-
1
-
-
43949092250
-
Security for pervasive health monitoring sensor applications
-
Venkatasubramanian, K., and Gupta, S. K. S., Security for pervasive health monitoring sensor applications. Proc. 4th Intl. Conf. Intelligent Sensing & Information Processing. Bangalore, India, pp. 197–202, 2006.
-
(2006)
Proc. 4th Intl. Conf. Intelligent Sensing & Information Processing. Bangalore, India
, pp. 197-202
-
-
Venkatasubramanian, K.1
Gupta, S.K.S.2
-
2
-
-
0038341106
-
A key-management scheme for distributed sensor networks
-
Eschenauer, L., and Gligor, V. D., A key-management scheme for distributed sensor networks. Proc. 9th ACM Conf. Computer and Communication Security, Washington, DC, USA, pp. 41–47, 2002.
-
(2002)
Proc. 9th ACM Conf. Computer and Communication Security, Washington, DC, USA
, pp. 41-47
-
-
Eschenauer, L.1
Gligor, V.D.2
-
3
-
-
33847120377
-
LEAP+: efficient security mechanisms for large-scale distributed sensor networks
-
Zhu, S., Setia, S., and Jajodia, S., LEAP+: efficient security mechanisms for large-scale distributed sensor networks. ACM Trans. Sens. Netw. (TOSN) 2(4):500–528, 2006.
-
(2006)
ACM Trans. Sens. Netw. (TOSN)
, vol.2
, Issue.4
, pp. 500-528
-
-
Zhu, S.1
Setia, S.2
Jajodia, S.3
-
4
-
-
84892591410
-
A survey of security issues in mobile ad hoc and sensor networks
-
Djenouri, D., Khelladi, L., and Badache, N., A survey of security issues in mobile ad hoc and sensor networks. IEEE Commun. Surv. Tutorials 7:2–28, 2005.
-
(2005)
IEEE Commun. Surv. Tutorials
, vol.7
, pp. 2-28
-
-
Djenouri, D.1
Khelladi, L.2
Badache, N.3
-
5
-
-
56949088196
-
A survey of security issues in wireless sensor networks
-
Yong, W., Attebury, G., and Ramamurthy, B., A survey of security issues in wireless sensor networks. IEEE Commun. Surv. Tutorials 8:2–23, 2006.
-
(2006)
IEEE Commun. Surv. Tutorials
, vol.8
, pp. 2-23
-
-
Yong, W.1
Attebury, G.2
Ramamurthy, B.3
-
6
-
-
0036738266
-
SPINS: security protocols for sensor networks
-
Perrig, A., Szewczyk, R., Tygar, J. D., Wen, V., and Culler, D. E., SPINS: security protocols for sensor networks. Wirel. Netw 8:521–534, 2002.
-
(2002)
Wirel. Netw
, vol.8
, pp. 521-534
-
-
Perrig, A.1
Szewczyk, R.2
Tygar, J.D.3
Wen, V.4
Culler, D.E.5
-
7
-
-
76849098534
-
PSKA: usable and secure key agreement scheme for body area networks
-
Venkatasubramanian, K. K., Banerjee, A., and Gupta, S. K. S., PSKA: usable and secure key agreement scheme for body area networks. IEEE Trans. Inf. Technol. Biomed. 14:60–68, 2010.
-
(2010)
IEEE Trans. Inf. Technol. Biomed.
, vol.14
, pp. 60-68
-
-
Venkatasubramanian, K.K.1
Banerjee, A.2
Gupta, S.K.S.3
-
8
-
-
33646948221
-
A novel biometrics method to secure wireless body area sensor networks for telemedicine and m-health
-
Poon, C. C. Y., Yuan-Ting, Z., and Shu-Di, B., A novel biometrics method to secure wireless body area sensor networks for telemedicine and m-health. IEEE Commun. Mag. 44:73–81, 2006.
-
(2006)
IEEE Commun. Mag.
