2016 IEEE 25th International Symposium on Industrial Electronics (ISIE) 2016
DOI: 10.1109/isie.2016.7745050
|View full text |Cite
|
Sign up to set email alerts
|

Wearable security: Key derivation for Body Area sensor Networks based on host movement

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
5
0

Year Published

2017
2017
2023
2023

Publication Types

Select...
6
3
1

Relationship

0
10

Authors

Journals

citations
Cited by 14 publications
(5 citation statements)
references
References 19 publications
0
5
0
Order By: Relevance
“…In addition, biometrics, such as electrocardiograms, physiological values (PVs), heart rate [138], glucose level and blood pressure, can all be used for key generation for encrypted communication in the body sensor network (BSN) [134]. In addition, patients' movement can be another property by which keys are derived [123].…”
Section: Medical Devices Controlsmentioning
confidence: 99%
“…In addition, biometrics, such as electrocardiograms, physiological values (PVs), heart rate [138], glucose level and blood pressure, can all be used for key generation for encrypted communication in the body sensor network (BSN) [134]. In addition, patients' movement can be another property by which keys are derived [123].…”
Section: Medical Devices Controlsmentioning
confidence: 99%
“…The authors focus on a key agreement and not on continuous authenticity and de-authentication. Another similar work is [11]. The authors focus on an implicit key agreement in BANs, but not on the devices' interactions after this agreement.…”
Section: Related Workmentioning
confidence: 99%
“…These protocols might rely on external factors with respect to the human user such as the radio environment [10][11][12], the acoustic surroundings [13,14], or other random physical patterns [15][16][17][18]. However, numerous context-based pairing research works in the field of wireless body area network (WBAN) rely on specific human-centric biometrics that are extracted by the sensors attached to the user which is more suitable for the implantable medical devices (IMD) [19][20][21][22]. These collected random features are used as the secure element in the protocol execution.…”
Section: Introductionmentioning
confidence: 99%