Survey of main challenges (security and privacy) in wireless body area networks for healthcare applications
暂无分享,去创建一个
Samaher Al-Janabi | Ibrahim Al-Shourbaji | Shahaboddin Shamshirband | Mohammad Shojafar | S. Shamshirband | M. Shojafar | Samaher Al-Janabi | Ibrahim Al-Shourbaji
[1] Enzo Baccarelli,et al. P-SEP: a prolong stable election routing algorithm for energy-limited heterogeneous fog-supported wireless sensor networks , 2017, The Journal of Supercomputing.
[2] Ibrahim AlShourbaji,et al. A Study of Cyber Security Awareness in Educational Environment in the Middle East , 2016, J. Inf. Knowl. Manag..
[3] Anurag Tewari,et al. Security and Privacy in E-Healthcare Monitoring with WBAN: A Critical Review , 2016 .
[4] Xiaolei Dong,et al. 4S: A secure and privacy-preserving key management scheme for cloud-assisted wireless body area network in m-healthcare social networks , 2015, Inf. Sci..
[5] Avishai Wool,et al. Implementing public-key cryptography on passive RFID tags is practical , 2015, International Journal of Information Security.
[6] Hu Xiong,et al. Cost-Effective Scalable and Anonymous Certificateless Remote Authentication Protocol , 2014, IEEE Transactions on Information Forensics and Security.
[7] Hoh Peter In,et al. A scheme for data confidentiality in Cloud-assisted Wireless Body Area Networks , 2014, Inf. Sci..
[8] Ye Tian,et al. An Attribute-Based Encryption Scheme with Revocation for Fine-Grained Access Control in Wireless Body Area Networks , 2014, Int. J. Distributed Sens. Networks.
[9] Haider Abbas,et al. Distributed Denial of Service (DDoS) Attack in Cloud- Assisted Wireless Body Area Networks: A Systematic Literature Review , 2014, Journal of Medical Systems.
[10] Xiaodong Lin,et al. Socialized WBANs in mobile sensing environments , 2014, IEEE Network.
[11] Remus Brad,et al. Security Requirements, Counterattacks and Projects in Healthcare Applications Using WSNs - A Review , 2014, ArXiv.
[12] Young-Sil Lee,et al. Secure key management scheme based on ECC algorithm for patient's medical information in healthcare system , 2014, The International Conference on Information Networking 2014 (ICOIN2014).
[13] Rachid Latif,et al. Developing a Real Time Electrocardiogram System Using Virtual Bio-Instrumentation , 2014, Journal of Medical Systems.
[14] Hoon-Jae Lee,et al. An Embedded Encryption Protocol for Healthcare Networks Security , 2014 .
[15] Abdul Fuad Abdul Rahman,et al. Forensics readiness for Wireless Body Area Network (WBAN) system , 2014, 16th International Conference on Advanced Communication Technology.
[16] Zhenguo Zhao,et al. An Efficient Anonymous Authentication Scheme for Wireless Body Area Networks Using Elliptic Curve Cryptosystem , 2014, Journal of Medical Systems.
[17] Abbas Jamalipour,et al. Wireless Body Area Networks: A Survey , 2014, IEEE Communications Surveys & Tutorials.
[18] Shikha Pathania,et al. SECURITY ISSUES IN WIRELESS BODY AREA NETWORK , 2014 .
[19] Borko Furht,et al. Anomaly Detection in Medical Wireless Sensor Networks using SVM and Linear Regression Models , 2014, Int. J. E Health Medical Commun..
[20] Mukesh Singhal,et al. An efficient routing algorithm to preserve k\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$k$$\end{document}-coverage , 2013, The Journal of Supercomputing.
[21] Samaher Hussein Ali. Novel Approach for Generating the Key of Stream Cipher System Using Random Forest Data Mining Algorithm , 2013, 2013 Sixth International Conference on Developments in eSystems Engineering.
[22] Hoon-Jae Lee,et al. Efficient Encryption Scheme based on Elliptic Curve Cryptography (ECC) and Symmetric algorithm in Wireless Body Area Networks (WBANs) , 2013 .
[23] Mario Cagalj,et al. LIRA: A new key deployment scheme for Wireless Body Area Networks , 2013, 2013 21st International Conference on Software, Telecommunications and Computer Networks - (SoftCOM 2013).
[24] Mohammad Javad Kargar,et al. Wireless Body Area Network: From Electronic Health Security Perspective , 2013 .
[25] Kyong-jin Kim,et al. Privacy Care Architecture in Wireless Sensor Networks , 2013, Int. J. Distributed Sens. Networks.
[26] Sana Ullah,et al. A Review of IEEE 802.15.6 MAC, PHY, and Security Specifications , 2013, Int. J. Distributed Sens. Networks.
[27] M. F. Abdollah,et al. A biometric-based security for data authentication in Wireless Body Area Network (WBAN) , 2013, 2013 15th International Conference on Advanced Communications Technology (ICACT).
[28] Ming Li,et al. Secure ad hoc trust initialization and key management in wireless body area networks , 2013, TOSN.
[29] Ramesh Kumar,et al. State Of The Art : Security In Wireless Body Area Networks , 2013 .
[30] Mohammad Abdur Razzaque,et al. Security and Privacy in Wireless Body Area Networks for Health Care Applications , 2013, Wireless Networks and Security.
