Accelerometer-Based Key Generation and Distribution Method for Wearable IoT Devices
暂无分享,去创建一个
Ye Li | Fangmin Sun | Weilin Zang | Ildar Farkhatdinov | Haohua Huang | Ye Li | I. Farkhatdinov | Fangmin Sun | Weilin Zang | Haohua Huang
[1] Geng Yang,et al. Wearable Internet of Things: Concept, architectural components and promises for person-centered healthcare , 2014 .
[2] Anil K. Jain,et al. Biometric cryptosystems: issues and challenges , 2004, Proceedings of the IEEE.
[3] Ye Li,et al. Accelerometer-Based Speed-Adaptive Gait Authentication Method for Wearable IoT Devices , 2019, IEEE Internet of Things Journal.
[4] Geng Yang,et al. Wearable Internet of Things: Concept, architectural components and promises for person-centered healthcare , 2014, 2014 4th International Conference on Wireless Mobile Communication and Healthcare - Transforming Healthcare Through Innovations in Mobile and Wireless Technologies (MOBIHEALTH).
[5] Giancarlo Fortino,et al. Gait-based identification for elderly users in wearable healthcare systems , 2020, Inf. Fusion.
[6] Athanasios V. Vasilakos,et al. Authenticated key management protocol for cloud-assisted body area sensor networks , 2018, J. Netw. Comput. Appl..
[7] Timo Sztyler,et al. On-body localization of wearable devices: An investigation of position-aware activity recognition , 2016, 2016 IEEE International Conference on Pervasive Computing and Communications (PerCom).
[8] René Mayrhofer,et al. Shake Well Before Use: Intuitive and Secure Pairing of Mobile Devices , 2009, IEEE Transactions on Mobile Computing.
[9] Neil W. Bergmann,et al. Walkie-Talkie: Motion-Assisted Automatic Key Generation for Secure On-Body Device Communication , 2016, 2016 15th ACM/IEEE International Conference on Information Processing in Sensor Networks (IPSN).
[10] Madhu Sudan,et al. A Fuzzy Vault Scheme , 2006, Des. Codes Cryptogr..
[11] Carmen C. Y. Poon,et al. Analysis of Using Interpulse Intervals to Generate 128-Bit Biometric Random Binary Sequences for Securing Wireless Body Sensor Networks , 2012, IEEE Transactions on Information Technology in Biomedicine.
[12] Benny P. L. Lo,et al. Random Number Generation Using Inertial Measurement Unit Signals for On-Body IoT Devices , 2018, IoT 2018.
[13] Yingjiu Li,et al. Lightweight Sharable and Traceable Secure Mobile Health System , 2020, IEEE Transactions on Dependable and Secure Computing.
[14] Mario Huemer,et al. Key Generation Based on Acceleration Data of Shaking Processes , 2007, UbiComp.
[15] Athanasios V. Vasilakos,et al. ECG-Cryptography and Authentication in Body Area Networks , 2012, IEEE Transactions on Information Technology in Biomedicine.
[16] Athanasios V. Vasilakos,et al. A Novel Authentication and Key Agreement Scheme for Implantable Medical Devices Deployment , 2018, IEEE Journal of Biomedical and Health Informatics.
[17] Divya Sharma,et al. Body area networks: A survey , 2016, 2016 3rd International Conference on Computing for Sustainable Global Development (INDIACom).
[18] Jongmoo Choi,et al. Security threat on wearable services: Empirical study using a commercial smartband , 2016, 2016 IEEE International Conference on Consumer Electronics-Asia (ICCE-Asia).
[19] Ye Li,et al. Biometric key distribution solution with energy distribution information of physiological signals for body sensor network security , 2013, IET Inf. Secur..
[20] Zhelong Wang,et al. Adaptive gait detection based on foot-mounted inertial sensors and multi-sensor fusion , 2019, Inf. Fusion.