, vol.44
, pp. 73-81
-
-
Poon, C.C.Y.1
Yuan-Ting, Z.2
Shu-Di, B.3
-
9
-
-
51049107527
-
-
IEEE INFOCOM Workshops, Phoenix, AZ:
-
Venkatasubramanian, K. K., Venkatasubramanian, A., Banerjee, K. K., and Gupta, S. K. S., “EKG-based key agreement in Body Sensor Networks,” Proc. IEEE INFOCOM Workshops, Phoenix, AZ, 2008.
-
(2008)
“EKG-based key agreement in Body Sensor Networks,” Proc
-
-
Venkatasubramanian, K.K.1
Venkatasubramanian, A.2
Banerjee, K.K.3
Gupta, S.K.S.4
-
10
-
-
0041779657
-
Set reconciliation with nearly optimal communication complexity
-
Minsky, Y., Trachtenberg, A., and Zippel, R., Set reconciliation with nearly optimal communication complexity. IEEE Trans. Inf. Theory 49:2213–2218, 2003.
-
(2003)
IEEE Trans. Inf. Theory
, vol.49
, pp. 2213-2218
-
-
Minsky, Y.1
Trachtenberg, A.2
Zippel, R.3
-
11
-
-
84939906261
-
-
UbiHealth, Nottingham, UK:
-
Kristof, L., LoBenny, P., Jason, N. G., et al., “Medical healthcare monitoring with wearable and implantable sensors”. Presented at 3rd International Workshop on Ubiquitous Computing for Pervasive Healthcare Applications (UbiHealth), Nottingham, UK, 2004.
-
(2004)
“Medical healthcare monitoring with wearable and implantable sensors”. Presented at 3rd International Workshop on Ubiquitous Computing for Pervasive Healthcare Applications
-
-
Kristof, L.1
LoBenny, P.2
Jason, N.G.3
-
12
-
-
84863011893
-
Security issues in healthcare applications using wireless medical sensor networks: a survey
-
Kumar, P., and Lee, H.-J., Security issues in healthcare applications using wireless medical sensor networks: a survey. Sensors 12:55–91, 2011.
-
(2011)
Sensors
, vol.12
, pp. 55-91
-
-
Kumar, P.1
Lee, H.-J.2
-
13
-
-
84856212536
-
A lightweight security scheme for wireless body area networks: design, energy evaluation and proposed microprocessor design
-
Selimis, G., Huang, L., Mass, F., Tsekoura, I., Ashouei, M., Catthoor, F., et al., A lightweight security scheme for wireless body area networks: design, energy evaluation and proposed microprocessor design. J. Med. Syst. 35:1289–1298, 2011.
-
(2011)
J. Med. Syst.
, vol.35
, pp. 1289-1298
-
-
Selimis, G.1
Huang, L.2
Mass, F.3
Tsekoura, I.4
Ashouei, M.5
Catthoor, F.6
-
14
-
-
84939906262
-
-
Network and Distributed System Security Symposium: San Diego; CA; USA
-
Balfanz, D., Smetters, D. K., Stewart, P., and Wong, H. C., “Talking to strangers: authentication in ad-hoc wireless networks,” Proc. Network and Distributed System Security Symposium, San Diego; CA; USA, 2002.
-
(2002)
“Talking to strangers: authentication in ad-hoc wireless networks,” Proc
-
-
Balfanz, D.1
Smetters, D.K.2
Stewart, P.3
Wong, H.C.4
-
15
-
-
84884253230
-
A security suite for wireless body area networks
-
Sampangi, R. V., Saurabh, D., Urs, S. R., and Sampalli, S., A security suite for wireless body area networks. Int. J. Netw. Secur. Appl. (IJNSA) 4:97–116, 2012.
-
(2012)
Int. J. Netw. Secur. Appl. (IJNSA)
, vol.4
, pp. 97-116
-
-
Sampangi, R.V.1
Saurabh, D.2
Urs, S.R.3
Sampalli, S.4
-
16
-
-
84883761197
-
Secure and lightweight network admission and transmission protocol for body sensor networks
-
He, D., Chen, C., Chan, S., Bu, J., and Zhang, P., Secure and lightweight network admission and transmission protocol for body sensor networks. IEEE J. Biomed. Health Inform. 17(3):664–674, 2013.
