-
1
-
-
84966628828
-
Understanding data flow and security requirements in wireless body area networks for healthcare
-
S. S. Ahmad, S. Camtepe, and D. Jayalath, "Understanding data flow and security requirements in wireless body area networks for healthcare," in 2015 17th International Conference on E-health Networking, Application & Services (HealthCom). IEEE, 2015, pp. 621-626.
-
(2015)
2015 17th International Conference on E-health Networking, Application & Services (HealthCom). IEEE
, pp. 621-626
-
-
Ahmad, S.S.1
Camtepe, S.2
Jayalath, D.3
-
2
-
-
84872963976
-
-
arXiv preprint arXiv:1001.0831
-
S. Ullah, P. Khan, N. Ullah, S. Saleem, H. Higgins, and K. S. Kwak, "A review of wireless body area networks for medical applications," arXiv preprint arXiv:1001.0831, 2010.
-
(2010)
A Review of Wireless Body Area Networks for Medical Applications
-
-
Ullah, S.1
Khan, P.2
Ullah, N.3
Saleem, S.4
Higgins, H.5
Kwak, K.S.6
-
3
-
-
84889031080
-
Security in wireless sensor networks: Issues and challanges
-
S. A. Salehi, M. Razzaque, P. Naraei, and A. Farrokhtala, "Security in wireless sensor networks: Issues and challanges," in Space Science and Communication (IconSpace), 2013 IEEE International Conference on. IEEE, 2013, pp. 356-360.
-
(2013)
Space Science and Communication (IconSpace), 2013 IEEE International Conference On. IEEE
, pp. 356-360
-
-
Salehi, S.A.1
Razzaque, M.2
Naraei, P.3
Farrokhtala, A.4
-
4
-
-
84937856016
-
-
R. Cavallari, F. Martelli, R. Rosini, C. Buratti, and R. Verdone, "A survey on wireless body area networks: Technologies and design challenges," 2014.
-
(2014)
A Survey on Wireless Body Area Networks: Technologies and Design Challenges
-
-
Cavallari, R.1
Martelli, F.2
Rosini, R.3
Buratti, C.4
Verdone, R.5
-
5
-
-
84889004828
-
Detection of sinkhole attack in wireless sensor networks
-
S. A. Salehi, M. Razzaque, P. Naraei, and A. Farrokhtala, "Detection of sinkhole attack in wireless sensor networks," in Space Science and Communication (IconSpace), 2013 IEEE International Conference on. IEEE, 2013, pp. 361-365.
-
(2013)
Space Science and Communication (IconSpace), 2013 IEEE International Conference On. IEEE
, pp. 361-365
-
-
Salehi, S.A.1
Razzaque, M.2
Naraei, P.3
Farrokhtala, A.4
-
6
-
-
80055071454
-
Kalwen: A new practical and interoperable key management scheme for body sensor networks
-
Y. W. Law, G. Moniava, Z. Gong, P. Hartel, and M. Palaniswami, "Kalwen: A new practical and interoperable key management scheme for body sensor networks," Security and communication networks, vol. 4, no. 11, pp. 1309-1329, 2011.
-
(2011)
Security and Communication Networks
, vol.4
, Issue.11
, pp. 1309-1329
-
-
Law, Y.W.1
Moniava, G.2
Gong, Z.3
Hartel, P.4
Palaniswami, M.5
-
7
-
-
77956946974
-
Integrity regions: Authentication through presence in wireless networks
-
S. C apkun, M. C agalj, G. O. Karame, and N. O. Tippenhauer, "Integrity regions: Authentication through presence in wireless networks," Mobile Computing, IEEE Transactions on, vol. 9, no. 11, pp. 1608-1621, 2010.
-
(2010)
Mobile Computing, IEEE Transactions on
, vol.9
, Issue.11
, pp. 1608-1621
-
-
Apkun, S.C.1
Agalj, M.C.2
Karame, G.O.3
Tippenhauer, N.O.4
-
8
-
-
79951723271
-
A survey on wireless body area networks
-
B. Latré, B. Braem, I. Moerman, C. Blondia, and P. Demeester, "A survey on wireless body area networks," Wireless Networks, vol. 17, no. 1, pp. 1-18, 2011.
-
(2011)
Wireless Networks
, vol.17
, Issue.1
, pp. 1-18
-
-
Latré, B.1
Braem, B.2
Moerman, I.3
Blondia, C.4
Demeester, P.5
-
9
-
-
84879861042
-
Opfka: Secure and efficient ordered-physiological-feature-based key agreement for wireless body area networks
-
C. Hu, X. Cheng, F. Zhang, D. Wu, X. Liao, and D. Chen, "Opfka: Secure and efficient ordered-physiological-feature-based key agreement for wireless body area networks," in INFOCOM, 2013 Proceedings IEEE. IEEE, 2013, pp. 2274-2282.
