-
2
-
-
79951803442
-
Secret key generation rate vs. Reconciliation cost using wireless channel characteristics in body area networks
-
IEEE
-
S. Ali, V. Sivaraman, and D. Ostry. Secret key generation rate vs. reconciliation cost using wireless channel characteristics in body area networks. In Embedded and Ubiquitous Computing (EUC), 2010 IEEE/IFIP 8th International Conference on, pages 644-650. IEEE, 2010.
-
(2010)
Embedded and Ubiquitous Computing (EUC), 2010 IEEE/IFIP 8th International Conference on
, pp. 644-650
-
-
Ali, S.1
Sivaraman, V.2
Ostry, D.3
-
5
-
-
0038487088
-
Random key predistribution schemes for sensor networks
-
H. Chan, A. Perrig, and D. Song. Random key predistribution schemes for sensor networks. In IEEE S & P'03, page 197, 2003.
-
(2003)
IEEE S& P'03
, pp. 197
-
-
Chan, H.1
Perrig, A.2
Song, D.3
-
6
-
-
78049456501
-
A lightweight user authentication scheme for wireless sensor networks
-
may
-
O. Cheikhrouhou, A. Koubaa, M. Boujelben, and M. Abid. A lightweight user authentication scheme for wireless sensor networks. In Computer Systems and Applications (AICCSA), 2010 IEEE/ACS International Conference on, pages 1 -7, may 2010.
-
(2010)
Computer Systems and Applications (AICCSA), 2010 IEEE/ACS International Conference on
, pp. 1-7
-
-
Cheikhrouhou, O.1
Koubaa, A.2
Boujelben, M.3
Abid, M.4
-
7
-
-
79956094375
-
Body area networks: A survey
-
April
-
M. Chen, S. Gonzalez, A. Vasilakos, H. Cao, and V. C. Leung. Body area networks: A survey. Mob. Netw. Appl., 16:171-193, April 2011.
-
(2011)
Mob. Netw. Appl.
, vol.16
, pp. 171-193
-
-
Chen, M.1
Gonzalez, S.2
Vasilakos, A.3
Cao, H.4
Leung, V.C.5
-
8
-
-
84939435969
-
Biosec: A biometric based approach for securing communication in wireless networks of biosensors implanted in the human body
-
S. Cherukuri, K. K. Venkatasubramanian, and S. K. S. Gupta. Biosec: A biometric based approach for securing communication in wireless networks of biosensors implanted in the human body. Parallel Processing Workshops, International Conference on, 0:432, 2003.
-
(2003)
Parallel Processing Workshops, International Conference on
, pp. 432
-
-
Cherukuri, S.1
Venkatasubramanian, K.K.2
Gupta, S.K.S.3
-
9
-
-
79952574261
-
A light-weight authentication scheme for wireless sensor networks
-
O. Delgado-Mohatar, A. Fuster-Sabater, and J. M. Sierra. A light-weight authentication scheme for wireless sensor networks. Ad Hoc Networks, 9(5):727 - 735, 2011.
-
(2011)
Ad Hoc Networks
, vol.9
, Issue.5
, pp. 727-735
-
-
Delgado-Mohatar, O.1
Fuster-Sabater, A.2
Sierra, J.M.3
-
12
-
-
23244467182
-
A pairwise key predistribution scheme for wireless sensor networks
-
DOI 10.1145/1065545.1065548
-
W. Du, J. Deng, Y. Han, P. Varshney, J. Katz, and A. Khalili. A pairwise key predistribution scheme for wireless sensor networks. ACM Transactions on Information and System Security (TISSEC), 8(2):228-258, 2005. (Pubitemid 41092672)
-
(2005)
ACM Transactions on Information and System Security
, vol.8
, Issue.2
, pp. 228-258
-
-
Du, W.1
Deng, J.2
Han, Y.S.3
Varshney, P.K.4
Katz, J.5
Khalili, A.6
-
13
-
-
0038341106
-
A key-management scheme for distributed sensor networks
-
L. Eschenauer and V. D. Gligor. A key-management scheme for distributed sensor networks. In CCS'02, pages 41-47, 2002.
-
(2002)
CCS'02
, pp. 41-47
-
-
Eschenauer, L.1
Gligor, V.D.2
-
14
-
-
50249098733
-
Pacemakers and implantable cardiac defibrillators: Software radio attacks and zero-power defenses
-
Ieee
-
D. Halperin, T. Heydt-Benjamin, B. Ransford, S. Clark, B. Defend, W. Morgan, K. Fu, T. Kohno, and W. Maisel. Pacemakers and implantable cardiac defibrillators: Software radio attacks and zero-power defenses. In Security and Privacy, 2008. SP 2008. IEEE Symposium on, pages 129-142. Ieee, 2008.
