메뉴 건너뛰기




Volumn 14, Issue 12, 2014, Pages 22619-22642

Secure publish-subscribe protocols for heterogeneous medical wireless body area networks

Author keywords

Attribute based encryption; eHealth security; Privacy; Wearable sensors; Wireless body area networks (WBAN)

Indexed keywords

ACCESS CONTROL; CRYPTOGRAPHY; DATA PRIVACY; NETWORKS (CIRCUITS); WIRELESS LOCAL AREA NETWORKS (WLAN);

EID: 84914669929     PISSN: 14248220     EISSN: None     Source Type: Journal    
DOI: 10.3390/s141222619     Document Type: Article
Times cited : (34)

References (46)
  • 1
    • 77649094379 scopus 로고    scopus 로고
    • Data security and privacy in wireless body area networks
    • Li, M.; Lou, W.; Ren, K. Data security and privacy in wireless body area networks. IEEE Wirel. Commun. 2010, 17, 51-58.
    • (2010) IEEE Wirel. Commun. , vol.17 , pp. 51-58
    • Li, M.1    Lou, W.2    Ren, K.3
  • 2
    • 77953151195 scopus 로고    scopus 로고
    • Prognosis-A Wearable Health-Monitoring System for People at Risk: Methodology and Modeling
    • Pantelopoulos, A.; Bourbakis, N. Prognosis-A Wearable Health-Monitoring System for People at Risk: Methodology and Modeling. IEEE Trans. Inf. Technol. Biomed. 2010, 14, 613-621.
    • (2010) IEEE Trans. Inf. Technol. Biomed. , vol.14 , pp. 613-621
    • Pantelopoulos, A.1    Bourbakis, N.2
  • 4
    • 40649108378 scopus 로고    scopus 로고
    • Emerging Technologies [wireless communication systems for implantable medical devices]
    • Panescu, D. Emerging Technologies [wireless communication systems for implantable medical devices]. IEEE Eng. Med. Biol. Mag. 2008, 27, 96-101.
    • (2008) IEEE Eng. Med. Biol. Mag. , vol.27 , pp. 96-101
    • Panescu, D.1
  • 6
    • 84878319615 scopus 로고    scopus 로고
    • CAM: Cloud-Assisted Privacy Preserving Mobile Health Monitoring
    • Lin, H.; Shao, J.; Zhang, C.; Fang, Y. CAM: Cloud-Assisted Privacy Preserving Mobile Health Monitoring. IEEE Trans. Inf. Forensics Secur. 2013, 8, 985-997.
    • (2013) IEEE Trans. Inf. Forensics Secur. , vol.8 , pp. 985-997
    • Lin, H.1    Shao, J.2    Zhang, C.3    Fang, Y.4
  • 7
    • 79959821040 scopus 로고    scopus 로고
    • Wearable and Implantable Wireless Sensor Network Solutions for Healthcare Monitoring
    • Darwish, A.; Hassanien, A.E. Wearable and Implantable Wireless Sensor Network Solutions for Healthcare Monitoring. Sensors 2011, 11, 5561-5595.
    • (2011) Sensors , vol.11 , pp. 5561-5595
    • Darwish, A.1    Hassanien, A.E.2
  • 8
    • 84860253312 scopus 로고    scopus 로고
    • Security and Privacy Issues in Wireless Sensor Networks for Healthcare Applications
    • Ameen, M.; Liu, J.; Kwak, K. Security and Privacy Issues in Wireless Sensor Networks for Healthcare Applications. J. Med. Syst. 2012, 36, 93-101.
    • (2012) J. Med. Syst. , vol.36 , pp. 93-101
    • Ameen, M.1    Liu, J.2    Kwak, K.3
  • 9
    • 85132893778 scopus 로고    scopus 로고
    • Security and Privacy in Wireless Body Area Networks for Health Care Applications
    • Khan, S., Khan Pathan, A.S., Eds.; Springer: Berlin/Heidelberg, Germany
