devices in WBAN. This work proposes an improved mutual authentication and key agreement protocol for wearable sensing devices in WBAN. The existing related schemes require more computational and storage requirements, but the proposed method provides a flexible solution with less complexity.<\/jats:p>\n               <\/jats:sec>\n               <jats:sec>\n                  <jats:title>Findings<\/jats:title>\n                  <jats:p>As sensor devices are resource-constrained, proposed approach only makes use of cryptographic hash-functions and bit-wise XOR operations, hence it is lightweight and flexible. The protocol\u2019s security is validated using the AVISPA tool, and it will withstand various security attacks. The proposed protocol\u2019s simulation and performance analysis are compared to current relevant schemes and show that it produces efficient outcomes.<\/jats:p>\n               <\/jats:sec>\n               <jats:sec>\n                  <jats:title>Originality\/value<\/jats:title>\n                  <jats:p>This technology has significantly gained prominence in the medical sector. These sensing devises transmit information to doctors, and there are possibilities for an intruder to pose as a doctor and obtain information about the patient\u2019s vital information. Hence, this paper proposes a lightweight and flexible protocol for mutual authentication and key agreement for wearable sensing devices in WBAN only makes use of cryptographic hash-functions and bit-wise XOR operations. The proposed protocol is simulated using AVISPA tool and its performance is better compared to the existing methods. This paper proposes a novel improved mutual authentication and key-agreement protocol for wearable sensing devices in WBAN.<\/jats:p>\n               <\/jats:sec>","DOI":"10.1108\/ijpcc-06-2021-0144","type":"journal-article","created":{"date-parts":[[2022,1,13]],"date-time":"2022-01-13T03:48:03Z","timestamp":1642045683000},"page":"398-414","source":"Crossref","is-referenced-by-count":2,"title":["A lightweight and flexible mutual authentication and key agreement protocol for wearable sensing devices in WBAN"],"prefix":"10.1108","volume":"20","author":[{"given":"Sandeep Kumar Reddy","family":"Thota","sequence":"first","affiliation":[{"name":"Rajiv Gandhi University of Knowledge Technologies \u2013 RK Valley Campus Department of Computer Science and Engineering, , Kadapa,","place":["India"]}]},{"given":"C.","family":"Mala","sequence":"additional","affiliation":[{"name":"National Institute of Technology Tiruchirappalli Department of Computer Science and Engineering, , Tiruchirappalli,","place":["India"]}]},{"given":"Geetha","family":"Krishnan","sequence":"additional","affiliation":[{"name":"SASTRA University , Thanjavur,","place":["India"]}]}],"member":"140","published-online":{"date-parts":[[2022,1,14]]},"reference":[{"issue":"1","key":"2025090904245998000_ref001","doi-asserted-by":"publisher","DOI":"10.1007\/s12083-017-0627-8","article-title":"Lightweight and anonymous three-factor authentication and access control scheme for real-time applications in wireless sensor networks","volume":"12","author":"Adavoudi-Jolfaei","year":"2017","journal-title":"Peer-to-Peer Netw. Appl"},{"key":"2025090904245998000_ref002","doi-asserted-by":"publisher","first-page":"58","DOI":"10.1016\/j.adhoc.2015.05.020","article-title":"A secure light weight scheme for user authentication and key agreement in multi-gateway based wireless sensor networks","volume":"36","author":"Amin","year":"2016","journal-title":"Ad Hoc Networks"},{"key":"2025090904245998000_ref003","doi-asserted-by":"crossref","first-page":"281","DOI":"10.1007\/11513988_27","volume-title":"Computer Aided Verification","author":"Armando","year":"2005"},{"key":"2025090904245998000_ref004","unstructured":"AVISPA\n           (2018), \u201cAutomated validation of internet security protocols and applications\u201d, http:\/\/www.avispa-project.org (accessed May 2018)."},{"issue":"7","key":"2025090904245998000_ref005","doi-asserted-by":"crossref","first-page":"1074","DOI":"10.3390\/app8071074","article-title":"An anonymous mutual authenticated key agreement scheme for wearable sensors in wireless body area networks","volume":"8","author":"Chen","year":"2018","journal-title":"Applied Sciences"},{"issue":"3","key":"2025090904245998000_ref006","doi-asserted-by":"publisher","first-page":"1086","DOI":"10.1109\/TWC.2008.080128","article-title":"Two-factor user authentication in wireless sensor networks","volume":"8","author":"Das","year":"2009","journal-title":"IEEE Transactions on Wireless Communications"},{"issue":"2","key":"2025090904245998000_ref007","doi-asserted-by":"publisher","first-page":"198","DOI":"10.1109\/TIT.1983.1056650","article-title":"On the security of public key protocols","volume":"29","author":"Dolev","year":"1983","journal-title":"IEEE Transactions on Information Theory"},{"key":"2025090904245998000_ref008","article-title":"Authentication protocols for internet of things: a comprehensive survey","volume":"2017","author":"Ferrag","year":"2016","journal-title":"Security and Communication Networks"},{"issue":"11","key":"2025090904245998000_ref009","doi-asserted-by":"publisher","first-page":"7124","DOI":"10.1109\/TIE.2016.2585081","article-title":"A realistic lightweight anonymous authentication protocol for securing real-time application data access in wireless sensor networks","volume":"63","author":"Gope","year":"2016","journal-title":"IEEE Transactions on Industrial Electronics"},{"key":"2025090904245998000_ref010","doi-asserted-by":"publisher","first-page":"311","DOI":"10.1016\/j.comcom.2020.06.010","article-title":"A provably secure and efficient anonymous mutual authentication and key agreement protocol for wearable devices in WBAN","volume":"160","author":"Gupta","year":"2020","journal-title":"Computer Communications"},{"key":"2025090904245998000_ref011","doi-asserted-by":"publisher","first-page":"29","DOI":"10.1016\/j.comnet.2018.11.021","article-title":"A lightweight anonymous user authentication and key establishment scheme for wearable devices","volume":"149","author":"Gupta","year":"2019","journal-title":"Computer Networks"},{"key":"2025090904245998000_ref012","doi-asserted-by":"publisher","first-page":"678","DOI":"10.1109\/ACCESS.2015.2437951","article-title":"The internet of things for health care: a comprehensive survey","volume":"3","author":"Islam","year":"2015","journal-title":"IEEE Access"},{"issue":"3","key":"2025090904245998000_ref013","doi-asserted-by":"publisher","first-page":"2450","DOI":"10.3390\/s100302450","article-title":"Cryptanalysis and security improvements of \u2018two-factor user authentication in wireless sensor networks","volume":"10","author":"Khan","year":"2010","journal-title":"Sensors"},{"key":"2025090904245998000_ref014","doi-asserted-by":"publisher","first-page":"196","DOI":"10.1016\/j.comnet.2018.11.016","article-title":"A robust and efficient mutual authentication and key agreement scheme with untraceability for WBANs","volume":"148","author":"Kompara","year":"2019","journal-title":"Computer Networks"},{"key":"2025090904245998000_ref015","doi-asserted-by":"publisher","first-page":"138","DOI":"10.1016\/j.comnet.2018.05.006","article-title":"Anonymous hybrid mutual authentication and key agreement scheme for wireless body area network","volume":"140","author":"Koya","year":"2018","journal-title":"Computer Networks"},{"issue":"2","key":"2025090904245998000_ref016","doi-asserted-by":"crossref","first-page":"539","DOI":"10.3390\/s20020539","article-title":"IOT resource allocation and optimization based on heuristic algorithm","volume":"20","author":"Kumar","year":"2020","journal-title":"Sensors"},{"issue":"5","key":"2025090904245998000_ref017","doi-asserted-by":"publisher","first-page":"1365","DOI":"10.1016\/j.jnca.2013.02.034","article-title":"An enhanced smart card based remote user password authentication scheme","volume":"36","author":"Li","year":"2013","journal-title":"Journal of Network and Computer Applications"},{"issue":"1","key":"2025090904245998000_ref018","doi-asserted-by":"publisher","first-page":"85","DOI":"10.1016\/j.mcm.2012.06.033","article-title":"A novel smart card and dynamic ID based remote user authentication scheme for multi-server environments","volume":"58","author":"Li","year":"2013","journal-title":"Mathematical and Computer Modelling"},{"issue":"1","key":"2025090904245998000_ref019","doi-asserted-by":"publisher","first-page":"73","DOI":"10.1016\/j.jnca.2010.09.003","article-title":"Cryptanalysis and improvement of a biometrics-based remote user authentication scheme using smart cards","volume":"34","author":"Li","year":"2011","journal-title":"Journal of Network and Computer Applications"},{"issue":"P2","key":"2025090904245998000_ref020","doi-asserted-by":"publisher","first-page":"429","DOI":"10.1016\/j.comnet.2017.03.013","article-title":"Anonymous mutual authentication and key agreement scheme for wearable sensors in wireless body area networks","volume":"129","author":"Li","year":"2017","journal-title":"Computer Networks"},{"key":"2025090904245998000_ref021","doi-asserted-by":"publisher","first-page":"152","DOI":"10.1016\/j.adhoc.2015.05.014","article-title":"An efficient user authentication and key agreement scheme for heterogeneous wireless sensor network tailored for the internet of things environment","volume":"36","author":"Mohammad","year":"2016","journal-title":"Ad Hoc Netw"},{"key":"2025090904245998000_ref022","doi-asserted-by":"publisher","first-page":"96","DOI":"10.1016\/j.adhoc.2014.03.009","article-title":"A