메뉴 건너뛰기




Volumn , Issue , 2010, Pages 24-30

Public key cryptography-based security scheme for wireless sensor networks in healthcare

Author keywords

access control; authentication; elliptic curve cryptography; healthcare; security; sensor networks

Indexed keywords

ACCESS CONTROL SCHEMES; DYNAMIC NETWORK TOPOLOGY; ELLIPTIC CURVE CRYPTOGRAPHY; ENERGY-EFFICIENT SECURITY; HEALTH CARE PROFESSIONALS; HEALTHCARE ENVIRONMENTS; MALICIOUS NODES; MEDICAL DATA; MEDICAL SENSORS; MUTUAL AUTHENTICATION; PERFORMANCE EVALUATION; PUBLIC KEYS; RESOURCE CONSTRAINT; SECURITY; SECURITY ANALYSIS; SECURITY SCHEME; SENSOR PLATFORM;

EID: 84863265355     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/2108616.2108623     Document Type: Conference Paper
Times cited : (9)

References (32)
  • 1
    • 33745853759 scopus 로고    scopus 로고
    • Security issues of wireless sensor networks in healthcare applications
    • H. S. Ng, M. L. Sim, C. M. Tan. Security issues of wireless sensor networks in healthcare applications. BT Tech. Journal, Vol. 24 No 2, 2006, pp. 138 - 144,
    • (2006) BT Tech. Journal , vol.24 , Issue.2 , pp. 138-144
    • Ng, H.S.1    Sim, M.L.2    Tan, C.M.3
  • 3
    • 84863243575 scopus 로고    scopus 로고
    • http://fiji.eecs.harvard.edu/CodeBlue
  • 5
    • 84863244065 scopus 로고    scopus 로고
    • http://bsn.citris.berkeley.edu/home/
  • 6
    • 84863268563 scopus 로고    scopus 로고
    • http://web.mit.edu/wockets/
  • 7
    • 84863243574 scopus 로고    scopus 로고
    • http://smart.csail.mit.edu/
  • 8
    • 84863243573 scopus 로고    scopus 로고
    • http://www.mobihealth.org/
  • 9
    • 84863244064 scopus 로고    scopus 로고
    • http://www.doc.ic.ac.uk/vip/ubimon/home/index.html
  • 10
    • 34247399967 scopus 로고    scopus 로고
    • Sensor Networks, Wearable Computing, and Healthcare Applications
    • April-June
    • Trossen, D.; Pavel, D.; Sensor Networks, Wearable Computing, and Healthcare Applications. IEEE Pervasive Computing. Vol. 6(2), April-June 2007, pp.58 - 61.
    • (2007) IEEE Pervasive Computing , vol.6 , Issue.2 , pp. 58-61
    • Trossen, D.1    Pavel, D.2
  • 11
    • 67349129674 scopus 로고    scopus 로고
    • A secure mobile healthcare system using trust-based multicast scheme
    • Boukerche, A.; Yonglin R. A secure mobile healthcare system using trust-based multicast scheme. IEEE J. Selected Areas Comm., vol 27(4), 2009 pp:387 - 399.
    • (2009) IEEE J. Selected Areas Comm. , vol.27 , Issue.4 , pp. 387-399
    • Boukerche, A.1    Yonglin, R.2
  • 16
    • 67349259247 scopus 로고    scopus 로고
    • Secure mobile health systems: Principles and solutions
    • Kluwer Academic Publishers
    • M. Markovic, Z. Savic, and B. Kovacevic, Secure mobile health systems: principles and solutions, M-Health: Emerging Mobile Health Systems, Kluwer Academic Publishers, pp. 81-106, 2007.
    • (2007) M-Health: Emerging Mobile Health Systems , pp. 81-106
    • Markovic, M.1    Savic, Z.2    Kovacevic, B.3
  • 19
    • 67349219359 scopus 로고    scopus 로고
    • Pervasive, secure access to a hierarchical sensor-based healthcare monitoring architecture in wireless heterogeneous networks
    • May
    • Huang, Y.M.; Hsieh, M.Y.; Chao, H.C.; Hung, S.H.; Park, J.H. Pervasive, secure access to a hierarchical sensor-based healthcare monitoring architecture in wireless heterogeneous networks. IEEE Journal on Selected Areas in Communications, Vol. 27, No 4, May 2009.
    • (2009) IEEE Journal on Selected Areas in Communications , vol.27 , Issue.4
