Jinyang, S., Kwok-Yan, L., Ming, G., Mingze, L., and Siu-Leung, C., Towards energy-secure efficient communications using biometric key distribution in wireless biomedical healthcare networks. Proc. 2nd International Conference on Biomedical Technology and Computer Science (BMEI`09), IEEE, Tianjin, China, 1-5, 2009. Yao, L., Liu, B., Wu, G., Yao, K., and Wang, J., A biometric key establishment protocol for body area networks. Int. J. Distrib. meaning. Mr. Netw. 2011:10, 2011. Idity 282986.
Shu-Di, B., Poon, C.C. Y., Yuan-Ting, Z., and Lian-feng, S., Use heartbeat timing information as an entity identifier to secure the sensory network. IEEE Trans. Inf. Technol. Biomed. 12 (6):772-779, 2008. Ali, A., Irum, S., Kausar, F., and Khan, F.A., A key convention scheme based on a cluster that uses hashing for body networks. Multimed, Tools Appl. 66 (2):201-214, 2013. Hu, C., Zhang, N., Li, H., Cheng, X., and Liao, X., Body Area Network Security: A fuzzy attribute-based signcryption scheme. J.
Salt. Common Locals. 31(9):37–46, 2013. He checked the Liu et al. system and indicated that he was not safe for medical applications by proposing an identity attack. They then proposed a new anonymous authentication scheme for the WBAN and proved that it was safe . In 2017, Xiao et al. proposed a new anonymous remote authentication protocol without a certificate, with effective retraction , and this is the first time that the anonymous remote authentication locking feature is being considered for WBANs.
In 2015, Shen et al. proposed better secure sensor classification and key management protocol based on curve cryptography and hash chains for WBANs . Your protocol allows for mutual authentication and secure communication between sensor nodes, patient controller and healthcare staff. Since the computational capacity of medical sensors and controller nodes is very limited in THE WBANs, we have proposed a key agreement system for WBANs, without certificate and authenticated. In addition to mutual authentication, another important task is to set up the session key to protect health information during transmission. During the recording phase, we used the smart key chord scheme that uses Weil mating to generate the session key. can only be shared by AP and the customer. The session key between the AP and the user is generated by the secret values of chance and by the customer and AP. Specifically, the common session key depends on the identities, the customer and the access point, the main server key and two volatile keys. So that the opponent can`t have it.
As a result, the proposed regulations for WBANOs could allow for the establishment of meeting keys. Wireless space networks (WBANs) are used to collect and exchange important and sensitive information about patients` physical conditions.