메뉴 건너뛰기




Volumn , Issue , 2012, Pages 25-29

Enabling data protection through PKI encryption in IoT m-Health devices

Author keywords

Ambient Assistive Living; Internet of Things; PKI Security; wearable sensors

Indexed keywords

AMBIENT ASSISTED LIVING; ASSISTIVE LIVING; DAILY LIVES; DATA ENCRYPTION; DATA PROTECTION; DIGITAL CERTIFICATES; ELDERLY PEOPLE; ENVIRONMENTAL OBJECTS; INTERNET OF THINGS (IOT); LEADING EDGE; MHEALTH; NEW FORMS; PKI SECURITY; SECURITY ISSUES; SENSOR DATA; USER-CENTRIC; WEARABLE SENSORS; WIRELESS COMMUNICATION TECHNOLOGY;

EID: 84872855613     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/BIBE.2012.6399701     Document Type: Conference Paper
Times cited : (89)

References (23)
  • 4
    • 52149107120 scopus 로고    scopus 로고
    • Security, privacy and legal issues in pervasive ehealth monitoring systems
    • Proceedings of the 2008 7th International Conference on Mobile Business, ser. Washington, DC, USA: IEEE Computer Society, [Online]. Available
    • F. Kargl, E. Lawrence, M. Fischer, and Y. Y. Lim, "Security, privacy and legal issues in pervasive ehealth monitoring systems," in Proceedings of the 2008 7th International Conference on Mobile Business, ser. ICMB '08. Washington, DC, USA: IEEE Computer Society, 2008, pp. 296-304. [Online]. Available: http://dx.doi.org/10.1109/ICMB.2008.31
    • (2008) ICMB '08 , pp. 296-304
    • Kargl, F.1    Lawrence, E.2    Fischer, M.3    Lim, Y.Y.4
  • 5
    • 67549118456 scopus 로고    scopus 로고
    • Secure data aggregation in wireless sensor networks: A comprehensive overview
    • [Online]. Available
    • S. Ozdemir and Y. Xiao, "Secure data aggregation in wireless sensor networks: A comprehensive overview," Computer Networks, vol. 53, no. 12, pp. 2022-2037, 2009. [Online]. Available: http://www.sciencedirect.com/science/ article/pii/S1389128609000863
    • (2009) Computer Networks , vol.53 , Issue.12 , pp. 2022-2037
    • Ozdemir, S.1    Xiao, Y.2
  • 6
    • 84861997111 scopus 로고    scopus 로고
    • Internet of things: Vision, applications and research challenges
    • [Online]. Available
    • D. Miorandi, S. Sicari, F. D. Pellegrini, and I. Chlamtac, "Internet of things: Vision, applications and research challenges," Ad Hoc Networks, vol. 10, no. 7, pp. 1497-1516, 2012. [Online]. Available: http://www. sciencedirect.com/science/article/pii/S1570870512000674
    • (2012) Ad Hoc Networks , vol.10 , Issue.7 , pp. 1497-1516
    • Miorandi, D.1    Sicari, S.2    Pellegrini, F.D.3    Chlamtac, I.4
  • 7
    • 34047093851 scopus 로고    scopus 로고
    • Trust negotiation in identity management
    • IEEE, march-april
    • A. Bhargav-Spantzel, A. Squicciarini, and E. Bertino, "Trust negotiation in identity management," Security Privacy, IEEE, vol. 5, no. 2, pp. 55-63, march-april 2007.
    • (2007) Security Privacy , vol.5 , Issue.2 , pp. 55-63
    • Bhargav-Spantzel, A.1    Squicciarini, A.2    Bertino, E.3
  • 9
    • 18144428307 scopus 로고    scopus 로고
    • Securedav: A secure data aggregation and verification protocol for sensor networks
    • IEEE, nov.-3 dec. Vol.4
    • A. Mahimkar and T. Rappaport, "Securedav: a secure data aggregation and verification protocol for sensor networks," in Global Telecommunications Conference, 2004. GLOBECOM '04. IEEE, vol. 4, nov.-3 dec. 2004, pp. 2175-2179 Vol.4.
    • (2004) Global Telecommunications Conference, 2004. GLOBECOM '04 , vol.4 , pp. 2175-2179
    • Mahimkar, A.1    Rappaport, T.2
  • 10
    • 18844457825 scopus 로고    scopus 로고
    • Sia: Secure information aggregation in sensor networks
