메뉴 건너뛰기




Volumn 17, Issue 3, 2013, Pages 664-674

Secure and lightweight network admission and transmission protocol for body sensor networks

Author keywords

Body sensor networks (BSNs); Efficiency; Key update; Network admission and transmission; Security

Indexed keywords

BIOSENSORS; BODY SENSOR NETWORKS; EFFICIENCY; ENERGY EFFICIENCY;

EID: 84883761197     PISSN: 21682194     EISSN: None     Source Type: Journal    
DOI: 10.1109/JBHI.2012.2235180     Document Type: Article
Times cited : (51)

References (28)
  • 2
    • 54549116071 scopus 로고    scopus 로고
    • Secure, efficient data transmission over body sensor and wireless networks
    • N. Challa, H. Çam, and M. Sikri, "Secure, efficient data transmission over body sensor and wireless networks," EURASIP J. Wireless Commun. Netw., vol. 2008, Article ID 291365, 2008.
    • (2008) EURASIP J. Wireless Commun. Netw. , vol.2008 , pp. 291365
    • Challa, N.1    Çam, H.2    Sikri, M.3
  • 3
    • 84885148646 scopus 로고    scopus 로고
    • [Online]. Available
    • The health Information Trust Alliance (HITRUST). [Online]. Available:http://www.hitrustalliance.org
  • 4
    • 84885156799 scopus 로고    scopus 로고
    • The US Congress. Washington, DC. [Online]. Available
    • The US Congress. (1996). Health Insurance Portability and Accountability Act. Washington, DC. [Online]. Available:http://www.hhs.gov/ocr/privacy/
    • (1996) Health Insurance Portability and Accountability Act
  • 6
    • 70349646298 scopus 로고    scopus 로고
    • Design and implementation of a secure wireless mote-based medical sensor network
    • K. Malasri and L. Wang, "Design and implementation of a secure wireless mote-based medical sensor network," Sensors, vol. 9, no. 8, pp. 6273-6297, 2009.
    • (2009) Sensors , vol.9 , Issue.8 , pp. 6273-6297
    • Malasri, K.1    Wang, L.2
  • 7
    • 84907899140 scopus 로고    scopus 로고
    • Body area networking standardization: Present and future directions
    • C. Cordeiro and M. Patel, "Body area networking standardization: Present and future directions," in Proc. Body Nets, 2007.
    • Proc. Body Nets, 2007
    • Cordeiro, C.1    Patel, M.2
  • 8
    • 85008955601 scopus 로고    scopus 로고
    • Efficient implementation of public key cryptosystems on mote sensors
    • H. Wang and Q. Li, "Efficient implementation of public key cryptosystems on mote sensors," in Proc. Int. Conf. Inf. Commun. Security, 2006, pp. 519-528.
    • Proc. Int. Conf. Inf. Commun. Security, 2006 , pp. 519-528
    • Wang, H.1    Li, Q.2
  • 10
    • 84861445209 scopus 로고    scopus 로고
    • SDRP: A secure and distributed reprogramming protocol for wireless sensor networks
    • Nov.
    • D. He, C. Chen, S. Chan, and J. Bu, "SDRP: A secure and distributed reprogramming protocol for wireless sensor networks," IEEE Trans. Ind. Electron., vol. 59, no. 11, pp. 4155-4163, Nov. 2012.
    • (2012) IEEE Trans. Ind. Electron. , vol.59 , Issue.11 , pp. 4155-4163
    • He, D.1    Chen, C.2    Chan, S.3    Bu, J.4
  • 11
    • 60449084386 scopus 로고    scopus 로고
    • SMOCK: A scalable method of cryptographic key management for mission-critical wireless ad-hoc networks
    • Mar.
    • W. He, Y. Huang, R. Sathyam, K. Nahrstedt, and W. Lee, "SMOCK: A scalable method of cryptographic key management for mission-critical wireless ad-hoc networks," IEEE Trans. Inf. Forensics Security, vol. 4, no. 1, pp. 140-150, Mar. 2009.
