메뉴 건너뛰기




Volumn , Issue , 2012, Pages 27-38

BANA: Body area network authentication exploiting channel characteristics

Author keywords

Authentication; Physical layer; RSS; Sensor; Wireless body area network

Indexed keywords

AUTHENTICATION SCHEME; AUTHENTICATION SERVICES; AUTHENTICATION SOLUTIONS; BODY AREA NETWORK; BODY MOTIONS; CHANNEL CHARACTERISTICS; CLUSTERING ANALYSIS; COMMERCIAL OFF THE SHELVES; FALSE DATA; HEALTH INFORMATIONS; KEY COMPROMISE; KEY PRE-DISTRIBUTION; ON-BODY; PHYSICAL LAYERS; PHYSIOLOGICAL SIGNALS; REAL TIME MONITORING; REAL WORLD EXPERIMENT; RECEIVED SIGNAL STRENGTH; SENSOR DEVICE; SYSTEM SOFTWARES; WIRELESS BODY AREA NETWORK;

EID: 84860670073     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/2185448.2185454     Document Type: Conference Paper
Times cited : (39)

References (52)
  • 5
    • 0038487088 scopus 로고    scopus 로고
    • Random key predistribution schemes for sensor networks
    • H. Chan, A. Perrig, and D. Song. Random key predistribution schemes for sensor networks. In IEEE S & P'03, page 197, 2003.
    • (2003) IEEE S& P'03 , pp. 197
    • Chan, H.1    Perrig, A.2    Song, D.3
  • 9
    • 79952574261 scopus 로고    scopus 로고
    • A light-weight authentication scheme for wireless sensor networks
    • O. Delgado-Mohatar, A. Fuster-Sabater, and J. M. Sierra. A light-weight authentication scheme for wireless sensor networks. Ad Hoc Networks, 9(5):727 - 735, 2011.
    • (2011) Ad Hoc Networks , vol.9 , Issue.5 , pp. 727-735
    • Delgado-Mohatar, O.1    Fuster-Sabater, A.2    Sierra, J.M.3
  • 13
    • 0038341106 scopus 로고    scopus 로고
    • A key-management scheme for distributed sensor networks
    • L. Eschenauer and V. D. Gligor. A key-management scheme for distributed sensor networks. In CCS'02, pages 41-47, 2002.
    • (2002) CCS'02 , pp. 41-47
    • Eschenauer, L.1    Gligor, V.D.2
  • 15
    • 79960856885 scopus 로고    scopus 로고
    • Biometric-based two-level secure access control for implantable medical devices during emergencies
    • Shanghai, P.R.China, April
    • X. Hei and X. Du. Biometric-based two-level secure access control for implantable medical devices during emergencies. In The 30th IEEE International Conference on Computer Communications (INFOCOM 2011), pages 346 - 350, Shanghai, P.R.China, April 2011.
    • (2011) The 30th IEEE International Conference on Computer Communications (INFOCOM 2011) , pp. 346-350
    • Hei, X.1    Du, X.2
  • 16
    • 0027928863 scopus 로고
    • Applications of weighted voronoi diagrams and randomization to variance-based k-clustering: (Extended abstract)
    • New York, NY, USA, ACM
    • M. Inaba, N. Katoh, and H. Imai. Applications of weighted voronoi diagrams and randomization to variance-based k-clustering: (extended abstract). In Proceedings of the tenth annual symposium on Computational geometry, SCG'94, pages 332-339, New York, NY, USA, 1994. ACM.
    • (1994) Proceedings of the Tenth Annual Symposium on Computational Geometry, SCG'94 , pp. 332-339
    • Inaba, M.1    Katoh, N.2    Imai, H.3
  • 17
    • 18244373181 scopus 로고    scopus 로고
    • A wireless body area network of intelligent motion sensors for computer assisted physical rehabilitation
    • March
    • E. Jovanov, A. Milenkovic, C. Otto, and P. C. de Groen. A wireless body area network of intelligent motion sensors for computer assisted physical rehabilitation. J Neuroengineering Rehabil, 2(1), March 2005.
