Use of elliptic curves in cryptography
Lecture notes in computer sciences; 218 on Advances in cryptology---CRYPTO 85
SPINS: security protocols for sensor networks
Proceedings of the 7th annual international conference on Mobile computing and networking
Fast authenticated key establishment protocols for self-organizing sensor networks
WSNA '03 Proceedings of the 2nd ACM international conference on Wireless sensor networks and applications
LEAP: efficient security mechanisms for large-scale distributed sensor networks
Proceedings of the 10th ACM conference on Computer and communications security
From Euclid's GCD to Montgomery Multiplication to the Great Divide
From Euclid's GCD to Montgomery Multiplication to the Great Divide
HCMDSS-MDPNP '07 Proceedings of the 2007 Joint Workshop on High Confidence Medical Devices, Software, and Systems and Medical Device Plug-and-Play Interoperability
Embedded assessment: overcoming barriers to early detection with pervasive computing
PERVASIVE'05 Proceedings of the Third international conference on Pervasive Computing
Securing wireless implantable devices for healthcare: ideas and challenges
IEEE Communications Magazine
Security management in Wireless Sensor Networks for healthcare
International Journal of Mobile Communications
Privacy in mobile technology for personal healthcare
ACM Computing Surveys (CSUR)
KALwEN: a new practical and interoperable key management scheme for body sensor networks
Security and Communication Networks
Hi-index | 0.00 |
A medical sensor network can wirelessly monitor vital signs of humans, making it useful for long-term health care without sacrificing patient comfort and mobility. For such a network to be viable, its design must protect data privacy and authenticity given that medical data are highly sensitive. We identify the unique security challenges facing such a sensor network and propose a set of resource-efficient mechanisms to address these challenges. Our solution includes (1) a novel two-tier scheme for verifying the authenticity of patient data; (2) an ECC-based secure key exchange protocol to set up shared keys between sensor nodes and base stations; and (3) symmetric encryption/decryption for protecting data confidentiality and integrity. We have implemented the proposed mechanisms on a wireless mote platform and our results confirm their feasibility.