    • Javadi, S.; Razzaque, M. Security and Privacy in Wireless Body Area Networks for Health Care Applications. In Wireless Networks and Security; Khan, S., Khan Pathan, A.S., Eds.; Springer: Berlin/Heidelberg, Germany, 2013; pp. 165-187.
    • (2013) Wireless Networks and Security , pp. 165-187
    • Javadi, S.1    Razzaque, M.2
  • 11
    • 84870885441 scopus 로고    scopus 로고
    • Scalable and Secure Sharing of Personal Health Records in Cloud Computing Using Attribute-Based Encryption
    • Li, M.; Yu, S.; Zheng, Y.; Ren, K.; Lou, W. Scalable and Secure Sharing of Personal Health Records in Cloud Computing Using Attribute-Based Encryption. IEEE Trans. Parallel Distrib. Syst. 2013, 24, 131-143.
    • (2013) IEEE Trans. Parallel Distrib. Syst. , vol.24 , pp. 131-143
    • Li, M.1    Yu, S.2    Zheng, Y.3    Ren, K.4    Lou, W.5
  • 13
    • 84978647020 scopus 로고    scopus 로고
    • Level based Fault Monitoring and Security for Long Range Transmission in WBAN
    • Raja, S.K.S.; Jebarajan, T. Level based Fault Monitoring and Security for Long Range Transmission in WBAN. Int. J. Comput. Appl. 2013, 64, 1-9.
    • (2013) Int. J. Comput. Appl. , vol.64 , pp. 1-9
    • Raja, S.K.S.1    Jebarajan, T.2
  • 14
    • 79952071204 scopus 로고    scopus 로고
    • FDAC: Toward Fine-Grained Distributed Data Access Control inWireless Sensor Networks
    • Yu, S.; Ren, K.; Lou,W. FDAC: Toward Fine-Grained Distributed Data Access Control inWireless Sensor Networks. IEEE Trans. Parallel Distrib. Syst. 2011, 22, 673-686.
    • (2011) IEEE Trans. Parallel Distrib. Syst. , vol.22 , pp. 673-686
    • Yu, S.1    Ren, K.2    Lou, W.3
  • 17
    • 0027699087 scopus 로고
    • Lattice-Based Access Control Models
    • Sandhu, R.S. Lattice-Based Access Control Models. IEEE Comput. 1993, 26, 9-19.
    • (1993) IEEE Comput. , vol.26 , pp. 9-19
    • Sandhu, R.S.1
  • 18
    • 24944554962 scopus 로고    scopus 로고
    • Fuzzy Identity-Based Encryption
    • Cramer, R., Ed.; Springer: Berlin/Heidelberg, Germany
    • Sahai, A.; Waters, B. Fuzzy Identity-Based Encryption. In Advances in Cryptology- EUROCRYPT 2005; Cramer, R., Ed.; Springer: Berlin/Heidelberg, Germany, 2005; pp. 457-473.
    • (2005) Advances in Cryptology- EUROCRYPT 2005 , pp. 457-473
    • Sahai, A.1    Waters, B.2
  • 22
    • 78649998200 scopus 로고    scopus 로고
    • Hierarchical Attribute-Based Encryption for Fine-grained Access Control in Cloud Storage Services
    • Chicago, IL, USA, 4-8 October
    • Wang, G.; Liu, Q.; Wu, J. Hierarchical Attribute-Based Encryption for Fine-grained Access Control in Cloud Storage Services. In Proceedings of the 17th ACM Conference on Computer and Communications Security, Chicago, IL, USA, 4-8 October 2010; pp. 735-737.
    • (2010) Proceedings of the 17th ACM Conference on Computer and Communications Security , pp. 735-737
    • Wang, G.1    Liu, Q.2    Wu, J.3
  • 23
    • 79952521560 scopus 로고    scopus 로고
    • Ciphertext-policy Attribute-Based Encryption: An Expressive, Efficient, and Provably Secure Realization
    • Springer-Verlag: Berlin/Heidelberg, Germany
    • Waters, B. Ciphertext-policy Attribute-Based Encryption: An Expressive, Efficient, and Provably Secure Realization. In Public Key Cryptography-PKC 2011; Springer-Verlag: Berlin/Heidelberg, Germany, 2011; pp. 53-70.
