메뉴 건너뛰기




Volumn 31, Issue 9, 2013, Pages 1803-1816

BANA: Body area network authentication exploiting channel characteristics

Author keywords

Authentication; Physical Layer; RSS; Sensor; Wireless Body Area Network

Indexed keywords

AUTHENTICATION MECHANISMS; AUTHENTICATION SOLUTIONS; CHANNEL CHARACTERISTICS; COMMERCIAL OFF THE SHELVES; OFF-BODY COMMUNICATIONS; PHYSICAL LAYERS; RECEIVED SIGNAL STRENGTH; WIRELESS BODY AREA NETWORK;

EID: 84883408567     PISSN: 07338716     EISSN: None     Source Type: Journal    
DOI: 10.1109/JSAC.2013.130913     Document Type: Article
Times cited : (126)

References (55)
  • 3
    • 77649107719 scopus 로고    scopus 로고
    • Applications, challenges, and prospective in emerging body area networking technologies
    • February
    • M. Patel and J. Wang, "Applications, challenges, and prospective in emerging body area networking technologies," IEEE Wireless Commun., vol. 17, no. 1, pp. 80-88, february 2010.
    • (2010) IEEE Wireless Commun. , vol.17 , Issue.1 , pp. 80-88
    • Patel, M.1    Wang, J.2
  • 4
    • 18244373181 scopus 로고    scopus 로고
    • A wireless body area network of intelligent motion sensors for computer assisted physical rehabilitation
    • march
    • E. Jovanov, A. Milenkovic, C. Otto, and P. C. de Groen, "A wireless body area network of intelligent motion sensors for computer assisted physical rehabilitation," J Neuroengineering Rehabil, vol. 2, no. 1, p. 6, march 2005.
    • (2005) J Neuroengineering Rehabil , vol.2 , Issue.1 , pp. 6
    • Jovanov, E.1    Milenkovic, A.2    Otto, C.3    De Groen, P.C.4
  • 7
    • 77649094379 scopus 로고    scopus 로고
    • Data security and privacy in wireless body area networks
    • February
    • M. Li, W. Lou, and K. Ren, "Data security and privacy in wireless body area networks," IEEE Wireless Commun., vol. 17, no. 1, pp. 51- 58, february 2010.
    • (2010) IEEE Wireless Commun. , vol.17 , Issue.1 , pp. 51-58
    • Li, M.1    Lou, W.2    Ren, K.3
  • 9
    • 84860672350 scopus 로고    scopus 로고
    • august
    • K. Timm, "Medical device hacking prompts concern," august 2011. [Online]. Available: http://www.cyberprivacynews.com/2011/08/medicaldevice- hacking-prompts-concern/
    • (2011) Medical Device Hacking Prompts Concern
    • Timm, K.1
  • 12
    • 28444433009 scopus 로고    scopus 로고
    • Random key predistribution schemes for sensor networks Security and Privacy 2003
    • may
    • H. Chan, A. Perrig, and D. Song, "Random key predistribution schemes for sensor networks," in Security and Privacy, 2003. Proceedings. 2003 Symposium on, may 2003, pp. 197-213.
    • (2003) Proceedings. 2003 Symposium on , pp. 197-213
    • Chan, H.1    Perrig, A.2    Song, D.3
  • 14
    • 3042822764 scopus 로고    scopus 로고
    • Establishing pairwise keys in distributed sensor networks
    • Proceedings of the 10th ACM Conference on Computer and Communications Security, CCS 2003
    • D. Liu and P. Ning, "Establishing pairwise keys in distributed sensor networks," in Proc. 10th ACM conference on Computer and communications security. New York, NY, USA: ACM, 2003, pp. 52-61. (Pubitemid 40673788)
    • (2003) Proceedings of the ACM Conference on Computer and Communications Security , pp. 52-61
    • Liu, D.1    Ning, P.2
