Survey of Authentication Schemes for Health Monitoring: A Subset of Cyber Physical System
暂无分享,去创建一个
[1] Jian Shen,et al. A lightweight multi-layer authentication protocol for wireless body area networks , 2018, Future Gener. Comput. Syst..
[2] Ming Li,et al. Authenticated secret key extraction using channel characteristics for body area networks , 2012, CCS '12.
[3] Hesham A. El Zouka. An authentication scheme for wireless healthcare monitoring sensor network , 2017, 2017 14th International Conference on Smart Cities: Improving Quality of Life Using ICT & IoT (HONET-ICT).
[4] Ming Li,et al. BANA: Body Area Network Authentication Exploiting Channel Characteristics , 2012, IEEE Journal on Selected Areas in Communications.
[5] Feng Xia,et al. A Secured Health Care Application Architecture for Cyber-Physical Systems , 2011, ArXiv.
[6] Ming Li,et al. MASK-BAN: Movement-Aided Authenticated Secret Key Extraction Utilizing Channel Characteristics in Body Area Networks , 2015, IEEE Internet of Things Journal.
[7] Farrukh Aslam Khan,et al. Key Agreement Schemes in Wireless Body Area Networks: Taxonomy and State-of-the-Art , 2015, Journal of Medical Systems.
[8] Young-Sil Lee,et al. Secure key management scheme based on ECC algorithm for patient's medical information in healthcare system , 2014, The International Conference on Information Networking 2014 (ICOIN2014).
[9] Pardeep Kumar,et al. E-SAP: Efficient-Strong Authentication Protocol for Healthcare Applications Using Wireless Medical Sensor Networks , 2012, Sensors.
[10] Dong Hoon Lee,et al. A Privacy-Strengthened Scheme for E-Healthcare Monitoring System , 2012, Journal of Medical Systems.
[11] Wade Trappe,et al. ProxiMate: proximity-based secure pairing using ambient wireless signals , 2011, MobiSys '11.
[12] Soummya Kar,et al. Cyber physical attacks with control objectives and detection constraints , 2016, 2016 IEEE 55th Conference on Decision and Control (CDC).
[13] John R. Douceur,et al. The Sybil Attack , 2002, IPTPS.
[14] Samaher Al-Janabi,et al. Survey of main challenges (security and privacy) in wireless body area networks for healthcare applications , 2017 .
[15] Kyung Sup Kwak,et al. Certificateless Remote Anonymous Authentication Schemes for WirelessBody Area Networks , 2014, IEEE Transactions on Parallel and Distributed Systems.
[16] Zhiguang Qin,et al. Revocable and Scalable Certificateless Remote Authentication Protocol With Anonymity for Wireless Body Area Networks , 2015, IEEE Transactions on Information Forensics and Security.
[17] Marko Hölbl,et al. Survey on security in intra-body area network communication , 2018, Ad Hoc Networks.
[18] Syed Taha Ali,et al. Decorrelating secret bit extraction via channel hopping in body area networks , 2012, 2012 IEEE 23rd International Symposium on Personal, Indoor and Mobile Radio Communications - (PIMRC).
[19] Nizamuddin,et al. An authenticated key agreement with rekeying for secured body sensor networks based on hybrid cryptosystem , 2012, Proceedings of 2012 9th IEEE International Conference on Networking, Sensing and Control.
[20] Susmita Sur-Kolay,et al. CABA: Continuous Authentication Based on BioAura , 2017, IEEE Transactions on Computers.
[21] Sanjay Jha,et al. SeAK: Secure Authentication and Key Generation Protocol Based on Dual Antennas for Wireless Body Area Networks , 2014, RFIDSec.
[22] Gerhard P. Hancke,et al. Wearable security: Key derivation for Body Area sensor Networks based on host movement , 2016, 2016 IEEE 25th International Symposium on Industrial Electronics (ISIE).
