메뉴 건너뛰기




Volumn , Issue , 2008, Pages 148-153

Body sensor network security: An identity-based cryptography approach

Author keywords

Body sensor networks; Identity based cryptography; Security

Indexed keywords

BODY SENSOR NETWORKS; IDENTITY-BASED CRYPTOGRAPHY; IDENTITY-BASED ENCRYPTIONS; MEDICAL DATUMS; OF SENSORS; SECURITY; SECURITY AND PRIVACIES;

EID: 56749165131     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/1352533.1352557     Document Type: Conference Paper
Times cited : (123)

References (27)
  • 1
    • 35448931599 scopus 로고    scopus 로고
    • Applicability of identity-based cryptography for disruption-tolerant networking
    • N. Asokan, K. Kostiainen, P. Ginzboorg, J. Ott. and C. Luo. Applicability of identity-based cryptography for disruption-tolerant networking. In MobiOpp 2007.
    • (2007) MobiOpp
    • Asokan, N.1    Kostiainen, K.2    Ginzboorg, P.3    Ott, J.4    Luo, C.5
  • 2
    • 0012970453 scopus 로고    scopus 로고
    • Identity-based encryption from the Weil pairing
    • D. Boneh and M. Franklin. Identity-based encryption from the Weil pairing. In CRYPTO 2001.
    • (2001) CRYPTO
    • Boneh, D.1    Franklin, M.2
  • 3
    • 0242678584 scopus 로고    scopus 로고
    • Self-organized public-key management for mobile ad hoc networks
    • S. Capkun, L. Buttyán, and J.-P. Hubaux. Self-organized public-key management for mobile ad hoc networks. IEEE TMC 2003.
    • IEEE TMC 2003
    • Capkun, S.1    Buttyán, L.2    Hubaux, J.-P.3
  • 4
    • 77950169459 scopus 로고    scopus 로고
    • Random key predistribution schemes for sensor networks
    • H. Chan, A. Perrig, and D. Song. Random key predistribution schemes for sensor networks. In IEEE SP 2003.
    • IEEE SP 2003
    • Chan, H.1    Perrig, A.2    Song, D.3
  • 5
    • 77950151506 scopus 로고    scopus 로고
    • An identity based encryption scheme based on. quadratic residues
    • C. Cocks. An identity based encryption scheme based on. quadratic residues. In LNCS 2260 (2001).
    • (2001) LNCS , vol.2260
    • Cocks, C.1
  • 6
    • 29844457287 scopus 로고    scopus 로고
    • An efficient scheme for authenticating public keys in sensor networks
    • W. Du, R. Wang, and P. Ning. An efficient scheme for authenticating public keys in sensor networks. In MobiHoc 2005.
    • MobiHoc 2005
    • Du, W.1    Wang, R.2    Ning, P.3
  • 7
    • 0038341106 scopus 로고    scopus 로고
    • A key-management scheme for distributed sensor networks
    • L. Eschenauer and V. D. Gligor. A key-management scheme for distributed sensor networks. In CCS 2002.
    • CCS 2002
    • Eschenauer, L.1    Gligor, V.D.2
  • 9
    • 34249316910 scopus 로고    scopus 로고
    • Tinypeds: Tiny persistent encrypted data storage in asynchronous wireless sensor networks
    • J. Girao, D. Westhoff, E. Mykletun, and T. Araki. Tinypeds: Tiny persistent encrypted data storage in asynchronous wireless sensor networks. Ad Hoc Networks 2007.
    • Ad Hoc Networks 2007
    • Girao, J.1    Westhoff, D.2    Mykletun, E.3    Araki, T.4
  • 11
    • 56749165935 scopus 로고    scopus 로고
    • Exploiting hierarchical identity-based encryption for access control to pervasive computing information
    • U. Hengartner and P. Steenkiste. Exploiting hierarchical identity-based encryption for access control to pervasive computing information. In SecureComm 2005.
    • SecureComm 2005
    • Hengartner, U.1    Steenkiste, P.2
  • 12
    • 26444574670 scopus 로고    scopus 로고
    • Tinysec: A link layer security architecture for wireless sensor networks
    • C. Karlof, N. Sastry, and D. Wagner. Tinysec: a link layer security architecture for wireless sensor networks. In SenSys 2004.
    • SenSys 2004
    • Karlof, C.1    Sastry, N.2    Wagner, D.3
  • 14
    • 56749132791 scopus 로고    scopus 로고
    • Serloc: Secure range-independent localization for wireless sensor networks