-
(2008)
Security and Privacy, 2008. SP 2008. IEEE Symposium on
, pp. 129-142
-
-
Halperin, D.1
Heydt-Benjamin, T.2
Ransford, B.3
Clark, S.4
Defend, B.5
Morgan, W.6
Fu, K.7
Kohno, T.8
Maisel, W.9
-
15
-
-
79960856885
-
Biometric-based two-level secure access control for implantable medical devices during emergencies
-
Shanghai, P.R.China, April
-
X. Hei and X. Du. Biometric-based two-level secure access control for implantable medical devices during emergencies. In The 30th IEEE International Conference on Computer Communications (INFOCOM 2011), pages 346 - 350, Shanghai, P.R.China, April 2011.
-
(2011)
The 30th IEEE International Conference on Computer Communications (INFOCOM 2011)
, pp. 346-350
-
-
Hei, X.1
Du, X.2
-
16
-
-
0027928863
-
Applications of weighted voronoi diagrams and randomization to variance-based k-clustering: (Extended abstract)
-
New York, NY, USA, ACM
-
M. Inaba, N. Katoh, and H. Imai. Applications of weighted voronoi diagrams and randomization to variance-based k-clustering: (extended abstract). In Proceedings of the tenth annual symposium on Computational geometry, SCG'94, pages 332-339, New York, NY, USA, 1994. ACM.
-
(1994)
Proceedings of the Tenth Annual Symposium on Computational Geometry, SCG'94
, pp. 332-339
-
-
Inaba, M.1
Katoh, N.2
Imai, H.3
-
17
-
-
18244373181
-
A wireless body area network of intelligent motion sensors for computer assisted physical rehabilitation
-
March
-
E. Jovanov, A. Milenkovic, C. Otto, and P. C. de Groen. A wireless body area network of intelligent motion sensors for computer assisted physical rehabilitation. J Neuroengineering Rehabil, 2(1), March 2005.
-
(2005)
J Neuroengineering Rehabil
, vol.2
, Issue.1
-
-
Jovanov, E.1
Milenkovic, A.2
Otto, C.3
Groen, P.C.D.4
-
18
-
-
77955002645
-
Ensemble: Cooperative proximity-based authentication
-
New York, NY, USA, ACM
-
A. Kalamandeen, A. Scannell, E. de Lara, A. Sheth, and A. LaMarca. Ensemble: cooperative proximity-based authentication. In Proceedings of the 8th international conference on Mobile systems, applications, and services, MobiSys'10, pages 331-344, New York, NY, USA, 2010. ACM.
-
(2010)
Proceedings of the 8th International Conference on Mobile Systems, Applications, and Services, MobiSys'10
, pp. 331-344
-
-
Kalamandeen, A.1
Scannell, A.2
Lara, E.D.3
Sheth, A.4
Lamarca, A.5
-
20
-
-
84860663236
-
Secure ad-hoc trust initialization and key management in wireless body area networks
-
M. Li, S. Yu, J. D. Guttman, W. Lou, and K. Ren. Secure ad-hoc trust initialization and key management in wireless body area networks. ACM Transactions on Sensor Networks (TOSN), (To Appear), 2012.
-
(2012)
ACM Transactions on Sensor Networks (TOSN)
-
-
Li, M.1
Yu, S.2
Guttman, J.D.3
Lou, W.4
Ren, K.5
-
21
-
-
77953304550
-
Group device pairing based secure sensor association and key management for body area networks
-
march
-
M. Li, S. Yu, W. Lou, and K. Ren. Group device pairing based secure sensor association and key management for body area networks. In INFOCOM, 2010 Proceedings IEEE, pages 1 -9, march 2010.
-
(2010)
INFOCOM, 2010 Proceedings IEEE
, pp. 1-9
-
-
Li, M.1
Yu, S.2
Lou, W.3
Ren, K.4
-
23
-
-
42149172778
-
Group-based key predistribution for wireless sensor networks
-
D. Liu, P. Ning, and W. Du. Group-based key predistribution for wireless sensor networks. ACM Transactions on Sensor Networks (TOSN), 4(2):1-30, 2008.
