메뉴 건너뛰기




Volumn 31, Issue 9, 2013, Pages 37-46

Body area network security: A fuzzy attribute-based signcryption scheme

Author keywords

access control structure; attribute based cryptosystem; BAN controller; Body area networks (BANs); elasticity; signcryption

Indexed keywords

ACCESS CONTROL; AUTHENTICATION; CRYPTOGRAPHY; ELASTICITY; ELECTRONIC DOCUMENT IDENTIFICATION SYSTEMS; MOBILE SECURITY; NETWORKS (CIRCUITS); SECURITY OF DATA;

EID: 84891050675     PISSN: 07338716     EISSN: None     Source Type: Journal    
DOI: 10.1109/JSAC.2013.SUP.0513004     Document Type: Article
Times cited : (123)

References (44)
  • 2
    • 0034772382 scopus 로고    scopus 로고
    • Research challenges in wireless networks of biomedical sensors
    • L. Schwiebert, S. Gupta, and J. Weinmann, "Research challenges in wireless networks of biomedical sensors," in MobiCom, 2001.
    • (2001) MobiCom
    • Schwiebert, L.1    Gupta, S.2    Weinmann, J.3
  • 4
    • 84860253312 scopus 로고    scopus 로고
    • Security and privacy issues in wireless sensor networks for healthcare applications
    • M. Al Ameen, J. Liu, and K. Kwak, "Security and privacy issues in wireless sensor networks for healthcare applications," J. Medical Syst., vol. 36, 2012.
    • (2012) J. Medical Syst. , vol.36
    • Al Ameen, M.1    Liu, J.2    Kwak, K.3
  • 5
    • 77649094379 scopus 로고    scopus 로고
    • Data security and privacy in wireless body area networks
    • M. Li, W. Lou, and K. Ren, "Data security and privacy in wireless body area networks," TWC, vol. 17, no. 1, pp. 51-58, 2010.
    • (2010) TWC , vol.17 , Issue.1 , pp. 51-58
    • Li, M.1    Lou, W.2    Ren, K.3
  • 6
    • 84868130466 scopus 로고    scopus 로고
    • A review on body area networks security for healthcare
    • G. H. Zhang, C. C. Y. Poon, and Y. T. Zhang, "A review on body area networks security for healthcare," ISRN Commun. Netw., vol. 2011, no. 21, 2011.
    • (2011) ISRN Commun. Netw. , vol.2011 , Issue.21
    • Zhang, G.H.1    Poon, C.C.Y.2    Zhang, Y.T.3
  • 7
    • 77649151691 scopus 로고    scopus 로고
    • Monitoring patients via a secure and mobile healthcare system
    • Y. Ren, R. Pazzi, and A. Boukerche, "Monitoring patients via a secure and mobile healthcare system," TWC, vol. 17, no. 1, 2010.
    • (2010) TWC , vol.17 , Issue.1
    • Ren, Y.1    Pazzi, R.2    Boukerche, A.3
  • 8
    • 84930228444 scopus 로고    scopus 로고
    • Routing for information leakage reduction in multi-channel multi-hop ad-hoc social networks
    • W. Cheng, D. Wu, X. Cheng, and D. Chen, "Routing for information leakage reduction in multi-channel multi-hop ad-hoc social networks," in WASA, 2012.
    • (2012) WASA
    • Cheng, W.1    Wu, D.2    Cheng, X.3    Chen, D.4
  • 11
    • 76849098534 scopus 로고    scopus 로고
    • PSKA: Usable and secure key agreement scheme for body area networks
    • K. Venkatasubramanian, A. Banerjee, and S. Gupta, "PSKA: Usable and secure key agreement scheme for body area networks," TITB, vol. 14, no. 1, 2010.
    • (2010) TITB , vol.14 , Issue.1
    • Venkatasubramanian, K.1    Banerjee, A.2    Gupta, S.3
  • 12
    • 33645998872 scopus 로고    scopus 로고
    • Fuzzy identity-based encryption
