Efficient high-rate key management technique for wireless body area networks
暂无分享,去创建一个
[1] Sneha Kumar Kasera,et al. High-Rate Uncorrelated Bit Extraction for Shared Secret Key Generation from Channel Measurements , 2010, IEEE Transactions on Mobile Computing.
[2] Nick S. Jones,et al. Key Distillation and the Secret-Bit Fraction , 2006, IEEE Transactions on Information Theory.
[3] Farinaz Koushanfar,et al. Balancing security and utility in Medical Devices? , 2013, 2013 50th ACM/EDAC/IEEE Design Automation Conference (DAC).
[4] Akbar M. Sayeed,et al. Secure wireless communications: Secret keys through multipath , 2008, 2008 IEEE International Conference on Acoustics, Speech and Signal Processing.
[5] Ghassan O. Karame,et al. Integrity Regions: Authentication through Presence in Wireless Networks , 2006, IEEE Transactions on Mobile Computing.
[6] Lenan Wu,et al. A Secret Key Extraction Technique Applied in Vehicular Networks , 2014, 2014 IEEE 17th International Conference on Computational Science and Engineering.
[7] Ali Farrokhtala,et al. Detection of sinkhole attack in wireless sensor networks , 2013, 2013 IEEE International Conference on Space Science and Communication (IconSpace).
[8] Gill R. Tsouri,et al. Securing While Sampling in Wireless Body Area Networks With Application to Electrocardiography , 2016, IEEE Journal of Biomedical and Health Informatics.
[9] Chiara Buratti,et al. A Survey on Wireless Body Area Networks: Technologies and Design Challenges , 2014, IEEE Communications Surveys & Tutorials.
[10] Ming Li,et al. BANA: Body Area Network Authentication Exploiting Channel Characteristics , 2012, IEEE Journal on Selected Areas in Communications.
[11] Sneha Kumar Kasera,et al. Secret key extraction using Bluetooth wireless signal strength measurements , 2014, 2014 Eleventh Annual IEEE International Conference on Sensing, Communication, and Networking (SECON).
[12] Sanjay Jha,et al. Mobility Independent Secret Key Generation for Wearable Health-care Devices , 2015, BODYNETS.
[13] Ingrid Moerman,et al. A survey on wireless body area networks , 2011, Wirel. Networks.
[14] Dhammika Jayalath,et al. Understanding data flow and security requirements in wireless Body Area Networks for healthcare , 2015, 2015 17th International Conference on E-health Networking, Application & Services (HealthCom).
[15] Jiankun Hu,et al. An Energy Efficient Key Management Scheme for Body Sensor Networks , 2013, IEEE Transactions on Parallel and Distributed Systems.
[16] Kyung Sup Kwak,et al. A Review of Wireless Body Area Networks for Medical Applications , 2009, Int. J. Commun. Netw. Syst. Sci..
[17] Ali Farrokhtala,et al. Security in Wireless Sensor Networks: Issues and challanges , 2013, 2013 IEEE International Conference on Space Science and Communication (IconSpace).
[18] Jingjing Huang,et al. Secret key generation exploiting Ultra-wideband indoor wireless channel characteristics , 2015, Secur. Commun. Networks.
[19] Wade Trappe,et al. Radio-telepathy: extracting a secret key from an unauthenticated wireless channel , 2008, MobiCom '08.
[20] Inmaculada Tomeo-Reyes,et al. IEEE 802.15.6 standard in wireless body area networks from a healthcare point of view , 2016, 2016 22nd Asia-Pacific Conference on Communications (APCC).
[21] Athanasios V. Vasilakos,et al. An Enhanced Mobile-Healthcare Emergency System Based on Extended Chaotic Maps , 2013, Journal of Medical Systems.
[22] Syed Taha Ali,et al. Decorrelating secret bit extraction via channel hopping in body area networks , 2012, 2012 IEEE 23rd International Symposium on Personal, Indoor and Mobile Radio Communications - (PIMRC).
[23] Sanjay Jha,et al. SeAK: Secure Authentication and Key Generation Protocol Based on Dual Antennas for Wireless Body Area Networks , 2014, RFIDSec.
[24] Fan Zhang,et al. OPFKA: Secure and efficient Ordered-Physiological-Feature-based key agreement for wireless Body Area Networks , 2013, 2013 Proceedings IEEE INFOCOM.
[25] Ivan Martinovic,et al. Key Generation in Wireless Sensor Networks Based on Frequency-selective Channels - Design, Implementation, and Analysis , 2010, ArXiv.
[26] Sneha Kumar Kasera,et al. On Fast and Accurate Detection of Unauthorized Wireless Access Points Using Clock Skews , 2008, IEEE Transactions on Mobile Computing.
[27] Sneha Kumar Kasera,et al. Secret Key Extraction from Wireless Signal Strength in Real Environments , 2009, IEEE Transactions on Mobile Computing.
[28] Kui Ren,et al. Cooperative Secret Key Generation from Phase Estimation in Narrowband Fading Channels , 2011, IEEE Journal on Selected Areas in Communications.
[29] Marimuthu Palaniswami,et al. KALwEN: a new practical and interoperable key management scheme for body sensor networks , 2008, Secur. Commun. Networks.
[30] Nenghai Yu,et al. A Multihop Key Agreement Scheme for Wireless Ad Hoc Networks Based on Channel Characteristics , 2013, TheScientificWorldJournal.
[31] Aggelos Kiayias,et al. Robust key generation from signal envelopes in wireless networks , 2007, CCS '07.
[32] Yuefeng Ji,et al. Low Mismatch Key Agreement Based on Wavelet-Transform Trend and Fuzzy Vault in Body Area Network , 2013, Int. J. Distributed Sens. Networks.
[33] Wade Trappe,et al. Information-Theoretically Secret Key Generation for Fading Wireless Channels , 2009, IEEE Transactions on Information Forensics and Security.