Identity-based cryptosystems and signature schemes
Proceedings of CRYPTO 84 on Advances in cryptology
A key-management scheme for distributed sensor networks
Proceedings of the 9th ACM conference on Computer and communications security
Toward Hierarchical Identity-Based Encryption
EUROCRYPT '02 Proceedings of the International Conference on the Theory and Applications of Cryptographic Techniques: Advances in Cryptology
Random Key Predistribution Schemes for Sensor Networks
SP '03 Proceedings of the 2003 IEEE Symposium on Security and Privacy
Intrusion detection techniques for mobile wireless networks
Wireless Networks
Establishing pairwise keys in distributed sensor networks
Proceedings of the 10th ACM conference on Computer and communications security
LEAP: efficient security mechanisms for large-scale distributed sensor networks
Proceedings of the 10th ACM conference on Computer and communications security
Location-based pairwise key establishments for static sensor networks
Proceedings of the 1st ACM workshop on Security of ad hoc and sensor networks
Key distribution techniques for sensor networks
Wireless sensor networks
Short Signatures from the Weil Pairing
Journal of Cryptology
Dempster-Shafer Theory for Intrusion Detection in Ad Hoc Networks
IEEE Internet Computing
The Smart Phone: A Ubiquitous Input Device
IEEE Pervasive Computing
Integrated biomedical system for ubiquitous health monitoring
NBiS'07 Proceedings of the 1st international conference on Network-based information systems
Privacy-Preserving Telemonitoring for eHealth
Proceedings of the 23rd Annual IFIP WG 11.3 Working Conference on Data and Applications Security XXIII
Privacy-preserving statistical analysis on ubiquitous health data
TrustBus'11 Proceedings of the 8th international conference on Trust, privacy and security in digital business
Hi-index | 0.00 |
We propose a distributed and secure system that enables global & ubiquitous health monitoring. The biomedical data, collected by wearable sensors will be transmitted using cell phones towards the corresponding Health Monitoring Centers via various wireless networks. The security of personal medical data is paramount. Therefore, we propose a new scheme that enable security communications among cell phones and other wireless networks. In particular, we propose a hybrid authentication scheme that involves both the cellular network and the Health Monitor Centers. Therefore, we take advantage of the strong authentication and non-repudiation provided by the cellular networks. Consequently, our solution guaranties confidentiality, privacy and defences against denial of service attacks.