    • (2005) J Neuroengineering Rehabil , vol.2 , Issue.1
    • Jovanov, E.1    Milenkovic, A.2    Otto, C.3    Groen, P.C.D.4
  • 21
    • 77953304550 scopus 로고    scopus 로고
    • Group device pairing based secure sensor association and key management for body area networks
    • march
    • M. Li, S. Yu, W. Lou, and K. Ren. Group device pairing based secure sensor association and key management for body area networks. In INFOCOM, 2010 Proceedings IEEE, pages 1 -9, march 2010.
    • (2010) INFOCOM, 2010 Proceedings IEEE , pp. 1-9
    • Li, M.1    Yu, S.2    Lou, W.3    Ren, K.4
  • 23
    • 42149172778 scopus 로고    scopus 로고
    • Group-based key predistribution for wireless sensor networks
    • D. Liu, P. Ning, and W. Du. Group-based key predistribution for wireless sensor networks. ACM Transactions on Sensor Networks (TOSN), 4(2):1-30, 2008.
    • (2008) ACM Transactions on Sensor Networks (TOSN) , vol.4 , Issue.2 , pp. 1-30
    • Liu, D.1    Ning, P.2    Du, W.3
  • 27
    • 84860672351 scopus 로고    scopus 로고
    • A light weight protocol to provide location privacy in wireless body area networks
    • abs
    • M. Mana, M. Feham, and B. A. Bensaber. A light weight protocol to provide location privacy in wireless body area networks. CoRR, abs/1103.3308, 2011.
    • (2011) CoRR , vol.1103 , pp. 3308
    • Mana, M.1    Feham, M.2    Bensaber, B.A.3
  • 30
    • 38049075710 scopus 로고    scopus 로고
    • Shake well before use: Authentication based on accelerometer data
    • A. LaMarca, M. Langheinrich, and K. Truong, editors, volume 4480 of Lecture Notes in Computer Science, Springer Berlin/Heidelberg
    • R. Mayrhofer and H. Gellersen. Shake well before use: Authentication based on accelerometer data. In A. LaMarca, M. Langheinrich, and K. Truong, editors, Pervasive Computing, volume 4480 of Lecture Notes in Computer Science, pages 144-161. Springer Berlin/Heidelberg, 2007.
    • (2007) Pervasive Computing , pp. 144-161
    • Mayrhofer, R.1    Gellersen, H.2
  • 31
    • 65349086799 scopus 로고    scopus 로고
    • Shake well before use: Intuitive and secure pairing of mobile devices
    • R. Mayrhofer and H. Gellersen. Shake well before use: Intuitive and secure pairing of mobile devices. IEEE Transactions on Mobile Computing, 8:792-806, 2009.
    • (2009) IEEE Transactions on Mobile Computing , vol.8 , pp. 792-806
    • Mayrhofer, R.1    Gellersen, H.2
  • 32
    • 77649107719 scopus 로고    scopus 로고
    • Applications, challenges, and prospective in emerging body area networking technologies
    • IEEE, february
    • M. Patel and J. Wang. Applications, challenges, and prospective in emerging body area networking technologies. Wireless Communications, IEEE, 17(1):80 -88, february 2010.
    • (2010) Wireless Communications , vol.17 , Issue.1 , pp. 80-88
    • Patel, M.1    Wang, J.2
  • 35
    • 33646948221 scopus 로고    scopus 로고
    • A novel biometrics method to secure wireless body area sensor networks for telemedicine and M-health
    • DOI 10.1109/MCOM.2006.1632652
    • C. Poon, Y.-T. Zhang, and S.-D. Bao. A novel biometrics method to secure wireless body area sensor networks for telemedicine and m-health. IEEE Communications Magazine, 44(4):73-81, April 2006. (Pubitemid 43792671)
    • (2006) IEEE Communications Magazine , vol.44 , Issue.4 , pp. 73-81
    • Poon, C.C.Y.1    Zhang, Y.-T.2    Bao, S.-D.3
  • 36
    • 0026910649 scopus 로고