[31] Towards the Development of Cross Layer Approach for Energy Efficiency and Mobile Wireless Body Area Networks , 2013 .
[32] Yue Yin,et al. A Research on Security and Privacy Issues for Patient related Data in Medical Organization System , 2013 .
[33] Xiaohui Liang,et al. HealthShare: Achieving secure and privacy-preserving health information sharing through health social networks , 2012, Comput. Commun..
[34] Garth V. Crosby,et al. Wireless Body Area Networks for Healthcare: A Survey , 2012 .
[35] Nadeem Javaid,et al. Performance Study of Localization Techniques in Wireless Body Area Sensor Networks , 2012, 2012 IEEE 11th International Conference on Trust, Security and Privacy in Computing and Communications.
[36] Kyung Sup Kwak,et al. An efficient certificateless remote anonymous authentication scheme for wireless body area networks , 2012, 2012 IEEE International Conference on Communications (ICC).
[37] Min Chen,et al. An Integrated Biometric-Based Security Framework Using Wavelet-Domain HMM in Wireless Body Area Networks (WBAN) , 2011, 2011 IEEE International Conference on Communications (ICC).
[38] Cheong Boon Soh,et al. Opportunistic routing for body area network , 2011, 2011 IEEE Consumer Communications and Networking Conference (CCNC).
[39] Shirley Beul-Leusmann,et al. E-Health, Assistive Technologies and Applications for Assisted Living: Challenges and Solutions , 2011 .
[40] Xuemin Shen,et al. PEACE: An efficient and secure patient-centric access control scheme for eHealth care system , 2011, 2011 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS).
[41] Mohammed Feham,et al. Trust Key Management Scheme for Wireless Body Area Networks , 2011, Int. J. Netw. Secur..
[42] Jong Hyuk Park,et al. Hybrid security protocol for wireless body area networks , 2011, Wirel. Commun. Mob. Comput..
[43] Kyung Sup Kwak,et al. A Study of IEEE 802.15.4 Security Framework for Wireless Body Area Networks , 2011, Sensors.
[44] 샤나즈. A Study of IEEE 802.15.4 Security Framework for Wireless Body Area Network , 2011 .
[45] Muhammad Ibrahim,et al. SPINS: Security Protocols for Sensor Networks , 2011 .
[46] Ingrid Moerman,et al. A survey on wireless body area networks , 2011, Wirel. Networks.
[47] Ingrid Moerman,et al. A Comprehensive Survey of Wireless Body Area Networks , 2012, Journal of Medical Systems.
[48] Yuguang Fang,et al. Preserving Privacy in Emergency Response Based on Wireless Body Sensor Networks , 2010, 2010 IEEE Global Telecommunications Conference GLOBECOM 2010.
[49] Jim Morrison,et al. An energy analysis of IEEE 802.15.6 scheduled access modes , 2010, 2010 IEEE Globecom Workshops.
[50] A. Shanmugam,et al. A Novel Intrusion Detection System for Wireless Body Area Network in Health Care Monitoring , 2010 .
[51] J. Gialelis,et al. Imposing holistic privacy and data security on person centric ehealth monitoring infrastructures , 2010, The 12th IEEE International Conference on e-Health Networking, Applications and Services.
[52] Kyung Sup Kwak,et al. Towards security issues and solutions in Wireless Body Area Networks , 2010, INC2010: 6th International Conference on Networked Computing.
[53] Mark Stamp,et al. Handbook of Information and Communication Security , 2010, Handbook of Information and Communication Security.
[54] Kyung Sup Kwak,et al. Security and Privacy Issues in Wireless Sensor Networks for Healthcare Applications , 2010, Journal of Medical Systems.
[55] Ming Li,et al. Data security and privacy in wireless body area networks , 2010, IEEE Wireless Communications.
[56] T. Kavitha,et al. Security Vulnerabilities In Wireless Sensor Networks: A Survey , 2010 .
[57] Madjid Merabti,et al. Security in Wireless Sensor Networks , 2010, Handbook of Information and Communication Security.
[58] Carmen C. Y. Poon,et al. A biometric method to secure telemedicine systems , 2009, 2009 Annual International Conference of the IEEE Engineering in Medicine and Biology Society.
[59] Jin Li,et al. Privacy-Aware Attribute-Based Encryption with User Accountability , 2009, ISC.
[60] C. Redhead. The Health Information Technology for Economic and Clinical Health (HITECH) Act , 2009 .
[61] J. Misic. Enforcing Patient Privacy in Healthcare WSNs Using ECC Implemented on 802.15.4 Beacon Enabled Clusters , 2008, Annual IEEE International Conference on Pervasive Computing and Communications.
[62] J. Misic,et al. Enforcing Patient Privacy in Healthcare WSNs Using ECC Implemented on 802.15.4 Beacon Enabled Clusters , 2008, 2008 Sixth Annual IEEE International Conference on Pervasive Computing and Communications (PerCom).
[63] Andrey Bogdanov,et al. PRESENT: An Ultra-Lightweight Block Cipher , 2007, CHES.
[64] M. Ferdous,et al. A Taxonomy of Attack Methods on Peer-to-Peer Network , 2007 .
[65] Roger M. Needham,et al. TEA, a Tiny Encryption Algorithm , 1994, FSE.
[66] F. Backes. Transparent bridges for interconnection of IEEE 802 LANs , 1988, IEEE Network.