    • (2011) Public Key Cryptography-PKC 2011 , pp. 53-70
    • Waters, B.1
  • 25
    • 51849088550 scopus 로고    scopus 로고
    • Dynamic Threshold Public-Key Encryption
    • Wagner, D., Ed.; Springer: Berlin/Heidelberg, Germany
    • Delerablée, C.; Pointcheval, D. Dynamic Threshold Public-Key Encryption. In Advances in Cryptology-CRYPTO 2008; Wagner, D., Ed.; Springer: Berlin/Heidelberg, Germany, 2008; Vol. 5157, pp. 317-334.
    • (2008) Advances in Cryptology-CRYPTO 2008 , vol.5157 , pp. 317-334
    • Delerablée, C.1    Pointcheval, D.2
  • 26
    • 79952523217 scopus 로고    scopus 로고
    • Constant Size Ciphertexts in Threshold Attribute-Based Encryption
    • Nguyen, P.Q., Pointcheval, D., Eds.; Springer: Berlin/Heidelberg, Germany
    • Herranz, J.; Laguillaumie, F.; Ráfols, C. Constant Size Ciphertexts in Threshold Attribute-Based Encryption. In Public Key Cryptography-PKC 2010; Nguyen, P.Q., Pointcheval, D., Eds.; Springer: Berlin/Heidelberg, Germany, 2010; Volume 6056, pp. 19-34.
    • (2010) Public Key Cryptography-PKC 2010 , vol.6056 , pp. 19-34
    • Herranz, J.1    Laguillaumie, F.2    Ráfols, C.3
  • 27
    • 84865479255 scopus 로고    scopus 로고
    • New Proof Methods for Attribute-Based Encryption: Achieving Full Security through Selective Techniques
    • Safavi-Naini, R., Canetti, R., Eds.; Springer: Berlin/Heidelberg, Germany
    • Lewko, A.; Waters, B. New Proof Methods for Attribute-Based Encryption: Achieving Full Security through Selective Techniques. In Advances in Cryptology-CRYPTO 2012; Safavi-Naini, R., Canetti, R., Eds.; Springer: Berlin/Heidelberg, Germany, 2012; Volume 7417, pp. 180-198.
    • (2012) Advances in Cryptology-CRYPTO 2012 , vol.7417 , pp. 180-198
    • Lewko, A.1    Waters, B.2
  • 29
    • 84875726669 scopus 로고    scopus 로고
    • On reliability in publish/subscribe services
    • Esposito, C.; Cotroneo, D.; Russo, S. On reliability in publish/subscribe services. Comput. Netw. 2013, 57, 1318-1343.
    • (2013) Comput. Netw. , vol.57 , pp. 1318-1343
    • Esposito, C.1    Cotroneo, D.2    Russo, S.3
  • 30
    • 85077120667 scopus 로고    scopus 로고
    • Appscope: Application energymetering framework for android smartphone using kernel activity monitoring
    • Boston, MA, USA, 12-15 June
    • Yoon, C.; Kim, D.; Jung,W.; Kang, C.; Cha, H. Appscope: Application energymetering framework for android smartphone using kernel activity monitoring. In Proceedings of 2012 USENIX Annual Technical Conference, Boston, MA, USA, 12-15 June 2012.
    • (2012) Proceedings of 2012 USENIX Annual Technical Conference
    • Yoon, C.1    Kim, D.2    Jung, W.3    Kang, C.4    Cha, H.5
  • 32
    • 79960873920 scopus 로고    scopus 로고
    • IMDGuard: Securing implantable medical devices with the external wearable guardian
    • Shanghai, China, 10-15 April
    • Xu, F.; Qin, Z.; Tan, C.; Wang, B.; Li, Q. IMDGuard: Securing implantable medical devices with the external wearable guardian. In Proceedings of 2011 IEEE INFOCOM, Shanghai, China, 10-15 April 2011; pp. 1862-1870.
    • (2011) Proceedings of 2011 IEEE INFOCOM , pp. 1862-1870
    • Xu, F.1    Qin, Z.2    Tan, C.3    Wang, B.4    Li, Q.5
