메뉴 건너뛰기




Volumn , Issue , 2010, Pages

Group device pairing based secure sensor association and key management for body area networks

Author keywords

[No Author keywords available]

Indexed keywords

AUTHENTICATED GROUP KEY AGREEMENT PROTOCOL; BODY AREA NETWORK; BODY AREA NETWORKS; DESIGN GOAL; DEVICE PAIRING; E-HEALTHCARE; ENABLING TECHNOLOGIES; HARDWARE DEVICES; HEALTH MONITORING; KEY MANAGEMENT; ON-DEMAND; RESOURCE CONSTRAINT; SECRET KEY; SECURITY ISSUES; SENSOR DEVICE; SENSOR NETWORK TEST-BED; SET-UP TIME; SHARED SECRETS; SYMMETRIC KEY CRYPTOGRAPHY; WIRELESS COMMUNICATIONS;

EID: 77953304550     PISSN: 0743166X     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/INFCOM.2010.5462095     Document Type: Conference Paper
Times cited : (77)

References (30)
  • 3
    • 18244373181 scopus 로고    scopus 로고
    • A wireless body area network of intelligent motion sensors for computer assisted physical rehabilitation
    • March
    • E. Jovanov, A. Milenkovic, C. Otto, and P. C. de Groen, "A wireless body area network of intelligent motion sensors for computer assisted physical rehabilitation." J Neuroengineering Rehabil, vol. 2, no. 1, March 2005.
    • (2005) J Neuroengineering Rehabil , vol.2 , Issue.1
    • Jovanov, E.1    Milenkovic, A.2    Otto, C.3    De Groen, P.C.4
  • 4
    • 77953314795 scopus 로고    scopus 로고
    • Secure device pairing
    • 2nd Ed., H. Tilborg and S. Jajodia Ed., Springer, to appear
    • M. Li, W. Lou, and K. Ren, "Secure device pairing," in Encyclopedia of Cryptography and Security (2nd Ed.), H. Tilborg and S. Jajodia Ed., Springer, to appear, 2010.
    • (2010) Encyclopedia of Cryptography and Security
    • Li, M.1    Lou, W.2    Ren, K.3
  • 6
    • 33750827765 scopus 로고    scopus 로고
    • Resource-efficient security for medical body sensor networks
    • April
    • O. Morchon, H. Baldus, and D. Sanchez, "Resource-efficient security for medical body sensor networks," in BSN '06, April 2006, p. 83.
    • (2006) BSN '06 , pp. 83
    • Morchon, O.1    Baldus, H.2    Sanchez, D.3
  • 7
    • 35549002780 scopus 로고    scopus 로고
    • Addressing security in medical sensor networks
    • K. Malasri and L. Wang, "Addressing security in medical sensor networks," in HealthNet '07, 2007, pp. 7-12.
    • (2007) HealthNet '07 , pp. 7-12
    • Malasri, K.1    Wang, L.2
  • 8
    • 56749165131 scopus 로고    scopus 로고
    • Body sensor network security: An identity-based cryptography approach
    • C. C. Tan, H. Wang, S. Zhong, and Q. Li, "Body sensor network security: an identity-based cryptography approach," in ACM WiSec '08:, 2008, pp. 148-153.
    • (2008) ACM WiSec '08 , pp. 148-153
    • Tan, C.C.1    Wang, H.2    Zhong, S.3    Li, Q.4
  • 9
    • 33646948221 scopus 로고    scopus 로고
    • A novel biometrics method to secure wireless body area sensor networks for telemedicine and m-health
    • April
    • C. Poon, Y.-T. Zhang, and S.-D. Bao, "A novel biometrics method to secure wireless body area sensor networks for telemedicine and m-health," IEEE Communications Magazine, vol. 44, no. 4, pp. 73-81, April 2006.
    • (2006) IEEE Communications Magazine , vol.44 , Issue.4 , pp. 73-81
    • Poon, C.1    Zhang, Y.-T.2    Bao, S.-D.3
  • 10
    • 70349303536 scopus 로고    scopus 로고
    • Securing body sensor networks: Sensor association and key management
    • S. L. Keoh, E. Lupu, and M. Sloman, "Securing body sensor networks: Sensor association and key management," IEEE PerCom '09, pp. 1-6, 2009.
    • (2009) IEEE PerCom '09 , pp. 1-6
    • Keoh, S.L.1    Lupu, E.2    Sloman, M.3
