MBPSKA: Multi-Biometric and Physiological Signal-Based Key Agreement for Body Area Networks
暂无分享,去创建一个
Jiguo Yu | Chunqiang Hu | Hang Liu | Mana Al Reshan | Mana Saleh Al Reshan | Jiguo Yu | Hang Liu | Chun-qiang Hu
[1] Alessandra Lumini,et al. Fingerprint Image Reconstruction from Standard Templates , 2007, IEEE Transactions on Pattern Analysis and Machine Intelligence.
[2] Farinaz Koushanfar,et al. Balancing security and utility in Medical Devices? , 2013, 2013 50th ACM/EDAC/IEEE Design Automation Conference (DAC).
[3] Chithra Selvaraj,et al. Bio-sensor Authentication for Medical Applications Using WBAN , 2016 .
[4] Eryk Dutkiewicz,et al. An ECG-based Secret Data Sharing scheme supporting emergency treatment of Implantable Medical Devices , 2014, 2014 International Symposium on Wireless Personal Multimedia Communications (WPMC).
[5] Carmen C. Y. Poon,et al. A novel biometrics method to secure wireless body area sensor networks for telemedicine and m-health , 2006, IEEE Communications Magazine.
[6] Kevin Fu,et al. Design challenges for secure implantable medical devices , 2012, DAC Design Automation Conference 2012.
[7] Fengyuan Xu,et al. IMDGuard: Securing implantable medical devices with the external wearable guardian , 2011, 2011 Proceedings IEEE INFOCOM.
[8] Jia Wang,et al. An ECG-Based Signal Key Establishment Protocol in Body Area Networks , 2010, 2010 7th International Conference on Ubiquitous Intelligence & Computing and 7th International Conference on Autonomic & Trusted Computing.
[9] Michael D. Smith,et al. A public-key infrastructure for key distribution in TinyOS based on elliptic curve cryptography , 2004, 2004 First Annual IEEE Communications Society Conference on Sensor and Ad Hoc Communications and Networks, 2004. IEEE SECON 2004..
[10] Farinaz Koushanfar,et al. Heart-to-heart (H2H): authentication for implanted medical devices , 2013, CCS.
[11] Junbin Gao,et al. Fingerprint Matching using A Hybrid Shape and Orientation Descriptor , 2011 .
[12] Ethiopia Nigussie,et al. Cryptographic key generation using ECG signal , 2017, 2017 14th IEEE Annual Consumer Communications & Networking Conference (CCNC).
[13] Chandan Singh D Rawat,et al. Biometric Personal Identification based on Iris Patterns , 2014 .
[14] K.K. Venkatasubramanian,et al. Plethysmogram-based secure inter-sensor communication in Body Area Networks , 2008, MILCOM 2008 - 2008 IEEE Military Communications Conference.
[15] Niraj K. Jha,et al. Hijacking an insulin pump: Security attacks and defenses for a diabetes therapy system , 2011, 2011 IEEE 13th International Conference on e-Health Networking, Applications and Services.
[16] Majid R Alshammari,et al. Efficient key distribution protocol for wireless sensor networks , 2018, 2018 IEEE 8th Annual Computing and Communication Workshop and Conference (CCWC).
[17] Anton H. M. Akkermans,et al. Face biometrics with renewable templates , 2006, Electronic Imaging.
[18] Ye Li,et al. A Modified Fuzzy Vault Scheme for Biometrics-Based Body Sensor Networks Security , 2010, 2010 IEEE Global Telecommunications Conference GLOBECOM 2010.
[19] Sharath Pankanti,et al. Fingerprint-Based Fuzzy Vault: Implementation and Performance , 2007, IEEE Transactions on Information Forensics and Security.
[20] Qian Li,et al. Efficient authenticated key exchange protocols for wireless body area networks , 2015, EURASIP Journal on Wireless Communications and Networking.
[21] Haiping Lu,et al. Face recognition with biometric encryption for privacy-enhancing self-exclusion , 2009, 2009 16th International Conference on Digital Signal Processing.
[22] Sanjay Kumar,et al. Secure authentication approach using Diffie-Hellman key exchange algorithm for WSN , 2016, Int. J. Commun. Networks Distributed Syst..
[23] Sharath Pankanti,et al. Fuzzy Vault for Fingerprints , 2005, AVBPA.
[24] L. Benedicenti,et al. The electroencephalogram as a biometric , 2001, Canadian Conference on Electrical and Computer Engineering 2001. Conference Proceedings (Cat. No.01TH8555).
[25] Tieniu Tan,et al. Combining Face and Iris Biometrics for Identity Verification , 2003, AVBPA.
[26] Sheng Zhong,et al. Body sensor network security: an identity-based cryptography approach , 2008, WiSec '08.
