메뉴 건너뛰기




Volumn 17, Issue 7, 2013, Pages 1317-1329

A sensitive data aggregation scheme for body sensor networks based on data hiding

Author keywords

BSN; Data aggregation; Data hiding; Health monitoring; Security

Indexed keywords

BSN; DATA AGGREGATION; DATA HIDING; HEALTH MONITORING; SECURITY;

EID: 84885864117     PISSN: 16174909     EISSN: None     Source Type: Journal    
DOI: 10.1007/s00779-012-0566-6     Document Type: Article
Times cited : (9)

References (29)
  • 1
    • 70449591671 scopus 로고    scopus 로고
    • Guest editorial body sensor networks: From theory to emerging applications
    • doi:10.1109/TITB.2009.2034564
    • Jovanov E, Poon CC, Yang GZ, Zhang YT (2009) Guest editorial body sensor networks: from theory to emerging applications. IEEE Trans Inf Technol Biomed 13(6):859-863. doi:10.1109/TITB.2009.2034564
    • (2009) IEEE Trans Inf Technol Biomed , vol.13 , Issue.6 , pp. 859-863
    • Jovanov, E.1    Poon, C.C.2    Yang, G.Z.3    Zhang, Y.T.4
  • 4
    • 84860253312 scopus 로고    scopus 로고
    • Security and privacy issues in wireless sensor networks for healthcare applications
    • doi:10.1007/s10916-010-9449-4
    • Ameen M Al, Liu J, Kwak K (2010) Security and privacy issues in wireless sensor networks for healthcare applications. J Med Syst. doi:10.1007/s10916-010- 9449-4
    • (2010) J Med Syst.
    • Al Ameen, M.1    Liu, J.2    Kwak, K.3
  • 5
    • 32944471696 scopus 로고    scopus 로고
    • The health insurance portability and accountability act of 1996 (HIPAA) privacy rule: Implications for clinical research
    • doi:10.1146/annurev.med.57.121304.131257
    • Nosowsky R, Giordano TJ (2006) The Health Insurance Portability and Accountability Act of 1996 (HIPAA) privacy rule: implications for clinical research. Annu Rev Med 57:575-590. doi:10.1146/annurev.med.57.121304.131257
    • (2006) Annu Rev Med , vol.57 , pp. 575-590
    • Nosowsky, R.1    Giordano, T.J.2
  • 8
    • 77953501127 scopus 로고    scopus 로고
    • Privacy-preserving data aggregation protocols for wireless sensor networks: A survey
    • doi:10.3390/s100504577
    • Bista R, Chang JW (2010) Privacy-preserving data aggregation protocols for wireless sensor networks: a survey. Sensors 10(5):4577-4601. doi:10.3390/s100504577
    • (2010) Sensors , vol.10 , Issue.5 , pp. 4577-4601
    • Bista, R.1    Chang, J.W.2
  • 9
    • 84860762438 scopus 로고    scopus 로고
    • Security in wireless sensor network: A survey
    • Rathod VJ, Mehta M (2011) Security in wireless sensor network: a survey. Ganpat Univ J Eng Technol 1(1):35-44
    • (2011) Ganpat Univ J Eng Technol , vol.1 , Issue.1 , pp. 35-44
    • Rathod, V.J.1    Mehta, M.2
  • 10
    • 70849117519 scopus 로고    scopus 로고
    • Privacy-preserving integrity-assured data aggregation in sensor networks
    • Vancouver, Canada, August 29-31 2009. doi:10.1109/CSE. 2009.389
    • Taban G, Gligor VD (2009) Privacy-preserving integrity-assured data aggregation in sensor networks In: Proceeding of international symposium on secure computing (SecureCom), Vancouver, Canada, August 29-31, 168-175, 2009. doi:10.1109/CSE. 2009.389
    • (2009) Proceeding of International Symposium on Secure Computing (SecureCom) , pp. 168-175