-
(2013)
INFOCOM, 2013 Proceedings IEEE. IEEE
, pp. 2274-2282
-
-
Hu, C.1
Cheng, X.2
Zhang, F.3
Wu, D.4
Liao, X.5
Chen, D.6
-
10
-
-
84879868277
-
Balancing security and utility in medical devices?
-
M. Rostami, W. Burleson, F. Koushanfar, and A. Juels, "Balancing security and utility in medical devices" in Proceedings of the 50th Annual Design Automation Conference. ACM, 2013, p. 13.
-
(2013)
Proceedings of the 50th Annual Design Automation Conference. ACM
, pp. 13
-
-
Rostami, M.1
Burleson, W.2
Koushanfar, F.3
Juels, A.4
-
11
-
-
84885111766
-
An energy efficient key management scheme for body sensor networks
-
H. Zhao, J. Qin, and J. Hu, "An energy efficient key management scheme for body sensor networks," Parallel and Distributed Systems, IEEE Transactions on, vol. 24, no. 11, pp. 2202-2210, 2013.
-
(2013)
Parallel and Distributed Systems, IEEE Transactions on
, vol.24
, Issue.11
, pp. 2202-2210
-
-
Zhao, H.1
Qin, J.2
Hu, J.3
-
12
-
-
84883314860
-
Secure key generation in sensor networks based on frequency-selective channels
-
M. Wilhelm, I. Martinovic, and J. B. Schmitt, "Secure key generation in sensor networks based on frequency-selective channels," Selected Areas in Communications, IEEE Journal on, vol. 31, no. 9, pp. 1779-1790, 2013.
-
(2013)
Selected Areas in Communications, IEEE Journal on
, vol.31
, Issue.9
, pp. 1779-1790
-
-
Wilhelm, M.1
Martinovic, I.2
Schmitt, J.B.3
-
13
-
-
84994633662
-
Secret key generation exploiting ultra-wideband indoor wireless channel characteristics
-
J. Huang and T. Jiang, "Secret key generation exploiting ultra-wideband indoor wireless channel characteristics," Security and Communication Networks, 2014.
-
(2014)
Security and Communication Networks
-
-
Huang, J.1
Jiang, T.2
-
14
-
-
84994667298
-
Ieee 802.15.6 standard in wireless body area networks from a healthcare point of view
-
S. S. Ahmad, M. Razzaque, I. Tomeo-Reyes, N. Hussain, and V. Kaviani, "Ieee 802.15.6 standard in wireless body area networks from a healthcare point of view," in Communications (APCC), 2016 Asia-Pacific Conference on. IEEE, 2016.
-
(2016)
Communications (APCC), 2016 Asia-Pacific Conference On. IEEE
-
-
Ahmad, S.S.1
Razzaque, M.2
Tomeo-Reyes, I.3
Hussain, N.4
Kaviani, V.5
-
15
-
-
60149088258
-
Robust key generation from signal envelopes in wireless networks
-
B. Azimi-Sadjadi, A. Kiayias, A. Mercado, and B. Yener, "Robust key generation from signal envelopes in wireless networks," in Proceedings of the 14th ACM conference on Computer and communications security. ACM, 2007, pp. 401-410.
-
(2007)
Proceedings of the 14th ACM Conference on Computer and Communications Security. ACM
, pp. 401-410
-
-
Azimi-Sadjadi, B.1
Kiayias, A.2
Mercado, A.3
Yener, B.4
-
16
-
-
60149097098
-
Radiotelepathy: Extracting a secret key from an unauthenticated wireless channel
-
S. Mathur, W. Trappe, N. Mandayam, C. Ye, and A. Reznik, "Radiotelepathy: extracting a secret key from an unauthenticated wireless channel," in Proceedings of the 14th ACM international conference on Mobile computing and networking. ACM, 2008, pp. 128-139.
-
(2008)
Proceedings of the 14th ACM International Conference on Mobile Computing and Networking. ACM
, pp. 128-139
-
-
Mathur, S.1
Trappe, W.2
Mandayam, N.3
Ye, C.4
Reznik, A.5
-
17
-
-
39849094738
-
Key distillation and the secret-bit fraction
-
N. S. Jones and L. Masanes, "Key distillation and the secret-bit fraction," Information Theory, IEEE Transactions on, vol. 54, no. 2, pp. 680-691, 2008.