-
(2008)
ACM Transactions on Sensor Networks (TOSN)
, vol.4
, Issue.2
, pp. 1-30
-
-
Liu, D.1
Ning, P.2
Du, W.3
-
24
-
-
10944253573
-
Sensor networks for emergency response: Challenges and opportunities
-
DOI 10.1109/MPRV.2004.18
-
K. Lorincz, D. Malan, T. Fulford-Jones, A. Nawoj, A. Clavel, V. Shnayder, G. Mainland, M. Welsh, and S. Moulton. Sensor networks for emergency response: challenges and opportunities. IEEE Pervasive Computing, 3(4):16-23, Oct.-Dec. 2004. (Pubitemid 40010894)
-
(2004)
IEEE Pervasive Computing
, vol.3
, Issue.4
, pp. 16-23
-
-
Lorincz, K.1
Malan, D.J.2
Fulford-Jones, T.R.F.3
Nawoj, A.4
Clavel, A.5
Shnayder, V.6
Mainland, G.7
Welsh, M.8
Moulton, S.9
-
25
-
-
10944253573
-
Sensor networks for emergency response: Challenges and opportunities
-
DOI 10.1109/MPRV.2004.18
-
K. Lorincz, D. Malan, T. Fulford-Jones, A. Nawoj, A. Clavel, V. Shnayder, G. Mainland, M. Welsh, and S. Moulton. Sensor networks for emergency response: challenges and opportunities. IEEE Pervasive Computing, 3(4):16-23, Oct.-Dec. 2004. (Pubitemid 40010894)
-
(2004)
IEEE Pervasive Computing
, vol.3
, Issue.4
, pp. 16-23
-
-
Lorincz, K.1
Malan, D.J.2
Fulford-Jones, T.R.F.3
Nawoj, A.4
Clavel, A.5
Shnayder, V.6
Mainland, G.7
Welsh, M.8
Moulton, S.9
-
27
-
-
84860672351
-
A light weight protocol to provide location privacy in wireless body area networks
-
abs
-
M. Mana, M. Feham, and B. A. Bensaber. A light weight protocol to provide location privacy in wireless body area networks. CoRR, abs/1103.3308, 2011.
-
(2011)
CoRR
, vol.1103
, pp. 3308
-
-
Mana, M.1
Feham, M.2
Bensaber, B.A.3
-
28
-
-
79961063540
-
Proximate: Proximity-based secure pairing using ambient wireless signals
-
ACM
-
S. Mathur, R. Miller, A. Varshavsky, W. Trappe, and N. Mandayam. Proximate: proximity-based secure pairing using ambient wireless signals. In Proceedings of the 9th international conference on Mobile systems, applications, and services, pages 211-224. ACM, 2011.
-
(2011)
Proceedings of the 9th International Conference on Mobile Systems, Applications, and Services
, pp. 211-224
-
-
Mathur, S.1
Miller, R.2
Varshavsky, A.3
Trappe, W.4
Mandayam, N.5
-
29
-
-
60149097098
-
Radio-telepathy: Extracting a secret key from an unauthenticated wireless channel
-
ACM
-
S. Mathur, W. Trappe, N. Mandayam, C. Ye, and A. Reznik. Radio-telepathy: extracting a secret key from an unauthenticated wireless channel. In Proceedings of the 14th ACM international conference on Mobile computing and networking, pages 128-139. ACM, 2008.
-
(2008)
Proceedings of the 14th ACM International Conference on Mobile Computing and Networking
, pp. 128-139
-
-
Mathur, S.1
Trappe, W.2
Mandayam, N.3
Ye, C.4
Reznik, A.5
-
30
-
-
38049075710
-
Shake well before use: Authentication based on accelerometer data
-
A. LaMarca, M. Langheinrich, and K. Truong, editors, volume 4480 of Lecture Notes in Computer Science, Springer Berlin/Heidelberg
-
R. Mayrhofer and H. Gellersen. Shake well before use: Authentication based on accelerometer data. In A. LaMarca, M. Langheinrich, and K. Truong, editors, Pervasive Computing, volume 4480 of Lecture Notes in Computer Science, pages 144-161. Springer Berlin/Heidelberg, 2007.
-
(2007)
Pervasive Computing
, pp. 144-161
-
-
Mayrhofer, R.1
Gellersen, H.2
-
31
-
-
65349086799
-
Shake well before use: Intuitive and secure pairing of mobile devices
-
R. Mayrhofer and H. Gellersen. Shake well before use: Intuitive and secure pairing of mobile devices. IEEE Transactions on Mobile Computing, 8:792-806, 2009.
-
(2009)
IEEE Transactions on Mobile Computing
, vol.8
, pp. 792-806
-
-
Mayrhofer, R.1
Gellersen, H.2
-
32
-
-
77649107719
-
Applications, challenges, and prospective in emerging body area networking technologies
-
IEEE, february
-
M. Patel and J. Wang. Applications, challenges, and prospective in emerging body area networking technologies. Wireless Communications, IEEE, 17(1):80 -88, february 2010.
