메뉴 건너뛰기




Volumn 5198 LNCS, Issue , 2008, Pages 94-107

A secure cross-layer protocol for multi-hop wireless body area networks

Author keywords

[No Author keywords available]

Indexed keywords

AD HOC NETWORKS; HEALTH CARE; HEALTH RISKS; LOCAL AREA NETWORKS; ROUTING PROTOCOLS; WIRELESS LOCAL AREA NETWORKS (WLAN);

EID: 56449125017     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-540-85209-4_8     Document Type: Conference Paper
Times cited : (27)

References (21)
  • 5
    • 34547371054 scopus 로고    scopus 로고
    • System architecture of a wireless body area sensor network for ubiquitous health monitoring
    • Otto, C., Milenkovic, A., Sanders, C., Jovanov, E.: System architecture of a wireless body area sensor network for ubiquitous health monitoring. Journal of Mobile Multimedia 1(4), 307-326 (2006)
    • (2006) Journal of Mobile Multimedia , vol.1 , Issue.4 , pp. 307-326
    • Otto, C.1    Milenkovic, A.2    Sanders, C.3    Jovanov, E.4
  • 6
    • 56449114677 scopus 로고    scopus 로고
    • IBBT IM3-project
    • IBBT IM3-project, http://projects.ibbt.be/im3
  • 8
    • 0033357103 scopus 로고    scopus 로고
    • Securing ad hoc networks
    • Zhou, L., Haas, Z.J.: Securing ad hoc networks. IEEE Network 13(6), 24-30 (1999)
    • (1999) IEEE Network , vol.13 , Issue.6 , pp. 24-30
    • Zhou, L.1    Haas, Z.J.2
  • 9
    • 0038341106 scopus 로고    scopus 로고
    • Eschenauer, L., Gligor, V.: A key-management scheme for distributed sensor networks. In: Proceedings of the 9th ACM Conference on Computer and Communications Security, CCS 2002, pp. 41-47 (November 2002)
    • Eschenauer, L., Gligor, V.: A key-management scheme for distributed sensor networks. In: Proceedings of the 9th ACM Conference on Computer and Communications Security, CCS 2002, pp. 41-47 (November 2002)
  • 11
    • 35048902355 scopus 로고    scopus 로고
    • Baldus, H., Klabunde, K., Msch, G.: Reliable set-up of medical body-sensor networks. In: Karl, H., Wolisz, A., Willig, A. (eds.) EWSN 2004. LNCS, 2920, pp. 353-363. Springer, Heidelberg (2004)
    • Baldus, H., Klabunde, K., Msch, G.: Reliable set-up of medical body-sensor networks. In: Karl, H., Wolisz, A., Willig, A. (eds.) EWSN 2004. LNCS, vol. 2920, pp. 353-363. Springer, Heidelberg (2004)
  • 12
    • 33646948221 scopus 로고    scopus 로고
    • A novel biometrics method to secure wireless body area sensor networks for telemedicine and m-health
    • Poon, C.C.Y., Yuan-Ting, Z., Shu-Di, B.: A novel biometrics method to secure wireless body area sensor networks for telemedicine and m-health. IEEE Communications Magazine 44(4), 73-81 (2006)
    • (2006) IEEE Communications Magazine , vol.44 , Issue.4 , pp. 73-81
    • Poon, C.C.Y.1    Yuan-Ting, Z.2    Shu-Di, B.3
  • 14
    • 23944521144 scopus 로고    scopus 로고
    • Manual authentication for wireless devices
    • Gehrmann, C., Mitchell, C., Nyberg, K.: Manual authentication for wireless devices. RSA Cryptobytes 7(1), 29-37 (2004)
    • (2004) RSA Cryptobytes , vol.7 , Issue.1 , pp. 29-37
    • Gehrmann, C.1    Mitchell, C.2    Nyberg, K.3
  • 16
    • 84947251443 scopus 로고    scopus 로고
    • The resurrecting duckling: Security issues in ad-hoc wireless networks
    • Malcolm, J.A, Christianson, B, Crispo, B, Roe, M, eds, Security Protocols 1999, Springer, Heidelberg
    • Stajano, F., Anderson, R.: The resurrecting duckling: Security issues in ad-hoc wireless networks. In: Malcolm, J.A., Christianson, B., Crispo, B., Roe, M. (eds.) Security Protocols 1999. LNCS, vol. 1796, pp. 172-182. Springer, Heidelberg (2000)
    • (2000) LNCS , vol.1796 , pp. 172-182
    • Stajano, F.1    Anderson, R.2
  • 18
    • 8744317627 scopus 로고    scopus 로고
    • Information technology - Security techniques - Entity authentication - Part 2: Mechanisms using symmetric encipherment algorithms
    • ISO/IEC 9798-2
    • ISO/IEC 9798-2. Information technology - Security techniques - Entity authentication - Part 2: Mechanisms using symmetric encipherment algorithms (1999)
    • (1999)
  • 20
    • 56449126127 scopus 로고    scopus 로고
    • NIST Special Publication 800-38C. Recommendation for block cipher modes of operation - the CCM mode for authentication and confidentiality. U.S. DoC/NIST (May 2004), http://csrc.nlst.gov/publications/
    • NIST Special Publication 800-38C. Recommendation for block cipher modes of operation - the CCM mode for authentication and confidentiality. U.S. DoC/NIST (May 2004), http://csrc.nlst.gov/publications/
  • 21
    • 56449117261 scopus 로고    scopus 로고
    • NIST Special Publication 800-38D. Recommendation for block cipher modes of operation - galois/counter mode (GCM) and GMAC. U.S. DoC/NIST (November 2007), http://csrc.nist.gov/publications/
    • NIST Special Publication 800-38D. Recommendation for block cipher modes of operation - galois/counter mode (GCM) and GMAC. U.S. DoC/NIST (November 2007), http://csrc.nist.gov/publications/


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.