-
(2008)
Information Theory, IEEE Transactions on
, vol.54
, Issue.2
, pp. 680-691
-
-
Jones, N.S.1
Masanes, L.2
-
18
-
-
70450242725
-
On the effectiveness of secret key extraction from wireless signal strength in real environments
-
S. Jana, S. N. Premnath, M. Clark, S. K. Kasera, N. Patwari, and S. V. Krishnamurthy, "On the effectiveness of secret key extraction from wireless signal strength in real environments," in Proceedings of the 15th annual international conference on Mobile computing and networking. ACM, 2009, pp. 321-332.
-
(2009)
Proceedings of the 15th Annual International Conference on Mobile Computing and Networking. ACM
, pp. 321-332
-
-
Jana, S.1
Premnath, S.N.2
Clark, M.3
Kasera, S.K.4
Patwari, N.5
Krishnamurthy, S.V.6
-
19
-
-
75449107600
-
On fast and accurate detection of unauthorized wireless access points using clock skews
-
S. Jana and S. K. Kasera, "On fast and accurate detection of unauthorized wireless access points using clock skews," Mobile Computing, IEEE Transactions on, vol. 9, no. 3, pp. 449-462, 2010.
-
(2010)
Mobile Computing, IEEE Transactions on
, vol.9
, Issue.3
, pp. 449-462
-
-
Jana, S.1
Kasera, S.K.2
-
20
-
-
51449114762
-
Secure wireless communications: Secret keys through multipath
-
A. Sayeed and A. Perrig, "Secure wireless communications: Secret keys through multipath," in Acoustics, Speech and Signal Processing, 2008. ICASSP 2008. IEEE International Conference on. IEEE, 2008, pp. 3013-3016.
-
(2008)
Acoustics, Speech and Signal Processing, 2008. ICASSP 2008. IEEE International Conference On. IEEE
, pp. 3013-3016
-
-
Sayeed, A.1
Perrig, A.2
-
21
-
-
77952604175
-
Information-theoretically secret key generation for fading wireless channels
-
C. Ye, S. Mathur, A. Reznik, Y. Shah, W. Trappe, and N. B. Mandayam, "Information-theoretically secret key generation for fading wireless channels," Information Forensics and Security, IEEE Transactions on, vol. 5, no. 2, pp. 240-254, 2010.
-
(2010)
Information Forensics and Security, IEEE Transactions on
, vol.5
, Issue.2
, pp. 240-254
-
-
Ye, C.1
Mathur, S.2
Reznik, A.3
Shah, Y.4
Trappe, W.5
Mandayam, N.B.6
-
22
-
-
84875681349
-
Secret key extraction from wireless signal strength in real environments
-
S. N. Premnath, S. Jana, J. Croft, P. L. Gowda, M. Clark, S. K. Kasera, N. Patwari, and S. V. Krishnamurthy, "Secret key extraction from wireless signal strength in real environments," Mobile Computing, IEEE Transactions on, vol. 12, no. 5, pp. 917-930, 2013.
-
(2013)
Mobile Computing, IEEE Transactions on
, vol.12
, Issue.5
, pp. 917-930
-
-
Premnath, S.N.1
Jana, S.2
Croft, J.3
Gowda, P.L.4
Clark, M.5
Kasera, S.K.6
Patwari, N.7
Krishnamurthy, S.V.8
-
23
-
-
84921027083
-
Secret key extraction using bluetooth wireless signal strength measurements
-
S. N. Premnath, P. L. Gowda, S. K. Kasera, N. Patwari, and R. Ricci, "Secret key extraction using bluetooth wireless signal strength measurements," in Sensing, Communication, and Networking (SECON), 2014 Eleventh Annual IEEE International Conference on. IEEE, 2014, pp. 293-301.
-
(2014)
Sensing, Communication, and Networking (SECON), 2014 Eleventh Annual IEEE International Conference On. IEEE
, pp. 293-301
-
-
Premnath, S.N.1
Gowda, P.L.2
Kasera, S.K.3
Patwari, N.4
Ricci, R.5
-
24
-
-
84871946403
-
Decorrelating secret bit extraction via channel hopping in body area networks
-
L. Yao, S. T. Ali, V. Sivaraman, and D. Ostry, "Decorrelating secret bit extraction via channel hopping in body area networks," in Personal Indoor and Mobile Radio Communications (PIMRC), 2012 IEEE 23rd International Symposium on. IEEE, 2012, pp. 1454-1459.
