메뉴 건너뛰기




Volumn 57, Issue 4, 2014, Pages 624-635

Achieving key privacy and invisibility for unattended wireless sensor networks in healthcare

Author keywords

aggregate signcryption; key invisibility; key privacy; medical networks; security; sensitive conditions; unattended wireless sensor networks

Indexed keywords

CRYPTOGRAPHY; SECURITY OF DATA; SENSORS; WIRELESS SENSOR NETWORKS;

EID: 84896325318     PISSN: 00104620     EISSN: 14602067     Source Type: Journal    
DOI: 10.1093/comjnl/bxt046     Document Type: Article
Times cited : (10)

References (47)
  • 1
    • 0141499236 scopus 로고    scopus 로고
    • Enhancing quality of life through wearable technology
    • Park, S. and Jayaraman, S. (2003) Enhancing quality of life through wearable technology. IEEE Eng. Biol. Mag., 22, 41-48
    • (2003) IEEE Eng. Biol. Mag , vol.22 , pp. 41-48
    • Park, S.1    Jayaraman, S.2
  • 2
    • 84897419718 scopus 로고    scopus 로고
    • Sensors and wireless communication for medical care database and expert system applications
    • Prague, Czech Republic, September 1-5 IEEE Computer Society, Washington, DC, USA
    • Bhargava, A. and Zoltowski, M. (2003) Sensors and Wireless Communication for Medical Care Database and Expert System Applications. Proc. DEXA?03, Prague, Czech Republic, September 1-5, pp. 956-960. IEEE Computer Society, Washington, DC, USA
    • (2003) Proc. DEXA?03 , pp. 956-960
    • Bhargava, A.1    Zoltowski, M.2
  • 3
    • 84860253312 scopus 로고    scopus 로고
    • Security and privacy issues in wireless sensor networks for healthcare applications
    • Ameen, M.A. and Liu, J. (2012) Security and privacy issues in wireless sensor networks for healthcare applications. Med. Syst. J., 36, 93-101
    • (2012) Med. Syst. J. , vol.36 , pp. 93-101
    • Ameen, M.A.1    Liu, J.2
  • 5
    • 84939435969 scopus 로고    scopus 로고
    • Biosec: A biometric based approach for securing communication in wireless networks of biosensors implanted in the human body
    • Kaohsiung, Taiwan, October 6-9 IEEE Computer Society, Washington, DC, USA
    • Cherkuri, S., Venkatasuubramanian, K.K. and Gupta, S.K.S. (2003) BioSec: A biometric based approach for securing communication in wireless networks of biosensors implanted in the human body. Proc. ICPPW?03, Kaohsiung, Taiwan, October 6-9, pp. 432-439. IEEE Computer Society, Washington, DC, USA
    • (2003) Proc. ICPPW?03 , pp. 432-439
    • Cherkuri, S.1    Venkatasuubramanian, K.K.2    Gupta, S.K.S.3
  • 7
    • 34548134027 scopus 로고    scopus 로고
    • I-living: An open system architecture forassisted living
    • Taipei,Taiwan October 8-11 IEEE Computer Society,Washington, DC, USA
    • Wang, Q. et al. (2006) I-LIVING: An Open System Architecture forAssisted Living. Proc. SMC?06,Taipei,Taiwan, October 8-11, pp. 4268-7275, IEEE Computer Society,Washington, DC, USA
    • (2006) Proc. SMC?06 , pp. 4268-7275
    • Wang, Q.1
  • 9
    • 35549002780 scopus 로고    scopus 로고
    • Addressing security in medical sensor networks
    • San Juan, PR, USA, June 11 ACM, NewYork, NY, USA
    • Malasri, K. andWang, L. (2007) Addressing Security in Medical Sensor Networks. Proc. HealthNet?07, San Juan, PR, USA, June 11, pp. 7-12. ACM, NewYork, NY, USA
    • (2007) Proc. HealthNet?07 , pp. 7-12
    • Malasri, K.1    Wang, L.2
  • 10
    • 35948930628 scopus 로고    scopus 로고