-
(2010)
Wireless Communications
, vol.17
, Issue.1
, pp. 80-88
-
-
Patel, M.1
Wang, J.2
-
34
-
-
0036738266
-
Spins: Security protocols for sensor networks
-
A. Perrig, R. Szewczyk, J. Tygar, V. Wen, and D. Culler. Spins: Security protocols for sensor networks. Wireless networks, 8(5):521-534, 2002.
-
(2002)
Wireless Networks
, vol.8
, Issue.5
, pp. 521-534
-
-
Perrig, A.1
Szewczyk, R.2
Tygar, J.3
Wen, V.4
Culler, D.5
-
35
-
-
33646948221
-
A novel biometrics method to secure wireless body area sensor networks for telemedicine and M-health
-
DOI 10.1109/MCOM.2006.1632652
-
C. Poon, Y.-T. Zhang, and S.-D. Bao. A novel biometrics method to secure wireless body area sensor networks for telemedicine and m-health. IEEE Communications Magazine, 44(4):73-81, April 2006. (Pubitemid 43792671)
-
(2006)
IEEE Communications Magazine
, vol.44
, Issue.4
, pp. 73-81
-
-
Poon, C.C.Y.1
Zhang, Y.-T.2
Bao, S.-D.3
-
36
-
-
0026910649
-
Effects of radio propagation path loss on DS-CDMA cellular frequency reuse efficiency for the reverse channel
-
DOI 10.1109/25.155970
-
T. Rappaport and L. Milstein. Effects of radio propagation path loss on ds-cdma cellular frequency reuse efficiency for the reverse channel. Vehicular Technology, IEEE Transactions on, 41(3):231 -242, aug 1992. (Pubitemid 23562472)
-
(1992)
IEEE Transactions on Vehicular Technology
, vol.41
, Issue.3
, pp. 231-242
-
-
Rappaport, T.S.1
Milstein, L.B.2
-
38
-
-
74049128234
-
Proximity-based access control for implantable medical devices
-
ACM
-
K. Rasmussen, C. Castelluccia, T. Heydt-Benjamin, and S. Capkun. Proximity-based access control for implantable medical devices. In Proceedings of the 16th ACM conference on Computer and communications security, pages 410-419. ACM, 2009.
-
(2009)
Proceedings of the 16th ACM Conference on Computer and Communications Security
, pp. 410-419
-
-
Rasmussen, K.1
Castelluccia, C.2
Heydt-Benjamin, T.3
Capkun, S.4
-
39
-
-
51349156683
-
Authenticated key establishment protocols for a home health care system
-
Dec.
-
K. Singh and V. Muthukkumarasamy. Authenticated key establishment protocols for a home health care system. In ISSNIP'07, pages 353-358, Dec. 2007.
-
(2007)
ISSNIP'07
, pp. 353-358
-
-
Singh, K.1
Muthukkumarasamy, V.2
-
40
-
-
70449479456
-
Characterization of the dynamic narrowband on-body to off-body area channel
-
IEEE
-
D. Smith, L. Hanlen, J. Zhang, D. Miniutti, D. Rodda, and B. Gilbert. Characterization of the dynamic narrowband on-body to off-body area channel. In Communications, 2009. ICC'09. IEEE International Conference on, pages 1-6. IEEE, 2009.
-
(2009)
Communications, 2009. ICC'09. IEEE International Conference on
, pp. 1-6
-
-
Smith, D.1
Hanlen, L.2
Zhang, J.3
Miniutti, D.4
Rodda, D.5
Gilbert, B.6
-
41
-
-
56749165131
-
Body sensor network security: An identity-based cryptography approach
-
C. C. Tan, H. Wang, S. Zhong, and Q. Li. Body sensor network security: an identity-based cryptography approach. In ACM WiSec'08:, pages 148-153, 2008.
-
(2008)
ACM WiSec'08
, pp. 148-153
-
-
Tan, C.C.1
Wang, H.2
Zhong, S.3
Li, Q.4
-
43
-
-
38349004892
-
Amigo: Proximity-based authentication of mobile devices
-
Berlin, Heidelberg, Springer-Verlag
-
A. Varshavsky, A. Scannell, A. LaMarca, and E. De Lara. Amigo: proximity-based authentication of mobile devices. In Proceedings of the 9th international conference on Ubiquitous computing, UbiComp'07, pages 253-270, Berlin, Heidelberg, 2007. Springer-Verlag.
