Password authentication with insecure communication
Communications of the ACM
A taxonomy of wireless micro-sensor network models
ACM SIGMOBILE Mobile Computing and Communications Review
A key-management scheme for distributed sensor networks
Proceedings of the 9th ACM conference on Computer and communications security
Random Key Predistribution Schemes for Sensor Networks
SP '03 Proceedings of the 2003 IEEE Symposium on Security and Privacy
Fast authenticated key establishment protocols for self-organizing sensor networks
WSNA '03 Proceedings of the 2nd ACM international conference on Wireless sensor networks and applications
A pairwise key pre-distribution scheme for wireless sensor networks
Proceedings of the 10th ACM conference on Computer and communications security
Encryption overhead in embedded systems and sensor network nodes: modeling and analysis
Proceedings of the 2003 international conference on Compilers, architecture and synthesis for embedded systems
Combinatorial Optimization of Group Key Management
Journal of Network and Systems Management
TinySec: a link layer security architecture for wireless sensor networks
SenSys '04 Proceedings of the 2nd international conference on Embedded networked sensor systems
An Efficient Pseudo Random Number Generator for Low-Power Sensor Networks
LCN '04 Proceedings of the 29th Annual IEEE International Conference on Local Computer Networks
Minimum power configuration in wireless sensor networks
Proceedings of the 6th ACM international symposium on Mobile ad hoc networking and computing
An Efficient Key Revocation Protocol for Wireless Sensor Networks
WOWMOM '06 Proceedings of the 2006 International Symposium on on World of Wireless, Mobile and Multimedia Networks
A Hexagon-Based Key Predistribution Scheme in Sensor Networks
ICPPW '06 Proceedings of the 2006 International Conference Workshops on Parallel Processing
Location-Aware Combinatorial Key Management Scheme for Clustered Sensor Networks
IEEE Transactions on Parallel and Distributed Systems
LEAP+: Efficient security mechanisms for large-scale distributed sensor networks
ACM Transactions on Sensor Networks (TOSN)
An Energy-Efficient Key Management Protocol For Large-Scale Wireless Sensor Networks
MUE '07 Proceedings of the 2007 International Conference on Multimedia and Ubiquitous Engineering
Combinatorial design of key distribution mechanisms for wireless sensor networks
IEEE/ACM Transactions on Networking (TON)
Plug 'n play simplicity for wireless medical body sensors
Mobile Networks and Applications
EURASIP Journal on Advances in Signal Processing
System architecture of a wireless body area sensor network for ubiquitous health monitoring
Journal of Mobile Multimedia
LSec: lightweight security protocol for distributed wireless sensor network
PWC'06 Proceedings of the 11th IFIP TC6 international conference on Personal Wireless Communications
A novel biometrics method to secure wireless body area sensor networks for telemedicine and m-health
IEEE Communications Magazine
Hi-index | 0.00 |
Wireless Sensor Networks (WSN) are worthy to use in ubiquitous healthcare environments. They provide comfort to patients and make patient monitoring systems more efficient. WSN, when applied in ubiquitous healthcare environments, have different characteristics and security requirements. Number of sensors is very small as compared to other WSN applications and all nodes are close to each other in the network. Possibility of human intervention in ubiquitous healthcare environments and randomness properties of biometric measurements, which are collected in ubiquitous healthcare environments, reduce the security requirements as compared to other WSN applications. Key Management Schemes, proposed for generic WSN, prove to be overly complex and inefficient for ubiquitous healthcare environments. In this paper, we present TIMAR, which is an efficient Key Management Scheme specifically designed for ubiquitous healthcare environments.