-
(2013)
IEEE J. Biomed. Health Inform.
, vol.17
, Issue.3
, pp. 664-674
-
-
He, D.1
Chen, C.2
Chan, S.3
Bu, J.4
Zhang, P.5
-
17
-
-
84891050675
-
Body area network security: a fuzzy attribute-based signcryption scheme
-
Hu, C., Zhang, N., Li, H., Cheng, X., and Liao, X., Body area network security: a fuzzy attribute-based signcryption scheme. IEEE J. Sel. Areas Commun. 31(9):37–46, 2013.
-
(2013)
IEEE J. Sel. Areas Commun.
, vol.31
, Issue.9
, pp. 37-46
-
-
Hu, C.1
Zhang, N.2
Li, H.3
Cheng, X.4
Liao, X.5
-
18
-
-
84879293203
-
Low mismatch key agreement based on wavelet-transform trend and fuzzy vault in body area network
-
Wu, Y., Sun, Y., Zhan, L., and Ji, Y., Low mismatch key agreement based on wavelet-transform trend and fuzzy vault in body area network. Int. J. Distrib. Sens. Netw. 2013:1–16, 2013.
-
(2013)
Int. J. Distrib. Sens. Netw.
, vol.2013
, pp. 1-16
-
-
Wu, Y.1
Sun, Y.2
Zhan, L.3
Ji, Y.4
-
19
-
-
0036350106
-
M., “A fuzzy vault scheme,” Proc. Int. Symp. Inf. Theory, IEEE, Lausanne
-
Juels, A., and Sudan, M., “A fuzzy vault scheme,” Proc. Int. Symp. Inf. Theory, IEEE, Lausanne, Switzerland, pp. 408, 2002.
-
(2002)
Switzerland
, pp. 408
-
-
Juels, A.1
-
20
-
-
84876192814
-
Human interactive secure key and identity exchange protocols in body sensor networks
-
Xin, H., Bangdao, C., Markham, A., Qinghua, W., Zheng, Y., and Roscoe, A. W., Human interactive secure key and identity exchange protocols in body sensor networks. IET Inf. Secur. 7(1):30–38, 2013.
-
(2013)
IET Inf. Secur.
, vol.7
, Issue.1
, pp. 30-38
-
-
Xin, H.1
Bangdao, C.2
Markham, A.3
Qinghua, W.4
Zheng, Y.5
Roscoe, A.W.6
-
21
-
-
84939435969
-
S.,“Biosec: a biometric based approach for securing communication in wireless networks of biosensors implanted in the human body”, Proc. Parallel Processing Workshops, Kaohsiung
-
Cherukuri, S., Venkatasubramanian, K. K., and Gupta, S. K. S.,“Biosec: a biometric based approach for securing communication in wireless networks of biosensors implanted in the human body”, Proc. Parallel Processing Workshops, Kaohsiung, Taiwan, pp. 432–439, 2003.
-
(2003)
Taiwan
, pp. 432-439
-
-
Cherukuri, S.1
Venkatasubramanian, K.K.2
Gupta, S.K.3
-
22
-
-
77954990804
-
Physiological value-based efficient usable security solutions for body sensor networks
-
Venkatasubramanian, K. K., and Gupta, S. K. S., Physiological value-based efficient usable security solutions for body sensor networks. ACM Trans. Sens. Netw. 6:1–36, 2010.
-
(2010)
ACM Trans. Sens. Netw.
, vol.6
, pp. 1-36
-
-
Venkatasubramanian, K.K.1
Gupta, S.K.S.2
-
23
-
-
84879695352
-
A cluster-based key agreement scheme using keyed hashing for Body Area Networks
-
Ali, A., Irum, S., Kausar, F., and Khan, F., A cluster-based key agreement scheme using keyed hashing for Body Area Networks. Multimed. Tools Appl. 66:201–214, 2013.
-
(2013)
Multimed. Tools Appl.
