메뉴 건너뛰기




Volumn 2, Issue 1, 2015, Pages 52-62

MASK-BAN: Movement-aided authenticated secret key extraction utilizing channel characteristics in body area networks

Author keywords

Authenticated key generation; physical layer; received signal strength (RSS); sensor; wireless body area network (WBAN).

Indexed keywords

CHIP SCALE PACKAGES; CRYPTOGRAPHY; EXTRACTION; HARDWARE; NETWORK LAYERS; NETWORK SECURITY; NETWORKS (CIRCUITS); RSS; SENSORS; WIRELESS LOCAL AREA NETWORKS (WLAN); WIRELESS NETWORKS; WIRELESS SENSOR NETWORKS;

EID: 84923221226     PISSN: None     EISSN: 23274662     Source Type: Journal    
DOI: 10.1109/JIOT.2015.2391113     Document Type: Article
Times cited : (46)

References (36)
  • 5
    • 65349086799 scopus 로고    scopus 로고
    • Shake well before use: Intuitive and secure pairing of mobile devices
    • Jun.
    • R. Mayrohofer and H. Gellersen, "Shake well before use: Intuitive and secure pairing of mobile devices," IEEE Trans. Mobile Comput., vol. 8, no. 6, pp. 792-806, Jun. 2009.
    • (2009) IEEE Trans. Mobile Comput. , vol.8 , Issue.6 , pp. 792-806
    • Mayrohofer, R.1    Gellersen, H.2
  • 10
    • 33646948221 scopus 로고    scopus 로고
    • A novel biometrics method to secure wireless body area sensor networks for telemedicine and m-health
    • Apr.
    • C. Poon, Y.-T. Zhang, and S.-D. Bao, "A novel biometrics method to secure wireless body area sensor networks for telemedicine and m-health," IEEE Commun. Mag., vol. 44, no. 4, pp. 73-81, Apr. 2006.
    • (2006) IEEE Commun. Mag. , vol.44 , Issue.4 , pp. 73-81
    • Poon, C.1    Zhang, Y.-T.2    Bao, S.-D.3
  • 11
    • 79960856885 scopus 로고    scopus 로고
    • Biometric-based two-level secure access control for implantable medical devices during emergencies
    • Apr.
    • X. Hei and X. Du, "Biometric-based two-level secure access control for implantable medical devices during emergencies," in Proc. IEEE INFOCOM, Apr. 2011, pp. 346-350.
    • (2011) Proc. IEEE INFOCOM , pp. 346-350
    • Hei, X.1    Du, X.2
  • 14
    • 79960873920 scopus 로고    scopus 로고
    • Imdguard: Securing implantable medical devices with the external wearable guardian
    • Apr.
    • F. Xu, Z. Qin, C. Tan, B. Wang, and Q. Li, "Imdguard: Securing implantable medical devices with the external wearable guardian," in Proc. IEEE INFOCOM, Apr. 2011, pp. 1862-1870.
    • (2011) Proc. IEEE INFOCOM , pp. 1862-1870
    • Xu, F.1    Qin, Z.2    Tan, C.3    Wang, B.4    Li, Q.5
  • 15
    • 76849098534 scopus 로고    scopus 로고
    • PSKA: Usable and secure key agreement scheme for body area networks
    • Jan.
    • K. Venkatasubramanian, A. Banerjee, and S. Gupta, "PSKA: Usable and secure key agreement scheme for body area networks," IEEE Trans. Inf. Technol. Biomed., vol. 14, no. 1, pp. 60-68, Jan. 2010.
    • (2010) IEEE Trans. Inf. Technol. Biomed. , vol.14 , Issue.1 , pp. 60-68
    • Venkatasubramanian, K.1    Banerjee, A.2    Gupta, S.3
  • 16
    • 77954990804 scopus 로고    scopus 로고
    • Physiological valuebased efficient usable security solutions for body sensor networks
    • Jul.
    • K. K. Venkatasubramanian and S. K. S. Gupta, "Physiological valuebased efficient usable security solutions for body sensor networks," ACM Trans. Sens. Netw., vol. 6, no. 4, pp. 1-36, Jul. 2010.
    • (2010) ACM Trans. Sens. Netw. , vol.6 , Issue.4 , pp. 1-36
