메뉴 건너뛰기




Volumn 39, Issue 12, 2015, Pages

A Lightweight Encryption Scheme Combined with Trust Management for Privacy-Preserving in Body Sensor Networks

Author keywords

Body sensor Network (BSN); Lightweight encryption; m Healthcare; Privacy preserving; Trust management

Indexed keywords

ALGORITHM; ARTICLE; BODY SENSOR NETWORK; HEALTH CARE SYSTEM; HUMAN; IDENTITY; MEDICAL PERSONNEL; PRIVACY; SENSOR; SIMULATION; SOCIAL INTERACTION; SOCIAL NETWORK; TRUST; COMPUTER SECURITY; CONFIDENTIALITY; DEVICES; REMOTE SENSING; REPRODUCIBILITY; TELEMEDICINE; WIRELESS COMMUNICATION;

EID: 84944685478     PISSN: 01485598     EISSN: 1573689X     Source Type: Journal    
DOI: 10.1007/s10916-015-0341-0     Document Type: Article
Times cited : (13)

References (24)
  • 1
    • 84863011893 scopus 로고    scopus 로고
    • Security issues in healthcare applications using wireless medical sensor networks: a survey
    • Kumar, P., and Lee, H. J., Security issues in healthcare applications using wireless medical sensor networks: a survey. Sensors 11(12):55–91, 2012.
    • (2012) Sensors , vol.11 , Issue.12 , pp. 55-91
    • Kumar, P.1    Lee, H.J.2
  • 2
    • 77649094379 scopus 로고    scopus 로고
    • Data security and privacy in wireless body area networks
    • Li, M., Lou, W., and Ren, K., Data security and privacy in wireless body area networks. IEEE Wirel. Commun. 17(1):51–58, 2010.
    • (2010) IEEE Wirel. Commun. , vol.17 , Issue.1 , pp. 51-58
    • Li, M.1    Lou, W.2    Ren, K.3
  • 4
    • 76649094265 scopus 로고    scopus 로고
    • Opportunities in opportunistic computing
    • Contis, M., and Kumar, M., Opportunities in opportunistic computing. IEEE Compute. 43(1):42–50, 2011.
    • (2011) IEEE Compute. , vol.43 , Issue.1 , pp. 42-50
    • Contis, M.1    Kumar, M.2
  • 6
    • 84883449411 scopus 로고    scopus 로고
    • Hsu, C. L., Lee, M. R., and Su, C. H., The role of privacy protection in healthcare information systems adoption. J. Med. Syst. 31(2) 2013
    • Hsu, C. L., Lee, M. R., and Su, C. H., The role of privacy protection in healthcare information systems adoption. J. Med. Syst. 31(2). doi:10.1007/s10916-013-9966-z, 2013.
  • 9
    • 70449562519 scopus 로고    scopus 로고
    • IBE-Lite:a lightweight identity-based cryptography for body sensor networks
    • Tan, C. C., Wang, H. D., and Zhong, S., IBE-Lite:a lightweight identity-based cryptography for body sensor networks. IEEE Trans. Inf. Technol. Bio-Med. 13(6):926–932, 2009.
    • (2009) IEEE Trans. Inf. Technol. Bio-Med. , vol.13 , Issue.6 , pp. 926-932
    • Tan, C.C.1    Wang, H.D.2    Zhong, S.3
  • 11
    • 84873848479 scopus 로고    scopus 로고
    • SPOC: a secure and privacy-preserving opportunistic computing framework for mobile-healthcare emergency
    • Lu, R. X., Lin, X. D., and Shen, X. M., SPOC: a secure and privacy-preserving opportunistic computing framework for mobile-healthcare emergency. IEEE Trans. Parallel Distrib. Syst. 24(3):614–625, 2013.
    • (2013) IEEE Trans. Parallel Distrib. Syst. , vol.24 , Issue.3 , pp. 614-625
    • Lu, R.X.1    Lin, X.D.2    Shen, X.M.3
  • 12
    • 84871781834 scopus 로고    scopus 로고
    • Cluster-based certificate revocation for mobile body sensor networks
    • Wei, L., Hiroki, N., and Ansari, N., Cluster-based certificate revocation for mobile body sensor networks. IEEE Trans. Parallel Distrib. Syst. 24(2):239–249, 2013.
    • (2013) IEEE Trans. Parallel Distrib. Syst. , vol.24 , Issue.2 , pp. 239-249
    • Wei, L.1    Hiroki, N.2    Ansari, N.3
  • 13
    • 77951699595 scopus 로고    scopus 로고
    • BARI: a biometric based distributed key management approach for wireless body area networks
    • Raazi, S. M., and Kuras, U. R., BARI: a biometric based distributed key management approach for wireless body area networks. Sensors 10(8):3911–3933, 2010.
    • (2010) Sensors , vol.10 , Issue.8 , pp. 3911-3933
    • Raazi, S.M.1    Kuras, U.R.2
  • 14
    • 84890369044 scopus 로고    scopus 로고
