{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,2]],"date-time":"2026-02-02T11:58:02Z","timestamp":1770033482805,"version":"3.49.0"},"reference-count":32,"publisher":"SAGE Publications","issue":"5","license":[{"start":{"date-parts":[[2021,4,2]],"date-time":"2021-04-02T00:00:00Z","timestamp":1617321600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/journals.sagepub.com\/page\/policies\/text-and-data-mining-license"}],"content-domain":{"domain":["journals.sagepub.com"],"crossmark-restriction":true},"short-container-title":["Journal of Intelligent &amp; Fuzzy Systems"],"published-print":{"date-parts":[[2021,11,17]]},"abstract":"<jats:p>Due to the rapid growth in sensor technology and embedded technology, wireless body area network WBANs plays a vital role in monitoring the human body system and the surrounding environment. It supports many healthcare applications on the one hand and are very much help full in pandemic scenarios. It has become the most innovative health care area, which is intriguing to many researchers because of its vast future prospective and potential. Data collected by different wireless sensors or nodes is very personal, critical, and important because of human life involvement. WBANs can minimize human to human contact, which helps stop the spread of severe infectious diseases. The biggest concern is the maintenance of privacy and accuracy of data is still a hot area of research due to nature of attacks, which are changing day by day and increasing, as well as for the sake of better performance. A suitable security mechanism is a way to address above issues, for achieving data security, it is expedient to propose a mechanism. It is essential to update the patient\u2019s regular data. WBANs help to deliver truthful reports related to the patient\u2019s health regularly and individually. This paper proposes an algorithm that shows a better result than the existing algorithm in their previous works. This work is all about proposing a mechanism which needs comparatively less resource. Only authentic entities can interact with the server, which has become obligatory for both sides, keeping data safe. Several authentication schemes have been proposed or discussed by different researchers. This paper has proposed a Secure and Efficient WBANs Authentication Mechanism (SEAM). This security framework will take care of the authentication and the security of transmitted data.<\/jats:p>","DOI":"10.3233\/jifs-189873","type":"journal-article","created":{"date-parts":[[2021,4,6]],"date-time":"2021-04-06T12:53:48Z","timestamp":1617713628000},"page":"5525-5534","update-policy":"https:\/\/doi.org\/10.1177\/sage-journals-update-policy","source":"Crossref","is-referenced-by-count":2,"title":["Secure and efficient WBANs algorithm with authentication mechanism"],"prefix":"10.1177","volume":"41","author":[{"given":"Vinay","family":"Pathak","sequence":"first","affiliation":[{"name":"School of Computer &amp; Systems Sciences, JNU, New Delhi, India"}]},{"given":"Karan","family":"Singh","sequence":"additional","affiliation":[{"name":"School of Computer &amp; Systems Sciences, JNU, New Delhi, India"}]}],"member":"179","published-online":{"date-parts":[[2021,4,2]]},"reference":[{"key":"e_1_3_2_2_2","doi-asserted-by":"publisher","DOI":"10.1109\/MWC.2010.5416350"},{"key":"e_1_3_2_3_2","unstructured":"BourouisA. FehamM. and BouchachiaA. A new architecture of a ubiquitous health monitoring system: a prototype of cloud mobile health monitoring system arXiv preprint arXiv:1205.6910 (2012)."},{"key":"e_1_3_2_4_2","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2013.2255593"},{"key":"e_1_3_2_5_2","unstructured":"Transparency Market Research Implantable Medical Devices Market (Reconstructive Joint Replacement Spinal Implants Cardiovascular Implants Dental Implants Intraocular Lens and Breast Implants)\u2014US Industry Analysis Size Share Trends Growth And Forecast 2012\u20132018; Technical Report; Transparency Market Research: Albany NY USA (2013)."},{"key":"e_1_3_2_6_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2010.05.003"},{"key":"e_1_3_2_7_2","doi-asserted-by":"crossref","unstructured":"XuF. et al. IMDGuard: Securing implantable medical devices with the external wearable guardian 2011 Proceedings IEEE INFOCOM. IEEE (2011).","DOI":"10.1109\/INFCOM.2011.5934987"},{"key":"e_1_3_2_8_2","doi-asserted-by":"crossref","unstructured":"GollakotaS. et al. They can hear your heartbeats: non-invasive security for implantable medical devices Proceedings of the ACM SIGCOMM 2011 conference (2011).","DOI":"10.1145\/2018436.2018438"},{"key":"e_1_3_2_9_2","doi-asserted-by":"crossref","unstructured":"AkinyeleJ.A. et al. Securing electronic medical records using attribute-based encryption on mobile devices Proceedings of the 1st ACM workshop on security and privacy in smartphones and mobile