    • L. Lazos and R. Poovendran. Serloc: Secure range-independent localization for wireless sensor networks. ACM TOSN 2005.
    • ACM TOSN 2005
    • Lazos, L.1    Poovendran, R.2
  • 15
    • 56749176053 scopus 로고    scopus 로고
    • A. Liu, P. Kampanakis, and P. Ning. Tinyecc: Elliptic curve cryptography for sensor networks version 0.3, 2007
    • A. Liu, P. Kampanakis, and P. Ning. Tinyecc: Elliptic curve cryptography for sensor networks (version 0.3). 2007.
  • 16
    • 3042822764 scopus 로고    scopus 로고
    • Establishing pairwise keys in distributed sensor networks
    • D. Liu and P. Ning. Establishing pairwise keys in distributed sensor networks. In CCS 2003.
    • CCS 2003
    • Liu, D.1    Ning, P.2
  • 17
    • 33750836005 scopus 로고    scopus 로고
    • Key technical challenges and current implementations of body sensor networks
    • B. Lo and G. Z, Yang. Key technical challenges and current implementations of body sensor networks. In BSN 2005.
    • BSN 2005
    • Lo, B.1    Yang, G.Z.2
  • 18
    • 56749176558 scopus 로고    scopus 로고
    • Codeblue: An ad hoc sensor network infrastructure for emergency medical care
    • D. Malan, T. Fulford-Jones, M. Welsh, and S. Moulton. Codeblue: An ad hoc sensor network infrastructure for emergency medical care. In BSN 2004.
    • BSN 2004
    • Malan, D.1    Fulford-Jones, T.2    Welsh, M.3    Moulton, S.4
  • 19
    • 20344381294 scopus 로고    scopus 로고
    • A public-key infrastructure for key distribution in tinyos based on elliptic curve cryptography
    • D. J. Malan, M. Welsh, and M. D. Smith. A public-key infrastructure for key distribution in tinyos based on elliptic curve cryptography. In SECON 2004.
    • SECON 2004
    • Malan, D.J.1    Welsh, M.2    Smith, M.D.3
  • 20
    • 35549002780 scopus 로고    scopus 로고
    • Addressing security in medical sensor networks
    • K. Malasri and L. Wang. Addressing security in medical sensor networks. In HealthNet 2007.
    • HealthNet 2007
    • Malasri, K.1    Wang, L.2
  • 22
    • 85141900633 scopus 로고    scopus 로고
    • Public key based cryptoschemes for data concealment in wireless sensor networks
    • E. Mykletun, J. Girao, and D. Westhoff. Public key based cryptoschemes for data concealment in wireless sensor networks. In ICC2006.
    • ICC2006
    • Mykletun, E.1    Girao, J.2    Westhoff, D.3
  • 24
    • 0001827537 scopus 로고    scopus 로고
    • Identity-based cryptosystems and signature schemes
    • A. Shamir. Identity-based cryptosystems and signature schemes. In CRYPTO 1984.
    • CRYPTO 1984
    • Shamir, A.1
  • 25
    • 85008955601 scopus 로고    scopus 로고
    • Efficient Implementation of Public Key Cryptosystems on Mote Sensors (Short Paper)
    • International Conference on Information and Communication Security ICICS 2006
    • H. Wang and Q. Li. Efficient Implementation of Public Key Cryptosystems on Mote Sensors (Short Paper). In International Conference on Information and Communication Security (ICICS 2006), LNCS 4307.
    • LNCS , vol.4307
    • Wang, H.1    Li, Q.2
  • 26
    • 51349093348 scopus 로고    scopus 로고
    • ECC: An Elliptic Curve Cryptography Suite on Sensor Motes
    • Technical Report WM-CS-2007-11
    • H. Wang, B. Sheng, C. C. Tan, and Q. Li. WM-ECC: an Elliptic Curve Cryptography Suite on Sensor Motes. In Technical Report WM-CS-2007-11, 2007.
    • (2007)
    • Wang, H.1    Sheng, B.2    Tan, C.C.3    WM, Q.L.4
  • 27
    • 33750795341 scopus 로고    scopus 로고
    • A phone-centered body sensor network platform: Cost, energy efficiency and user interface
    • L. Zhong, M. Sinclair, and R. Bittner. A phone-centered body sensor network platform: cost, energy efficiency and user interface. In BSN 2006.
    • BSN 2006
    • Zhong, L.1    Sinclair, M.2    Bittner, R.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.