  • 11
    • 79959884874 scopus 로고    scopus 로고
    • Message-in-a-bottle: User-friendly and secure key deployment for sensor nodes
    • C. Kuo, M. Luk, R. Negi, and A. Perrig, "Message-in-a-bottle: user-friendly and secure key deployment for sensor nodes," in SenSys '07, 2007, pp. 233-246.
    • (2007) SenSys '07 , pp. 233-246
    • Kuo, C.1    Luk, M.2    Negi, R.3    Perrig, A.4
  • 12
    • 77953320591 scopus 로고    scopus 로고
    • Kalwen: A new practical and interoperable key management scheme for body sensor networks
    • April 1-3
    • Y. Law, G. Moniava, Z. Gong, P. Hartel, and M. Palaniswami, "Kalwen: A new practical and interoperable key management scheme for body sensor networks," in BodyNets '09, April 1-3 2009.
    • (2009) BodyNets '09
    • Law, Y.1    Moniava, G.2    Gong, Z.3    Hartel, P.4    Palaniswami, M.5
  • 13
    • 84947251443 scopus 로고    scopus 로고
    • The resurrecting duckling: Security issues for ad-hoc wireless networks
    • F. Stajano and R. J. Anderson, "The resurrecting duckling: Security issues for ad-hoc wireless networks," in IWSP '00, 2000, pp. 172-194.
    • (2000) IWSP '00 , pp. 172-194
    • Stajano, F.1    Anderson, R.J.2
  • 14
    • 33751044073 scopus 로고    scopus 로고
    • Talking to strangers: Authentication in ad-hoc wireless networks
    • D. Balfanz, D. K. Smetters, P. Stewart, and H. C. Wong, "Talking to strangers: authentication in ad-hoc wireless networks," in NDSS '02, 2002.
    • (2002) NDSS '02
    • Balfanz, D.1    Smetters, D.K.2    Stewart, P.3    Wong, H.C.4
  • 15
    • 27544489075 scopus 로고    scopus 로고
    • Seeing-is-believing: Using camera phones for human-verifiable authentication
    • J. M. McCune, A. Perrig, and M. K. Reiter, "Seeing-is-believing: Using camera phones for human-verifiable authentication," in IEEE S & P, 2005, pp. 110-124.
    • (2005) IEEE S & P , pp. 110-124
    • McCune, J.M.1    Perrig, A.2    Reiter, M.K.3
  • 16
    • 31344438973 scopus 로고    scopus 로고
    • Key agreement in peer-to-peer wireless networks
    • Feb.
    • M. Cagalj, S. Capkun, and J.-P. Hubaux, "Key agreement in peer-to-peer wireless networks," Proceedings of the IEEE, vol. 94, no. 2, pp. 467-478, Feb. 2006.
    • (2006) Proceedings of the IEEE , vol.94 , Issue.2 , pp. 467-478
    • Cagalj, M.1    Capkun, S.2    Hubaux, J.-P.3
  • 17
    • 33745832230 scopus 로고    scopus 로고
    • SAS-based Authenticated Key Agreement
    • Public Key Cryptography - PKC '06, ser.
    • S. Pasini and S. Vaudenay, "SAS-based Authenticated Key Agreement," in Public Key Cryptography - PKC '06, ser. LNCS, vol. 3958, 2006, pp. 395-409.
    • (2006) LNCS , vol.3958 , pp. 395-409
    • Pasini, S.1    Vaudenay, S.2
  • 19
    • 40249105903 scopus 로고    scopus 로고
    • SAS-Based Group Authentication and Key Agreement Protocols
    • Public Key Cryptography - PKC '08, ser.
    • S. Laur and S. Pasini, "SAS-Based Group Authentication and Key Agreement Protocols," in Public Key Cryptography - PKC '08, ser. LNCS, 2008, pp. 197-213.
    • (2008) LNCS , pp. 197-213
    • Laur, S.1    Pasini, S.2
  • 20
    • 0033748607 scopus 로고    scopus 로고
    • New multiparty authentication services and key agreement protocols
    • Apr
    • G. Ateniese, M. Steiner, and G. Tsudik, "New multiparty authentication services and key agreement protocols," IEEE JSAC, vol. 18, no. 4, pp. 628-639, Apr 2000.
    • (2000) IEEE JSAC , vol.18 , Issue.4 , pp. 628-639
    • Ateniese, G.1    Steiner, M.2    Tsudik, G.3
  • 21
    • 45749134695 scopus 로고    scopus 로고