[21] Martin Wattenberg,et al. A fuzzy commitment scheme , 1999, CCS '99.
[22] Zhaohui Wu,et al. Accelerometer-Based Gait Recognition by Sparse Representation of Signature Points With Clusters , 2015, IEEE Transactions on Cybernetics.
[23] Sherali Zeadally,et al. Privacy Issues and Solutions for Consumer Wearables , 2018, IT Professional.
[24] Jiankun Hu,et al. A New Biocryptosystem-Oriented Security Analysis Framework and Implementation of Multibiometric Cryptosystems Based on Decision Level Fusion , 2015, IEEE Transactions on Information Forensics and Security.
[25] Wu Yuezhong,et al. Auto-Key , 2020, Proc. ACM Interact. Mob. Wearable Ubiquitous Technol..
[26] Elaine B. Barker,et al. A Statistical Test Suite for Random and Pseudorandom Number Generators for Cryptographic Applications , 2000 .
[27] David Mohaisen,et al. Sensor-Based Continuous Authentication of Smartphones’ Users Using Behavioral Biometrics: A Contemporary Survey , 2021, IEEE Internet of Things Journal.
[28] Aleksandr Ometov,et al. Feasibility characterization of cryptographic primitives for constrained (wearable) IoT devices , 2016, 2016 IEEE International Conference on Pervasive Computing and Communication Workshops (PerCom Workshops).
[29] Yuan-Ting Zhang,et al. Heartbeats Based Biometric Random Binary Sequences Generation to Secure Wireless Body Sensor Networks , 2018, IEEE Transactions on Biomedical Engineering.
[30] Ayan Banerjee,et al. PSKA: Usable and Secure Key Agreement Scheme for Body Area Networks , 2010, IEEE Transactions on Information Technology in Biomedicine.
[31] Guang-Zhong Yang,et al. Secure key generation using gait features for Body Sensor Networks , 2017, 2017 IEEE 14th International Conference on Wearable and Implantable Body Sensor Networks (BSN).
[32] Athanasios V. Vasilakos,et al. LAM-CIoT: Lightweight authentication mechanism in cloud-based IoT environment , 2020, J. Netw. Comput. Appl..
[33] Mahbub Hassan,et al. KEH-Gait: Using Kinetic Energy Harvesting for Gait-based User Authentication Systems , 2019, IEEE Transactions on Mobile Computing.
[34] Craig Valli,et al. A Critical Analysis of ECG-Based Key Distribution for Securing Wearable and Implantable Medical Devices , 2019, IEEE Sensors Journal.
[35] Rahat Ali Khan,et al. The state-of-the-art wireless body area sensor networks: A survey , 2018, Int. J. Distributed Sens. Networks.
[36] Alexandru Popa,et al. Analyzing of LAM-CIoT: Lightweight Authentication Mechanism in Cloud-based IoT Environment , 2020, 2020 IEEE Symposium Series on Computational Intelligence (SSCI).
[37] Yier Jin,et al. Privacy and Security in Internet of Things and Wearable Devices , 2015, IEEE Transactions on Multi-Scale Computing Systems.
[38] Ngu Nguyen,et al. Security Properties of Gait for Mobile Device Pairing , 2018, IEEE Transactions on Mobile Computing.
[39] Matti Siekkinen,et al. Modeling, Profiling, and Debugging the Energy Consumption of Mobile Devices , 2015, ACM Comput. Surv..
[40] Athanasios V. Vasilakos,et al. Security of the Internet of Things: perspectives and challenges , 2014, Wireless Networks.
[41] Athanasios V. Vasilakos,et al. Accelerometer and Fuzzy Vault-Based Secure Group Key Generation and Sharing Protocol for Smart Wearables , 2017, IEEE Transactions on Information Forensics and Security.
[42] David Mohaisen,et al. Sensor-based Continuous Authentication of Smartphones' Users Using Behavioral Biometrics: A Survey , 2020, ArXiv.