ASK-BAN: authenticated secret key extraction utilizing channel characteristics for body area networks
暂无分享,去创建一个
Ming Li | Shucheng Yu | Jiawei Yuan | Lu Shi | Jiawei Yuan | Shucheng Yu | Ming Li | Lu Shi
[1] Mario Huemer,et al. Key Generation Based on Acceleration Data of Shaking Processes , 2007, UbiComp.
[2] Sandeep K. S. Gupta,et al. Physiological value-based efficient usable security solutions for body sensor networks , 2010, TOSN.
[3] Ming Li,et al. BANA: Body Area Network Authentication Exploiting Channel Characteristics , 2012, IEEE Journal on Selected Areas in Communications.
[4] Xiaojiang Du,et al. Biometric-based two-level secure access control for Implantable Medical Devices during emergencies , 2011, 2011 Proceedings IEEE INFOCOM.
[5] René Mayrhofer,et al. Shake Well Before Use: Authentication Based on Accelerometer Data , 2007, Pervasive.
[6] Simon L. Cotton,et al. Received signal characteristics of outdoor body-to-body communications channels at 2.45 GHz , 2011, 2011 Loughborough Antennas & Propagation Conference.
[7] David Kotz,et al. Recognizing whether sensors are on the same body , 2011, Pervasive Mob. Comput..
[8] Nick F. Timmons,et al. On-body to on-body channel characterization , 2011, 2011 IEEE SENSORS Proceedings.
[9] Wenliang Du,et al. PHY-based cooperative key generation in wireless networks , 2011, 2011 49th Annual Allerton Conference on Communication, Control, and Computing (Allerton).
[10] Sneha Kumar Kasera,et al. Secret Key Extraction from Wireless Signal Strength in Real Environments , 2009, IEEE Transactions on Mobile Computing.
[11] Eyal de Lara,et al. Amigo: Proximity-Based Authentication of Mobile Devices , 2007, UbiComp.
[12] Sandeep K. S. Gupta,et al. Biosec: a biometric based approach for securing communication in wireless networks of biosensors implanted in the human body , 2003, 2003 International Conference on Parallel Processing Workshops, 2003. Proceedings..
[13] Gilles Brassard,et al. Secret-Key Reconciliation by Public Discussion , 1994, EUROCRYPT.
[14] Leonid A. Levin,et al. Pseudo-random generation from one-way functions , 1989, STOC '89.
[15] W. G. Scanlon,et al. An experimental study on the impact of human body shadowing in off-body communications channels at 2.45 GHz , 2011, Proceedings of the 5th European Conference on Antennas and Propagation (EUCAP).
[16] Ivan Martinovic,et al. A Practical Man-In-The-Middle Attack on Signal-Based Key Generation Protocols , 2012, ESORICS.
[17] Ingrid Moerman,et al. A survey on wireless body area networks , 2011, Wirel. Networks.
[18] René Mayrhofer,et al. Shake Well Before Use: Intuitive and Secure Pairing of Mobile Devices , 2009, IEEE Transactions on Mobile Computing.
[19] Fabio Di Franco,et al. The effect of body shape and gender on wireless Body Area Network on-body channels , 2010, IEEE Middle East Conference on Antennas and Propagation (MECAP 2010).
[20] Wade Trappe,et al. Radio-telepathy: extracting a secret key from an unauthenticated wireless channel , 2008, MobiCom '08.
[21] Julien Ryckaert,et al. Channel model for wireless communication around human body , 2004 .
[22] Farhad Shahrokhi,et al. The maximum concurrent flow problem , 1990, JACM.
[23] Donald F. Towsley,et al. Secure Wireless Communication with Dynamic Secrets , 2010, 2010 Proceedings IEEE INFOCOM.
[24] V. Muthukkumarasamy,et al. Authenticated Key Establishment Protocols for a Home Health Care System , 2007, 2007 3rd International Conference on Intelligent Sensors, Sensor Networks and Information.
[25] Ayan Banerjee,et al. PSKA: Usable and Secure Key Agreement Scheme for Body Area Networks , 2010, IEEE Transactions on Information Technology in Biomedicine.
[26] Prasant Mohapatra,et al. Good Neighbor: Ad hoc Pairing of Nearby Wireless Devices by Multiple Antennas , 2011, NDSS.
[27] Carmen C. Y. Poon,et al. A novel biometrics method to secure wireless body area sensor networks for telemedicine and m-health , 2006, IEEE Communications Magazine.
[28] Fengyuan Xu,et al. IMDGuard: Securing implantable medical devices with the external wearable guardian , 2011, 2011 Proceedings IEEE INFOCOM.
[29] Eyal de Lara,et al. Ensemble: cooperative proximity-based authentication , 2010, MobiSys '10.
[30] Wade Trappe,et al. ProxiMate: proximity-based secure pairing using ambient wireless signals , 2011, MobiSys '11.