  • 15
    • 42149172778 scopus 로고    scopus 로고
    • Group-based key predistribution for wireless sensor networks
    • 30, Apr
    • D. Liu, P. Ning, and W. Du, "Group-based key predistribution for wireless sensor networks," ACM Trans. Sen. Netw., vol. 4, no. 2, pp. 11:1-11:30, Apr. 2008.
    • (2008) ACM Trans. Sen. Netw. , vol.4 , Issue.2 , pp. 111-111
    • Liu, D.1    Ning, P.2    Du, W.3
  • 16
    • 0036738266 scopus 로고    scopus 로고
    • Spins: Security protocols for sensor networks
    • Sep
    • A. Perrig, R. Szewczyk, J. D. Tygar, V. Wen, and D. E. Culler, "Spins: security protocols for sensor networks," Wirel. Netw., vol. 8, no. 5, pp. 521-534, Sep. 2002.
    • (2002) Wirel. Netw. , vol.8 , Issue.5 , pp. 521-534
    • Perrig, A.1    Szewczyk, R.2    Tygar, J.D.3    Wen, V.4    Culler, D.E.5
  • 17
    • 77958096949 scopus 로고    scopus 로고
    • Non-cryptographic authentication and identification in wireless networks [security and Privacy in Emerging Wireless Networks]
    • October
    • K. Zeng, K. Govindan, and P. Mohapatra, "Non-cryptographic authentication and identification in wireless networks [security and privacy in emerging wireless networks]," IEEE Wireless Commun., vol. 17, pp. 56-62, october 2010.
    • (2010) IEEE Wireless Commun. , vol.17 , pp. 56-62
    • Zeng, K.1    Govindan, K.2    Mohapatra, P.3
  • 20
    • 84860663238 scopus 로고    scopus 로고
    • A new approach for evolution of end to end in wireless sensor network
    • june
    • S. A. Devi, R. V. Babu, and B. S. Rao, "A new approach for evolution of end to end in wireless sensor network," International J. Computer Science and Engineering, vol. 3, no. 6, pp. 2531-2543, june 2011.
    • (2011) International J. Computer Science and Engineering , vol.3 , Issue.6 , pp. 2531-2543
    • Devi, S.A.1    Babu, R.V.2    Rao, B.S.3
  • 21
    • 84878431584 scopus 로고    scopus 로고
    • A light weight protocol to provide location privacy in wireless bodyarea networks
    • march
    • M. Mana, M. Feham, and B. A. Bensaber, "A light weight protocol to provide location privacy in wireless bodyarea networks," International J. Network Security & Its Applications, vol. 3, no. 2, pp. 1-11, march 2011.
    • (2011) International J. Network Security & Its Applications , vol.3 , Issue.2 , pp. 1-11
    • Mana, M.1    Feham, M.2    Bensaber, B.A.3
  • 22
    • 79952574261 scopus 로고    scopus 로고
    • A lightweight authentication scheme for wireless sensor networks
    • 2011
    • O. Delgado-Mohatar, A. Fuster-Sabater, and J. M. Sierra, "A lightweight authentication scheme for wireless sensor networks," Ad Hoc Networks, vol. 9, no. 5, pp. 727-735, 2011.
    • Ad Hoc Networks , vol.9 , Issue.5 , pp. 727-735
    • Delgado-Mohatar, O.1    Fuster-Sabater, A.2    Sierra, J.M.3
  • 25
    • 70449562519 scopus 로고    scopus 로고
    • Ibe-lite: A lightweight identitybased cryptography for body sensor networks
    • Nov
    • C. Tan, H. Wang, S. Zhong, and Q. Li, "Ibe-lite: A lightweight identitybased cryptography for body sensor networks," IEEE Trans. Inf. Technol. Biomed., vol. 13, no. 6, pp. 926-932, Nov. 2009.
    • (2009) IEEE Trans. Inf. Technol. Biomed. , vol.13 , Issue.6 , pp. 926-932
    • Tan, C.1    Wang, H.2    Zhong, S.3    Li, Q.4
