2008
DOI: 10.1155/2008/291365
|View full text |Cite
|
Sign up to set email alerts
|

Secure and Efficient Data Transmission over Body Sensor and Wireless Networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
10
0

Year Published

2009
2009
2020
2020

Publication Types

Select...
3
3
1

Relationship

0
7

Authors

Journals

citations
Cited by 16 publications
(10 citation statements)
references
References 7 publications
0
10
0
Order By: Relevance
“…They have proposed approaches using HRV or IPIs as biometric characteristics to generate identity for authentication and encryption [15,16,20,21]. Several data encryption schemes have been proposed based on ECG [18,22,23], PPG [19] and multiple physiological signals [24]. Clancy et al [25] suggested that fingerprint can be used to generate keys for cryptosystems in eHealth platforms.…”
Section: Related Workmentioning
confidence: 99%
“…They have proposed approaches using HRV or IPIs as biometric characteristics to generate identity for authentication and encryption [15,16,20,21]. Several data encryption schemes have been proposed based on ECG [18,22,23], PPG [19] and multiple physiological signals [24]. Clancy et al [25] suggested that fingerprint can be used to generate keys for cryptosystems in eHealth platforms.…”
Section: Related Workmentioning
confidence: 99%
“…The ECG is a unique individual trait, whereas its properties completely depend on human body and heart beats. To become ensure about ECG as a biometric feature, it is essential to know ideal biometric characteristics [3][4][5], as shown in Table.1.…”
Section: Fig 1 Body Sensor Network Architecture [9]mentioning
confidence: 99%
“…If the check is successful, the Joiner computes K'=abQ and computes K using the Matyas-Meyer-Oseas (MMO) hash function [11]. The 160-bit K' becomes a 128-bit Network Key, K. A subMAC [12] is constructed by selecting some bits of an HMAC. We reduce the overhead by transmitting only a part of the actual HMAC, rather than the entire HMAC using subMAC.…”
Section: Proposed Zigbee Key Managementmentioning
confidence: 99%
“…In this paper, we apply the elliptic curve Diffie-Hellman(ECDH) [3] key distribution mechanism for such the ZigBee Pro vulnerabilities and propose a more efficient ECDH using subMAC [12] that has message authentication and prevents man-in-the-middle attack. Our research exhibits an enhanced key mechanism and message authentication in ZigBee Pro for wireless sensor networks.…”
Section: Introductionmentioning
confidence: 99%