2009
DOI: 10.1109/titb.2009.2033055
|View full text |Cite
|
Sign up to set email alerts
|

IBE-Lite: A Lightweight Identity-Based Cryptography for Body Sensor Networks

Abstract: Abstract-A body sensor network (BSN) is a network of sensors deployed on a person's body for health care monitoring. Since the sensors collect personal medical data, security and privacy are important components in a BSN. In this paper, we developed IBELite, a lightweight identity-based encryption suitable for sensors in a BSN. We present protocols based on IBE-Lite that balance security and privacy with accessibility and perform evaluation using experiments conducted on commercially available sensors.Index Te… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
83
0

Year Published

2013
2013
2022
2022

Publication Types

Select...
6
3

Relationship

0
9

Authors

Journals

citations
Cited by 130 publications
(85 citation statements)
references
References 12 publications
0
83
0
Order By: Relevance
“…Finally, the PHS constructs msg B 3 as shown in Eq. (10). This message is encrypted with the session key K s to protect it from being intercepted.…”
Section: B2mentioning
confidence: 99%
See 1 more Smart Citation
“…Finally, the PHS constructs msg B 3 as shown in Eq. (10). This message is encrypted with the session key K s to protect it from being intercepted.…”
Section: B2mentioning
confidence: 99%
“…The unique aspect of this study was the generation of a random key from physiological data instead of from a pseudo-random generator. IBE-Lite, developed by [10], is lightweight identity-based encryption suitable for sensors with limited computation capability.…”
Section: Literature Surveymentioning
confidence: 99%
“…The authors in [22] proposed a security mechanism for WBANs. They reviewed IBE-Lite [23] technique and addressed its limitations such as exposure of master key, partial heath records decryption problem International Journal of Distributed Sensor Networks 3 after rekeying, and lack of adequate privacy provisioning. To overcome these limitations, the authors proposed a scheme that introduced anonymity and unlinkability and offered authorized access of patients' health information.…”
Section: Related Workmentioning
confidence: 99%
“…Generally, the public keys are generated from identity strings and only the CA or PKG (private key generator) can create the private keys to decrypt the data. When the sensor node wants to share data with others, it doesn't have to store many public keys [22]. However, when somebody wants to share data with many friends, he has to encrypt the same data for many copies with different public keys.…”
Section:  Identity Based Encryptionmentioning
confidence: 99%