    • Taban, G.1    Gligor, V.D.2
  • 11
    • 79952493402 scopus 로고    scopus 로고
    • A security framework for privacy-preserving data aggregation in wireless sensor networks
    • doi:10.1145/1921621.1921623
    • Chan ACF, Castelluccia C (2011) A security framework for privacy-preserving data aggregation in wireless sensor networks. ACM Trans Sensor Netw (TOSN) 7(4):29-73. doi:10.1145/1921621.1921623
    • (2011) ACM Trans Sensor Netw (TOSN) , vol.7 , Issue.4 , pp. 29-73
    • Chan, A.C.F.1    Castelluccia, C.2
  • 12
    • 84856665180 scopus 로고    scopus 로고
    • Intrusion detection based on traffic analysis and fuzzy inference system in wireless sensor networks
    • Ponomarchuk Y, Seo D-W (2010) Intrusion detection based on traffic analysis and fuzzy inference system in wireless sensor networks. J Conver 1(1):35-42
    • (2010) J Conver , vol.1 , Issue.1 , pp. 35-42
    • Ponomarchuk, Y.1    Seo, D.-W.2
  • 15
    • 84867615498 scopus 로고    scopus 로고
    • Security enhanced communication in wireless sensor networks using reed-muller codes and partially balanced incomplete block designs
    • Sarkar P, Saha A (2011) Security enhanced communication in wireless sensor networks using reed-muller codes and partially balanced incomplete block designs. J Converg 2(1):23-30
    • (2011) J Converg , vol.2 , Issue.1 , pp. 23-30
    • Sarkar, P.1    Saha, A.2
  • 16
    • 78651280371 scopus 로고    scopus 로고
    • A secure pervasive health care system using location dependent unicast key generation scheme
    • Toronto, ON, Canada, October 26-30 2010. doi:10.1145/1871902.1871919
    • Acharya D, Kumar V (2010) A secure pervasive health care system using location dependent unicast key generation scheme. In: Proceedings of the 3rd workshop on Ph. D. students in information and knowledge management, Toronto, ON, Canada, October 26-30, pp 87-90, 2010. doi:10.1145/1871902.1871919
    • (2010) Proceedings of the 3rd Workshop on Ph. D. Students in Information and Knowledge Management , pp. 87-90
    • Acharya, D.1    Kumar, V.2
  • 17
    • 80053520387 scopus 로고    scopus 로고
    • Trust key management scheme for wireless body area networks
    • doi:ijns-2011-v12-n2-p84-91
    • Mana M, Feham M, Bensaber BA (2011) Trust key management scheme for wireless body area networks. Int J Netw Secur 12(2):75-83. doi:ijns-2011-v12-n2- p84-91
    • (2011) Int J Netw Secur , vol.12 , Issue.2 , pp. 75-83
    • Mana, M.1    Feham, M.2    Bensaber, B.A.3
  • 18
    • 67349253018 scopus 로고    scopus 로고
    • SAGE: A strong privacy-preserving scheme against global eavesdropping for ehealth systems
    • doi:10.1109/JSAC.2009.090502
    • Lin X, Lu R, Shen X, Nemoto Y, Kato N (2009) SAGE: a strong privacy-preserving scheme against global eavesdropping for ehealth systems. IEEE J Sel Areas Commun 27(4):365-378. doi: 10.1109/JSAC.2009.090502
    • (2009) IEEE J Sel Areas Commun , vol.27 , Issue.4 , pp. 365-378
    • Lin, X.1    Lu, R.2    Shen, X.3    Nemoto, Y.4    Kato, N.5
  • 19
    • 70449562519 scopus 로고    scopus 로고
    • IBE-lite: A lightweight identity-based cryptography for body sensor networks
    • doi:10.1109/TITB.2009.2033055