    • Huang, Y.M.1    Hsieh, M.Y.2    Chao, H.C.3    Hung, S.H.4    Park, J.H.5
  • 20
    • 49949083706 scopus 로고    scopus 로고
    • Elliptic curve cryptography-based access control in sensor networks
    • Wang, H., Sheng, B., Li, Q.: Elliptic curve cryptography-based access control in sensor networks, Int. J. Security and Networks, Vol. 1, Nos. 3/4, pp.127-137 (2006).
    • (2006) Int. J. Security and Networks , vol.1 , Issue.3-4 , pp. 127-137
    • Wang, H.1    Sheng, B.2    Li, Q.3
  • 21
    • 32844459414 scopus 로고    scopus 로고
    • A Key Predistribution Scheme for Sensor Networks Using Deployment Knowledge
    • Du, W.; Deng, J.; Han, Y.; Varshney, P. A Key Predistribution Scheme for Sensor Networks Using Deployment Knowledge. IEEE Trans. Depend. Secure 2006, 3, 62-77.
    • (2006) IEEE Trans. Depend. Secure , vol.3 , pp. 62-77
    • Du, W.1    Deng, J.2    Han, Y.3    Varshney, P.4
  • 22
    • 77952655038 scopus 로고    scopus 로고
    • A Secure Coordination - Based Data Dissemination for Mobile sinks in Sensor Networks
    • X-H. Le, S. Lee, Y-K. Lee, H. Lee. A Secure Coordination - based Data Dissemination for Mobile sinks in Sensor Networks. IEICE Transaction on Communication, 2009, Vol E92-B(01).
    • (2009) IEICE Transaction on Communication , vol.E92-B , Issue.1
    • Le, X.-H.1    Lee, S.2    Lee, Y.-K.3    Lee, H.4
  • 23
  • 25
    • 33847120377 scopus 로고    scopus 로고
    • LEAP+: Efficient security mechanisms for large-scale distributed sensor networks
    • DOI 10.1145/1218556.1218559
    • Zhu, S.; Setia, S.; Jajodia, S. LEAP+: Efficient Security Mechanisms for Large-Scale Distributed Sensor Networks. ACM Trans. Sens. Netw. 2006, 2, 500-528. (Pubitemid 46278640)
    • (2006) ACM Transactions on Sensor Networks , vol.2 , Issue.4 , pp. 500-528
    • Zhu, S.1    Setia, S.2    Jajodia, S.3
  • 26
    • 35248831758 scopus 로고    scopus 로고
    • Cryptanalysis of SAFER++
    • Alex Biryukov
    • Alex Biryukov, Christophe De Cannière, Gustaf Dellkrantz: Cryptanalysis of SAFER++. CRYPTO 2003: 195-211.
    • CRYPTO 2003 , pp. 195-211
    • De Cannière, C.1    Dellkrantz, G.2
  • 27
    • 35048818581 scopus 로고    scopus 로고
    • Comparing Elliptic Curve Cryptography and RSA on 8-it CPUs
    • CHES 2004
    • Gura,N., Patel, A., Wander, A., Eberle, H., Shantz,S.C.: Comparing Elliptic Curve Cryptography and RSA on 8-it CPUs. In CHES 2004, Vol. 3156, LNCS, pp.119-132.
    • LNCS , vol.3156 , pp. 119-132
    • Gura, N.1    Patel, A.2    Wander, A.3    Eberle, H.4    Shantz, S.C.5
  • 28
    • 84863289658 scopus 로고    scopus 로고
    • On the Security of 1024- Bit RSA and 160-bit Elliptic Curve Cryptography
    • ePrint Archive: Report 2009/389
    • Joppe W. Bos, Marcelo K., Thorsten Kleinjung, Arjen K. Lenstra and Peter L. Montgomery: On the Security of 1024- bit RSA and 160-bit Elliptic Curve Cryptography Cryptology. ePrint Archive: Report 2009/389.
    • Cryptology
    • Bos, J.W.1    Marcelo, K.2    Kleinjung, T.3    Lenstra, A.K.4    Montgomery, P.L.5
  • 29
    • 0000838441 scopus 로고
    • Use of elliptic curves in cryptography
    • V. Miller, Use of elliptic curves in cryptography, CRYPTO 85, 1985.
    • (1985) CRYPTO 85
    • Miller, V.1
  • 30
    • 84968503742 scopus 로고
    • Elliptic curve cryptosystems
    • N. Koblitz, Elliptic curve cryptosystems, in Mathematics of Computation 48, 1987, pp. 203-209.
    • (1987) Mathematics of Computation , vol.48 , pp. 203-209
    • Koblitz, N.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.