메뉴 건너뛰기




Volumn 16, Issue 4, 2016, Pages

Secure authentication for remote patient monitoring withwireless medical sensor networks

Author keywords

Authentication; FPGA implementation; MSN; Rabin algorithm; Remote patient monitoring; Security issues

Indexed keywords

ALGORITHMS; AUTHENTICATION; C++ (PROGRAMMING LANGUAGE); CRYPTOGRAPHY; DATA PRIVACY; NETWORK SECURITY; PATIENT MONITORING; RECONFIGURABLE HARDWARE; SENSOR NETWORKS; WIRELESS SENSOR NETWORKS;

EID: 84961627565     PISSN: 14248220     EISSN: None     Source Type: Journal    
DOI: 10.3390/s16040424     Document Type: Article
Times cited : (78)

References (79)
  • 1
    • 84936053181 scopus 로고    scopus 로고
    • Public-key Authentication for Cloud-based WBANs
    • London, UK, 29 September–1 October 2014; ICST (Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering): Brussels, Belgium
    • Hayajneh, T.; Vasilakos, A.V.; Almashaqbeh, G.; Mohd, B.J.; Imran, M.A.; Shakir, M.Z.; Qaraqe, K.A. Public-key Authentication for Cloud-based WBANs. In Proceedings of the 9th International Conference on Body Area Networks, London, UK, 29 September–1 October 2014; ICST (Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering): Brussels, Belgium, 2014; p. 286–292.
    • (2014) Proceedings of the 9Th International Conference on Body Area Networks , pp. 286-292
    • Hayajneh, T.1    Vasilakos, A.V.2    Almashaqbeh, G.3    Mohd, B.J.4    Imran, M.A.5    Shakir, M.Z.6    Qaraqe, K.A.7
  • 4
    • 84885589116 scopus 로고    scopus 로고
    • Cloud-enabled wireless body area networks for pervasive healthcare
    • Wan, J.; Zou, C.; Ullah, S.; Lai, C.F.; Zhou, M.; Wang, X. Cloud-enabled wireless body area networks for pervasive healthcare. IEEE Netw. 2013, 27, 56–61.
    • (2013) IEEE Netw , vol.27 , pp. 56-61
    • Wan, J.1    Zou, C.2    Ullah, S.3    Lai, C.F.4    Zhou, M.5    Wang, X.6
  • 6
    • 84888322916 scopus 로고    scopus 로고
    • A survey of mobile cloud computing: Architecture, applications, and approaches
    • Dinh, H.T.; Lee, C.; Niyato, D.; Wang, P. A survey of mobile cloud computing: Architecture, applications, and approaches. Wirel. Commun. Mobile Comput. 2013, 13, 1587–1611.
    • (2013) Wirel. Commun. Mobile Comput , vol.13 , pp. 1587-1611
    • Dinh, H.T.1    Lee, C.2    Niyato, D.3    Wang, P.4
  • 7
    • 84880579098 scopus 로고    scopus 로고
    • MHealthMon: Toward Energy-Efficient and Distributed Mobile Health Monitoring Using Parallel Offloading
    • Ahnn, J.H.; Potkonjak, M. mHealthMon: Toward Energy-Efficient and Distributed Mobile Health Monitoring Using Parallel Offloading. J. Med. Syst. 2013, 37, 1–11.
    • (2013) J. Med. Syst , vol.37 , pp. 1-11
    • Ahnn, J.H.1    Potkonjak, M.2
  • 8
    • 84921067887 scopus 로고    scopus 로고
    • Cloud-assisted body area networks: State-of-the-art and future challenges
    • Fortino, G.; di Fatta, G.; Pathan, M.; Vasilakos, A. Cloud-assisted body area networks: State-of-the-art and future challenges. Wirel. Netw. 2014, 20, 1925–1938.
    • (2014) Wirel. Netw , vol.20 , pp. 1925-1938
    • Fortino, G.1    Di Fatta, G.2    Pathan, M.3    Vasilakos, A.4
  • 12
    • 84889087663 scopus 로고    scopus 로고
    • Security and privacy for storage and computation in cloud computing
    • Wei, L.; Zhu, H.; Cao, Z.; Dong, X.; Jia, W.; Chen, Y.; Vasilakos, A.V. Security and privacy for storage and computation in cloud computing. Inf. Sci. 2014, 258, 371–386.