    • Proceedings of the 1st international conference on Embedded networked sensor systems, ser. New York, NY, USA: ACM, [Online]. Available
    • B. Przydatek, D. Song, and A. Perrig, "Sia: secure information aggregation in sensor networks," in Proceedings of the 1st international conference on Embedded networked sensor systems, ser. SenSys '03. New York, NY, USA: ACM, 2003, pp. 255-265. [Online]. Available: http://doi.acm.org/10.1145/ 958491.958521
    • (2003) SenSys '03 , pp. 255-265
    • Przydatek, B.1    Song, D.2    Perrig, A.3
  • 15
    • 80755190141 scopus 로고    scopus 로고
    • Dydap: A dynamic data aggregation scheme for privacy aware wireless sensor networks
    • ¡ce:title¿Dynamic Analysis and Testing of Embedded Software¡/ce:title¿. [Online]. Available
    • S. Sicari, L. A. Grieco, G. Boggia, and A. Coen-Porisini, "Dydap: A dynamic data aggregation scheme for privacy aware wireless sensor networks," Journal of Systems and Software, vol. 85, no. 1, pp. 152-166, 2012, ¡ce:title¿Dynamic Analysis and Testing of Embedded Software¡/ce:title¿. [Online]. Available: http://www.sciencedirect. com/science/article/pii/S0164121211002068
    • (2012) Journal of Systems and Software , vol.85 , Issue.1 , pp. 152-166
    • Sicari, S.1    Grieco, L.A.2    Boggia, G.3    Coen-Porisini, A.4
  • 16
    • 84872838789 scopus 로고    scopus 로고
    • Sedap: Secure data aggregation protocol in privacy aware wireless sensor networks
    • Sensor Systems and Software, ser. G. Par and P. Morrow, Eds. Springer Berlin Heidelberg, [Online]. Available
    • A. Coen Porisini and S. Sicari, "Sedap: Secure data aggregation protocol in privacy aware wireless sensor networks," in Sensor Systems and Software, ser. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, G. Par and P. Morrow, Eds. Springer Berlin Heidelberg, 2011, vol. 57, pp. 135-150. [Online]. Available: http://dx.doi.org/10.1007/978-3-642-23583-2 10
    • (2011) Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering , vol.57 , pp. 135-150
    • Coen Porisini, A.1    Sicari, S.2
  • 18
    • 79955712919 scopus 로고    scopus 로고
    • Key management systems for sensor networks in the context of the internet of things
    • ¡ce:title¿Modern Trends in Applied Security: Architectures, Implementations and Applications¡/ce:title¿. [Online]. Available
    • R. Roman, C. Alcaraz, J. Lopez, and N. Sklavos, "Key management systems for sensor networks in the context of the internet of things," Computers & Electrical Engineering, vol. 37, no. 2, pp. 147-159, 2011, ¡ce:title¿Modern Trends in Applied Security: Architectures, Implementations and Applications¡/ce:title¿. [Online]. Available: http://www.sciencedirect.com/science/article/pii/S0045790611000176
    • (2011) Computers & Electrical Engineering , vol.37 , Issue.2 , pp. 147-159
    • Roman, R.1    Alcaraz, C.2    Lopez, J.3    Sklavos, N.4
  • 19
    • 34547420699 scopus 로고    scopus 로고
    • How public key cryptography influences wireless sensor node lifetime
    • Proceedings of the fourth ACM workshop on Security of ad hoc and sensor networks, ser. New York, NY, USA: ACM, [Online]. Available
    • K. Piotrowski, P. Langendoerfer, and S. Peter, "How public key cryptography influences wireless sensor node lifetime," in Proceedings of the fourth ACM workshop on Security of ad hoc and sensor networks, ser. SASN '06. New York, NY, USA: ACM, 2006, pp. 169-176. [Online]. Available: http://doi.acm.org/10.1145/1180345.1180366
    • (2006) SASN '06 , pp. 169-176
    • Piotrowski, K.1    Langendoerfer, P.2    Peter, S.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.