    • (2009) IEEE Trans. Inf. Forensics Security , vol.4 , Issue.1 , pp. 140-150
    • He, W.1    Huang, Y.2    Sathyam, R.3    Nahrstedt, K.4    Lee, W.5
  • 12
    • 84860887293 scopus 로고    scopus 로고
    • A survey of applications of identity-based cryptography in mobile ad-hoc networks
    • May
    • S. Zhao, A. Aggarwal, R. Frost, and X. Bai, "A survey of applications of identity-based cryptography in mobile ad-hoc networks," IEEE Commun. Surveys Tuts., vol. 14, no. 2, pp. 380-400, May 2012.
    • (2012) IEEE Commun. Surveys Tuts. , vol.14 , Issue.2 , pp. 380-400
    • Zhao, S.1    Aggarwal, A.2    Frost, R.3    Bai, X.4
  • 13
    • 35549002780 scopus 로고    scopus 로고
    • Addressing security in medical sensor networks
    • K. Malasri and L. Wang, "Addressing security in medical sensor networks," in Proc. Health Net., 2007, pp. 7-12.
    • Proc. Health Net., 2007 , pp. 7-12
    • Malasri, K.1    Wang, L.2
  • 14
    • 56649112965 scopus 로고    scopus 로고
    • Using the timing information of heartbeats as an entity identifier to secure body sensor network
    • Nov.
    • S. Bao, C. Poon, Y. Zhang, and L. Shen, "Using the timing information of heartbeats as an entity identifier to secure body sensor network," IEEE Trans. Inf. Technol. Biomed., vol. 12, no. 6, pp. 772-779, Nov. 2008.
    • (2008) IEEE Trans. Inf. Technol. Biomed. , vol.12 , Issue.6 , pp. 772-779
    • Bao, S.1    Poon, C.2    Zhang, Y.3    Shen, L.4
  • 15
    • 84879695352 scopus 로고    scopus 로고
    • A cluster-based key agreement scheme using keyed hashing for body area networks
    • DOI: 10.1007/s11042-011-0791-4
    • A. Ali, S. Irum, F. Kausar, and F. Khan, "A cluster-based key agreement scheme using keyed hashing for body area networks," Multimed. Tools Appl., 2011, DOI: 10.1007/s11042-011-0791-4.
    • (2011) Multimed. Tools Appl.
    • Ali, A.1    Irum, S.2    Kausar, F.3    Khan, F.4
  • 16
    • 70449562519 scopus 로고    scopus 로고
    • IBE-Lite: A lightweight identity-based cryptography for body sensor networks
    • Nov.
    • C. C. Tan, H. Wang, S. Zhong, and Q. Li, "IBE-Lite: A lightweight identity-based cryptography for body sensor networks," IEEE Trans. Inf. Technol. Biomed., vol. 13, no. 6, pp. 926-932, Nov. 2009.
    • (2009) IEEE Trans. Inf. Technol. Biomed. , vol.13 , Issue.6 , pp. 926-932
    • Tan, C.C.1    Wang, H.2    Zhong, S.3    Li, Q.4
  • 17
    • 84870885560 scopus 로고    scopus 로고
    • A distributed trust evaluation model and its application scenarios for medical sensor networks
    • Nov.
    • D. He, C. Chen, S. Chan, J. Bu, and A. Vasilakos, "A distributed trust evaluation model and its application scenarios for medical sensor networks," IEEE Trans. Inf. Technol. Biomed., vol. 16, no. 6, pp. 1164-1175, Nov. 2012.
    • (2012) IEEE Trans. Inf. Technol. Biomed. , vol.16 , Issue.6 , pp. 1164-1175
    • He, D.1    Chen, C.2    Chan, S.3    Bu, J.4    Vasilakos, A.5
  • 18
    • 84863512174 scopus 로고    scopus 로고
    • ReTrust: Attack resistant and lightweight trust management for medical sensor networks
    • Jul.
    • D. He, C. Chen, S. Chan, J. Bu, and A. Vasilakos, "ReTrust: Attack resistant and lightweight trust management for medical sensor networks," IEEE Trans. Inf. Technol. Biomed., vol. 16, no. 4, pp. 623-632, Jul. 2012.
    • (2012) IEEE Trans. Inf. Technol. Biomed. , vol.16 , Issue.4 , pp. 623-632
