2018
DOI: 10.1007/s11227-018-2616-y
|View full text |Cite
|
Sign up to set email alerts
|

Study on peak misdetection recovery of key exchange protocol using heartbeat

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
16
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
5
2

Relationship

0
7

Authors

Journals

citations
Cited by 9 publications
(16 citation statements)
references
References 16 publications
0
16
0
Order By: Relevance
“…Each IPI is transformed into a sequence of random bits, and we assume that legitimate sensors, only, can retrieve that sequence, by simultaneously measuring ECG from two different locations and applying the proposed key agreement protocol. Previous literature has already proposed IPI-based security mechanisms: they mainly employed fuzzy commitment and fuzzy vault [7]- [10]. On the contrary, we provide an analytical solution to authenticate two nodes within a WBAN: we can show that a relationship between information reconciliation and privacy amplification matrices can be found.…”
Section: Introductionmentioning
confidence: 88%
See 2 more Smart Citations
“…Each IPI is transformed into a sequence of random bits, and we assume that legitimate sensors, only, can retrieve that sequence, by simultaneously measuring ECG from two different locations and applying the proposed key agreement protocol. Previous literature has already proposed IPI-based security mechanisms: they mainly employed fuzzy commitment and fuzzy vault [7]- [10]. On the contrary, we provide an analytical solution to authenticate two nodes within a WBAN: we can show that a relationship between information reconciliation and privacy amplification matrices can be found.…”
Section: Introductionmentioning
confidence: 88%
“…They found that roughly one minute is the expected time for securely exchanging an 80-bit key with high probability (1-10 −6 ), while consuming only 88 µJ from an IMD. Some improvements (both in terms of computational and communication cost and key establishment time) of the abovementioned scheme were reported in [8]- [10]. In particular, in [8], fuzzy-vault based protocol was shown to shorten the key establishment time by reducing the number of IPIs needed to generate a secret key.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…Another research is conducted to reduce the cost of communication by providing a method for detecting detection errors and recovering the inter-pulse interval using thresholds. There is a method that reduces the cost of communication compared to previous approaches, not only energy efficient but also key generating [18]. The efficiency of the recovery method is also demonstrated.…”
Section: Communication Networkmentioning
confidence: 99%
“…The key distribution problem between two devices (e.g., two ECG sensors [16]) has also attracted the attention of some researchers. In detail, in these solutions, each sensor derives the shared key from the acquired physiological signal, preventing the sensors from sharing any information beforehand [17,18]. In addition, the extraction of randomness from physiological signals has been recently scrutinised (e.g., ECG [19,20], EEG [21,22] and EMG [23]).…”
Section: Introductionmentioning
confidence: 99%