    • A. Sahai. and B. Waters, "Fuzzy identity-based encryption," in EURO-CRYPT, 2005.
    • (2005) EURO-CRYPT
    • Sahai, A.1    Waters, B.2
  • 13
    • 34547273527 scopus 로고    scopus 로고
    • Attribute-based encryption for fine-grained access control of encrypted data
    • V. Goyal, O. Pandey, A. Sahai, and B. Waters, "Attribute-based encryption for fine-grained access control of encrypted data," in CCS, 2006.
    • (2006) CCS
    • Goyal, V.1    Pandey, O.2    Sahai, A.3    Waters, B.4
  • 14
    • 34548731375 scopus 로고    scopus 로고
    • Ciphertext-policy attribute-based encryption
    • J. Bethencourt, A. Sahai, and B. Waters, "Ciphertext-policy attribute-based encryption," in S&P, 2007, pp. 321-334.
    • (2007) S&P , pp. 321-334
    • Bethencourt, J.1    Sahai, A.2    Waters, B.3
  • 15
    • 34548364110 scopus 로고    scopus 로고
    • Insider attacker detection in wireless sensor networks
    • F. Liu, X. Cheng, and D. Chen, "Insider attacker detection in wireless sensor networks," in INFOCOM, 2007.
    • (2007) INFOCOM
    • Liu, F.1    Cheng, X.2    Chen, D.3
  • 16
    • 77953307472 scopus 로고    scopus 로고
    • From time domain to space domain: Detecting replica attacks in mobile ad hoc networks
    • K. Xing and X. Cheng, "From time domain to space domain: Detecting replica attacks in mobile ad hoc networks," in INFOCOM, 2010.
    • (2010) INFOCOM
    • Xing, K.1    Cheng, X.2
  • 17
    • 51849154670 scopus 로고    scopus 로고
    • Realtime detection of clone attacks in wireless sensor networks
    • K. Xing, F. Liu, X. Cheng, and D. H.-C. Du, "Realtime detection of clone attacks in wireless sensor networks," in ICDCS, 2008.
    • (2008) ICDCS
    • Xing, K.1    Liu, F.2    Cheng, X.3    Du, D.H.-C.4
  • 18
    • 0018545449 scopus 로고
    • How to share a secret
    • A. Shamir, "How to share a secret," Comm. ACM 22(11), 1979.
    • (1979) Comm. ACM , vol.22 , Issue.11
    • Shamir, A.1
  • 19
    • 84862010429 scopus 로고    scopus 로고
    • Verifiable multi-secret sharing based on lrsr sequences
    • C. Hu, X. Liao, and X. Cheng, "Verifiable multi-secret sharing based on lrsr sequences," Theoretical Comput. Science, vol. 445, 2012.
    • (2012) Theoretical Comput. Science , vol.445
    • Hu, C.1    Liao, X.2    Cheng, X.3
  • 20
    • 37649017555 scopus 로고    scopus 로고
    • An efficient threshold verifiable multi-secret sharing
    • M. Dehkordi and S. Mashhadi, "An efficient threshold verifiable multi-secret sharing," Comput. Standards Interfaces, vol. 30, no. 3, 2008.
    • (2008) Comput. Standards Interfaces , vol.30 , Issue.3
    • Dehkordi, M.1    Mashhadi, S.2
  • 22
    • 0037623983 scopus 로고    scopus 로고
    • Identity-based encryption from the weil pairing
    • D. Boneh and M. Franklin, "Identity-based encryption from the weil pairing," SIAM J. Comput., vol. 32, no. 3, 2003.
    • (2003) SIAM J. Comput , vol.32 , Issue.3
    • Boneh, D.1    Franklin, M.2
  • 23
    • 24944590176 scopus 로고    scopus 로고
    • Efficient identity-based encryption without random oracles
    • B. Waters, "Efficient identity-based encryption without random oracles," in EUROCRYPT, 2005.
    • (2005) EUROCRYPT
    • Waters, B.1
  • 24