    • He, D.1    Chen, C.2    Chan, S.3    Bu, J.4    Vasilakos, A.5
  • 19
    • 84655162295 scopus 로고    scopus 로고
    • Prototype of a secure wireless patient monitoring system for the medical community
    • Jan.
    • S. Mollera, T. Newe, and S. Lochmann, "Prototype of a secure wireless patient monitoring system for the medical community," Sens. Actuators A: Phys., vol. 173, no. 1, pp. 55-65, Jan. 2012.
    • (2012) Sens. Actuators A: Phys. , vol.173 , Issue.1 , pp. 55-65
    • Mollera, S.1    Newe, T.2    Lochmann, S.3
  • 21
    • 85028765277 scopus 로고    scopus 로고
    • Perfectly-secure key distribution for dynamic conferences
    • Proc. Adv. Cryptol., 1993
    • C. Blundo, A. Santis, A. Herzberg, S. Kutten, U. Vaccaro, and M. Yung, "Perfectly-secure key distribution for dynamic conferences," in Proc. Adv. Cryptol., 1993, vol. LNCS-740, pp. 471-486.
    • LNCS , vol.740 , pp. 471-486
    • Blundo, C.1    Santis, A.2    Herzberg, A.3    Kutten, S.4    Vaccaro, U.5    Yung, M.6
  • 22
    • 33748324558 scopus 로고    scopus 로고
    • Energy-aware lossless data compression
    • DOI 10.1145/1151690.1151692
    • K. C. Barr and K. Asanovi, "Energy aware lossless data compression," ACM Trans. Comput. Syst., vol. 24, no. 3, pp. 250-291, Aug. 2006. (Pubitemid 44330468)
    • (2006) ACM Transactions on Computer Systems , vol.24 , Issue.3 , pp. 250-291
    • Barr, K.C.1    Asanovic, K.2
  • 23
    • 84885128263 scopus 로고    scopus 로고
    • Available
    • Tiny OS. [Online]. Available:http://www.tinyos.net
    • Tiny OS. [Online]
  • 24
    • 78049298573 scopus 로고    scopus 로고
    • The price of security in wireless sensor networks
    • Dec.
    • J. Lee, K. Kapitanova, and S. Son, "The price of security in wireless sensor networks," Comput. Netw., vol. 54, no. 17, pp. 2967-2978, Dec. 2010.
    • (2010) Comput. Netw. , vol.54 , Issue.17 , pp. 2967-2978
    • Lee, J.1    Kapitanova, K.2    Son, S.3
  • 25
    • 34547420699 scopus 로고    scopus 로고
    • How public key cryptography influences wireless sensor node lifetime
    • K. Piotrowski, P. Langendoerfer, and S. Peter, "How public key cryptography influences wireless sensor node lifetime," in Proc. SASN, 2006, pp. 69-176.
    • Proc. SASN, 2006 , pp. 69-176
    • Piotrowski, K.1    Langendoerfer, P.2    Peter, S.3
  • 26
    • 51249087814 scopus 로고    scopus 로고
    • Tiny ECC: A configurable library for elliptic curve cryptography in wireless sensor networks
    • A. Liu and P. Ning, "Tiny ECC: A configurable library for elliptic curve cryptography in wireless sensor networks," in Proc. Int. Conf. Inf. Process. Sensor Netw., 2008, pp. 245-256.
    • Proc. Int. Conf. Inf. Process. Sensor Netw., 2008 , pp. 245-256
    • Liu, A.1    Ning, P.2
  • 27
    • 26444574670 scopus 로고    scopus 로고
    • Tiny Sec: A link layer security architecture for wireless sensor networks
    • C. Karlof, N. Sastry, and D. Wagner, "Tiny Sec: A link layer security architecture for wireless sensor networks," in Proc. ACM SenSys, 2004, pp. 162-175.
    • Proc. ACM SenSys, 2004 , pp. 162-175
    • Karlof, C.1    Sastry, N.2    Wagner, D.3
  • 28
    • 84885119875 scopus 로고    scopus 로고
    • [Online]. Available
    • [Online]. Available: http://tinyos.cvs.sourceforge.net/viewvc/tinyos/ tinyos- 2.x-contrib/crypto/index.html


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.