    • Tan CC, Wang H, Zhong S, Li Q (2009) IBE-lite: a lightweight identity-based cryptography for body sensor networks. IEEE Trans Inf Technol Biomed 13(6):926-932. doi:10.1109/TITB. 2009.2033055
    • (2009) IEEE Trans Inf Technol Biomed , vol.13 , Issue.6 , pp. 926-932
    • Tan, C.C.1    Wang, H.2    Zhong, S.3    Li, Q.4
  • 21
    • 77953304550 scopus 로고    scopus 로고
    • Group device pairing based secure sensor association and key management for body area networks
    • San Diego, CA, USA, March 4-19 2010. doi:10.1109/INFCOM.2010.546 2095
    • Li M, Yu S, Lou W, Ren K (2010) Group device pairing based secure sensor association and key management for body area networks. In: Proceedings IEEE INFOCOM, San Diego, CA, USA, March 4-19, 1-9, 2010. doi:10.1109/INFCOM.2010.546 2095
    • (2010) Proceedings IEEE INFOCOM , pp. 1-9
    • Li, M.1    Yu, S.2    Lou, W.3    Ren, K.4
  • 22
    • 77954990804 scopus 로고    scopus 로고
    • Physiological value-based efficient usable security solutions for body sensor networks
    • doi:10.1145/1777406.1777410
    • Venkatasubramanian KK, Gupta SKS (2010) Physiological value-based efficient usable security solutions for body sensor networks. ACM Trans Sens Netw (TOSN) 6(4):1-36. doi:10.1145/1777406. 1777410
    • (2010) ACM Trans Sens Netw (TOSN) , vol.6 , Issue.4 , pp. 1-36
    • Venkatasubramanian, K.K.1    Gupta, S.K.S.2
  • 23
    • 79959839466 scopus 로고    scopus 로고
    • Authenticated key agreement with rekeying for secured body sensor networks
    • doi:10.3390/s110605835
    • Eldefrawy MH, Khan MK, Alghathbar K, Tolba AS, Kim KJ (2011) Authenticated key agreement with rekeying for secured body sensor networks. Sensors 11(6):5835-5849. doi:10.3390/s110605835
    • (2011) Sensors , vol.11 , Issue.6 , pp. 5835-5849
    • Eldefrawy, M.H.1    Khan, M.K.2    Alghathbar, K.3    Tolba, A.S.4    Kim, K.J.5
  • 24
    • 38449083733 scopus 로고    scopus 로고
    • Using packet combination in multi-query optimization for data collection in sensor networks
    • doi:10.1007/978-3-540-77024-4-59
    • Sun JZ (2007) Using packet combination in multi-query optimization for data collection in sensor networks. Mobile Ad-Hoc Sens Netw 4864:645-656. doi:10.1007/978-3-540-77024-4-59
    • (2007) Mobile Ad-Hoc Sens Netw , vol.4864 , pp. 645-656
    • Sun, J.Z.1
  • 26
    • 0034445661 scopus 로고    scopus 로고
    • System architecture directions for networked sensors
    • doi:10.1145/356989.356998
    • Hill J, Szewczyk R, Woo A, Hollar S, Culler D, Pister K (2000) System architecture directions for networked sensors. Acm Sigplan Notices 35(11):93-104. doi:10.1145/356989.356998
    • (2000) Acm Sigplan Notices , vol.35 , Issue.11 , pp. 93-104
    • Hill, J.1    Szewczyk, R.2    Woo, A.3    Hollar, S.4    Culler, D.5    Pister, K.6
  • 28
    • 0033061976 scopus 로고    scopus 로고
    • Development of the polysomnographic database on CD-ROM
    • doi:10.1046/j.1440-1819.1999.00527.x
    • Ichimaru Y, Moody GB (1999) Development of the polysomnographic database on CD-ROM. Psychiatry Clin Neurosci 53(2):175-177. doi:10.1046/j.1440-1819.1999. 00527.x
    • (1999) Psychiatry Clin Neurosci , vol.53 , Issue.2 , pp. 175-177
    • Ichimaru, Y.1    Moody, G.B.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.