[23] Fan Zhang,et al. OPFKA: Secure and efficient Ordered-Physiological-Feature-based key agreement for wireless Body Area Networks , 2013, 2013 Proceedings IEEE INFOCOM.
[24] Amr M. Youssef,et al. Security Tradeoffs in Cyber Physical Systems: A Case Study Survey on Implantable Medical Devices , 2016, IEEE Access.
[25] Himanshu Neema,et al. Evaluating the effects of cyber-attacks on cyber physical systems using a hardware-in-the-loop simulation testbed , 2017, 2017 Resilience Week (RWS).
[26] Neil W. Bergmann,et al. Walkie-Talkie: Motion-Assisted Automatic Key Generation for Secure On-Body Device Communication , 2016, 2016 15th ACM/IEEE International Conference on Information Processing in Sensor Networks (IPSN).
[27] Yuesheng Zhu,et al. TinyZKP: A Lightweight Authentication Scheme Based on Zero-Knowledge Proof for Wireless Body Area Networks , 2014, Wirel. Pers. Commun..
[28] Sheng Zhong,et al. IBE-Lite: A Lightweight Identity-Based Cryptography for Body Sensor Networks , 2009, IEEE Transactions on Information Technology in Biomedicine.
[29] Ayan Banerjee,et al. PSKA: Usable and Secure Key Agreement Scheme for Body Area Networks , 2010, IEEE Transactions on Information Technology in Biomedicine.
[30] Gill R. Tsouri,et al. Securing While Sampling in Wireless Body Area Networks With Application to Electrocardiography , 2016, IEEE Journal of Biomedical and Health Informatics.
[31] Srdjan Capkun,et al. Proximity-based access control for implantable medical devices , 2009, CCS.
[32] Kyung Sup Kwak,et al. Security and Privacy Issues in Wireless Sensor Networks for Healthcare Applications , 2010, Journal of Medical Systems.
[33] Sanjay Jha,et al. DLINK: Dual link based radio frequency fingerprinting for wearable devices , 2015, 2015 IEEE 40th Conference on Local Computer Networks (LCN).
[34] Ming Li,et al. Group Device Pairing based Secure Sensor Association and Key Management for Body Area Networks , 2010, 2010 Proceedings IEEE INFOCOM.
[35] Xiong Li,et al. Anonymous mutual authentication and key agreement scheme for wearable sensors in wireless body area networks , 2017, Comput. Networks.
[36] Qaisar Shafi,et al. Cyber Physical Systems Security: A Brief Survey , 2012, 2012 12th International Conference on Computational Science and Its Applications.
[37] Sanjay Jha,et al. iARC: Secret Key Generation for Resource Constrained Devices by Inducing Artificial Randomness in the Channel , 2015, AsiaCCS.
[38] Qian Li,et al. Efficient authenticated key exchange protocols for wireless body area networks , 2015, EURASIP Journal on Wireless Communications and Networking.
[39] Bin Liu,et al. A Novel Authentication Scheme Based on Acceleration Data in WBAN , 2017, 2017 IEEE/ACM International Conference on Connected Health: Applications, Systems and Engineering Technologies (CHASE).
[40] Yang Xiang,et al. A survey on security control and attack detection for industrial cyber-physical systems , 2018, Neurocomputing.
[41] Soummya Kar,et al. Optimal Attack Strategies Subject to Detection Constraints Against Cyber-Physical Systems , 2016, IEEE Transactions on Control of Network Systems.
[42] Sandeep K. S. Gupta,et al. Biosec: a biometric based approach for securing communication in wireless networks of biosensors implanted in the human body , 2003, 2003 International Conference on Parallel Processing Workshops, 2003. Proceedings..
[43] Eyal de Lara,et al. Amigo: Proximity-Based Authentication of Mobile Devices , 2007, UbiComp.
[44] Fengjun Li,et al. Cyber-Physical Systems Security—A Survey , 2017, IEEE Internet of Things Journal.