    • Security solution for data integrity in wireless biosensor networks
    • Toronto, Canada, June IEEE Computer Society,Washington, DC, USA
    • Balasubramanyan, V.B., Thamilarasu, G. and Sridhar, R. (2007) Security Solution for Data Integrity in Wireless Biosensor Networks. Proc. ICDCSW?07, Toronto, Canada, June 22-29. IEEE Computer Society,Washington, DC, USA
    • (2007) Proc. ICDCSW?07 , pp. 22-29
    • Balasubramanyan, V.B.1    Thamilarasu, G.2    Sridhar, R.3
  • 12
    • 84897413231 scopus 로고    scopus 로고
    • http://www.hackerhalted.com/2011/
  • 13
    • 79957984376 scopus 로고    scopus 로고
    • A framework for specifying safe behavior of the CIIP medical system, advances in experimental medicine and biology
    • Babamir, S.M. (2011) A framework for specifying safe behavior of the CIIP medical system, advances in experimental medicine and biology. J. Softw. Tools Algorithms Biol. Syst., 696, 637-644
    • (2011) J. Softw. Tools Algorithms Biol. Syst , vol.696 , pp. 637-644
    • Babamir, S.M.1
  • 14
    • 84863221395 scopus 로고    scopus 로고
    • Constructing a model-based software monitor for the insulin pump behavior
    • Babamir, S.M. (2012) Constructing a model-based software monitor for the insulin pump behavior. J. Med. Syst., 36, 829-840
    • (2012) J. Med. Syst , vol.36 , pp. 829-840
    • Babamir, S.M.1
  • 15
    • 84863221395 scopus 로고    scopus 로고
    • Formal verification of medical monitoring software using Z language: A representative sample
    • Babamir, S.M. and Borhani, M. (2012) Formal verification of medical monitoring software using Z language: A representative sample. J. Med. Syst., 36, 829-840
    • (2012) J. Med. Syst , vol.36 , pp. 829-840
    • Babamir, S.M.1    Borhani, M.2
  • 16
    • 63449122349 scopus 로고    scopus 로고
    • Digital signcryption or how to achieve cost (signature&encryption) cost (signature) + cost (encryption
    • Santa Barbara, CA, USA, August 17-21 Springer, Berlin
    • Zheng, Y. (1997) Digital Signcryption or How to Achieve Cost (signature&encryption)Cost (signature) + Cost (encryption). Proc. Crypto?97, Santa Barbara, CA, USA, August 17-21, pp. 165-179. Springer, Berlin
    • (1997) Proc. Crypto?97 , pp. 165-179
    • Zheng, Y.1
  • 18
    • 35048859269 scopus 로고    scopus 로고
    • Efficient signcryption with key privacy from gap diffie-hellman groups
    • Singapore, Malaysia, March 1-4 Springer, Berlin
    • Libert, B. and Quisquater, J.J. (2004) Efficient Signcryption with Key Privacy from Gap Diffie-Hellman Groups. Proc. PKC?04, Singapore, Malaysia, March 1-4, pp. 187-200. Springer, Berlin
    • (2004) Proc. PKC?04 , pp. 187-200
    • Libert, B.1    Quisquater, J.J.2
  • 19
    • 35048854673 scopus 로고    scopus 로고
    • Efficient forward and provably secure id-based signcryption scheme with public verifiability and public ciphertext authenticity
    • Seoul, Korea, November 27-28 Springer, Berlin
    • Chow, S.S.M., Yiu, S.M., Hui, L.C.K. and Chow, K.P. (2004) Efficient Forward and Provably Secure ID-Based Signcryption Scheme with Public Verifiability and Public Ciphertext Authenticity. Proc. ICISC?03, Seoul, Korea, November 27-28, pp. 352-369. Springer, Berlin
    • (2004) Proc. ICISC?03 , pp. 352-369
    • Chow, S.S.M.1    Yiu, S.M.2    Hui, L.C.K.3    Chow, K.P.4
  • 20
    • 35248874429 scopus 로고    scopus 로고
    • Multipurpose identity-based signcryption: A swiss army knife for identity-based cryptology