, vol.66
, pp. 201-214
-
-
Ali, A.1
Irum, S.2
Kausar, F.3
Khan, F.4
-
24
-
-
77957961454
-
F., “An improved EKG-based key agreement scheme for body area networks”, Proc. 4th International Conference on Information Security and Assurance (ISA 2010). Miyazaki, Japan
-
Ali, A., and Khan, F., “An improved EKG-based key agreement scheme for body area networks”, Proc. 4th International Conference on Information Security and Assurance (ISA 2010). Miyazaki, Japan, CCIS Vol. 76, pp. 298–308, (Springer) 2010.
-
(2010)
CCIS Vol. 76, pp.
, vol.298-308
, Issue.Springer
-
-
Ali, A.1
-
25
-
-
0025486359
-
Worst-case interactive communication. I. Two messages are almost optimal
-
Orlitsky, A., Worst-case interactive communication. I. Two messages are almost optimal. IEEE Trans. Inf. Theory 36(5):1111–1126, 1990.
-
(1990)
IEEE Trans. Inf. Theory
, vol.36
, Issue.5
, pp. 1111-1126
-
-
Orlitsky, A.1
-
26
-
-
33646581008
-
C., “Energy analysis of public-key cryptography for wireless sensor networks”, Proc. Pervasive Computing and Communications, PerCom 2005, Kauai
-
Wander, A. S., Gura, N., Eberle, H., Gupta, V., and Shantz, S. C., “Energy analysis of public-key cryptography for wireless sensor networks”, Proc. Pervasive Computing and Communications, PerCom 2005, Kauai, Hawaii, pp. 324–328, 2005.
-
(2005)
Hawaii
, pp. 324-328
-
-
Wander, A.S.1
Gura, N.2
Eberle, H.3
Gupta, V.4
Shantz, S.5
-
27
-
-
84884221648
-
A hybrid security mechanism for intra-WBAN and inter-WBAN communications
-
Irum, S., Ali, A., Khan, F. A., and Abbas, H., A hybrid security mechanism for intra-WBAN and inter-WBAN communications. Int. J. Distrib. Sens. Netw. 2013:11, 2013.
-
(2013)
Int. J. Distrib. Sens. Netw.
, vol.2013
, pp. 11
-
-
Irum, S.1
Ali, A.2
Khan, F.A.3
Abbas, H.4
-
28
-
-
84894161253
-
Energy-efficient cluster-based security mechanism for intra-WBAN and inter-WBAN communications for healthcare applications
-
Ali, A., and Khan, F. A., Energy-efficient cluster-based security mechanism for intra-WBAN and inter-WBAN communications for healthcare applications. EURASIP J. Wirel. Commun. Netw. 2013:216, 2013.
-
(2013)
EURASIP J. Wirel. Commun. Netw.
, vol.2013
, pp. 216
-
-
Ali, A.1
Khan, F.A.2
-
29
-
-
85027951627
-
Energy-efficient key distribution using electrocardiograph biometric set for secure communications in wireless body healthcare networks
-
Shi, J., Lam, K.-Y., Gu, M., Li, M., and Chung, S.-L., Energy-efficient key distribution using electrocardiograph biometric set for secure communications in wireless body healthcare networks. J. Med. Syst. 35(5):745–753, 2011.
-
(2011)
J. Med. Syst.
, vol.35
, Issue.5
, pp. 745-753
-
-
Shi, J.1
Lam, K.-Y.2
Gu, M.3
Li, M.4
Chung, S.-L.5
-
30
-
-
84939874503
-
BodySec: synchronized key distribution using biometric slots for wireless body sensor networks
-
Shi, J., Lam, K.-Y., Gu, M., and Li, H., BodySec: synchronized key distribution using biometric slots for wireless body sensor networks. SIGMOBILE Mob. Comput. Commun. Rev. 14(1):22–24, 2010.
-
(2010)
SIGMOBILE Mob. Comput. Commun. Rev.
, vol.14
, Issue.1
, pp. 22-24
-
-
Shi, J.1
Lam, K.-Y.2
Gu, M.3
Li, H.4
|