Use of elliptic curves in cryptography
Lecture notes in computer sciences; 218 on Advances in cryptology---CRYPTO 85
CCS '99 Proceedings of the 6th ACM conference on Computer and communications security
System architecture directions for networked sensors
ACM SIGPLAN Notices
A method for obtaining digital signatures and public-key cryptosystems
Communications of the ACM
SPINS: security protocols for sensor networks
Wireless Networks
TinySec: a link layer security architecture for wireless sensor networks
SenSys '04 Proceedings of the 2nd international conference on Embedded networked sensor systems
Energy Analysis of Public-Key Cryptography for Wireless Sensor Networks
PERCOM '05 Proceedings of the Third IEEE International Conference on Pervasive Computing and Communications
Designs, Codes and Cryptography
Resource-Efficient Security for Medical Body Sensor Networks
BSN '06 Proceedings of the International Workshop on Wearable and Implantable Body Sensor Networks
Wireless Body Sensor Network Using Medical Implant Band
Journal of Medical Systems
Body sensor network security: an identity-based cryptography approach
WiSec '08 Proceedings of the first ACM conference on Wireless network security
TinyECC: A Configurable Library for Elliptic Curve Cryptography in Wireless Sensor Networks
IPSN '08 Proceedings of the 7th international conference on Information processing in sensor networks
ISA '08 Proceedings of the 2008 International Conference on Information Security and Assurance (isa 2008)
PRESENT: An Ultra-Lightweight Block Cipher
CHES '07 Proceedings of the 9th international workshop on Cryptographic Hardware and Embedded Systems
An RC4-Based Lightweight Security Protocol for Resource-constrained Communications
CSEWORKSHOPS '08 Proceedings of the 2008 11th IEEE International Conference on Computational Science and Engineering - Workshops
Hardware-Based Random Number Generation in Wireless Sensor Networks(WSNs)
ISA '09 Proceedings of the 3rd International Conference and Workshops on Advances in Information Security and Assurance
KATAN and KTANTAN -- A Family of Small and Efficient Hardware-Oriented Block Ciphers
CHES '09 Proceedings of the 11th International Workshop on Cryptographic Hardware and Embedded Systems
Applications, challenges, and prospective in emerging body area networking technologies
IEEE Wireless Communications
Efficient implementation of public key cryptosystems on mote sensors (short paper)
ICICS'06 Proceedings of the 8th international conference on Information and Communications Security
mCrypton – a lightweight block cipher for security of low-cost RFID tags and sensors
WISA'05 Proceedings of the 6th international conference on Information Security Applications
A survey of security issues in wireless sensor networks
IEEE Communications Surveys & Tutorials
IEEE Transactions on Information Technology in Biomedicine
A novel biometrics method to secure wireless body area sensor networks for telemedicine and m-health
IEEE Communications Magazine
Commercial Applications of Wireless Sensor Networks Using ZigBee
IEEE Communications Magazine
Hi-index | 0.00 |
Body area networks (BANs) are emerging as one of the main research trends in recent years, particularly in the area of personal health monitoring. Since health data are private and sensitive information, the security of data transmission within a BAN becomes a critical issue that requires immediate attention. In this paper, we attempt to examine possible attacks of the resource-constrained BANs and present state-of-the-art communication protocols, cryptographic methods, and key management schemes that are useful for BANs security. We will also discuss the problems of existing solutions and possible future research directions on security for BANs. A novel biometric method that utilizes the biological channels (biochannels) to assist secure information transmission within a BAN will also be highlighted and discussed.