2017 IEEE 14th International Conference on Wearable and Implantable Body Sensor Networks (BSN) 2017
DOI: 10.1109/bsn.2017.7936042
|View full text |Cite
|
Sign up to set email alerts
|

Secure key generation using gait features for Body Sensor Networks

Abstract: Abstract-With increasing popularity of wearable and Body Sensor Networks technologies, there is a growing concern on the security and data protection of such low-power pervasive devices. With very limited computational power, BSN sensors often cannot provide the necessary data protection to collect and process sensitive personal information. Since conventional network security schemes are too computationally demanding for miniaturized BSN sensors, new methods of securing BSNs have proposed, in which Biometric … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

1
42
0

Year Published

2018
2018
2021
2021

Publication Types

Select...
3
2
2

Relationship

0
7

Authors

Journals

citations
Cited by 33 publications
(43 citation statements)
references
References 20 publications
1
42
0
Order By: Relevance
“…The protocol exploits the acceleration along the z-axis and concatenates the key sequence as gray-coded, scaled and rounded IPIs. As reported in [12] (cf. Table 2 in Section 5.1) the security and inter-class similarity depends on the speed of consecutive steps and steplength.…”
Section: Acceleration-based Pairing Of Devicessupporting
confidence: 63%
See 1 more Smart Citation
“…The protocol exploits the acceleration along the z-axis and concatenates the key sequence as gray-coded, scaled and rounded IPIs. As reported in [12] (cf. Table 2 in Section 5.1) the security and inter-class similarity depends on the speed of consecutive steps and steplength.…”
Section: Acceleration-based Pairing Of Devicessupporting
confidence: 63%
“…Careful choice of the parameters is therefore demanded to limit the advantage gained by an adversary through the use of fuzzy cryptography. From the protocols we investigated, BANDANA [11] and the IPI-protocol [12] employ BCH codes for error correction. [16] integrates the fuzzy vault design that operates on order-invariant tuples generated by Walkie-Talkie.…”
Section: Benefits and Pitfalls In Using Error Correctionmentioning
confidence: 99%
“…Recently proposed protocols for ad-hoc pairing of devices co-present on the same body [3]- [7] leverage sensor data to form characteristic sequences, called fingerprints, in each wearable device. These fingerprints can be collated with a template database to identify legitimate users or detect impostors.…”
Section: Introductionmentioning
confidence: 99%
“…The existing approaches [3]- [7] utilized the correlation of movement data to generate fingerprints. It is observed that fingerprints on devices carried or worn by the same individual are more similar than those attached to distinct users.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation