2015
DOI: 10.1007/978-3-319-18191-2_3
|View full text |Cite
|
Sign up to set email alerts
|

A Novel Biometric Algorithm to Body Sensor Networks

Abstract: Abstract. In Body Sensor Networks (BSN) several sensor nodes are attached on, inside or around human body to monitor vital sign signals such as, Electrocardiogram (ECG), Electroencephalogram (EEG), Blood pressure etc. The information from each sensor node is very significant; therefore privacy and security is very important during data transmission in BSN. The conventional cryptographic approaches make use of cryptographic keys to achieve authentication, and use of these keys not only require high resource uti… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2016
2016
2022
2022

Publication Types

Select...
3
2
1

Relationship

0
6

Authors

Journals

citations
Cited by 8 publications
(2 citation statements)
references
References 18 publications
0
2
0
Order By: Relevance
“…Asymmetric encryption is used in traditional networks like local area network and wide area network. However, asymmetric encryption is not ideal for BASN because of its high demand in computational resource utilization, power consumption, and memory size [108]. Hence, symmetric cryptography is widely used in BASN.…”
Section: Other Authentication Scenariosmentioning
confidence: 99%
“…Asymmetric encryption is used in traditional networks like local area network and wide area network. However, asymmetric encryption is not ideal for BASN because of its high demand in computational resource utilization, power consumption, and memory size [108]. Hence, symmetric cryptography is widely used in BASN.…”
Section: Other Authentication Scenariosmentioning
confidence: 99%
“…Public Key-based cryptography concept is using a private and a public key [47]. There are many public key cryptography algorithms such as Rivest Shamir Adleman (RSA) [48,49], Diffie-Hellman (DH), digital signature algorithm (DSA), ELGamal [50,51], and ECC [52].…”
Section: Public Key-based Authenticationmentioning
confidence: 99%