2006
DOI: 10.1109/mcom.2006.1632652
|View full text |Cite
|
Sign up to set email alerts
|

A novel biometrics method to secure wireless body area sensor networks for telemedicine and m-health

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
350
0
6

Year Published

2011
2011
2022
2022

Publication Types

Select...
5
4

Relationship

0
9

Authors

Journals

citations
Cited by 492 publications
(362 citation statements)
references
References 9 publications
0
350
0
6
Order By: Relevance
“…A novel biometrics method to secure wireless body area sensor networks for telemedicine and mhealth [39] 2006 Healthcare Information Technology "This article explores the use of this conduit in the security mechanism of BASN; that is, by a biometrics approach that uses an intrinsic characteristic of the human body as the authentication identity or the means of securing the distribution of a cipher key to secure inter-BASN communications." Mobile phone messaging telemedicine for facilitating self-management of long-term illnesses [40] 2008…”
Section: -6mentioning
confidence: 99%
“…A novel biometrics method to secure wireless body area sensor networks for telemedicine and mhealth [39] 2006 Healthcare Information Technology "This article explores the use of this conduit in the security mechanism of BASN; that is, by a biometrics approach that uses an intrinsic characteristic of the human body as the authentication identity or the means of securing the distribution of a cipher key to secure inter-BASN communications." Mobile phone messaging telemedicine for facilitating self-management of long-term illnesses [40] 2008…”
Section: -6mentioning
confidence: 99%
“…In many previous works [8][9][10][11][12], it is already evaluated that each IPI, which is obtained from healthy subjects as well as patients with cardiovascular diseases, has a high degree of entropy and it therefore can be used as a security key. However, all bits of an IPI does not have a high degree of entropy.…”
Section: Related Workmentioning
confidence: 99%
“…If the IPIs are used for key establishment scheme, it is not necessary to derive the polynomial, unlike the fuzzy-vault, and there is no need to transmit chaff points, so the amount of computation and the amount of traffic can be greatly reduced. Although various IPI-based key establishment schemes [8][9][10][11][12] have been proposed so far, the work [13] recently proposed a simple and efficient IPI-based key delivery protocol. The work [13] encodes the secret key generated by biometric sensor A using an error correction code (ECC), then A hides it in a witness, which is generated from the biometric information measured by itself, and transmits it securely to another biometric sensor B.…”
Section: Introductionmentioning
confidence: 99%
“…Therefore, designing an efficient key management scheme in medical sensor networks is a challengeable problem. Due to the need for more security in telemedicine based applications [9], we require an efficient cryptography scheme. The proposed Fuzzy based Bio-Key Management (FBKM) scheme, which would serve as a better and efficient cryptography solution for secured real-time medical data communication.…”
Section: Introductionmentioning
confidence: 99%