    • (2014) Inf. Sci , vol.258 , pp. 371-386
    • Wei, L.1    Zhu, H.2    Cao, Z.3    Dong, X.4    Jia, W.5    Chen, Y.6    Vasilakos, A.V.7
  • 13
    • 84930705771 scopus 로고    scopus 로고
    • Security and Privacy Issues in Implantable Medical Devices
    • Camara, C.; Peris-Lopez, P.; Tapiador, J.E. Security and Privacy Issues in Implantable Medical Devices. J. Biomed. Inform. 2015, 55, 272–289.
    • (2015) J. Biomed. Inform , vol.55 , pp. 272-289
    • Camara, C.1    Peris-Lopez, P.2    Tapiador, J.E.3
  • 14
    • 84943778934 scopus 로고    scopus 로고
    • A survey on lightweight block ciphers for low-resource devices: Comparative study and open issues
    • Mohd, B.J.; Hayajneh, T.; Vasilakos, A.V. A survey on lightweight block ciphers for low-resource devices: Comparative study and open issues. J. Netw. Comput. Appl. 2015, 58, 73–93.
    • (2015) J. Netw. Comput. Appl , vol.58 , pp. 73-93
    • Mohd, B.J.1    Hayajneh, T.2    Vasilakos, A.V.3
  • 15
    • 84860494264 scopus 로고    scopus 로고
    • Key factors influencing the implementation success of a home telecare application
    • Postema, T.; Peeters, J.; Friele, R. Key factors influencing the implementation success of a home telecare application. Int. J. Med. Inform. 2012, 81, 415–423.
    • (2012) Int. J. Med. Inform , vol.81 , pp. 415-423
    • Postema, T.1    Peeters, J.2    Friele, R.3
  • 17
    • 84892621763 scopus 로고    scopus 로고
    • A Novel and Lightweight System to Secure Wireless Medical Sensor Networks
    • He, D.; Chan, S.; Tang, S. A Novel and Lightweight System to Secure Wireless Medical Sensor Networks. IEEE J. Biomed. Health Inform. 2014, 18, 316–326.
    • (2014) IEEE J. Biomed. Health Inform , vol.18 , pp. 316-326
    • He, D.1    Chan, S.2    Tang, S.3
  • 19
    • 84908621929 scopus 로고    scopus 로고
    • A Provably-Secure ECC-Based Authentication Scheme forWireless Sensor Networks
    • Nam, J.; Kim, M.; Paik, J.; Lee, Y.; Won, D. A Provably-Secure ECC-Based Authentication Scheme forWireless Sensor Networks. Sensors 2014, 14, 21023–21044.
    • (2014) Sensors , vol.14 , pp. 21023-21044
    • Nam, J.1    Kim, M.2    Paik, J.3    Lee, Y.4    Won, D.5
  • 20
    • 80052170264 scopus 로고    scopus 로고
    • Efficient Group Key Management and Authentication for Body Sensor Networks
    • Kyoto, Japan, 5–9 June
    • Keoh, S.L. Efficient Group Key Management and Authentication for Body Sensor Networks. In Proceedings of the IEEE International Conference on Communications, Kyoto, Japan, 5–9 June 2011; p. 1–6.
    • (2011) Proceedings of the IEEE International Conference on Communications , pp. 1-6
    • Keoh, S.L.1
  • 21
    • 0017930809 scopus 로고
    • A Method for Obtaining Digital Signatures and Public-Key Cryptosystems
    • Rivest, R.L.; Shamir, A.; Adleman, L. A Method for Obtaining Digital Signatures and Public-Key Cryptosystems. Commun. ACM 1978, 21, 120–126.
    • (1978) Commun. ACM , vol.21 , pp. 120-126
    • Rivest, R.L.1    Shamir, A.2    Adleman, L.3
  • 23
    • 84940883191 scopus 로고    scopus 로고
    • Design and Analysis of an Enhanced Patient-Server Mutual Authentication Protocol for Telecare Medical Information System
    • Amin, R.; Islam, S.; Biswas, G.; Khan, M.; Obaidat, M. Design and Analysis of an Enhanced Patient-Server Mutual Authentication Protocol for Telecare Medical Information System. J. Med. Syst. 2015, 39, doi:10.1007/s10916-015-0307-2.