-
(2007)
Proceedings of the 9th International Conference on Ubiquitous Computing, UbiComp'07
, pp. 253-270
-
-
Varshavsky, A.1
Scannell, A.2
Lamarca, A.3
Lara, E.D.4
-
44
-
-
76849098534
-
Pska: Usable and secure key agreement scheme for body area networks
-
K. Venkatasubramanian, A. Banerjee, and S. Gupta. Pska: Usable and secure key agreement scheme for body area networks. Information Technology in Biomedicine, IEEE Transactions on, 14(1):60-68, 2010.
-
(2010)
Information Technology in Biomedicine, IEEE Transactions on
, vol.14
, Issue.1
, pp. 60-68
-
-
Venkatasubramanian, K.1
Banerjee, A.2
Gupta, S.3
-
45
-
-
77954990804
-
Physiological value-based efficient usable security solutions for body sensor networks
-
K. Venkatasubramanian and S. Gupta. Physiological value-based efficient usable security solutions for body sensor networks. ACM Transactions on Sensor Networks (TOSN), 6(4):1-36, 2010.
-
(2010)
ACM Transactions on Sensor Networks (TOSN)
, vol.6
, Issue.4
, pp. 1-36
-
-
Venkatasubramanian, K.1
Gupta, S.2
-
46
-
-
81155138997
-
Interoperable medical devices: Communication security issues
-
IEEE
-
K. Venkatasubramanian, S. Gupta, R. Jetley, and P. Jones. Interoperable medical devices: Communication security issues. Pulse, IEEE, 1(2):16-27, 2010.
-
(2010)
Pulse
, vol.1
, Issue.2
, pp. 16-27
-
-
Venkatasubramanian, K.1
Gupta, S.2
Jetley, R.3
Jones, P.4
-
47
-
-
77954990804
-
Physiological value-based efficient usable security solutions for body sensor networks
-
31:1-31:36, July
-
K. K. Venkatasubramanian and S. K. S. Gupta. Physiological value-based efficient usable security solutions for body sensor networks. ACM Trans. Sen. Netw., 6:31:1-31:36, July 2010.
-
(2010)
ACM Trans. Sen. Netw.
, vol.6
-
-
Venkatasubramanian, K.K.1
Gupta, S.K.S.2
-
48
-
-
48149115694
-
Using the physical layer for wireless authentication in time-variant channels
-
july
-
L. Xiao, L. Greenstein, N. Mandayam, and W. Trappe. Using the physical layer for wireless authentication in time-variant channels. Wireless Communications, IEEE Transactions on, 7(7):2571 -2579, july 2008.
-
(2008)
Wireless Communications, IEEE Transactions On
, vol.7
, Issue.7
, pp. 2571-2579
-
-
Xiao, L.1
Greenstein, L.2
Mandayam, N.3
Trappe, W.4
-
49
-
-
69749083720
-
Channel-based detection of sybil attacks in wireless networks
-
September
-
L. Xiao, L. J. Greenstein, N. B. Mandayam, and W. Trappe. Channel-based detection of sybil attacks in wireless networks. Trans. Info. For. Sec., 4:492-503, September 2009.
-
(2009)
Trans. Info. For. Sec.
, vol.4
, pp. 492-503
-
-
Xiao, L.1
Greenstein, L.J.2
Mandayam, N.B.3
Trappe, W.4
-
50
-
-
79960873920
-
Securing implantable medical devices with the external wearable guardian
-
Shanghai, P.R.China, April
-
F. Xu, Z. Qin, C. Tan, B. Wang, and Q. Li. Imdguard: Securing implantable medical devices with the external wearable guardian. In The 30th IEEE International Conference on Computer Communications (INFOCOM 2011), pages 1862 - 1870, Shanghai, P.R.China, April 2011.
-
(2011)
The 30th IEEE International Conference on Computer Communications (INFOCOM 2011)
, pp. 1862-1870
-
-
Xu, F.1
Qin, Z.2
Tan, C.3
Wang, B.4
Imdguard, Q.Li.5
-
51
-
-
77958096949
-
Non-cryptographic authentication and identification in wireless networks
-
October
-
K. Zeng, K. Govindan, and P. Mohapatra. Non-cryptographic authentication and identification in wireless networks. Wireless Commun., 17:56-62, October 2010.
-
(2010)
Wireless Commun.
, vol.17
, pp. 56-62
-
-
Zeng, K.1
Govindan, K.2
Mohapatra, P.3
-
52
-
-
84860685134
-
A lightweight security framework for wireless sensor networks
-
september
-
T. Zia and A. Zomaya. A lightweight security framework for wireless sensor networks. Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications, 2:53-73, september 2011.
-
(2011)
Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications
, vol.2
, pp. 53-73
-
-
Zia, T.1
Zomaya, A.2
|