{"title":"A Review on Authentication Protocols in Wireless Body Area Networks (WBAN)","authors":"Bhawna Narwal, A. Mohapatra","doi":"10.1109/IC3I44769.2018.9007303","DOIUrl":null,"url":null,"abstract":"Nowadays WBAN is trending in the healthcare industry and proved to be a boon for the patients due to the expert level medical diagnosis, patient’s health tracking, seamless and continuous quality treatment. However, wide adoption among the healthcare system makes it vulnerable to the security and privacy issues. To combat such issues researchers proposed several authentication schemes in the literature. This paper is an attempt to provide a detailed review of various authentication schemes and finally presents a comprehensive comparison between the schemes based on security attacks, security features and several different attributes.","PeriodicalId":161694,"journal":{"name":"2018 3rd International Conference on Contemporary Computing and Informatics (IC3I)","volume":"7 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"14","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2018 3rd International Conference on Contemporary Computing and Informatics (IC3I)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/IC3I44769.2018.9007303","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 14
Abstract
Nowadays WBAN is trending in the healthcare industry and proved to be a boon for the patients due to the expert level medical diagnosis, patient’s health tracking, seamless and continuous quality treatment. However, wide adoption among the healthcare system makes it vulnerable to the security and privacy issues. To combat such issues researchers proposed several authentication schemes in the literature. This paper is an attempt to provide a detailed review of various authentication schemes and finally presents a comprehensive comparison between the schemes based on security attacks, security features and several different attributes.