hkr.sePublikationer
Ändra sökning
RefereraExporteraLänk till posten
Permanent länk

Direktlänk
Referera
Referensformat
  • apa
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Annat format
Fler format
Språk
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Annat språk
Fler språk
Utmatningsformat
  • html
  • text
  • asciidoc
  • rtf
Human interactive secure key and ID exchange protocols in body sensor networks
Department of Computer Science, Institute for the Future of Computing/Oxford Martin School, University of Oxford.
Department of Computer Science, University of Oxford.
Department of Computer Science, Institute for the Future of Computing/Oxford Martin School, University of Oxford.
Högskolan Kristianstad, Sektionen för hälsa och samhälle, Avdelningen för Design och datavetenskap. Department of Communications and Networking, Aalto University, Espoo.ORCID-id: 0000-0002-8032-6291
Visa övriga samt affilieringar
2013 (Engelska)Ingår i: IET Information Security, ISSN 1751-8709, E-ISSN 1751-8717, Vol. 7, nr 1, s. 30-38Artikel i tidskrift (Refereegranskat) Published
Abstract [en]

A body sensor network (BSN) is typically a wearable wireless sensor network. Security protection is critical to BSNs, since they collect sensitive personal information. Generally speaking, security protection of BSN relies on identity (ID) and key distribution protocols. Most existing protocols are designed to run in general wireless sensor networks, and are not suitable for BSNs. After carefully examining the characteristics of BSNs, the authors propose human interactive empirical channel-based security protocols, which include an elliptic curve Diffie–Hellman version of symmetric hash commitment before knowledge protocol and an elliptic curve Diffie–Hellman version of hash commitment before knowledge protocol. Using these protocols, dynamically distributing keys and IDs become possible. As opposite to present solutions, these protocols do not need any pre-deployment of keys or secrets. Therefore compromised and expired keys or IDs can be easily changed. These protocols exploit human users as temporary trusted third parties. The authors, thus, show that the human interactive channels can help them to design secure BSNs.

Ort, förlag, år, upplaga, sidor
2013. Vol. 7, nr 1, s. 30-38
Nyckelord [en]
Data security, ; Biomedical communication, Protocols, Cryptography, Wireless sensor networks
Nationell ämneskategori
Kommunikationssystem Inbäddad systemteknik Medicinsk laboratorie- och mätteknik
Identifikatorer
URN: urn:nbn:se:hkr:diva-11329DOI: 10.1049/iet-ifs.2012.0080OAI: oai:DiVA.org:hkr-11329DiVA, id: diva2:668350
Tillgänglig från: 2013-11-29 Skapad: 2013-11-29 Senast uppdaterad: 2017-12-06Bibliografiskt granskad

Open Access i DiVA

Fulltext saknas i DiVA

Övriga länkar

Förlagets fulltext

Person

Wang, Qinghua

Sök vidare i DiVA

Av författaren/redaktören
Wang, Qinghua
Av organisationen
Avdelningen för Design och datavetenskap
I samma tidskrift
IET Information Security
KommunikationssystemInbäddad systemteknikMedicinsk laboratorie- och mätteknik

Sök vidare utanför DiVA

GoogleGoogle Scholar

doi
urn-nbn

Altmetricpoäng

doi
urn-nbn
Totalt: 316 träffar
RefereraExporteraLänk till posten
Permanent länk

Direktlänk
Referera
Referensformat
  • apa
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Annat format
Fler format
Språk
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Annat språk
Fler språk
Utmatningsformat
  • html
  • text
  • asciidoc
  • rtf