SwePub
Sök i LIBRIS databas

  Utökad sökning

onr:"swepub:oai:researchportal.hkr.se/admin:publications/ca5fdf82-a0ce-41ab-9913-09fa56949724"
 

Sökning: onr:"swepub:oai:researchportal.hkr.se/admin:publications/ca5fdf82-a0ce-41ab-9913-09fa56949724" > Human interactive s...

  • Huang, XinDepartment of Computer Science, Institute for the Future of Computing/Oxford Martin School, University of Oxford,Department of Computer Science, Institute for the Future of Computing/Oxford Martin School, University of Oxford (författare)

Human interactive secure key and ID exchange protocols in body sensor networks

  • Artikel/kapitelEngelska2013

Förlag, utgivningsår, omfång ...

  • 2013-03
  • Institution of Engineering and Technology,2013
  • 8

Nummerbeteckningar

  • LIBRIS-ID:oai:researchportal.hkr.se/admin:publications/ca5fdf82-a0ce-41ab-9913-09fa56949724
  • oai:researchportal.hkr.se/admin:publications/ca5fdf82-a0ce-41ab-9913-09fa56949724URI
  • https://doi.org/10.1049/iet-ifs.2012.0080DOI

Kompletterande språkuppgifter

  • Språk:engelska
  • Sammanfattning på:engelska

Ingår i deldatabas

Klassifikation

  • Ämneskategori:ref swepub-contenttype
  • Ämneskategori:art swepub-publicationtype

Anmärkningar

  • A body sensor network (BSN) is typically a wearable wireless sensor network. Security protection is critical to BSNs, since they collect sensitive personal information. Generally speaking, security protection of BSN relies on identity (ID) and key distribution protocols. Most existing protocols are designed to run in general wireless sensor networks, and are not suitable for BSNs. After carefully examining the characteristics of BSNs, the authors propose human interactive empirical channel-based security protocols, which include an elliptic curve Diffie–Hellman version of symmetric hash commitment before knowledge protocol and an elliptic curve Diffie–Hellman version of hash commitment before knowledge protocol. Using these protocols, dynamically distributing keys and IDs become possible. As opposite to present solutions, these protocols do not need any pre-deployment of keys or secrets. Therefore compromised and expired keys or IDs can be easily changed. These protocols exploit human users as temporary trusted third parties. The authors, thus, show that the human interactive channels can help them to design secure BSNs.

Ämnesord och genrebeteckningar

Biuppslag (personer, institutioner, konferenser, titlar ...)

  • Chen, BangdaoUniversity of Oxford (författare)
  • Markham, AndrewDepartment of Computer Science, Institute for the Future of Computing/Oxford Martin School, University of Oxford,Department of Computer Science, Institute for the Future of Computing/Oxford Martin School, University of Oxford (författare)
  • Wang, QinghuaKristianstad University (författare)
  • Zheng, YanAalto University (författare)
  • Roscoe, Andrew WilliamDepartment of Computer Science, Institute for the Future of Computing/Oxford Martin School, University of Oxford,Department of Computer Science, Institute for the Future of Computing/Oxford Martin School, University of Oxford (författare)
  • Department of Computer Science, Institute for the Future of Computing/Oxford Martin School, University of OxfordUniversity of Oxford (creator_code:org_t)

Sammanhörande titlar

  • Ingår i:IET Information Security: Institution of Engineering and Technology7:1, s. 30-381751-87091751-8717

Internetlänk

Hitta via bibliotek

Till lärosätets databas

Sök utanför SwePub

Kungliga biblioteket hanterar dina personuppgifter i enlighet med EU:s dataskyddsförordning (2018), GDPR. Läs mer om hur det funkar här.
Så här hanterar KB dina uppgifter vid användning av denna tjänst.

 
pil uppåt Stäng

Kopiera och spara länken för att återkomma till aktuell vy