    • Santa Barbara, CA, USA, August 17-21 Springer, Berlin
    • Boyen, X. (2003) Multipurpose Identity-Based Signcryption: A Swiss Army Knife for Identity-Based Cryptology. Proc. CRYPTO?03, Santa Barbara, CA, USA, August 17-21, pp. 383-399. Springer, Berlin
    • (2003) Proc. CRYPTO?03 , pp. 383-399
    • Boyen, X.1
  • 21
    • 24144498013 scopus 로고    scopus 로고
    • Improved identity-based signcryption
    • Les Diablerets, Switzerland, January 23-26 Springer, Berlin
    • Chen, L. and Malone-Lee, J. (2005) Improved Identity-Based Signcryption. Proc. PKC?05, Les Diablerets, Switzerland, January 23-26, pp. 362-379. Springer, Berlin
    • (2005) Proc. PKC?05 , pp. 362-379
    • Chen, L.1    Malone-Lee, J.2
  • 22
    • 33646820668 scopus 로고    scopus 로고
    • Efficient and provably-secure identity based signcryption from bilinear maps
    • Chennai (Madras) India, December 4-8 Springer, Berlin
    • Barreto, P.S.L.M., Libert, B., McCullagh N. and Quisquater, J.J. (2005) Efficient and Provably-Secure Identity Based Signcryption from Bilinear Maps. Proc. ASIACRYPT?05, Chennai (Madras), India, December 4-8, pp. 515-532. Springer, Berlin
    • (2005) Proc. ASIACRYPT?05 , pp. 515-532
    • Barreto, P.S.L.M.1    Libert, B.2    McCullagh, N.3    Quisquater, J.J.4
  • 24
    • 77950628145 scopus 로고    scopus 로고
    • An improved semanticallysecure identity-based signcryption scheme in the standard model
    • Jin, Z., Wen, Q. and Du, H. (2010) An improved semanticallysecure identity-based signcryption scheme in the standard model. J. Comput. Electr. Eng., 36, 545-552
    • (2010) J. Comput. Electr. Eng , vol.36 , pp. 545-552
    • Jin, Z.1    Wen, Q.2    Du, H.3
  • 25
    • 77956318476 scopus 로고    scopus 로고
    • An efficient identity-based signcryption scheme for multiple receivers
    • Toyama, Japan, October 28-30 Springer, Berlin
    • Selvi, S., Vivek, S., Srinivasan, R. and Rangan, C. (2009) An Efficient Identity-Based Signcryption Scheme for Multiple Receivers. Proc. IWSEC?09, Toyama, Japan, October 28-30, pp. 71-88. Springer, Berlin
    • (2009) Proc. IWSEC?09 , pp. 71-88
    • Selvi, S.1    Vivek, S.2    Srinivasan, R.3    Rangan, C.4
  • 26
    • 84862664924 scopus 로고    scopus 로고
    • Efficient generalized signcryption schemes
    • Kushwah, P. and Lal, S. (2011) Efficient generalized signcryption schemes. Theor. Comput. Sci. J., 412, 6382-6389
    • (2011) Theor. Comput. Sci. J. , vol.412 , pp. 6382-6389
    • Kushwah, P.1    Lal, S.2
  • 27
    • 79958742506 scopus 로고    scopus 로고
    • A survey of identity based signcryption
    • Liu, F. and Khan, M.K. (2011) A survey of identity based signcryption. IETE Tech. Rev. J., 28, 256-272
    • (2011) IETE Tech. Rev. J. , vol.28 , pp. 256-272
    • Liu, F.1    Khan, M.K.2
  • 28
    • 24944566040 scopus 로고    scopus 로고
    • Efficient identity based encryption without random oracles
    • Aarhus, Denmark, May 22-26 Springer, Berlin
    • Waters, B. (2005) Efficient Identity Based Encryption Without Random Oracles. Proc. EUROCRYPT?05, Aarhus, Denmark, May 22-26, pp. 114-127. Springer, Berlin
    • (2005) Proc. EUROCRYPT?05 , pp. 114-127
    • Waters, B.1
  • 29
    • 33746372179 scopus 로고    scopus 로고
    • Efficient identity based signature secure in the standard model
    • Melbourne, Australia, July 3-5 Springer, Berlin
    • Paterson, K.G. and Schuldt, J.C.N. (2006) Efficient Identity Based Signature Secure in the Standard Model. Proc. ACISP?06, Melbourne, Australia, July 3-5, pp. 207-222. Springer, Berlin
    • (2006) Proc. ACISP?06 , pp. 207-222
    • Paterson, K.G.1    Schuldt, J.C.N.2
  • 33
    • 85020598353 scopus 로고
    • Identity based cryptosystems and signature schemes
    • Santa Barbara, CA, USA, August 19-22 Springer, NewYork, NY, USA
    • Shamir, A. (1984) Identity Based Cryptosystems and Signature Schemes. Proc. Crypto? 84, Santa Barbara, CA, USA, August 19-22, pp. 47-53. Springer, NewYork, NY, USA
    • (1984) Proc. Crypto? 84 , pp. 47-53
    • Shamir, A.1
  • 34
    • 84870718896 scopus 로고    scopus 로고
    • Data security in unattended wireless sensor networks through aggregate signcryption
    • Babamir, F.S. and Eslami, Z. (2012) Data security in unattended wireless sensor networks through aggregate signcryption. KSII Trans. Internet Inf. Syst., 9, 287-296
    • (2012) KSII Trans. Internet Inf. Syst , vol.9 , pp. 287-296
    • Babamir, F.S.1    Eslami, Z.2
  • 35
    • 77955088735 scopus 로고    scopus 로고
    • Efficient online/offline identity based signature for wireless sensor network
    • Liu, J.K., Beak, J., Zhou, J., Yang, Y. and Wong, J.W. (2012) Efficient online/offline identity based signature for wireless sensor network. Int. J. Secur., 9, 287-296
    • (2012) Int. J. Secur , vol.9 , pp. 287-296
    • Liu, J.K.1    Beak, J.2    Zhou, J.3    Yang, Y.4    Wong, J.W.5
  • 36
    • 65249138169 scopus 로고    scopus 로고
    • A new adversary and threats: Security in unattended wireless sensor networks
    • Ma, D., Soriente, C. and Tsudik, G. (2009)A new adversary and threats: Security in unattended wireless sensor networks. IEEE Netw. J., 23, 43-48
    • (2009) IEEE Netw. J. , vol.23 , pp. 43-48
    • Ma, D.1    Soriente, C.2    Tsudik, G.3
  • 37
    • 84957626176 scopus 로고
    • Proactive secret sharing or: How to cope with perpetual leakage
    • Santa Barbara, CA, USA, August 27-31, Lecture Notes in Computer Science 963 Springer, London, UK.
    • Herzberg, A., Jarecki, S., Krawczyk, H. and Yung, M. (1995) Proactive Secret Sharing or: How to Cope with Perpetual Leakage. Proc. CRYPTO?95, Santa Barbara, CA, USA, August 27-31, Lecture Notes in Computer Science 963, pp. 339-352. Springer, London, UK.
    • (1995) Proc. CRYPTO?95 , pp. 339-352
    • Herzberg, A.1    Jarecki, S.2    Krawczyk, H.3    Yung, M.4
  • 38
    • 33847255502 scopus 로고    scopus 로고
    • A practical study of transitory master key establishment for wireless sensor networks
    • Athens, Greece, September 5-9 IEEE Computer Society, Washington, DC, USA
    • Deng, J., Hartung, C., Han, R. and Mishra, S. (2005) A Practical Study of Transitory Master Key Establishment for Wireless Sensor Networks. Proc. SecureComm?05, Athens, Greece, September 5-9, pp. 289-302. IEEE Computer Society, Washington, DC, USA
    • (2005) Proc. Secure Comm?05 , pp. 289-302
    • Deng, J.1    Hartung, C.2    Han, R.3    Mishra, S.4
  • 39
    • 53149126145 scopus 로고    scopus 로고
    • Tinypbc: Pairings for authenticated identity-based non-interactive key distribution in sensor networks
    • Kanazawa, Japan, June 17-19 IEEE Computer Society, Washington, DC, USA
