A cluster-based approach for routing in dynamic networks
ACM SIGCOMM Computer Communication Review
CCS '99 Proceedings of the 6th ACM conference on Computer and communications security
Geography-informed energy conservation for Ad Hoc routing
Proceedings of the 7th annual international conference on Mobile computing and networking
Research challenges in wireless networks of biomedical sensors
Proceedings of the 7th annual international conference on Mobile computing and networking
SPINS: security protocols for sensor networks
Wireless Networks
A key-management scheme for distributed sensor networks
Proceedings of the 9th ACM conference on Computer and communications security
WCA: A Weighted Clustering Algorithm for Mobile Ad Hoc Networks
Cluster Computing
Denial of Service in Sensor Networks
Computer
LifeMinder: A Wearable Healthcare Support System Using User's Context
ICDCSW '02 Proceedings of the 22nd International Conference on Distributed Computing Systems
On Communication Security in Wireless Ad-Hoc Sensor Networks
WETICE '02 Proceedings of the 11th IEEE International Workshops on Enabling Technologies: nfrastructure for Collaborative Enterprises
The Resurrecting Duckling: Security Issues for Ad-hoc Wireless Networks
Proceedings of the 7th International Workshop on Security Protocols
Load-Balancing Clusters in Wireless Ad Hoc Networks
ASSET '00 Proceedings of the 3rd IEEE Symposium on Application-Specific Systems and Software Engineering Technology (ASSET'00)
Energy-Efficient Communication Protocol for Wireless Microsensor Networks
HICSS '00 Proceedings of the 33rd Hawaii International Conference on System Sciences-Volume 8 - Volume 8
Random Key Predistribution Schemes for Sensor Networks
SP '03 Proceedings of the 2003 IEEE Symposium on Security and Privacy
Distributed Clustering for Ad Hoc Networks
ISPAN '99 Proceedings of the 1999 International Symposium on Parallel Architectures, Algorithms and Networks
AMON: A Wearable Medical Computer for High Risk Patients
ISWC '02 Proceedings of the 6th IEEE International Symposium on Wearable Computers
Application-specific protocol architectures for wireless networks
Application-specific protocol architectures for wireless networks
Fast authenticated key establishment protocols for self-organizing sensor networks
WSNA '03 Proceedings of the 2nd ACM international conference on Wireless sensor networks and applications
Establishing pairwise keys in distributed sensor networks
Proceedings of the 10th ACM conference on Computer and communications security
Random key-assignment for secure Wireless Sensor Networks
Proceedings of the 1st ACM workshop on Security of ad hoc and sensor networks
Location-based pairwise key establishments for static sensor networks
Proceedings of the 1st ACM workshop on Security of ad hoc and sensor networks
Key Infection: Smart Trust for Smart Dust
ICNP '04 Proceedings of the 12th IEEE International Conference on Network Protocols
Spine versus Porcupine: A Study in Distributed Wearable Activity Recognition
ISWC '04 Proceedings of the Eighth International Symposium on Wearable Computers
Fine-grained network time synchronization using reference broadcasts
OSDI '02 Proceedings of the 5th symposium on Operating systems design and implementationCopyright restrictions prevent ACM from being able to make the PDFs for this conference available for downloading
A pairwise key predistribution scheme for wireless sensor networks
ACM Transactions on Information and System Security (TISSEC)
Secure Distributed Cluster Formation in Wireless Sensor Networks
ACSAC '06 Proceedings of the 22nd Annual Computer Security Applications Conference
LEAP+: Efficient security mechanisms for large-scale distributed sensor networks
ACM Transactions on Sensor Networks (TOSN)
Message-in-a-bottle: user-friendly and secure key deployment for sensor nodes
Proceedings of the 5th international conference on Embedded networked sensor systems
Pacemakers and Implantable Cardiac Defibrillators: Software Radio Attacks and Zero-Power Defenses
SP '08 Proceedings of the 2008 IEEE Symposium on Security and Privacy
Green and Sustainable Cyber-Physical Security Solutions for Body Area Networks
BSN '09 Proceedings of the 2009 Sixth International Workshop on Wearable and Implantable Body Sensor Networks
Shake well before use: authentication based on accelerometer data
PERVASIVE'07 Proceedings of the 5th international conference on Pervasive computing
A performance evaluation of intrusion-tolerant routing in wireless sensor networks
IPSN'03 Proceedings of the 2nd international conference on Information processing in sensor networks
The candidate key protocol for generating secret shared keys from similar sensor data streams
ESAS'07 Proceedings of the 4th European conference on Security and privacy in ad-hoc and sensor networks
A wearable health care system based on knitted integrated sensors
IEEE Transactions on Information Technology in Biomedicine
A novel biometrics method to secure wireless body area sensor networks for telemedicine and m-health
IEEE Communications Magazine
Adaptive clustering for mobile wireless networks
IEEE Journal on Selected Areas in Communications
PSKA: usable and secure key agreement scheme for body area networks
IEEE Transactions on Information Technology in Biomedicine
BANA: body area network authentication exploiting channel characteristics
Proceedings of the fifth ACM conference on Security and Privacy in Wireless and Mobile Networks
An efficient and secure key agreement scheme using physiological signals in body area networks
Proceedings of the International Conference on Advances in Computing, Communications and Informatics
Secure ad hoc trust initialization and key management in wireless body area networks
ACM Transactions on Sensor Networks (TOSN)
Proceedings of the sixth ACM conference on Security and privacy in wireless and mobile networks
Balancing security and utility in medical devices?
Proceedings of the 50th Annual Design Automation Conference
Heart-to-heart (H2H): authentication for implanted medical devices
Proceedings of the 2013 ACM SIGSAC conference on Computer & communications security
PEES: physiology-based end-to-end security for mHealth
Proceedings of the 4th Conference on Wireless Health
A generic authentication protocol for wireless body area networks
BodyNets '13 Proceedings of the 8th International Conference on Body Area Networks
A sensitive data aggregation scheme for body sensor networks based on data hiding
Personal and Ubiquitous Computing
Mobile Information Systems - Emerging Wireless and Mobile Technologies
Hi-index | 0.00 |
A Body Sensor Network (BSN) is a network of economically powered, wireless, wearable, and implanted health monitoring sensors, designed to continually collect and communicate health information from the host they are deployed on. Due to the sensitive nature of the data collected, securing BSNs is important for privacy preservation and protecting the host from bodily harm. In this article, we present Physiological Value-based Security (PVS), a usable and efficient way of securing intersensor communication schemes for BSNs. The PVS scheme distributes the key used for securing a particular message along with the message itself, by hiding it using physiological values. In this way, it not only eliminates the need for any explicit key distribution, but also reduces the number of keys required at each node to meet all its secure communication requirements. We further demonstrate the use of the PVS scheme in securing cluster topology formation in BSNs. Traditional protocols for cluster formation do not consider security and are therefore susceptible to malicious attacks. We present a PVS-based cluster formation protocol which mitigates these attacks. Performance analysis of the protocol shows that compared to cluster formation protocols secured with non-PVS-based key distribution schemes, it performs efficiently.