    • Effects of radio propagation path loss on DS-CDMA cellular frequency reuse efficiency for the reverse channel
    • DOI 10.1109/25.155970
    • T. Rappaport and L. Milstein. Effects of radio propagation path loss on ds-cdma cellular frequency reuse efficiency for the reverse channel. Vehicular Technology, IEEE Transactions on, 41(3):231 -242, aug 1992. (Pubitemid 23562472)
    • (1992) IEEE Transactions on Vehicular Technology , vol.41 , Issue.3 , pp. 231-242
    • Rappaport, T.S.1    Milstein, L.B.2
  • 39
    • 51349156683 scopus 로고    scopus 로고
    • Authenticated key establishment protocols for a home health care system
    • Dec.
    • K. Singh and V. Muthukkumarasamy. Authenticated key establishment protocols for a home health care system. In ISSNIP'07, pages 353-358, Dec. 2007.
    • (2007) ISSNIP'07 , pp. 353-358
    • Singh, K.1    Muthukkumarasamy, V.2
  • 41
    • 56749165131 scopus 로고    scopus 로고
    • Body sensor network security: An identity-based cryptography approach
    • C. C. Tan, H. Wang, S. Zhong, and Q. Li. Body sensor network security: an identity-based cryptography approach. In ACM WiSec'08:, pages 148-153, 2008.
    • (2008) ACM WiSec'08 , pp. 148-153
    • Tan, C.C.1    Wang, H.2    Zhong, S.3    Li, Q.4
  • 45
    • 77954990804 scopus 로고    scopus 로고
    • Physiological value-based efficient usable security solutions for body sensor networks
    • K. Venkatasubramanian and S. Gupta. Physiological value-based efficient usable security solutions for body sensor networks. ACM Transactions on Sensor Networks (TOSN), 6(4):1-36, 2010.
    • (2010) ACM Transactions on Sensor Networks (TOSN) , vol.6 , Issue.4 , pp. 1-36
    • Venkatasubramanian, K.1    Gupta, S.2
  • 46
    • 81155138997 scopus 로고    scopus 로고
    • Interoperable medical devices: Communication security issues
    • IEEE
    • K. Venkatasubramanian, S. Gupta, R. Jetley, and P. Jones. Interoperable medical devices: Communication security issues. Pulse, IEEE, 1(2):16-27, 2010.
    • (2010) Pulse , vol.1 , Issue.2 , pp. 16-27
    • Venkatasubramanian, K.1    Gupta, S.2    Jetley, R.3    Jones, P.4
  • 47
    • 77954990804 scopus 로고    scopus 로고
    • Physiological value-based efficient usable security solutions for body sensor networks
    • 31:1-31:36, July
    • K. K. Venkatasubramanian and S. K. S. Gupta. Physiological value-based efficient usable security solutions for body sensor networks. ACM Trans. Sen. Netw., 6:31:1-31:36, July 2010.
    • (2010) ACM Trans. Sen. Netw. , vol.6
    • Venkatasubramanian, K.K.1    Gupta, S.K.S.2
  • 49
    • 69749083720 scopus 로고    scopus 로고
    • Channel-based detection of sybil attacks in wireless networks
    • September
    • L. Xiao, L. J. Greenstein, N. B. Mandayam, and W. Trappe. Channel-based detection of sybil attacks in wireless networks. Trans. Info. For. Sec., 4:492-503, September 2009.
    • (2009) Trans. Info. For. Sec. , vol.4 , pp. 492-503
    • Xiao, L.1    Greenstein, L.J.2    Mandayam, N.B.3    Trappe, W.4
  • 51
    • 77958096949 scopus 로고    scopus 로고
    • Non-cryptographic authentication and identification in wireless networks
    • October
    • K. Zeng, K. Govindan, and P. Mohapatra. Non-cryptographic authentication and identification in wireless networks. Wireless Commun., 17:56-62, October 2010.
    • (2010) Wireless Commun. , vol.17 , pp. 56-62
    • Zeng, K.1    Govindan, K.2    Mohapatra, P.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.