    • Oliveira, L., Scott, M., Lopez, J. and Dahab, R. (2008) TinyPBC: Pairings for Authenticated Identity-Based Non-Interactive Key Distribution in Sensor Networks. Proc. INSS?08, Kanazawa, Japan, June 17-19, pp. 173-180. IEEE Computer Society, Washington, DC, USA
    • (2008) Proc. INSS?08 , pp. 173-180
    • Oliveira, L.1    Scott, M.2    Lopez, J.3    Dahab, R.4
  • 41
    • 70349154616 scopus 로고    scopus 로고
    • On the application of pairing based cryptography to wireless sensor networks
    • Zurich, Switzerland ACM, NewYork, NY, USA
    • Szczechowiak, P., Kargl, A., Scott, M. and Collier, M. (2009) On the Application of Pairing Based Cryptography to Wireless Sensor Networks. Proc.WiSec?09, Zurich, Switzerland, pp. 1-12. ACM, NewYork, NY, USA
    • (2009) Proc.WiSec?09 , pp. 1-12
    • Szczechowiak, P.1    Kargl, A.2    Scott, M.3    Collier, M.4
  • 42
    • 79955044491 scopus 로고    scopus 로고
    • Implementation of data survival in unattended wireless sensor network using cryptography
    • Sheraton Denver, Downtown Denver, CO, USA, October 10-14 IEEE Computer Society,Washington DC, USA
    • Mateus, A.S.S., Margi, C.B., Simplicio, M.A., Geovandro, C.C.F.P. and de Oliveira, B.T. (2010) Implementation of Data Survival in Unattended Wireless Sensor Network Using Cryptography. Proc. LCN?10, Sheraton Denver, Downtown Denver, CO, USA, October 10-14, pp. 961-967. IEEE Computer Society,Washington, DC, USA
    • (2010) Proc. LCN?10 , pp. 961-967
    • Mateus, A.S.S.1    Margi, C.B.2    Simplicio, M.A.3    Geovandro, C.C.F.P.4    De Oliveira, B.T.5
  • 43
    • 25644439798 scopus 로고    scopus 로고
    • Several security schemes constructed using ECC-based self-certified public key cryptosystems
    • Tsaur, W.J. (2005) Several security schemes constructed using ECC-based self-certified public key cryptosystems. J. Appl. Math. Comput. J., 168, 447-464
    • (2005) J. Appl. Math. Comput. J. , vol.168 , pp. 447-464
    • Tsaur, W.J.1
  • 44
    • 60349125224 scopus 로고    scopus 로고
    • Self-certified multi-proxy signature schemes with message recovery
    • Wu,T.S., Hsu, C.L. and Li, H.Y. (2009) Self-certified multi-proxy signature schemes with message recovery. J. Zhejiang Univ. 7 Sci. A, 10, 290-300
    • (2009) J. Zhejiang Univ. 7 Sci. A , vol.10 , pp. 290-300
    • Wu, T.S.1    Hsu, C.L.2    Li, H.Y.3
  • 45
    • 84870700738 scopus 로고    scopus 로고
    • A fairexchange e-payment protocol for digital products with customer unlinkability
    • Yen, Y-C., Wu, T-C., Lo, N-W. and Tsai, K-Y. (2012) A fairexchange e-payment protocol for digital products with customer unlinkability. KSII Trans. Internet Inf. Syst., 6, 2956-2979
    • (2012) KSII Trans. Internet Inf. Syst , vol.6 , pp. 2956-2979
    • Yen, Y.-C.1    Wu, T.-C.2    Lo, N.-W.3    Tsai, K.-Y.4
  • 46
    • 0345058965 scopus 로고    scopus 로고
    • Factoring estimates for a 1024- bitrsamodulus
    • Taipei,Taiwan,November 30-December 4 Lecture Notes in Computer Science 2894 Springer, NewYork, USA
    • Lenstra, A., Tromer, E., Shamir, A., Kortsmit, W., Dodson, B., Hughes, J. and Leyland, P. (2003) Factoring Estimates for a 1024- bitRSAModulus. Proc. AsiaCrypt?03,Taipei,Taiwan,November 30-December 4, pp. 55-74 Lecture Notes in Computer Science 2894, Springer, NewYork, USA
    • (2003) Proc. AsiaCrypt?03 , pp. 55-74
    • Lenstra, A.1    Tromer, E.2    Shamir, A.3    Kortsmit, W.4    Dodson, B.5    Hughes, J.6    Leyland, P.7


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.