Enhanced Secure Sensor Association and Key Management in Wireless Body Area Networks |
Shen, Jian
(Jiangsu Engineering Center of Network Monitoring, Jiangsu Technology & Engineering Center of Meteorological Sensor Network, Jiangsu Collaborative Innovation Center on Atmospheric Environment and Equipment Technology, School of Computer and Software, Nanjing University of Information Science & Technology)
Tan, Haowen (Jiangsu Engineering Center of Network Monitoring, School of Computer and Software, Nanjing University of Information Science & Technology) Moh, Sangman (Department of Computer Engineering, Chosun University) Chung, Ilyong (Department of Computer Engineering, Chosun University) Liu, Qi (Jiangsu Engineering Center of Network Monitoring, School of Computer and Software, Nanjing University of Information Science & Technology) Sun, Xingming (Jiangsu Engineering Center of Network Monitoring, School of Computer and Software, Nanjing University of Information Science & Technology) |
1 | K. Lorincz et al., "Sensor networks for emergency response: Challenges and opportunities," IEEE Pervasive Comput., vol. 3, no. 4, pp. 16-23, Oct.-Dec. 2004. |
2 | M. Hanson et al., "Body area sensor networks: Challenges and opportunities," IEEE Computer, vol. 42, no. 1, pp. 58-65, Jan. 2009. |
3 | M. Li, W. Lou, and K. Ren, "Data security and privacy in wireless body area networks," IEEE Wireless Commun., vol. 17, no. 1, pp. 51-58, Feb. 2010. DOI |
4 | E. Jovanov et al., "A wireless body area network of intelligent motion sensors for computer assisted physical rehabilitation," J. NeuroEngineering and Rehabilitation, vol. 2, no. 1, Mar. 2005. |
5 | C. C. Tan et al., "IBE-Lite: A lightweight identity-based cryptography for body sensor networks," IEEE Trans. Inf. Technol. Biomed., vol. 13, no. 6, pp. 926-932, Nov. 2009. DOI |
6 | O. G.Morchon, H. Baldus, and D. S. Sanchez, "Resource-efficient security for medical body sensor networks," in Proc. BSN, Apr. 2006, pp. 80-83. |
7 | T. Donovan et al., "A context aware wireless body area network (BAN)," in Proc. of the Pervasive Health Conference, Apr. 2009, pp. 1-8. |
8 | K. Malasri and L. Wang, "Addressing security in medical sensor networks," in Proc. HealthNet, 2007, pp. 7-12. |
9 | S. L. Keoh, E. Lupu, and M. Sloman, "Securing body sensor networks: Sensor association and key management," in Proc. PerCom, Mar. 2009, pp. 1-6. |
10 | M. Li et al., "Group device pairing based secure sensor association and key management for body area networks," in Proc. IEEE INFOCOM, Mar. 2010, pp. 1-9. |
11 | N. Koblitz, "Elliptic curve cryptosystems," Math. Comp., vol. 48, pp. 203-209, 1987. DOI |
12 | J. H. Silverman, The arithmetic of elliptic curves, 2nd Edition, Springer, 2000. |
13 | W. Stallings, Cryptography and network security, 4th Edition, pp. 301-313, Prentice Hall, 2005. |
14 | R. Watro et al., "TinyPK: Securing sensor networks with public key technology," in Proc. SASN, Oct. 2004, pp. 59-64. |
15 | L. Law et al., "An efficient protocol for authenticated key agreement," Designs, Codes and Cryptography, vol. 28, pp. 119-134, 2003. DOI |
16 | J. Shen, S.Moh, and I. Chung, "A novel key management protocol in body area networks," in Proc. ICNS, May 2011, pp. 246-251. |
17 | W. Drira, E. Renault, and D. Zeghlache, "A hybrid authentication and key establishment scheme for WBAN," in Proc. TrustCom, 2012, pp. 78-83. |
18 | Y. Ren et al., "FoSBaS: A bi-directional secrecy and collusion resilience key management scheme for BANs," in Proc. WCNC, 2012, pp. 2841-2846. |
19 | M. Naor and K. Nissim, "Certificate revocation and certificate update," in IEEE J. Sel. Areas Commun., vol. 18, no. 4, pp. 561-570, Apr. 2000. DOI |
20 | H. Chan et al., "On the distribution and revocation of cryptographic keys in sensor networks," in IEEE Trans. Dependable Secure Comput., vol. 2, no. 3, pp. 233-247, 2005. DOI |
21 | H. J. Jo, J. H. Paik, and D. H. Lee, "Efficient privacy-preserving authentication in wireless mobile networks," in IEEE Trans. Mobile Comput., vol. 13, no. 7, pp. 1469-1481, July 2014. DOI |
22 | J. Andersen and J. E. Bardram, "BLIG: A new approach for sensor identification, grouping, and authorisation in body sensor networks," in Proc. BSN, Aachen, Germany, 2007, pp. 223-228. |
23 | J. Li et al., "Segmentation-based image copy-move forgery detection scheme," IEEE Trans. Inf. Forensics Security, doi: 10.1109-/TIFS.2014.2381872, 2015. |
24 | Z. Xia et al., "A secure and dynamic multi-keyword ranked search scheme over encrypted cloud data," IEEE Trans. Parallel Distrib. Syst., (DOI: 10.1109/TPDS.2015.2401003), 2015. |
25 | Z. Fu et al., "Achieving efficient cloud search services: Multi-keyword ranked search over encrypted cloud data supporting parallel computing," IEICE Trans. Commun., vol. E98-B, no. 1, pp. 190-200, 2015. DOI |
26 | S. B. Wilson, D. Johnson, and A. Menezes, "Key agreement protocols and their security analysis," in Proc. IMA International Conference on Cryptography and Coding, LNCS, vol. 1355, 1998, pp. 30-45. |
27 | J. Shen, S. Moh, and I. Chung, "Identity-based key agreement protocol employing a symmetric balanced incomplete block design," J. Commun. Netw., vol. 14, no. 6, pp. 682-691, 2012. DOI |
28 | J. Shen, S.Moh, and I. Chung, "Comment: 'Enhanced novel access control protocol over wireless sensor networks'," IEEE Trans. Consum. Electron., vol. 56, no. 3, pp. 2019-2021, 2010. DOI |
29 | M. Patel and J. Wang, "Applications, challenges, and prospective in emerging body area networking technologies," IEEE Wireless Commun., pp. 80-88, Feb. 2010. |
30 | D. J. Malan, M. Welsh, and M. D. Smith, "A public-key infrastructure for key distribution in TinyOS based on elliptic curve cryptography," in Proc. SECON, Oct. 2004, pp. 71-80. |
![]() |