    • An efficient verifiably encrypted signature from weil pairing
    • Shen, J., Zheng, W. Y., Wang, J., Zheng, Y. H., and Sun, X. M., An efficient verifiably encrypted signature from weil pairing. J. Internet Technol. 14(6):947–952, 2014.
    • (2014) J. Internet Technol. , vol.14 , Issue.6 , pp. 947-952
    • Shen, J.1    Zheng, W.Y.2    Wang, J.3    Zheng, Y.H.4    Sun, X.M.5
  • 15
    • 84886466907 scopus 로고    scopus 로고
    • An energy efficient stable election-based routing algorithm for wireless sensor networks
    • PID: 24284767
    • Wang, J., Zhang, Z. H., and Xia, F., An energy efficient stable election-based routing algorithm for wireless sensor networks. Sensors 13(11):14301–14320, 2013.
    • (2013) Sensors , vol.13 , Issue.11 , pp. 14301-14320
    • Wang, J.1    Zhang, Z.H.2    Xia, F.3
  • 16
    • 84876134245 scopus 로고    scopus 로고
    • Mobility based energy efficient and multi-sink algorithms for consumer home networks
    • Wang, J., Zhang, J. W., Lee, S. Y., and Sherratt, R. S., Mobility based energy efficient and multi-sink algorithms for consumer home networks. IEEE Trans. Consum. Electron. 59(1):77–84, 2013.
    • (2013) IEEE Trans. Consum. Electron. , vol.59 , Issue.1 , pp. 77-84
    • Wang, J.1    Zhang, J.W.2    Lee, S.Y.3    Sherratt, R.S.4
  • 17
    • 84904272742 scopus 로고    scopus 로고
    • Chen, C. L., Yang, T. T., and Shih, T. F., A secure medical data exchange protocol based on cloud environment. J. Med. Syst. 38(9).2014
    • Chen, C. L., Yang, T. T., and Shih, T. F., A secure medical data exchange protocol based on cloud environment. J. Med. Syst. 38(9). doi:10.1007/s10916-014-0112-3, 2014.
  • 18
    • 84944693053 scopus 로고    scopus 로고
    • BodyQoS: adaptive and radio-agnostic QoS for body sensor networks
    • Zhou, G., BodyQoS: adaptive and radio-agnostic QoS for body sensor networks. INFOCOM, 2009
    • (2009) INFOCOM
    • Zhou, G.1
  • 19
    • 84899961852 scopus 로고    scopus 로고
    • Image quality assessment based on matching pursuit
    • Hong, R. C., Pan, J. X., Hao, S. J., Wang, M., Xue, F., and Xu, X. D., Image quality assessment based on matching pursuit. Inf. Sci. 273:196–211, 2014.
    • (2014) Inf. Sci. , vol.273 , pp. 196-211
    • Hong, R.C.1    Pan, J.X.2    Hao, S.J.3    Wang, M.4    Xue, F.5    Xu, X.D.6
  • 20
    • 84922280902 scopus 로고    scopus 로고
    • Segmentation-based image copy-move forgery detection scheme
    • Li, J., Li, X. L., Yang, B., and Sun, X. M., Segmentation-based image copy-move forgery detection scheme. IEEE Trans. Inf. Forensics Secur. 2015. doi:10.1109/TIFS.2014.2381872.
    • (2015) IEEE Trans. Inf. Forensics Secur.
    • Li, J.1    Li, X.L.2    Yang, B.3    Sun, X.M.4
  • 21
    • 79952992733 scopus 로고    scopus 로고
    • Network coding based privacy preservation against traffic analysis in multi-hop wireless networks
    • Fan, Y., Network coding based privacy preservation against traffic analysis in multi-hop wireless networks. Trans. Wirel. Commun. 10(6):834–843, 2011.
    • (2011) Trans. Wirel. Commun. , vol.10 , Issue.6 , pp. 834-843
    • Fan, Y.1
  • 23
    • 84861334371 scopus 로고    scopus 로고
    • Trust computations and trust dynamics in wireless sensor networks: a survey
    • Govindan, K., and Mohapatra, P., Trust computations and trust dynamics in wireless sensor networks: a survey. IEEE Commun. Surv. Tutorials 14(2):279–298, 2012.
    • (2012) IEEE Commun. Surv. Tutorials , vol.14 , Issue.2 , pp. 279-298
    • Govindan, K.1    Mohapatra, P.2
  • 24
    • 85008532916 scopus 로고    scopus 로고
    • An interative algorithm for trust management and adversary detection for delay tolerant networks
    • Ayday, E., and Fekri, F., An interative algorithm for trust management and adversary detection for delay tolerant networks. IEEE Trans. Mob. Comput. 11(9):1514–1531, 2012.
    • (2012) IEEE Trans. Mob. Comput. , vol.11 , Issue.9 , pp. 1514-1531
    • Ayday, E.1    Fekri, F.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.