  • 38
    • 84893452444 scopus 로고    scopus 로고
    • Privacy-Preserving Wireless Medical Sensor Network
    • Security and Privacy in Computing and Communications (TrustCom), Melbourne, VIC, Austrlia, 16-18 July
    • Yi, X.; Willemson, J.; Nait-Abdesselam, F. Privacy-Preserving Wireless Medical Sensor Network. In Proceedings of 2013 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom), Melbourne, VIC, Austrlia, 16-18 July 2013; pp. 118-125.
    • (2013) Proceedings of 2013 12th IEEE International Conference on Trust , pp. 118-125
    • Yi, X.1    Willemson, J.2    Nait-Abdesselam, F.3
  • 39
    • 84901352780 scopus 로고    scopus 로고
    • Surveying Wearable Human Assistive Technology for Life and Safety Critical Applications: Standards, Challenges and Opportunities
    • Alam, M.M.; Hamida, E.B. Surveying Wearable Human Assistive Technology for Life and Safety Critical Applications: Standards, Challenges and Opportunities. Sensors 2014, 14, 9153-9209.
    • (2014) Sensors , vol.14 , pp. 9153-9209
    • Alam, M.M.1    Hamida, E.B.2
  • 40
    • 84914688458 scopus 로고    scopus 로고
    • Security and Privacy in Biomedical Telemetry: Mobile Health Platform for Secure Information Exchange
    • Wiley-IEEE: Hoboken, NJ, USA
    • Bourbakis, N.; Pantelopoulos, A.; Kannavara, R.; Nikita, K. Security and Privacy in Biomedical Telemetry: Mobile Health Platform for Secure Information Exchange. In Handbook of Biomedical Telemetry; Wiley-IEEE: Hoboken, NJ, USA, 2014; pp. 382-418.
    • (2014) Handbook of Biomedical Telemetry , pp. 382-418
    • Bourbakis, N.1    Pantelopoulos, A.2    Kannavara, R.3    Nikita, K.4
  • 41
    • 84906779666 scopus 로고    scopus 로고
    • Real-time query processing optimization for cloud-based wireless body area networks
    • Diallo, O.; Rodrigues, J.J.; Sene, M.; Niu, J. Real-time query processing optimization for cloud-based wireless body area networks. Inf. Sci. 2014, 284, 84-94.
    • (2014) Inf. Sci. , vol.284 , pp. 84-94
    • Diallo, O.1    Rodrigues, J.J.2    Sene, M.3    Niu, J.4
  • 42
    • 84894126402 scopus 로고    scopus 로고
    • CoSeMed-Cooperative and secure medical device cloud
    • Applications Services Healthcom, Lisbon, Portugal, 9-12 October
    • Kliem, A.; Kao, O. CoSeMed-Cooperative and secure medical device cloud. In Proceedings of 2013 IEEE 15th International Conference on e-Health Networking, Applications Services Healthcom, Lisbon, Portugal, 9-12 October 2013; pp. 260-264.
    • (2013) Proceedings of 2013 IEEE 15th International Conference on e-Health Networking , pp. 260-264
    • Kliem, A.1    Kao, O.2
  • 43
    • 84883076035 scopus 로고    scopus 로고
    • DAC-MACS: Effective data access control for multi-authority cloud storage systems
    • Turin, Italy, 14-19 April
    • Yang, K.; Jia, X.; Ren, K.; Zhang, B. DAC-MACS: Effective data access control for multi-authority cloud storage systems. In Proceedings of 2013 Proceedings IEEE INFOCOM, Turin, Italy, 14-19 April 2013; pp. 2895-2903.
    • (2013) Proceedings of 2013 Proceedings IEEE INFOCOM , pp. 2895-2903
    • Yang, K.1    Jia, X.2    Ren, K.3    Zhang, B.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.