    • Venkatasubramanian, K.K.1    Gupta, S.K.S.2
  • 17
    • 84939435969 scopus 로고    scopus 로고
    • Biosec: A biometric based approach for securing communication in wireless networks of biosensors implanted in the human body
    • Oct.
    • S. Cherukuri, K. Venkatasubramanian, and S. Gupta, "Biosec: A biometric based approach for securing communication in wireless networks of biosensors implanted in the human body," in Proc. Int. Conf. Parallel Process. Workshops, Oct. 2003, pp. 432-439.
    • (2003) Proc. Int. Conf. Parallel Process. Workshops , pp. 432-439
    • Cherukuri, S.1    Venkatasubramanian, K.2    Gupta, S.3
  • 19
    • 70450242725 scopus 로고    scopus 로고
    • On the effectiveness of secret key extraction from wireless signal strength in real environments
    • S. Jana et al., "On the effectiveness of secret key extraction from wireless signal strength in real environments," in Proc. 15th Annu. Int. Conf. Mobile Comput. Netw. (MobiCom'09), 2009, pp. 321-332.
    • (2009) Proc. 15th Annu. Int. Conf. Mobile Comput. Netw. (MobiCom'09) , pp. 321-332
    • Jana, S.1
  • 21
    • 84856160802 scopus 로고    scopus 로고
    • Received signal characteristics of outdoor body-to-body communications channels at 2.45 GHz
    • Nov.
    • S. Cotton, A. McKernan, and W. Scanlon, "Received signal characteristics of outdoor body-to-body communications channels at 2.45 GHz," in Proc. Loughborough Antennas Propag. Conf. (LAPC'11), Nov. 2011, pp. 1-4.
    • (2011) Proc. Loughborough Antennas Propag. Conf. (LAPC'11) , pp. 1-4
    • Cotton, S.1    McKernan, A.2    Scanlon, W.3
  • 22
    • 79959634698 scopus 로고    scopus 로고
    • An experimental study on the impact of human body shadowing in off-body communications channels at 2.45 GHz
    • Apr.
    • S. Cotton, A. McKernan, A. Ali, and W. Scanlon, "An experimental study on the impact of human body shadowing in off-body communications channels at 2.45 GHz," in Proc. 5th Eur. Conf. Antennas Propag. (EUCAP'11), Apr. 2011, pp. 3133-3137.
    • (2011) Proc. 5th Eur. Conf. Antennas Propag. (EUCAP'11) , pp. 3133-3137
    • Cotton, S.1    McKernan, A.2    Ali, A.3    Scanlon, W.4
  • 24
    • 84856865292 scopus 로고    scopus 로고
    • On-body to on-body channel characterization
    • Oct.
    • F. Di Franco et al., "On-body to on-body channel characterization," in Proc. IEEE Sensors, Oct. 2011, pp. 908-911.
    • (2011) Proc. IEEE Sensors , pp. 908-911
    • Di Franco, F.1
  • 25
    • 79952950550 scopus 로고    scopus 로고
    • The effect of body shape and gender on wireless body area network on-body channels
    • Oct.
    • F. Di Franco et al., "The effect of body shape and gender on wireless body area network on-body channels," in Proc. IEEE Middle East Conf. Antennas Propag. (MECAP'10), Oct. 2010, pp. 1-3.
    • (2010) Proc. IEEE Middle East Conf. Antennas Propag. (MECAP'10) , pp. 1-3
    • Di Franco, F.1
  • 26
    • 2542441781 scopus 로고    scopus 로고
    • Channel model for wireless communication around human body
    • Apr.
    • J. Ryckaert, P. De Doncker, R. Meys, A. de Le Hoye, and S. Donnay, "Channel model for wireless communication around human body," Electron. Lett., vol. 40, no. 9, Apr. 2004, pp. 543-544.
    • (2004) Electron. Lett. , vol.40 , Issue.9 , pp. 543-544
    • Ryckaert, J.1    De Doncker, P.2    Meys, R.3
  • 27