    • 36248988077 scopus 로고    scopus 로고
    • On broadcast authentication in wireless sensor networks
    • K. Ren, W. Lou, K. Zeng, and P. Moran, "On broadcast authentication in wireless sensor networks," TWC, vol. 6, no. 11, 2007.
    • (2007) TWC , vol.6 , Issue.11
    • Ren, K.1    Lou, W.2    Zeng, K.3    Moran, P.4
  • 25
    • 33646581008 scopus 로고    scopus 로고
    • Energy analysis of public-key cryptography for wireless sensor networks
    • A. Wander, N. Gura, H. Eberle, V. Gupta, and S. Shantz, "Energy analysis of public-key cryptography for wireless sensor networks," in PerCom, 2005.
    • (2005) PerCom
    • Wander, A.1    Gura, N.2    Eberle, H.3    Gupta, V.4    Shantz, S.5
  • 29
    • 33646948221 scopus 로고    scopus 로고
    • A novel biometrics method to secure wireless body area sensor networks for telemedicine and m-health
    • C. Poon, Y. Zhang, and S. Bao, "A novel biometrics method to secure wireless body area sensor networks for telemedicine and m-health," IEEE Commun. Mag., vol. 44, no. 4, 2006.
    • (2006) IEEE Commun. Mag , vol.44 , Issue.4
    • Poon, C.1    Zhang, Y.2    Bao, S.3
  • 30
    • 84939435969 scopus 로고    scopus 로고
    • Biosec: A biometric based approach for securing communication in wireless networks of biosensors implanted in the human body
    • S. Cherukuri, K. Venkatasubramanian, and S. Gupta, "Biosec: A biometric based approach for securing communication in wireless networks of biosensors implanted in the human body," in ICPP, 2003.
    • (2003) ICPP
    • Cherukuri, S.1    Venkatasubramanian, K.2    Gupta, S.3
  • 32
    • 84879861042 scopus 로고    scopus 로고
    • OPFKA: Secure and efficient ordered-physiological-feature-based key agreement for wireless body area networks
    • C. Hu, X. Cheng, F. Zhang, D. Wu, X. Liao, and D. Chen, "OPFKA: Secure and efficient ordered-physiological-feature-based key agreement for wireless body area networks," in INFOCOM, 2013.
    • (2013) INFOCOM
    • Hu, C.1    Cheng, X.2    Zhang, F.3    Wu, D.4    Liao, X.5    Chen, D.6
  • 33
    • 77956424716 scopus 로고    scopus 로고
    • A fuzzy commitment scheme
    • A. Juels and M. Wattenberg, "A fuzzy commitment scheme," in CCS, 1999.
    • (1999) CCS
    • Juels, A.1    Wattenberg, M.2
  • 34
    • 79952122961 scopus 로고    scopus 로고
    • A human body model for efficient numerical characterization of uwb signal propagation in wireless body area networks
    • H. B. Lim, D. Baumann, and E.-P. Li, "A human body model for efficient numerical characterization of uwb signal propagation in wireless body area networks." IEEE Trans. Biomedical Eng., vol. 58, no. 3, 2011.
    • (2011) IEEE Trans. Biomedical Eng , vol.58 , Issue.3
    • Lim, H.B.1    Baumann, D.2    Li, E.-P.3
  • 35
    • 34548205306 scopus 로고    scopus 로고
    • iPAK: An in-situ pairwise key bootstrapping scheme for wireless sensor networks
    • L. Ma, X. Cheng, F. Liu, F. An, and M. Rivera, "iPAK: An in-situ pairwise key bootstrapping scheme for wireless sensor networks," IEEE Trans. Parallel Distributed Syst., vol. 18, no. 8, 2007.
    • (2007) IEEE Trans. Parallel Distributed Syst , vol.18 , Issue.8
    • Ma, L.1    Cheng, X.2    Liu, F.3    An, F.4    Rivera, M.5
