2011
DOI: 10.1155/2011/676843
|View full text |Cite
|
Sign up to set email alerts
|

Distributed Authentication Mechanism for Secure Channel Establishment in Ubiquitous Medical Sensor Networks

Abstract: In medical sensor networks, sensor nodes on a body of the patient sense the vital data and deliver them to the server system through mobile devices or gateways in the middle. However, when these linking devices do not function because of the battery outage or the system fault, the server system could not get patients' data during that period, and this situation could lead to serious problems. In this paper, to cope with this problem, we propose a distributed authentication mechanism in which substituted device… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3

Citation Types

0
3
0

Year Published

2012
2012
2019
2019

Publication Types

Select...
4
2

Relationship

0
6

Authors

Journals

citations
Cited by 6 publications
(3 citation statements)
references
References 22 publications
0
3
0
Order By: Relevance
“…Wireless sensor network (WSN) has emerged as a promising research area for an ever-increasing need for various applications, such as habit or environmental monitoring, wildlife tracking, disaster managing, patient healthcare, humanitarian logistics and industrial data acquisition, and so on [1][2][3][4]. A typical WSN is comprised of a large number of distributed sensor nodes with an information collector, referred to as the sink node.…”
Section: Introductionmentioning
confidence: 99%
“…Wireless sensor network (WSN) has emerged as a promising research area for an ever-increasing need for various applications, such as habit or environmental monitoring, wildlife tracking, disaster managing, patient healthcare, humanitarian logistics and industrial data acquisition, and so on [1][2][3][4]. A typical WSN is comprised of a large number of distributed sensor nodes with an information collector, referred to as the sink node.…”
Section: Introductionmentioning
confidence: 99%
“…By using a wireless and mobile communication channel, which can also be served as an access method to the Internet, the mobile user ( MU ) can access the services provided by their home agent ( HA ) when they visit a foreign agent ( FA ) at anytime and anywhere. But, in almost all the communication and information systems such as the traditional Internet networks, group‐oriented communication systems , wireless sensor networks , radio‐frequency ID systems , ad‐hoc networks , and so on, security protection such as user authentication is an important issue, and the wireless and mobile communication networks are no exception. When an MU roams to and would like access to an FA , the FA must authenticate the validity of the MU through its HA .…”
Section: Introductionmentioning
confidence: 99%
“…Therefore, DDoS is often considered as one of the worst possible attacks in the current Internet [34]. DoS might be a great threat in the ubiquitous medical sensor networks [14] by changing the patient's data. Delot et al [11] proposed a data management solution for event exchange in vehicular networks to avoid dangerous/undesirable situations where DoS might be a great threat.…”
Section: Introductionmentioning
confidence: 99%