novel user authentication and key agreement scheme for heterogeneous ad hoc wireless sensor networks, based on the internet of things notion","volume":"20","author":"Muhamed","year":"2014","journal-title":"Ad Hoc Netw"},{"issue":"7","key":"2025090904245998000_ref023","doi-asserted-by":"crossref","first-page":"4189","DOI":"10.1109\/TII.2019.2898174","article-title":"Enforcing position-based confidentiality with machine learning paradigm through mobile edge computing in real-time industrial informatics","volume":"15","author":"Sangaiah","year":"2019","journal-title":"IEEE Transactions on Industrial Informatics"},{"issue":"4","key":"2025090904245998000_ref024","doi-asserted-by":"publisher","first-page":"2573","DOI":"10.1109\/COMST.2017.2731979","article-title":"A survey of wearable devices and challenges","volume":"19","author":"Seneviratne","year":"2017","journal-title":"IEEE Communications Surveys and Tutorials"},{"key":"2025090904245998000_ref025","doi-asserted-by":"crossref","DOI":"10.1017\/CBO9780511807213","volume-title":"Fundamentals of Wireless Communication","author":"Tse","year":"2005"},{"key":"2025090904245998000_ref026","doi-asserted-by":"publisher","first-page":"66411","DOI":"10.1109\/ACCESS.2020.2985261","article-title":"Mutual authentication in body area networks using signal propagation characteristics","volume":"8","author":"Umar","year":"2020","journal-title":"IEEE Access"},{"key":"2025090904245998000_ref027","doi-asserted-by":"publisher","first-page":"175385","DOI":"10.1109\/ACCESS.2020.3026630","article-title":"An efficient lightweight key agreement and authentication scheme for WBAN","volume":"8","author":"Ur Rehman","year":"2020","journal-title":"IEEE Access"},{"key":"2025090904245998000_ref028","first-page":"1","article-title":"The high-level protocol specification language HLPSL developed in the EU project AVISPA","author":"Von Oheimb","year":"2005","journal-title":"Proceedings of APPSEM 2005 Workshop"},{"key":"2025090904245998000_ref029","doi-asserted-by":"publisher","first-page":"8","DOI":"10.1109\/SUTC.2006.1636182","article-title":"A dynamic user authentication scheme for wireless sensor networks","author":"Wong","year":"2006"},{"key":"2025090904245998000_ref030","doi-asserted-by":"publisher","DOI":"10.1109\/SmartCloud49737.2020.00045","article-title":"A new mutual authentication and key agreement protocol in wireless body area network","author":"Wu","year":"2020"},{"issue":"2","key":"2025090904245998000_ref031","doi-asserted-by":"publisher","first-page":"187","DOI":"10.1007\/s10009- 015-0385-y","article-title":"SATMC: a SAT-based model checker for security protocols, business processes, and security APIs","volume":"18","author":"Armando","year":"2016","journal-title":"International Journal on Software Tools for Technology Transfer"},{"issue":"3","key":"2025090904245998000_ref032","doi-asserted-by":"publisher","first-page":"181","DOI":"10.1007\/s10207-004-0055-7","article-title":"OFMC: a symbolic model checker for security protocols","volume":"4","author":"Basin","year":"2005","journal-title":"International Journal of Information Security"},{"key":"2025090904245998000_ref033","doi-asserted-by":"crossref","first-page":"277","DOI":"10.1007\/11805618_21","volume-title":"Term Rewriting and Applications","author":"Turuani","year":"2006"},{"key":"2025090904245998000_ref034","doi-asserted-by":"publisher","first-page":"600","DOI":"10.1109\/WIMOB.2010.5645004","article-title":"Improved two-factor user authentication in wireless sensor networks","author":"Vaidya","year":"2010"}],"container-title":["International Journal of Pervasive Computing and Communications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.emerald.com\/insight\/content\/doi\/10.1108\/IJPCC-06-2021-0144\/full\/xml","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/www.emerald.com\/ijpcc\/article-pdf\/20\/4\/398\/10205372\/ijpcc-06-2021-0144en.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/www.emerald.com\/ijpcc\/article-pdf\/20\/4\/398\/10205372\/ijpcc-06-2021-0144en.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,9,9]],"date-time":"2025-09-09T08:26:01Z","timestamp":1757406361000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.emerald.com\/ijpcc\/article\/20\/4\/398\/1230865\/A-lightweight-and-flexible-mutual-authentication"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,1,14]]},"references-count":34,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2024,11,8]]}},"URL":"https:\/\/doi.org\/10.1108\/ijpcc-06-2021-0144","relation":{},"ISSN":["1742-7371","1742-738X"],"issn-type":[{"value":"1742-7371","type":"print"},{"value":"1742-738X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022,1,14]]}}}