[27] Fang Liu,et al. LKE: A Self-Configuring Scheme for Location-Aware Key Establishment in Wireless Sensor Networks , 2008, IEEE Transactions on Wireless Communications.
[28] Pravin Yannawar,et al. Fingerprint Recognition for Person Identification and Verification Based on Minutiae Matching , 2016, 2016 IEEE 6th International Conference on Advanced Computing (IACC).
[29] Sandeep K. S. Gupta,et al. Research challenges in wireless networks of biomedical sensors , 2001, MobiCom '01.
[30] Inampudi Ramesh Babu,et al. Authentication Using Fuzzy Vault Based on Iris Textures , 2008, Asia International Conference on Modelling and Simulation.
[31] Ayan Banerjee,et al. PSKA: Usable and Secure Key Agreement Scheme for Body Area Networks , 2010, IEEE Transactions on Information Technology in Biomedicine.
[32] K K Venkatasubramanian,et al. Interoperable Medical Devices , 2010, IEEE Pulse.
[33] Ming Li,et al. Secure ad hoc trust initialization and key management in wireless body area networks , 2013, TOSN.
[34] Fang Liu,et al. SBK: A Self-Configuring Framework for Bootstrapping Keys in Sensor Networks , 2008, IEEE Transactions on Mobile Computing.
[35] Vincenzo Conti,et al. A Frequency-based Approach for Features Fusion in Fingerprint and Iris Multimodal Biometric Identification Systems , 2010, IEEE Transactions on Systems, Man, and Cybernetics, Part C (Applications and Reviews).
[36] Christos Strydis,et al. Enhancing Heart-Beat-Based Security for mHealth Applications , 2017, IEEE Journal of Biomedical and Health Informatics.
[37] Anil K. Jain,et al. Fingerprint Image Enhancement: Algorithm and Performance Evaluation , 1998, IEEE Trans. Pattern Anal. Mach. Intell..
[38] Virgil D. Gligor,et al. A key-management scheme for distributed sensor networks , 2002, CCS '02.
[39] Francisco Herrera,et al. A survey on fingerprint minutiae-based local matching for verification and identification: Taxonomy and experimental evaluation , 2015, Inf. Sci..
[40] Emil C. Lupu,et al. Securing body sensor networks: Sensor association and key management , 2009, 2009 IEEE International Conference on Pervasive Computing and Communications.
[41] K.K. Venkatasubramanian,et al. EKG-based key agreement in Body Sensor Networks , 2008, IEEE INFOCOM Workshops 2008.
[42] Gérard D. Cohen,et al. Theoretical and Practical Boundaries of Binary Secure Sketches , 2008, IEEE Transactions on Information Forensics and Security.
[43] Athanasios V. Vasilakos,et al. Body Area Networks: A Survey , 2010, Mob. Networks Appl..
[44] Gengfa Fang,et al. Multiple ECG Fiducial Points-Based Random Binary Sequence Generation for Securing Wireless Body Area Networks , 2017, IEEE Journal of Biomedical and Health Informatics.
[45] Chandrashekar M Patil,et al. Feature Extraction Classification for Personal Identification using Iris , 2017, 2017 International Conference on Current Trends in Computer, Electrical, Electronics and Communication (CTCEEC).
[46] Xiong Li,et al. Anonymous mutual authentication and key agreement scheme for wearable sensors in wireless body area networks , 2017, Comput. Networks.
[47] M. V. Karthikeyan,et al. A novel fast chaff point generation method using bio-inspired flower pollination algorithm for fuzzy vault systems with physiological signal for wireless body area sensor networks , 2017 .
[48] Sushil Jajodia,et al. LEAP+: Efficient security mechanisms for large-scale distributed sensor networks , 2006, TOSN.
[49] Martin Wattenberg,et al. A fuzzy commitment scheme , 1999, CCS '99.
[50] Neal Leavitt,et al. Researchers Fight to Keep Implanted Medical Devices Safe from Hackers , 2010, Computer.
[51] Alessandro Neri,et al. IRIS template protection using a digital modulation paradigm , 2014, 2014 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP).
[52] Fang Liu,et al. iPAK: An In-Situ Pairwise Key Bootstrapping Scheme for Wireless Sensor Networks , 2007, IEEE Transactions on Parallel and Distributed Systems.
[53] K.K. Venkatasubramanian,et al. Security for Pervasive Health Monitoring Sensor Applications , 2006, 2006 Fourth International Conference on Intelligent Sensing and Information Processing.
[54] Kevin Fu,et al. Security and Privacy for Implantable Medical Devices , 2008, IEEE Pervasive Comput..
[55] Brenda K. Wiederhold,et al. ECG to identify individuals , 2005, Pattern Recognit..
[56] Jeffrey M. Hausdorff,et al. Physionet: Components of a New Research Resource for Complex Physiologic Signals". Circu-lation Vol , 2000 .
