Resource-efficient authenticated data sharing mechanism for smart wearable systems

M Tanveer, M Ahmad, TN Nguyen… - … on Network Science …, 2022 - ieeexplore.ieee.org
Recent technological developments in the wearable devices (WDs) and smartphones
enabled ubiquitous and always-on monitoring of the users' movements. WDs collect the …

Secure and authenticated data access and sharing model for smart wearable systems

H Amintoosi, M Nikooghadam, S Kumari… - IEEE Internet of …, 2021 - ieeexplore.ieee.org
Contrary to the public cloud storage services that impose users to accept the security
restrictions delivered by the service provider, users in the private cloud benefit from self …

Cloud-assisted secure and cost-effective authenticated solution for remote wearable health monitoring system

K Mahmood, MS Obaidat, Z Ghaffar… - … on Network Science …, 2022 - ieeexplore.ieee.org
Security and privacy are the leading solicitude in cloud computing since users have
restricted privilege on the data maintained by distinct service providers at remote locations …

Anonymous authenticated key agreement and group proof protocol for wearable computing

Y Guo, Z Zhang, Y Guo - IEEE Transactions on Mobile …, 2021 - ieeexplore.ieee.org
Wearable computing has been used in a wide range of applications. But wearable
computing often suffers from various security and privacy issues. To solve these issues …

EAKE-WC: Efficient and anonymous authenticated key exchange scheme for wearable computing

S Tu, A Badshah, H Alasmary… - IEEE Transactions on …, 2023 - ieeexplore.ieee.org
Wearable computing has shown tremendous potential to revolutionize and uplift the
standard of our lives. However, researchers and field experts have often noted several …

Design of secure and lightweight authentication protocol for wearable devices environment

AK Das, M Wazid, N Kumar, MK Khan… - IEEE journal of …, 2017 - ieeexplore.ieee.org
Wearable devices are used in various applications to collect information including step
information, sleeping cycles, workout statistics, and health-related information. Due to the …

A decentralised authentication and access control mechanism for medical wearable sensors data

M Abubakar, Z Jaroucheh, A Al Dubai… - … Conference on Omni …, 2021 - ieeexplore.ieee.org
Recent years have seen an increase in medical big data, which can be attributed to a
paradigm shift experienced in medical data sharing induced by the growth of medical …

Selective disclosure and yoking-proof based privacy-preserving authentication scheme for cloud assisted wearable devices

H Liu, H Ning, Y Yue, Y Wan, LT Yang - Future Generation Computer …, 2018 - Elsevier
Along with the development of user-centric wireless communications, wearable devices
appear to be popular for real-time collecting a user's private data to provide intelligent …

Privacy and Security Awareness for Sensitive/Non-sensitive Data based Wearable Devices

F Shukur, A Fatlawi - … Conference on Emerging Trends in Smart …, 2022 - ieeexplore.ieee.org
In recent years, technological industry has made a large investment in the design of
wearable devices. Wearable devices are attractive to a variety of different age groups within …

Secure and lightweight authentication with key agreement for smart wearable systems

J Li, N Zhang, J Ni, J Chen, R Du - IEEE Internet of Things …, 2020 - ieeexplore.ieee.org
Nowadays, an increasing number of wearable devices (WDs) have been widely deployed in
smart wearable systems to collect health status measures and body information of users …