-
(2012)
Personal Indoor and Mobile Radio Communications (PIMRC), 2012 IEEE 23rd International Symposium On. IEEE
, pp. 1454-1459
-
-
Yao, L.1
Ali, S.T.2
Sivaraman, V.3
Ostry, D.4
-
26
-
-
72249083097
-
High-rate uncorrelated bit extraction for shared secret key generation from channel measurements
-
N. Patwari, J. Croft, S. Jana, and S. K. Kasera, "High-rate uncorrelated bit extraction for shared secret key generation from channel measurements," Mobile Computing, IEEE Transactions on, vol. 9, no. 1, pp. 17-30, 2010.
-
(2010)
Mobile Computing, IEEE Transactions on
, vol.9
, Issue.1
, pp. 17-30
-
-
Patwari, N.1
Croft, J.2
Jana, S.3
Kasera, S.K.4
-
27
-
-
84866898821
-
Cooperative secret key generation from phase estimation in narrowband fading channels
-
Q. Wang, K. Xu, and K. Ren, "Cooperative secret key generation from phase estimation in narrowband fading channels," Selected Areas in Communications, IEEE Journal on, vol. 30, no. 9, pp. 1666-1674, 2012.
-
(2012)
Selected Areas in Communications, IEEE Journal on
, vol.30
, Issue.9
, pp. 1666-1674
-
-
Wang, Q.1
Xu, K.2
Ren, K.3
-
28
-
-
84879293203
-
Low mismatch key agreement based on wavelet-transform trend and fuzzy vault in body area network
-
Y. Wu, Y. Sun, L. Zhan, and Y. Ji, "Low mismatch key agreement based on wavelet-transform trend and fuzzy vault in body area network," International Journal of Distributed Sensor Networks, vol. 2013, 2013.
-
(2013)
International Journal of Distributed Sensor Networks
, vol.2013
-
-
Wu, Y.1
Sun, Y.2
Zhan, L.3
Ji, Y.4
-
29
-
-
84911913888
-
Seak: Secure authentication and key generation protocol based on dual antennas for wireless body area networks
-
Springer
-
C. Javali, G. Revadigar, L. Libman, and S. Jha, "Seak: Secure authentication and key generation protocol based on dual antennas for wireless body area networks," in Radio Frequency Identification: Security and Privacy Issues. Springer, 2014, pp. 74-89.
-
(2014)
Radio Frequency Identification: Security and Privacy Issues
, pp. 74-89
-
-
Javali, C.1
Revadigar, G.2
Libman, L.3
Jha, S.4
-
30
-
-
84883408567
-
Bana: Body area network authentication exploiting channel characteristics
-
L. Shi, M. Li, S. Yu, and J. Yuan, "Bana: body area network authentication exploiting channel characteristics," Selected Areas in Communications, IEEE Journal on, vol. 31, no. 9, pp. 1803-1816, 2013.
-
(2013)
Selected Areas in Communications, IEEE Journal on
, vol.31
, Issue.9
, pp. 1803-1816
-
-
Shi, L.1
Li, M.2
Yu, S.3
Yuan, J.4
-
32
-
-
84878663786
-
A multihop key agreement scheme for wireless ad hoc networks based on channel characteristics
-
Z. Hao, S. Zhong, and N. Yu, "A multihop key agreement scheme for wireless ad hoc networks based on channel characteristics," The Scientific World Journal, vol. 2013, 2013.
-
(2013)
The Scientific World Journal
, vol.2013
-
-
Hao, Z.1
Zhong, S.2
Yu, N.3
-
33
-
-
85052167029
-
Mobility independent secret key generation for wearable health-care devices
-
G. Revadigar, C. Javali, H. J. Asghar, K. B. Rasmussen, and S. Jha, "Mobility independent secret key generation for wearable health-care devices," Proc. BodyNets, 2015.
-
(2015)
Proc. BodyNets
-
-
Revadigar, G.1
Javali, C.2
Asghar, H.J.3
Rasmussen, K.B.4
Jha, S.5
-
35
-
-
84883484959
-
An enhanced mobile-healthcare emergency system based on extended chaotic maps
-
C.-C. Lee, C.-W. Hsu, Y.-M. Lai, and A. Vasilakos, "An enhanced mobile-healthcare emergency system based on extended chaotic maps," Journal of medical systems, vol. 37, no. 5, pp. 1-12, 2013.
-
(2013)
Journal of Medical Systems
, vol.37
, Issue.5
, pp. 1-12
-
-
Lee, C.-C.1
Hsu, C.-W.2
Lai, Y.-M.3
Vasilakos, A.4
|