devices. (2011).","DOI":"10.1145\/2046614.2046628"},{"key":"e_1_3_2_10_2","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2012.97"},{"key":"e_1_3_2_11_2","doi-asserted-by":"crossref","unstructured":"BaruaM. et al. Peace: An efficient and secure patient-centric access control scheme for e-health care system 2011 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS). IEEE (2011).","DOI":"10.1109\/INFCOMW.2011.5928953"},{"key":"e_1_3_2_12_2","doi-asserted-by":"crossref","unstructured":"LounisA. et al. Secure and scalable cloud-based architecture for e-health wireless sensor networks 2012 21st International Conference on Computer Communications and Networks (ICCCN). IEEE (2012).","DOI":"10.1109\/ICCCN.2012.6289252"},{"key":"e_1_3_2_13_2","doi-asserted-by":"crossref","unstructured":"RageshG.K. and BaskaranK. CRYPE: towards cryptographically enforced and privacy-enhanced WBANs Proceedings of the First International Conference on Security of Internet of Things (2012).","DOI":"10.1145\/2490428.2490457"},{"key":"e_1_3_2_14_2","doi-asserted-by":"crossref","unstructured":"YiX. WillemsonJ. and Nait-AbdesselamF. Privacy-preserving wireless medical sensor network 2013 12th IEEE international conference on trust security and privacy in computing and communications. IEEE (2013).","DOI":"10.1109\/TrustCom.2013.19"},{"key":"e_1_3_2_15_2","doi-asserted-by":"publisher","DOI":"10.3390\/s140509153"},{"key":"e_1_3_2_16_2","doi-asserted-by":"crossref","unstructured":"BourbakisN. et al. Security and privacy in biomedical telemetry: Mobile health platform for secure information exchange Handbook of Biomedical Telemetry; Wiley-IEEE: Hoboken NJ USA (2014) 382\u2013418.","DOI":"10.1002\/9781118893715.ch13"},{"key":"e_1_3_2_17_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2014.03.081"},{"key":"e_1_3_2_18_2","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2010.130"},{"key":"e_1_3_2_19_2","unstructured":"SahaiA. and WatersB. Fuzzy identity-based encryption Annual International Conference on the Theory and Applications of Cryptographic Techniques. Springer Berlin Heidelberg (2005)."},{"key":"e_1_3_2_20_2","doi-asserted-by":"crossref","unstructured":"KliemA. and KaoO. Cosemed-cooperative and secure medical device cloud 2013 IEEE 15th International Conference on e-Health Networking Applications and Services (Healthcom 2013). IEEE (2013).","DOI":"10.1109\/HealthCom.2013.6720678"},{"key":"e_1_3_2_21_2","doi-asserted-by":"publisher","DOI":"10.1145\/2541228.2555313"},{"key":"e_1_3_2_22_2","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2014.2309858"},{"key":"e_1_3_2_23_2","doi-asserted-by":"publisher","DOI":"10.1117\/1.3582930"},{"key":"e_1_3_2_24_2","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2013.2279531"},{"key":"e_1_3_2_25_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.jpdc.2013.11.007"},{"key":"e_1_3_2_26_2","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2014.2363765"},{"key":"e_1_3_2_27_2","doi-asserted-by":"publisher","DOI":"10.1145\/272991.272995"},{"key":"e_1_3_2_28_2","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2012.206"},{"issue":"7","key":"e_1_3_2_29_2","first-page":"1958","article-title":"State of the art in WBAN security and open research issues","volume":"2","author":"Saha M.S.","year":"2014","unstructured":"SahaM.S. and AnvekarD.D.K., State of the art in WBAN security and open research issues, International Journal on Recent and Innovation Trends in Computing and Communication2(7) (2014), 1958\u20131964.","journal-title":"International Journal on Recent and Innovation Trends in Computing and Communication"},{"key":"e_1_3_2_30_2","doi-asserted-by":"publisher","DOI":"10.1007\/s11277-014-1948-z"},{"key":"e_1_3_2_31_2","doi-asserted-by":"publisher","DOI":"10.1007\/s11277-017-3961-5"},{"key":"e_1_3_2_32_2","doi-asserted-by":"publisher","DOI":"10.1007\/s11277-013-1039-6"},{"key":"e_1_3_2_33_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2011.11.009"}],"container-title":["Journal of Intelligent &amp; Fuzzy Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/journals.sagepub.com\/doi\/pdf\/10.3233\/JIFS-189873","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/journals.sagepub.com\/doi\/full-xml\/10.3233\/JIFS-189873","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/journals.sagepub.com\/doi\/pdf\/10.3233\/JIFS-189873","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,2,2]],"date-time":"2026-02-02T01:26:19Z","timestamp":1769995579000},"score":1,"resource":{"primary":{"URL":"https:\/\/journals.sagepub.com\/doi\/10.3233\/JIFS-189873"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,4,2]]},"references-count":32,"journal-issue":{"issue":"5","published-print":{"date-parts":[[2021,11,17]]}},"alternative-id":["10.3233\/JIFS-189873"],"URL":"https:\/\/doi.org\/10.3233\/jifs-189873","relation":{},"ISSN":["1064-1246","1875-8967"],"issn-type":[{"value":"1064-1246","type":"print"},{"value":"1875-8967","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021,4,2]]}}}