CCS '99 Proceedings of the 6th ACM conference on Computer and communications security
Research challenges in wireless networks of biomedical sensors
Proceedings of the 7th annual international conference on Mobile computing and networking
Handbook of Applied Cryptography
Handbook of Applied Cryptography
Fine-grained network time synchronization using reference broadcasts
OSDI '02 Proceedings of the 5th symposium on Operating systems design and implementationCopyright restrictions prevent ACM from being able to make the PDFs for this conference available for downloading
LEAP+: Efficient security mechanisms for large-scale distributed sensor networks
ACM Transactions on Sensor Networks (TOSN)
Authentication Using Fuzzy Vault Based on Iris Textures
AMS '08 Proceedings of the 2008 Second Asia International Conference on Modelling & Simulation (AMS)
EURASIP Journal on Advances in Signal Processing
Green and Sustainable Cyber-Physical Security Solutions for Body Area Networks
BSN '09 Proceedings of the 2009 Sixth International Workshop on Wearable and Implantable Body Sensor Networks
Challenges of implementing cyber-physical security solutions in body area networks
BodyNets '09 Proceedings of the Fourth International Conference on Body Area Networks
Physiological value-based efficient usable security solutions for body sensor networks
ACM Transactions on Sensor Networks (TOSN)
Ayushman: a wireless sensor network based health monitoring infrastructure and testbed
DCOSS'05 Proceedings of the First IEEE international conference on Distributed Computing in Sensor Systems
AVBPA'05 Proceedings of the 5th international conference on Audio- and Video-Based Biometric Person Authentication
A novel biometrics method to secure wireless body area sensor networks for telemedicine and m-health
IEEE Communications Magazine
IEEE Transactions on Information Technology in Biomedicine
Usable protection to healthcare application
Proceedings of the Seventh Annual Workshop on Cyber Security and Information Intelligence Research
BANA: body area network authentication exploiting channel characteristics
Proceedings of the fifth ACM conference on Security and Privacy in Wireless and Mobile Networks
Body area network security: robust key establishment using human body channel
HealthSec'12 Proceedings of the 3rd USENIX conference on Health Security and Privacy
HealthSec'12 Proceedings of the 3rd USENIX conference on Health Security and Privacy
Secure ad hoc trust initialization and key management in wireless body area networks
ACM Transactions on Sensor Networks (TOSN)
Proceedings of the sixth ACM conference on Security and privacy in wireless and mobile networks
Balancing security and utility in medical devices?
Proceedings of the 50th Annual Design Automation Conference
A cluster-based key agreement scheme using keyed hashing for Body Area Networks
Multimedia Tools and Applications
Heart-to-heart (H2H): authentication for implanted medical devices
Proceedings of the 2013 ACM SIGSAC conference on Computer & communications security
PEES: physiology-based end-to-end security for mHealth
Proceedings of the 4th Conference on Wireless Health
Channel information based cryptography and authentication in wireless body area networks
BodyNets '13 Proceedings of the 8th International Conference on Body Area Networks
BDK: secure and efficient biometric based deterministic key agreement in wireless body area networks
BodyNets '13 Proceedings of the 8th International Conference on Body Area Networks
A generic authentication protocol for wireless body area networks
BodyNets '13 Proceedings of the 8th International Conference on Body Area Networks
Hi-index | 0.00 |
A body area network (BAN) is a wireless network of health monitoring sensors designed to deliver personalized health-care. Securing intersensor communications within BANs is essential for preserving not only the privacy of health data, but also for ensuring safety of healthcare delivery. This paper presents physiological-signal-based key agreement (PSKA), a scheme for enabling secure intersensor communication within a BAN in a usable (plug-n-play, transparent) manner. PSKA allows neighboring nodes in a BAN to agree to a symmetric (shared) cryptographic key, in an authenticated manner, using physiological signals obtained from the subject. No initialization or predeployment is required; simply deploying sensors in a BAN is enough to make them communicate securely. Our analysis, prototyping, and comparison with the frequently used Diffie-Hellman key agreement protocol shows that PSKA is a viable intersensor key agreement protocol for BANs.