    • Efficient device pairing using human-comparable synchronized audiovisual patterns
    • Applied Cryptography and Network Security (ACNS), ser.
    • R. Prasad and N. Saxena, "Efficient device pairing using human-comparable synchronized audiovisual patterns," in Applied Cryptography and Network Security (ACNS), ser. LNCS, 2008, pp. 328-345.
    • (2008) LNCS , pp. 328-345
    • Prasad, R.1    Saxena, N.2
  • 22
    • 84885941616 scopus 로고    scopus 로고
    • Efficient mutual data authentication using manually authenticated strings
    • Springer
    • S. Laur, N. Asokan, and K. Nyberg, "Efficient mutual data authentication using manually authenticated strings," in Cryptology and Network Security. Springer, 2005, pp. 90-107.
    • (2005) Cryptology and Network Security , pp. 90-107
    • Laur, S.1    Asokan, N.2    Nyberg, K.3
  • 23
    • 35048896826 scopus 로고    scopus 로고
    • Zrtp: Extensions to rtp for diffiehellman key agreement for srtp draft-zimmermann-avt-zrtp-01
    • March
    • P. Zimmermann, A. Johnston, and J. Callas, "Zrtp: Extensions to rtp for diffiehellman key agreement for srtp draft-zimmermann-avt-zrtp-01," in Internet-draft, March. 2006.
    • (2006) Internet-draft
    • Zimmermann, P.1    Johnston, A.2    Callas, J.3
  • 24
    • 43749092801 scopus 로고    scopus 로고
    • Provably secure constant round contributory group key agreement in dynamic setting
    • May
    • R. Dutta and R. Barua, "Provably secure constant round contributory group key agreement in dynamic setting," IEEE Trans. on Inf. Theory, vol. 54, no. 5, pp. 2007-2025, May 2008.
    • (2008) IEEE Trans. on Inf. Theory , vol.54 , Issue.5 , pp. 2007-2025
    • Dutta, R.1    Barua, R.2
  • 25
    • 85028765277 scopus 로고
    • Perfectly-secure key distribution for dynamic conferences
    • Springer-Verlag
    • C. Blundo, A. D. Santis, A. Herzberg, S. Kutten, U. Vaccaro, and M. Yung, "Perfectly-secure key distribution for dynamic conferences," in CRYPTO '92. Springer-Verlag, 1993, pp. 471-486.
    • (1993) CRYPTO '92 , pp. 471-486
    • Blundo, C.1    Santis, A.D.2    Herzberg, A.3    Kutten, S.4    Vaccaro, U.5    Yung, M.6
  • 26
    • 0019634370 scopus 로고
    • Password authentication with insecure communication
    • L. Lamport, "Password authentication with insecure communication," Commun. ACM, vol. 24, no. 11, pp. 770-772, 1981.
    • (1981) Commun. ACM , vol.24 , Issue.11 , pp. 770-772
    • Lamport, L.1
  • 27
    • 0032178082 scopus 로고    scopus 로고
    • Secure group communications using key graphs
    • C. K. Wong, M. Gouda, and S. S. Lam, "Secure group communications using key graphs," SIGCOMM Comput. Commun. Rev., vol. 28, no. 4, pp. 68-79, 1998.
    • (1998) SIGCOMM Comput. Commun. Rev. , vol.28 , Issue.4 , pp. 68-79
    • Wong, C.K.1    Gouda, M.2    Lam, S.S.3
  • 29
    • 10044284351 scopus 로고    scopus 로고
    • Leap: Efficient security mechanisms for large-scale distributed sensor networks
    • S. Zhu, S. Setia, and S. Jajodia, "Leap: efficient security mechanisms for large-scale distributed sensor networks," in CCS '03, 2003, pp. 62-72.
    • (2003) CCS '03 , pp. 62-72
    • Zhu, S.1    Setia, S.2    Jajodia, S.3
  • 30
    • 51249087814 scopus 로고    scopus 로고
    • Tinyecc: A configurable library for elliptic curve cryptography in wireless sensor networks
    • A. Liu and P. Ning, "Tinyecc: A configurable library for elliptic curve cryptography in wireless sensor networks," in IPSN '08, 2008, pp. 245-256.
    • (2008) IPSN '08 , pp. 245-256
    • Liu, A.1    Ning, P.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.