[57] Raymond N. J. Veldhuis,et al. Fingerprint Verification Using Spectral Minutiae Representations , 2009, IEEE Transactions on Information Forensics and Security.
[58] Sandeep K. S. Gupta,et al. Biosec: a biometric based approach for securing communication in wireless networks of biosensors implanted in the human body , 2003, 2003 International Conference on Parallel Processing Workshops, 2003. Proceedings..
[59] Marimuthu Palaniswami,et al. KALwEN: a new practical and interoperable key management scheme for body sensor networks , 2008, Secur. Commun. Networks.
[60] Julien Penders,et al. Potential and challenges of body area networks for personal health , 2009, 2009 Annual International Conference of the IEEE Engineering in Medicine and Biology Society.
[61] Whitfield Diffie,et al. New Directions in Cryptography , 1976, IEEE Trans. Inf. Theory.
[62] Ming Li,et al. Group Device Pairing based Secure Sensor Association and Key Management for Body Area Networks , 2010, 2010 Proceedings IEEE INFOCOM.
[63] Chien-Ming Chen,et al. An Anonymous Mutual Authenticated Key Agreement Scheme for Wearable Sensors in Wireless Body Area Networks , 2018, Applied Sciences.
[64] Madhu Sudan,et al. A Fuzzy Vault Scheme , 2006, Des. Codes Cryptogr..
[65] Anil K. Jain,et al. Multibiometric Cryptosystems Based on Feature-Level Fusion , 2012, IEEE Transactions on Information Forensics and Security.
[66] Xiaofeng Liao,et al. Body Area Network Security: A Fuzzy Attribute-Based Signcryption Scheme , 2013, IEEE Journal on Selected Areas in Communications.
[67] Fan Zhang,et al. OPFKA: Secure and efficient Ordered-Physiological-Feature-based key agreement for wireless Body Area Networks , 2013, 2013 Proceedings IEEE INFOCOM.
[68] Feng Hao,et al. Combining Crypto with Biometrics Effectively , 2006, IEEE Transactions on Computers.
[69] Bo Fu,et al. Multibiometric Cryptosystem: Model Structure and Performance Analysis , 2009, IEEE Transactions on Information Forensics and Security.
[70] Axel Munk,et al. The Fuzzy Vault for Fingerprints is Vulnerable to Brute Force Attack , 2007, BIOSIG.
[71] Jian Shen,et al. A lightweight multi-layer authentication protocol for wireless body area networks , 2018, Future Gener. Comput. Syst..
[72] Berrin A. Yanikoglu,et al. Realization of correlation attack against the fuzzy vault scheme , 2008, Electronic Imaging.
[73] B. Ripley,et al. Pattern Recognition , 1968, Nature.
[74] Sheng Zhong,et al. IBE-Lite: A Lightweight Identity-Based Cryptography for Body Sensor Networks , 2009, IEEE Transactions on Information Technology in Biomedicine.
[75] Andreas Uhl,et al. A survey on biometric cryptosystems and cancelable biometrics , 2011, EURASIP J. Inf. Secur..
[76] Nalini K. Ratha,et al. Generating Cancelable Fingerprint Templates , 2007, IEEE Transactions on Pattern Analysis and Machine Intelligence.
[77] Karthik Nandakumar,et al. A fingerprint cryptosystem based on minutiae phase spectrum , 2010, 2010 IEEE International Workshop on Information Forensics and Security.
[78] Marios Poulos,et al. Person identification via the EEG using computational geometry algorithms , 1998, 9th European Signal Processing Conference (EUSIPCO 1998).
[79] Enrique Argones-Rúa,et al. A survey on physiological-signal-based security for medical devices , 2016, IACR Cryptol. ePrint Arch..
[80] Suela Kodra. Fuzzy extractors : How to generate strong keys from biometrics and other noisy data , 2015 .
[81] Anil K. Jain,et al. FVC2002: Second Fingerprint Verification Competition , 2002, Object recognition supported by user interaction for service robots.
[82] F. Moore,et al. Polynomial Codes Over Certain Finite Fields , 2017 .
[83] Mohamed Elhoseny,et al. Cascade Multimodal Biometric System Using Fingerprint and Iris Patterns , 2017, AISI.
[84] T.E. Boult,et al. Cracking Fuzzy Vaults and Biometric Encryption , 2007, 2007 Biometrics Symposium.
[85] Josef Bernhard,et al. Body Area Network BAN – a Key Infrastructure Element for Patient-Centered Medical Applications , 2002, Biomedizinische Technik. Biomedical engineering.
[86] Tetsuo Asano,et al. Fingerprint Matching Using Minutia Polygons , 2006, 18th International Conference on Pattern Recognition (ICPR'06).
[87] Marko Hölbl,et al. Survey on security in intra-body area network communication , 2018, Ad Hoc Networks.