  • 27
    • 77953304550 scopus 로고    scopus 로고
    • Group device pairing based secure sensor association and key management for body area networks
    • march
    • M. Li, S. Yu, W. Lou, and K. Ren, "Group device pairing based secure sensor association and key management for body area networks," in INFOCOM, 2010 Proceedings IEEE, march 2010, pp. 1-9.
    • (2010) INFOCOM, 2010 Proceedings IEEE , pp. 1-9
    • Li, M.1    Yu, S.2    Lou, W.3    Ren, K.4
  • 29
    • 84861648316 scopus 로고    scopus 로고
    • Exploiting prediction to enable secure and reliable routing in wireless body area networks
    • March
    • X. Liang, X. Li, Q. Shen, R. Lu, X. Lin, X. Shen, and W. Zhuang, "Exploiting prediction to enable secure and reliable routing in wireless body area networks," in INFOCOM, 2012 Proc. IEEE, March 2012, pp. 388-396.
    • (2012) INFOCOM, 2012 Proc. IEEE , pp. 388-396
    • Liang, X.1    Li, X.2    Shen, Q.3    Lu, R.4    Lin, X.5    Shen, X.6    Zhuang, W.7
  • 30
    • 33646948221 scopus 로고    scopus 로고
    • A novel biometrics method to secure wireless body area sensor networks for telemedicine and M-health
    • DOI 10.1109/MCOM.2006.1632652
    • C. Poon, Y.-T. Zhang, and S.-D. Bao, "A novel biometrics method to secure wireless body area sensor networks for telemedicine and mhealth," IEEE Commun. Mag., vol. 44, no. 4, pp. 73-81, april 2006. (Pubitemid 43792671)
    • (2006) IEEE Communications Magazine , vol.44 , Issue.4 , pp. 73-81
    • Poon, C.C.Y.1    Zhang, Y.-T.2    Bao, S.-D.3
  • 31
    • 77954990804 scopus 로고    scopus 로고
    • Physiological valuebased efficient usable security solutions for body sensor networks
    • Jul
    • K. K. Venkatasubramanian and S. K. S. Gupta, "Physiological valuebased efficient usable security solutions for body sensor networks," ACM Trans. Sen. Netw., vol. 6, no. 4, pp. 31:1-31:36, Jul. 2010.
    • (2010) ACM Trans. Sen. Netw. , vol.6 , Issue.4 , pp. 311-3136
    • Venkatasubramanian, K.K.1    Gupta, S.K.S.2
  • 32
    • 76849098534 scopus 로고    scopus 로고
    • Pska: Usable and secure key agreement scheme for body area networks
    • jan
    • K. Venkatasubramanian, A. Banerjee, and S. Gupta, "Pska: Usable and secure key agreement scheme for body area networks," IEEE Trans. Inf. Technol. Biomed., vol. 14, no. 1, pp. 60-68, jan. 2010.
    • (2010) IEEE Trans. Inf. Technol. Biomed. , vol.14 , Issue.1 , pp. 60-68
    • Venkatasubramanian, K.1    Banerjee, A.2    Gupta, S.3
  • 34
    • 77954990804 scopus 로고    scopus 로고
    • Physiological valuebased efficient usable security solutions for body sensor networks
    • July
    • K. K. Venkatasubramanian and S. K. S. Gupta, "Physiological valuebased efficient usable security solutions for body sensor networks," ACM Trans. Sen. Netw., vol. 6, pp. 31:1-31:36, July 2010.
    • (2010) ACM Trans. Sen. Netw. , vol.6 , pp. 311-33136
    • Venkatasubramanian, K.K.1    Gupta, S.K.S.2
  • 36
    • 79960856885 scopus 로고    scopus 로고
    • Biometric-based two-level secure access control for implantable medical devices during emergencies
    • Shanghai, P.R.China, April