  • 36
    • 38349093891 scopus 로고    scopus 로고
    • LKE: A self-configuring scheme for location-aware key establishment in wireless sensor networks
    • F. Liu and X. Cheng, "LKE: A self-configuring scheme for location-aware key establishment in wireless sensor networks," TWC, vol. 7, no. 1, 2008.
    • (2008) TWC , vol.7 , Issue.1
    • Liu, F.1    Cheng, X.2
  • 37
    • 44149083595 scopus 로고    scopus 로고
    • SBK: A self-configuring framework for bootstrapping keys in sensor networks
    • F. Liu, X. Cheng, L. Ma, and K. Xing, "SBK: A self-configuring framework for bootstrapping keys in sensor networks," TMC, vol. 7, no. 7, 2008.
    • (2008) TMC , vol.7 , Issue.7
    • Liu, F.1    Cheng, X.2    Ma, L.3    Xing, K.4
  • 38
    • 0038341106 scopus 로고    scopus 로고
    • A key-management scheme for distributed sensor networks
    • L. Eschenauer and V. Gligor, "A key-management scheme for distributed sensor networks," in CCS, 2002.
    • (2002) CCS
    • Eschenauer, L.1    Gligor, V.2
  • 39
    • 3042783638 scopus 로고    scopus 로고
    • A pairwise key predistribution scheme for wireless sensor networks
    • W. Du, J. Deng, Y. Han, and P. Varshney, "A pairwise key predistribution scheme for wireless sensor networks," in CCS, 2003.
    • (2003) CCS
    • Du, W.1    Deng, J.2    Han, Y.3    Varshney, P.4
  • 40
    • 84874325466 scopus 로고    scopus 로고
    • Body sensor network security: An identity-based cryptography approach
    • C. Tan, H. Wang, S. Zhong, and Q. Li, "Body sensor network security: An identity-based cryptography approach," in WiSec, 2008.
    • (2008) WiSec
    • Tan, C.1    Wang, H.2    Zhong, S.3    Li, Q.4
  • 41
    • 70349682512 scopus 로고    scopus 로고
    • FDAC: Toward fine-grained distributed data access control in wireless sensor networks
    • S. Yu, K. Ren, and W. Lou, "FDAC: Toward fine-grained distributed data access control in wireless sensor networks," in INFOCOM, 2009.
    • (2009) INFOCOM
    • Yu, S.1    Ren, K.2    Lou, W.3
  • 42
    • 58049089548 scopus 로고    scopus 로고
    • Secure monitoring scheme based on identity-based threshold signcryption for wireless sensor networks
    • J. Li, D. Wei, and H. Kou, "Secure monitoring scheme based on identity-based threshold signcryption for wireless sensor networks," in WiCOM, 2008.
    • (2008) WiCOM
    • Li, J.1    Wei, D.2    Kou, H.3
  • 43
    • 77955088735 scopus 로고    scopus 로고
    • Efficient online/offline identity-based signature for wireless sensor network
    • J. Liu, J. Baek, J. Zhou, Y. Yang, and J. Wong, "Efficient online/offline identity-based signature for wireless sensor network," International J. Inf. Security, vol. 9, 2010.
    • (2010) International J. Inf. Security , vol.9
    • Liu, J.1    Baek, J.2    Zhou, J.3    Yang, Y.4    Wong, J.5
  • 44
    • 79956145687 scopus 로고    scopus 로고
    • An efficient identity-based broadcast signcryption scheme for wireless sensor networks
    • I. Kim and S. Hwang, "An efficient identity-based broadcast signcryption scheme for wireless sensor networks," in ISWPC, 2011.
    • (2011) ISWPC
    • Kim, I.1    Hwang, S.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.