메뉴 건너뛰기




Volumn 13, Issue 6, 2009, Pages 926-932

IBE-lite: A lightweight identity-based cryptography for body sensor networks

Author keywords

Body sensor network; Identity based encryption; Privacy; Security

Indexed keywords

BODY SENSOR NETWORK; IDENTITY BASED CRYPTOGRAPHY; IDENTITY-BASED ENCRYPTION; MEDICAL DATA; NETWORK OF SENSORS; PRIVACY; SECURITY; SECURITY AND PRIVACY;

EID: 70449562519     PISSN: 10897771     EISSN: None     Source Type: Journal    
DOI: 10.1109/TITB.2009.2033055     Document Type: Article
Times cited : (135)

References (15)
  • 1
    • 84874324906 scopus 로고    scopus 로고
    • Identity-based encryption from the Weil pairing
    • D. Boneh and M. Franklin, "Identity-based encryption from the Weil pairing," in Proc. CRYPTO, 2001, pp. 213-229.
    • (2001) Proc. CRYPTO , pp. 213-229
    • Boneh, D.1    Franklin, M.2
  • 2
    • 33750836005 scopus 로고    scopus 로고
    • Key technical challenges and current implementations of body sensor networks
    • B. Lo and G. Z. Yang, "Key technical challenges and current implementations of body sensor networks," in Proc. Body Sensor Networks (BSN), 2005, pp. 1-5.
    • (2005) Proc. Body Sensor Networks (BSN) , pp. 1-5
    • Lo, B.1    Yang, G.Z.2
  • 3
    • 84968503742 scopus 로고
    • Elliptic curve cryptosystems
    • N. Koblitz, "Elliptic curve cryptosystems," Math. Comput., vol.48, pp. 203-209, 1987.
    • (1987) Math. Comput. , vol.48 , pp. 203-209
    • Koblitz, N.1
  • 4
    • 33750795341 scopus 로고    scopus 로고
    • A phone-centered body sensor network platform: Cost, energy efficiency and user interface
    • L. Zhong, M. Sinclair, and R. Bittner, "A phone-centered body sensor network platform: Cost, energy efficiency and user interface," in Proc. BSN, 2006, pp. 179-182.
    • (2006) Proc. BSN , pp. 179-182
    • Zhong, L.1    Sinclair, M.2    Bittner, R.3
  • 6
    • 77950151506 scopus 로고    scopus 로고
    • An identity based encryption scheme based on quadratic residues
    • C. Cocks, "An identity based encryption scheme based on quadratic residues," in Proc. LNCS, 2001, vol.2260, pp. 360-363.
    • (2001) Proc. LNCS , vol.2260 , pp. 360-363
    • Cocks, C.1
  • 7
    • 33144476837 scopus 로고    scopus 로고
    • Location-based compromisetolerant security mechanisms forwireless sensor networks
    • Y. Zhang, W. Liu, W. Lou, and Y. Fang, "Location-based compromisetolerant security mechanisms forwireless sensor networks," in Proc. IEEE J. Sel. Areas Commun., 2006, pp. 247-260.
    • (2006) Proc. IEEE J. Sel. Areas Commun. , pp. 247-260
    • Zhang, Y.1    Liu, W.2    Lou, W.3    Fang, Y.4
  • 8
    • 46849122785 scopus 로고    scopus 로고
    • Efficient implementation of public key cryptosystems on mote sensors (short paper)
    • presented at the Raleigh, NC
    • H.Wang and Q. Li, "Efficient implementation of public key cryptosystems on mote sensors (short paper)," presented at the Int. Conf. Inf. Commun. Security (ICICS), Raleigh, NC, 2006.
    • (2006) Int. Conf. Inf. Commun. Security (ICICS)
    • Wang, H.1    Li, Q.2
  • 9
    • 49949083706 scopus 로고    scopus 로고
    • Elliptic curve cryptography based access control in sensor networks
    • H. Wang, B. Sheng, and Q. Li, "Elliptic curve cryptography based access control in sensor networks," Int. J. Security Netw., vol. 1, no. 3/4, pp. 127- 137, 2006.
    • (2006) Int. J. Security Netw. , vol.1 , Issue.3-4 , pp. 127-137
    • Wang, H.1    Sheng, B.2    Li, Q.3
  • 10
    • 51849154205 scopus 로고    scopus 로고
    • Comparing symmetric-key and public-key schemes in sensor networks
    • H.Wang, B. Sheng, C. C. Tan, and Q. Li, "Comparing symmetric-key and public-key schemes in sensor networks," in Proc. IEEE ICDCS, 2008, pp. 11-18.
    • (2008) Proc. IEEE ICDCS , pp. 11-18
    • Wang, H.1    Sheng, B.2    Tan, C.C.3    Li, Q.4
  • 11
    • 27144464694 scopus 로고    scopus 로고
    • A flexible role-based secure messaging service: Exploiting IBE technology for privacy in health care
    • M. Mont, P. Bramhall, and K. Harrison, "A flexible role-based secure messaging service: Exploiting IBE technology for privacy in health care," in Proc. Int. Workshop Database Expert Syst. Appl., 2003, pp. 432-437.
    • (2003) Proc. Int. Workshop Database Expert Syst. Appl. , pp. 432-437
    • Mont, M.1    Bramhall, P.2    Harrison, K.3
  • 14
    • 33846925115 scopus 로고    scopus 로고
    • Physiological signal based entity authentication for body area sensor networks and mobile healthcare systems
    • S.-D. Bao, Y.-T. Zhang, and L.-F. Shen, "Physiological signal based entity authentication for body area sensor networks and mobile healthcare systems," in Proc. IEEE Eng. Med. Biol., 2005, pp. 2455-2458.
    • (2005) Proc. IEEE Eng. Med. Biol. , pp. 2455-2458
    • Bao, S.-D.1    Zhang, Y.-T.2    Shen, L.-F.3
  • 15
    • 56749165131 scopus 로고    scopus 로고
    • Body sensor network security: An identity-based cryptography approach
    • C. C. Tan, H. Wang, S. Zhong, and Q. Li, "Body sensor network security: An identity-based cryptography approach," in ACM Conf. Wireless Security (WiSec), 2008, pp. 148-153.
    • (2008) ACM Conf. Wireless Security (WiSec) , pp. 148-153
    • Tan, C.C.1    Wang, H.2    Zhong, S.3    Li, Q.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.