    • (2015) J. Med. Syst , pp. 39
    • Amin, R.1    Islam, S.2    Biswas, G.3    Khan, M.4    Obaidat, M.5
  • 24
    • 84863271667 scopus 로고    scopus 로고
    • E-SAP: Efficient-Strong Authentication Protocol for Healthcare Applications Using Wireless Medical Sensor Networks
    • Kumar, P.; Lee, S.G.; Lee, H.J. E-SAP: Efficient-Strong Authentication Protocol for Healthcare Applications Using Wireless Medical Sensor Networks. Sensors 2012, 12, 1625–1647.
    • (2012) Sensors , vol.12 , pp. 1625-1647
    • Kumar, P.1    Lee, S.G.2    Lee, H.J.3
  • 25
    • 84930216224 scopus 로고    scopus 로고
    • Revocable and Scalable Certificateless Remote Authentication Protocol With Anonymity forWireless Body Area Networks
    • Xiong, H.; Qin, Z. Revocable and Scalable Certificateless Remote Authentication Protocol With Anonymity forWireless Body Area Networks. IEEE Trans. Inf. Forensics Secur. 2015, 10, 1442–1455.
    • (2015) IEEE Trans. Inf. Forensics Secur , vol.10 , pp. 1442-1455
    • Xiong, H.1    Qin, Z.2
  • 26
    • 84891804845 scopus 로고    scopus 로고
    • Certificateless Remote Anonymous Authentication Schemes for Wireless Body Area Networks
    • Liu, J.; Zhang, Z.; Chen, X.; Kwak, K.S. Certificateless Remote Anonymous Authentication Schemes for Wireless Body Area Networks. IEEE Trans. Parallel Distrib. Syst. 2014, 25, 332–342.
    • (2014) IEEE Trans. Parallel Distrib. Syst , vol.25 , pp. 332-342
    • Liu, J.1    Zhang, Z.2    Chen, X.3    Kwak, K.S.4
  • 27
    • 84930202100 scopus 로고    scopus 로고
    • Cost-Effective Scalable and Anonymous Certificateless Remote Authentication Protocol
    • Xiong, H. Cost-Effective Scalable and Anonymous Certificateless Remote Authentication Protocol. IEEE Trans. Inf. Forensics Secur. 2014, 9, 2327–2339.
    • (2014) IEEE Trans. Inf. Forensics Secur , vol.9 , pp. 2327-2339
    • Xiong, H.1
  • 29
    • 84961616537 scopus 로고    scopus 로고
    • accessed on 22 March
    • G DATA Mobile Malware Report for the First Quarter of 2015. Available online: https://www.gdata-software.com/g-data/newsroom/news/article/g-data-releases-mobile-malware-report-for-the-first-quarter-of-2015 (accessed on 22 March 2016).
    • (2016)
  • 30
    • 84903633037 scopus 로고    scopus 로고
    • TinyZKP: A Lightweight Authentication Scheme Based on Zero-Knowledge Proof for Wireless Body Area Networks. Wirel. Pers
    • Ma, L.; Ge, Y.; Zhu, Y. TinyZKP: A Lightweight Authentication Scheme Based on Zero-Knowledge Proof for Wireless Body Area Networks. Wirel. Pers. Commun. 2014, 6, 1077–1090.
    • (2014) Commun , vol.6 , pp. 1077-1090
    • Ma, L.1    Ge, Y.2    Zhu, Y.3
  • 31
    • 84906789059 scopus 로고    scopus 로고
    • Scheme for data confidentiality in Cloud-assisted Wireless Body Area Networks
    • Han, N.D.; Han, L.; Tuan, D.M.; In, H.P.; Jo, M. A scheme for data confidentiality in Cloud-assisted Wireless Body Area Networks. Inf. Sci. 2014, 284, 157–166.
    • (2014) Inf. Sci , vol.284 , pp. 157-166
    • Han, N.D.1    Han, L.2    Tuan, D.M.3    In, H.P.4    Jo, M.A.5
  • 32
    • 84863512174 scopus 로고    scopus 로고
    • ReTrust: Attack-Resistant and Lightweight Trust Management for Medical Sensor Networks
    • He, D.; Chen, C.; Chan, S.; Bu, J.; Vasilakos, A. ReTrust: Attack-Resistant and Lightweight Trust Management for Medical Sensor Networks. IEEE Trans. Inf. Technol. Biomed. 2012, 16, 623–632.