    • X. Hei and X. Du, "Biometric-based two-level secure access control for implantable medical devices during emergencies," in The 30th IEEE International Conference on Computer Communications (INFOCOM 2011), Shanghai, P.R.China, April 2011, pp. 346-350.
    • (2011) The 30th IEEE International Conference on Computer Communications (INFOCOM 2011) , pp. 346-350
    • Hei, X.1    Du, X.2
  • 37
    • 38049075710 scopus 로고    scopus 로고
    • Shake well before use: Authentication based on accelerometer data
    • A. LaMarca, M. Langheinrich, and K. Truong, Eds. Springer Berlin /Heidelberg
    • R. Mayrhofer and H. Gellersen, "Shake well before use: Authentication based on accelerometer data," in Pervasive Computing, ser. Lecture Notes in Computer Science, A. LaMarca, M. Langheinrich, and K. Truong, Eds. Springer Berlin /Heidelberg, 2007, vol. 4480, pp. 144-161.
    • (2007) Pervasive Computing, Ser. Lecture Notes in Computer Science , vol.4480 , pp. 144-161
    • Mayrhofer, R.1    Gellersen, H.2
  • 38
    • 65349086799 scopus 로고    scopus 로고
    • Shake well before use: Intuitive and secure pairing of mobile devices
    • ], "Shake well before use: Intuitive and secure pairing of mobile devices," IEEE Trans. Mobile Computing, vol. 8, pp. 792-806, 2009.
    • (2009) IEEE Trans. Mobile Computing , vol.8 , pp. 792-806
  • 46
    • 85076297394 scopus 로고    scopus 로고
    • Realization of rf distance bounding
    • Berkeley,CA,USA: USENIX Association
    • K. B. Rasmussen and S. Capkun, "Realization of rf distance bounding," in Proc. 19th USENIX conference on Security. Berkeley,CA,USA: USENIX Association, 2010, pp. 25-25.
    • (2010) Proc. 19th USENIX Conference on Security , pp. 25-25
    • Rasmussen, K.B.1    Capkun, S.2
  • 50
    • 2542441781 scopus 로고    scopus 로고
    • Channel model for wireless communication around human body
    • april
    • J. Ryckaert, P. De Doncker, R. Meys, A. de Le Hoye, and S. Donnay, "Channel model for wireless communication around human body," Electronics Letters, vol. 40, no. 9, pp. 543-544, april 2004.
    • (2004) Electronics Letters , vol.40 , Issue.9 , pp. 543-544
    • Ryckaert, J.1    De Doncker, P.2    Meys, R.3    De Hoye Le, A.4    Donnay, S.5
  • 53
    • 0026910649 scopus 로고
    • Effects of radio propagation path loss on DS-CDMA cellular frequency reuse efficiency for the reverse channel
    • DOI 10.1109/25.155970Rappaport Theodore S.Milstein Laurence B.
    • T. Rappaport and L. Milstein, "Effects of radio propagation path loss on ds-cdma cellular frequency reuse efficiency for the reverse channel," IEEE Trans. Veh. Technol., vol. 41, no. 3, pp. 231-242, aug 1992. (Pubitemid 23562472)
    • (1992) IEEE Transactions on Vehicular Technology , vol.41 , Issue.3 , pp. 231-242
  • 55
    • 0027928863 scopus 로고
    • Applications of weighted voronoi diagrams and randomization to variance-based k-clustering: (Extended abstract)
    • New York, NY, USA: ACM
    • M. Inaba, N. Katoh, and H. Imai, "Applications of weighted voronoi diagrams and randomization to variance-based k-clustering: (extended abstract)," in Proc. tenth annual symposium on Computational geometry. New York, NY, USA: ACM, 1994, pp. 332-339.
    • (1994) Proc. Tenth Annual Symposium on Computational Geometry , pp. 332-339
    • Inaba, M.1    Katoh, N.2    Imai, H.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.