메뉴 건너뛰기




Volumn , Issue , 2015, Pages

Mobility independent secret key generation for wearable health-care devices

Author keywords

Body Area Networks; Physical layer security; Secret key generation

Indexed keywords

ENTROPY; HEALTH CARE; NETWORK LAYERS; NETWORK SECURITY; WEARABLE TECHNOLOGY; WIRELESS LOCAL AREA NETWORKS (WLAN);

EID: 85052167029     PISSN: None     EISSN: 23103582     Source Type: Conference Proceeding    
DOI: 10.4108/eai.28-9-2015.2261446     Document Type: Conference Paper
Times cited : (29)

References (18)
  • 4
    • 84860682242 scopus 로고    scopus 로고
    • Zero reconciliation secret key generation for body-worn health monitoring devices
    • S. T. Ali, V. Sivaraman, and D. Ostry. Zero Reconciliation Secret Key Generation for Body-worn Health Monitoring Devices. In ACM WiSec, 2012.
    • (2012) ACM WiSec
    • Ali, S.T.1    Sivaraman, V.2    Ostry, D.3
  • 6
    • 84879286482 scopus 로고    scopus 로고
    • Key-sharing via Channel Randomness in Narrowband Body Area Networks: Is Everyday Movement Suficient?
    • L. W. Hanlen, D. Smith, J. A. Zhang, and D. Lewis. Key-sharing via Channel Randomness in Narrowband Body Area Networks: Is Everyday Movement Suficient? In BodyNets, 2009.
    • (2009) BodyNets
    • Hanlen, L.W.1    Smith, D.2    Zhang, J.A.3    Lewis, D.4
  • 8
    • 85032386844 scopus 로고    scopus 로고
    • SeAK: Secure authentication and key generation protocol based on dual antennas for wireless body area networks
    • C. Javali, G. Revadigar, L. Libman, and S. Jha. SeAK: Secure Authentication and Key Generation Protocol based on Dual Antennas for Wireless Body Area Networks. In RFIDsec, 2014.
    • (2014) RFIDsec
    • Javali, C.1    Revadigar, G.2    Libman, L.3    Jha, S.4
  • 12
    • 85119546954 scopus 로고    scopus 로고
    • IARC: Secret Key generation for resource constrained devices by inducing artificial randomness in the channel
    • G. Revadigar, C. Javali, H. Asghar, K. Rasmussen, and S. Jha. iARC: Secret Key Generation for Resource Constrained Devices by Inducing artificial Randomness in the Channel. In ACM ASIACCS, 2014.
    • (2014) ACM ASIACCS
    • Revadigar, G.1    Javali, C.2    Asghar, H.3    Rasmussen, K.4    Jha, S.5
  • 14
    • 85032359539 scopus 로고    scopus 로고
    • DLINK: Dual link based radio frequency fingerprinting for wearable devices
    • G. Revadigar, C. Javali, W. Hu, and S. Jha. DLINK: Dual Link Based Radio Frequency Fingerprinting for Wearable Devices. In IEEE LCN, 2015.
    • (2015) IEEE LCN
    • Revadigar, G.1    Javali, C.2    Hu, W.3    Jha, S.4
  • 15
    • 84888984313 scopus 로고    scopus 로고
    • Heart-to-heart (h2h): Authentication for implanted medical devices
    • M. Rostami, A. Juels, and F. Koushanfar. Heart-to-Heart (H2H): Authentication for Implanted Medical Devices. In ACM CCS, 2013.
    • (2013) ACM CCS
    • Rostami, M.1    Juels, A.2    Koushanfar, F.3
  • 17
    • 84879516937 scopus 로고    scopus 로고
    • ASK-BAN: Authenticated secret key extraction utilizing channel characteristics for body area networks
    • L. Shi, J. Yuan, S. Yu, and M. Li. ASK-BAN: Authenticated Secret Key Extraction Utilizing Channel Characteristics for Body Area Networks. In ACM WiSec, 2013.
    • (2013) ACM WiSec
    • Shi, L.1    Yuan, J.2    Yu, S.3    Li, M.4
  • 18
    • 77952329424 scopus 로고    scopus 로고
    • Secret keys from entangled sensor motes: Implementation and analysis
    • M. Wilhelm, I. Martinovic, and J. B. Schmitt. Secret Keys from Entangled Sensor Motes: Implementation and Analysis. In ACM WiSec, 2010.
    • (2010) ACM WiSec
    • Wilhelm, M.1    Martinovic, I.2    Schmitt, J.B.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.