    • (2012) IEEE Trans. Inf. Technol. Biomed , vol.16 , pp. 623-632
    • He, D.1    Chen, C.2    Chan, S.3    Bu, J.4    Vasilakos, A.5
  • 33
    • 84896480048 scopus 로고    scopus 로고
    • A hybrid and secure priority-guaranteed MAC protocol for wireless body area network
    • Ullah, S.; Imran, M.; Alnuem, M. A hybrid and secure priority-guaranteed MAC protocol for wireless body area network. Int. J. Distrib. Sens. Netw. 2014, 2014, doi:10.1155/2014/481761.
    • (2014) Int. J. Distrib. Sens. Netw , pp. 2014
    • Ullah, S.1    Imran, M.2    Alnuem, M.3
  • 35
    • 84883408567 scopus 로고    scopus 로고
    • Bana: Body area network authentication exploiting channel characteristics
    • Shi, L.; Li, M.; Yu, S.; Yuan, J. Bana: Body area network authentication exploiting channel characteristics. IEEE J. Sel. Areas Commun. 2013, 31, 1803–1816.
    • (2013) IEEE J. Sel. Areas Commun , vol.31 , pp. 1803-1816
    • Shi, L.1    Li, M.2    Yu, S.3    Yuan, J.4
  • 36
    • 84876065473 scopus 로고    scopus 로고
    • Secure ad hoc trust initialization and key management in wireless body area networks
    • Li, M.; Yu, S.; Guttman, J.D.; Lou, W.; Ren, K. Secure ad hoc trust initialization and key management in wireless body area networks. ACM Trans. Sens. Netw. 2013, 9, doi:10.1145/2422966.2422975.
    • (2013) ACM Trans. Sens. Netw , pp. 9
    • Li, M.1    Yu, S.2    Guttman, J.D.3    Lou, W.4    Ren, K.5
  • 38
    • 84940203165 scopus 로고    scopus 로고
    • A User Authentication Scheme Based on Elliptic Curves Cryptography for Wireless Ad Hoc Networks
    • Chen, H.; Ge, L.; Xie, L. A User Authentication Scheme Based on Elliptic Curves Cryptography for Wireless Ad Hoc Networks. Sensors 2015, 15, 17057–17075.
    • (2015) Sensors , vol.15 , pp. 17057-17075
    • Chen, H.1    Ge, L.2    Xie, L.3
  • 39
    • 20344381294 scopus 로고    scopus 로고
    • A Public-Key Infrastructure for Key Distribution in TinyOS Based on Elliptic Curve Cryptography
    • Santa Clara, CA, USA, 4–7 October
    • Malan, D.J.; Welsh, M.; Smith, M.D. A Public-Key Infrastructure for Key Distribution in TinyOS Based on Elliptic Curve Cryptography. In Proceedings of the SECON, Santa Clara, CA, USA, 4–7 October 2004.
    • (2004) Proceedings of the SECON
    • Malan, D.J.1    Welsh, M.2    Smith, M.D.3
  • 40
    • 70349646298 scopus 로고    scopus 로고
    • Design and Implementation of a Secure Wireless Mote-Based Medical Sensor Network
    • Malasri, K.; Wang, L. Design and Implementation of a Secure Wireless Mote-Based Medical Sensor Network. Sensors 2009, 9, 6273–6297.
    • (2009) Sensors , vol.9 , pp. 6273-6297
    • Malasri, K.1    Wang, L.2
  • 41
    • 70449562519 scopus 로고    scopus 로고
    • IBE-Lite: A Lightweight Identity-Based Cryptography for Body Sensor Networks
    • Tan, C.; Wang, H.; Zhong, S.; Li, Q. IBE-Lite: A Lightweight Identity-Based Cryptography for Body Sensor Networks. IEEE Trans. Inf. Technol. Biomed. 2009, 13, 926–932.
    • (2009) IEEE Trans. Inf. Technol. Biomed , vol.13 , pp. 926-932
    • Tan, C.1    Wang, H.2    Zhong, S.3    Li, Q.4
  • 42
    • 79953065589 scopus 로고    scopus 로고
    • An efficient mutual authentication and access control scheme for wireless sensor networks in healthcare
    • Le, X.H.; Khalid, M.; Sankar, R.; Lee, S. An efficient mutual authentication and access control scheme for wireless sensor networks in healthcare. J. Netw. 2011, 6, 355–364.
