

Comparative Survey of Key Management Schemes for Body Area Networks
Abstract
Keywords
References
Otto, C., Milenkovic, A., Sanders, C., &Jovanov, E (2006) “System Architecture of a WirelessBody Area Sensor Network for Ubiquitous Health Monitoring”, In Journal of MobileMultimedia, Vol. 1, No. 4, pp307-326.
R. S. H. Istepanian, E. Jovanov, and Y. T. Zhang,Guest editorial introduction to the special sectionon m-health: Beyond seamless mobility and globalwireless health-care connectivity," IEEE Transactions on Information Technology in Biomedicine, vol.8, no. 4, pp. 405-414, Dec. 2004.
S. Lim, T. H. Oh, Y. B. Choi, and T. Lakshman, “Security issueson wireless body area network for remote healthcare monitoring,”in Proceedings of the IEEE International Conferenceon Sensor Networks, Ubiquitous, and Trustworthy Computing,(SUTC ’10), pp. 327–332, Newport Beach, Calif, USA, June2010.
K. Malasri and L. Wang, Addressing Security inMedical Sensor Networks," HealthNet '07, pp. 7-12,San Juan, Puerto Rico, USA, June 11, 2007.
HaoFeng, Anderson Ross, Daugman John, “CombiningCryptography with Biometrics Effectively”, ComputerLaboratory, University of Cambridge, Technical Report No.640, UCAM-CL-TR-640, July 2005.
Goh A., Ngo D.C.L., Computation of cryptographic keysfrom face biometrics, International Federation for InformationProcessing 2003, Springer-Verlag, LNCS 2828, 2003.
Chouakri S.A., Bereksi-Reguig F., Ahmaidi S., FokapuO.Waveletdenoising of the electrocardiogram signal based onthe corrupted noise estimation, Univ. DjillaliLiabes, SidiBelAbbes, Computers in Cardiology, 2005, 1021-1024.
S. Cherukuri, K. K. Venkatasubramanian, and S. K. S. Gupta, “BioSec: A biometric based approach forsecuring communication in wireless networks of biosensors implanted in the human body,” in Proceedings ofthe Workshop on Wireless Security and Privacy (WiSPr), International Conference on Parallel ProcessingWorkshops, 2003, pp. 432–439.
N. Asokan, K. Kostiainen, P. Ginzboorg, J. Ott, and C. Luo. "Applicability of identity-based cryptographyfor disruption-tolerant networking". In MobiOpp 2007.
C. C. Y. Poon, Y.-T. Zhang, and S.-D. Bao, “A Novel Biometrics MethodTo Secure Wireless Body Area Sensor Networks for Telemedicine AndM-Health,” IEEE Communications Magazine, vol. 44, no. 4, pp. 73–81,2006.
Ruangchaijatupon, P. Krishnamurthy, ''Encryptionand Power Consumption in Wireless LANs-N,’’ TheThird IEEE Workshop on Wireless LANs – September27-28, 2001- Newton, Massachusetts.
Hardjono, ''Security In Wireless LANS AndMANS,'' Artech House Publishers 2005.
C. C. Y. Poon, Y.-T. Zhang and S.-D. Bao, “A novel biometricsmethod to secure wireless body area sensor networks fortelemedicine and m-health,” IEEE Communications Magazine,vol. 44, no. 4, pp. 73–81, 2006
K. Venkatasubramanian, A. Banerjee, and S. K. S. Gupta. EKG-basedKey Agreement in Body Sensor Networks. pages 1–6, April 2008. Proc.of 2nd Workshop on Mission Critical Networks.
K. K. Venkatasubramanian, A. Banerjee, and S. K. S. Gupta,“PSKA: usable and secure key agreement scheme for bodyarea networks,” IEEE Transactions on Information Technologyin Biomedicine, vol. 14, no. 1, pp. 60–68, 2010.
Mana, M., Feham, M., &Bensaber, B. A., (2011) “Trust Key Management Scheme for Wireless Body Area Networks”, In International Journal of Network Security, vol. 12, no. 2, pp71-79.
Lin Yao,1 Bing Liu,1 Guowei Wu,1 Kai Yao,2 and Jia Wang1 “A Biometric Key Establishment Protocol for Body Area Networks. Hindawi Publishing CorporationInternational Journal of Distributed Sensor Networks Volume 2011.
Garcia-Baleon H.A., Alarcon-Aquino V., Starostenko O., AWavelet-Based 128-bit Key Generator Using ElectrocardiogramSignals, IEEE International Midwest Symposium onCircuits and Systems, MWSCAS 2009, August 2009.
Garcia-Baleon H. A., Alarcon-Aquino V., ”CryptographicKey Generation from Biometric Data Using Wavelets,” IEEEElectronics,
Robotics and Automotive Mechanics ConferenceCERMA 2009, Mexico, September 2009, in press.
Goh A., Ngo D.C.L., Computation of cryptographic keysfrom face biometrics, International Federation for InformationProcessing 2003, Springer-Verlag, LNCS 2828, 2003.
Clancy T.C., Kiyavash N., Lin D.J. Secure smart card-basedfingerprint authentication, Proceedings of the 2003 ACMSIGMM Workshop of Biometrics Methods and Application,WBMA 2003.
Hao F., Chan C.W., Private key generation from on-linehandwritten signatures, Information Management & ComputerSociety, Issue 10, No.2, 2002.
Garcia-Baleon HA, Alarcon-Aquino V, Cryptographic Key Generation from Biometric Data Using Wavelets, Electronics, Robotics and Automotive Mechanics Conference, 2009. CERMA '09, 2009, Pages:15-20
L. Yao, B. Liu, K. Yao, G. W. Wu, and J. Wang, “An ecgbasedsignal key establishment protocol in body area network,”in Proceedings of the Symposia and Workshops on Ubiquitous,Autonomic and Trusted Computing, pp. 233–238,October20
Refbacks
- There are currently no refbacks.

This work is licensed under a Creative Commons Attribution 3.0 License.