    • 85027496257 scopus 로고
    • Secret-key reconciliation by public discussion
    • T. Helleseth, Ed. New York, NY, USA: Springer
    • G. Brassard and L. Salvail, "Secret-key reconciliation by public discussion," in Advances in Cryptology: EUROCRYPT'93, T. Helleseth, Ed. New York, NY, USA: Springer, 1994, vol. 765.
    • (1994) Advances in Cryptology: EUROCRYPT'93 , vol.765
    • Brassard, G.1    Salvail, L.2
  • 29
    • 0025415365 scopus 로고
    • The maximum concurrent flow problem
    • Apr.
    • F. Shahrokhi and D. W. Matula, "The maximum concurrent flow problem," J. ACM, vol. 37, no. 2, pp. 318-334, Apr. 1990.
    • (1990) J. ACM , vol.37 , Issue.2 , pp. 318-334
    • Shahrokhi, F.1    Matula, D.W.2
  • 30
    • 80051886930 scopus 로고    scopus 로고
    • Short paper: Reactive jamming in wireless networks: How realistic is the threat?
    • [Online]. Available
    • M. Wilhelm, I. Martinovic, J. B. Schmitt, and V. Lenders, "Short paper: Reactive jamming in wireless networks: How realistic is the threat?" in Proc. 4th ACMConf.Wireless Netw. Security (WiSec'11), 2011, pp. 47-52 [Online]. Available: http://doi.acm.org/10.1145/1998412.1998422
    • (2011) Proc. 4th ACMConf.Wireless Netw. Security (WiSec'11) , pp. 47-52
    • Wilhelm, M.1    Martinovic, I.2    Schmitt, J.B.3    Lenders, V.4
  • 31
    • 84865611232 scopus 로고    scopus 로고
    • A practical man-In-The-middle attack on signal-based key generation protocols
    • New York, NY, USA: Springer
    • S. Eberz, M. Strohmeier, M. Wilhelm, and I. Martinovic, "A practical man-in-the-middle attack on signal-based key generation protocols," in Computer Security: ESORICS'12. New York, NY, USA: Springer, 2012, vol. 7459.
    • Computer Security: ESORICS'12 , vol.7459 , pp. 2012
    • Eberz, S.1    Strohmeier, M.2    Wilhelm, M.3    Martinovic, I.4
  • 32
    • 84887106886 scopus 로고    scopus 로고
    • Securearray: Improving wifi security with fine-grained physical-layer information
    • [Online]. Available
    • J. Xiong and K. Jamieson, "Securearray: Improving wifi security with fine-grained physical-layer information," in Proc. 19th Annu. Int. Conf. Mobile Comput. Netw. (MobiCom'13), 2013, pp. 441-452 [Online]. Available: http://doi.acm.org/10.1145/2500423.2500444
    • (2013) Proc. 19th Annu. Int. Conf. Mobile Comput. Netw. (MobiCom'13) , pp. 441-452
    • Xiong, J.1    Jamieson, K.2
  • 33
    • 77953313388 scopus 로고    scopus 로고
    • Secure wireless communication with dynamic secrets
    • Mar.
    • S. Xiao,W. Gong, and D. Towsley, "Secure wireless communication with dynamic secrets," in Proc. IEEE INFOCOM, Mar. 2010, pp. 1-9.
    • (2010) Proc. IEEE INFOCOM , pp. 1-9
    • Xiaow. Gong, S.1    Towsley, D.2
  • 35
    • 84923264453 scopus 로고    scopus 로고
    • Texas Instruments Incorporated [Online]. Available
    • Texas Instruments Incorporated. "Chipcon AS SmartRF CC2420 preliminary datasheet (rev. C)," 2013 [Online]. Available: http://www.ti.com/lit/ds/symlink/cc2420.pdf
    • (2013) Chipcon AS SmartRF CC2420 Preliminary Datasheet (Rev. C)
  • 36
    • 40249107802 scopus 로고    scopus 로고
    • Crossbow Technol. Inc [Online]. Available
    • Crossbow Technol. Inc. "Telos B data sheet" [Online]. Available: http://www.willow.co.uk/TelosB-Datasheet.pdf
    • Telos B Datasheet


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.