    • (2011) J. Netw , vol.6 , pp. 355-364
    • Le, X.H.1    Khalid, M.2    Sankar, R.3    Lee, S.4
  • 43
    • 84863011893 scopus 로고    scopus 로고
    • Security Issues in Healthcare Applications UsingWireless Medical Sensor Networks
    • Kumar, P.; Lee, H.J. Security Issues in Healthcare Applications UsingWireless Medical Sensor Networks: A Survey. Sensors 2011, 12, 55–91.
    • (2011) A Survey. Sensors , vol.12 , pp. 55-91
    • Kumar, P.1    Lee, H.J.2
  • 44
    • 84893906839 scopus 로고    scopus 로고
    • An Efficient and Adaptive Mutual Authentication Framework for Heterogeneous Wireless Sensor Network-Based Applications
    • Kumar, P.; Ylianttila, M.; Gurtov, A.; Lee, S.G.; Lee, H.J. An Efficient and Adaptive Mutual Authentication Framework for Heterogeneous Wireless Sensor Network-Based Applications. Sensors 2014, 14, 2732–2755.
    • (2014) Sensors , vol.14 , pp. 2732-2755
    • Kumar, P.1    Ylianttila, M.2    Gurtov, A.3    Lee, S.G.4    Lee, H.J.5
  • 46
    • 70449491089 scopus 로고    scopus 로고
    • Detecting malicious packet dropping in the presence of collisions and channel errors in wireless ad hoc networks
    • Dresden, Germany, 14–18 June
    • Hayajneh, T.; Krishnamurthy, P.; Tipper, D.; Kim, T. Detecting malicious packet dropping in the presence of collisions and channel errors in wireless ad hoc networks. In Proceedings of the IEEE International Conference on Communications, Dresden, Germany, 14–18 June 2009; p. 1–6.
    • (2009) Proceedings of the IEEE International Conference on Communications , pp. 1-6
    • Hayajneh, T.1    Krishnamurthy, P.2    Tipper, D.3    Kim, T.4
  • 47
    • 84941025368 scopus 로고    scopus 로고
    • Green Approach for Selfish Misbehavior Detection in 802. A11-Based Wireless Networks
    • Hayajneh, T.; Almashaqbeh, G.; Ullah, S. A Green Approach for Selfish Misbehavior Detection in 802.11-Based Wireless Networks. Mobile Netw. Appl. 2015, 20, 623–635.
    • (2015) Mobile Netw. Appl , vol.20 , pp. 623-635
    • Hayajneh, T.1    Almashaqbeh, G.2    Ullah, S.A.3
  • 48
    • 84861884161 scopus 로고    scopus 로고
    • Secure neighborhood creation in wireless ad hoc networks using hop count discrepancies
    • Hayajneh, T.; Krishnamurthy, P.; Tipper, D.; Le, A. Secure neighborhood creation in wireless ad hoc networks using hop count discrepancies. Mobile Netw. Appl. 2012, 17, 415–430.
    • (2012) Mobile Netw. Appl , vol.17 , pp. 415-430
    • Hayajneh, T.1    Krishnamurthy, P.2    Tipper, D.3    Le, A.4
  • 52
    • 84893021026 scopus 로고    scopus 로고
    • An Efficient Anonymous Authentication Scheme forWireless Body Area Networks Using Elliptic Curve Cryptosystem
    • Zhao, Z. An Efficient Anonymous Authentication Scheme forWireless Body Area Networks Using Elliptic Curve Cryptosystem. J. Med. Syst. 2014, 38, doi:10.1007/s10916-014-0013-5.
    • (2014) J. Med. Syst , pp. 38
    • Zhao, Z.1
  • 53
    • 84904116666 scopus 로고    scopus 로고
    • Secure personal health information sharing with patient-centric access control in cloud computing
    • Atlanta, GA, USA, 9–13 December
    • Barua, M.; Lu, R.; Shen, X. SPS: Secure personal health information sharing with patient-centric access control in cloud computing. In Proceedings of the Global Communications Conference (GLOBECOM), Atlanta, GA, USA, 9–13 December 2013; p. 647–652.
    • (2013) Proceedings of the Global Communications Conference (GLOBECOM) , pp. 647-652
    • Barua, M.1    Lu, R.2    Shen, X.3
  • 54
    • 84925235936 scopus 로고    scopus 로고
    • Modeling of WBAN and Cloud Integration for Secure and Reliable Healthcare
    • UMass Club, MA, USA, 30 September–2 October
    • Divi, K.; Liu, H. Modeling of WBAN and Cloud Integration for Secure and Reliable Healthcare. In Proceedings of the BodyNets, UMass Club, MA, USA, 30 September–2 October 2013; p. 128–131.
    • (2013) Proceedings of the Bodynets , pp. 128-131
    • Divi, K.1    Liu, H.2
  • 55
    • 84868125268 scopus 로고    scopus 로고
    • A Hybrid Authentication and Key Establishment Scheme for WBAN
    • Liverpool, UK, 25–27 June
    • Drira, W.; Renault, E.; Zeghlache, D. A Hybrid Authentication and Key Establishment Scheme for WBAN. In Proceedings of the TrustCom, Liverpool, UK, 25–27 June 2012; p. 78–83.
    • (2012) Proceedings of the Trustcom , pp. 78-83
    • Drira, W.1    Renault, E.2    Zeghlache, D.3
  • 56
    • 84876796310 scopus 로고    scopus 로고
    • U-Healthcare System: State-of-the-Art Review and Challenges
    • Touati, F.; Tabish, R. U-Healthcare System: State-of-the-Art Review and Challenges. J. Med. Syst. 2013, 37, 1–20.
    • (2013) J. Med. Syst , vol.37 , pp. 1-20
    • Touati, F.1    Tabish, R.2
  • 57
    • 0003614758 scopus 로고
    • Digitalized Signatures and Public Key Functions as Intractable as Factorization
    • Reading, MA, USA
    • Rabin, M. Digitalized Signatures and Public Key Functions as Intractable as Factorization; Massachusetts Institute of Technology: Reading, MA, USA, 1979.
    • (1979) Massachusetts Institute of Technology
    • Rabin, M.1
  • 59
    • 84999466301 scopus 로고    scopus 로고
    • Security on FPGAs: State-of-the-art Implementations and Attacks
    • Wollinger, T.; Guajardo, J.; Paar, C. Security on FPGAs: State-of-the-art Implementations and Attacks. ACM Trans. Embed. Comput. Syst. 2004, 3, 534–574.
    • (2004) ACM Trans. Embed. Comput. Syst , vol.3 , pp. 534-574
    • Wollinger, T.1    Guajardo, J.2    Paar, C.3
  • 60
    • 84897638271 scopus 로고    scopus 로고
    • Analysis and modeling of FPGA implementations of spatial steganography methods
    • Mohd, B.J.; Hayajneh, T.; Abed, S.; Itradat, A. Analysis and modeling of FPGA implementations of spatial steganography methods. J. Circuits Syst. Comput. 2014, 23, doi: 10.1142/S0218126614500182.
    • (2014) J. Circuits Syst. Comput , pp. 23
    • Mohd, B.J.1    Hayajneh, T.2    Abed, S.3    Itradat, A.4
  • 62
    • 84961668818 scopus 로고    scopus 로고
    • FPGA, SoC, and CPLD from Altera, accessed on 22 March
    • Altera Inc. FPGA, SoC, and CPLD from Altera. Available online: ftp://ftp.altera.com/up/pub/Altera-Material/10.1/Tutorials/Verilog/ModelSim-GUI-Introduction.pdf (accessed on 22 March 2016).
    • (2016)
  • 63
    • 84961592139 scopus 로고    scopus 로고
    • accessed on 22 March
    • Cyclone II Architecture. Available online: http://www.altera.com/literature/hb/cyc2/cyc2-cii51002.pdf (accessed on 22 March 2016).
    • (2016)
  • 65
    • 85027050059 scopus 로고    scopus 로고
    • An Enhanced WLAN Security System With FPGA Implementation for Multimedia Applications
    • Hayajneh, T.; Ullah, S.; Mohd, B.; Balagani, K. An Enhanced WLAN Security System With FPGA Implementation for Multimedia Applications. IEEE Syst. J. 2015, doi:10.1109/JSYST.2015.2424702.
    • (2015) IEEE Syst. J
    • Hayajneh, T.1    Ullah, S.2    Mohd, B.3    Balagani, K.4
  • 66
    • 84876480614 scopus 로고    scopus 로고
    • FPGA Implementation and Energy Cost Analysis of Two Light-Weight Involutional Block Ciphers Targeted to Wireless Sensor Networks
    • Zhang, X.; Heys, H.M.; Li, C. FPGA Implementation and Energy Cost Analysis of Two Light-Weight Involutional Block Ciphers Targeted to Wireless Sensor Networks. Mobile Netw. Appl. 2013, 18, 222–234.
    • (2013) Mobile Netw. Appl , vol.18 , pp. 222-234
    • Zhang, X.1    Heys, H.M.2    Li, C.3
  • 67
    • 84892981941 scopus 로고    scopus 로고
    • Wavelet-transform steganography: Algorithm and hardware implementation
    • Mohd, B.J.; Hayajneh, T. Wavelet-transform steganography: Algorithm and hardware implementation. Int. J. Electron. Secur. Digit. Forensics 2013, 5, 241–256.
    • (2013) Int. J. Electron. Secur. Digit. Forensics , vol.5 , pp. 241-256
    • Mohd, B.J.1    Hayajneh, T.2
  • 70
    • 84910668271 scopus 로고    scopus 로고
    • An energy-efficient and security aware route selection protocol for wireless sensor networks
    • Hayajneh, T.; Doomun, R.; Al-Mashaqbeh, G.; Mohd, B.J. An energy-efficient and security aware route selection protocol for wireless sensor networks. Secur. Commun. Netw. 2014, 7, 2015–2038.
    • (2014) Secur. Commun. Netw , vol.7 , pp. 2015-2038
    • Hayajneh, T.1    Doomun, R.2    Al-Mashaqbeh, G.3    Mohd, B.J.4
  • 71
    • 53149137371 scopus 로고    scopus 로고
    • Popovici, E. Hardware-Software Implementation of Public-Key Cryptography forWireless Sensor Networks
    • Dublin, Ireland, 28–30 June
    • Murphy, G.; Keeshan, A.; Agarwal, R.; Popovici, E. Hardware-Software Implementation of Public-Key Cryptography forWireless Sensor Networks. In Proceedings of the Irish Signals and Systems Conference, Dublin, Ireland, 28–30 June 2006; p. 463–468.
    • (2006) Proceedings of the Irish Signals and Systems Conference , pp. 463-468
    • Murphy, G.1    Keeshan, A.2    Agarwal, R.3
  • 74
    • 84961604308 scopus 로고    scopus 로고
    • accessed on 22 March
    • Multiprecision Integer and Rational Arithmetic C/C++ Library (MIRACL). Available online: http://indigo.ie/mscott/ (accessed on 22 March 2016).
    • (2016)
  • 75
    • 61649124331 scopus 로고    scopus 로고
    • Experimental Study of the Impact of WLAN Interference on IEEE 802 15 4 Body Area Networks
    • Springer: Berlin, Germany; Heidelberg, Germany
    • Hauer, J.H.; Handziski, V.; Wolisz, A. Experimental Study of the Impact of WLAN Interference on IEEE 802.15.4 Body Area Networks. In Wireless Sensor Networks; Springer: Berlin, Germany; Heidelberg, Germany, 2009; Volume 5432, p. 17–32.
    • (2009) Wireless Sensor Networks , vol.5432 , pp. 17-32
    • Hauer, J.H.1    Handziski, V.2    Wolisz, A.3
  • 78
    • 0001263548 scopus 로고
    • A Certified Digital Signature
    • Santa Barbara, CA, USA, 20–24 August 1989; Springer: New York, NY, USA
    • Merkle, R. A Certified Digital Signature. In Proceedings of the CRYPTO, Santa Barbara, CA, USA, 20–24 August 1989; Springer: New York, NY, USA, 1989; p. 218–238.
    • (1989) Proceedings of the CRYPTO , pp. 218-238
    • Merkle, R.1
  • 79
    • 29844457287 scopus 로고    scopus 로고
    • An efficient scheme for authenticating public keys in sensor networks
    • Urbana-Champaign, IL, USA, 25–28 May
    • Du, W.; Wang, R.; Ning, P. An efficient scheme for authenticating public keys in sensor networks. In Proceedings of the MobiHoc, Urbana-Champaign, IL, USA, 25–28 May 2005; p. 58–67.
    • (2005) Proceedings of the Mobihoc , pp. 58-67
    • Du, W.1    Wang, R.2    Ning, P.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.