BibTex RIS Kaynak Göster
Yıl 2016, Cilt: 6 Sayı: 2, 1123 - 1135, 01.12.2016

Öz

Kaynakça

  • P. Kumar, H. Jea Lee, “Security issues in healthcare applications using wireless medical sensor networks: a survey”, in journal of sensors, vol. 12, pp. 55-91, 2012.
  • Y. Zheng, “Digital signcryption or how to achieve cost (signature & encryption) << cost(signature) + cost(encryption),” In: Kaliski Jr. B.S. ed. Advances in Cryptology– CRYPTO’1997. LNCS1294, COMPARISON
  • Y. Zheng, “Digital signcryption or how to achieve cost (signature & encryption) << cost(signature) + cost(encryption),” In: Kaliski Jr. B.S. ed. Advances in Cryptology– CRYPTO’1997. LNCS1294,
  • Heidelberg: Springer-Verlag,1997, 179
  • F. Bao, RH. Deng, “A signcryption scheme with signature directly verifiable by public key,” In: Imai H., Zheng Y. ed. Public Key Cryptography’98, LNCS 1431,
  • Heidelberg: Springer-Verlag,1998, 59
  • A. S. S. Mateus, C. B. Margi, M. A. Simplicio, C. C. F. P. Geovandro and B. T. de Oliveira, “Implementation of data survival in unattended wireless sensor network using cryptography”, in proceeding of IEEE conference on Local Computer Networks (LCN), , USA, pp. 961-967. C. H. Lim and H. S. Hwang, “Fast implementation of elliptic curve algorithm in GF(pn), ” in public key cryptography series, lecture notes in computer science, vol. 1751, springer, , pp.405-421.
  • K.R.R.S. Muhammad, H. Lee, S. Lee, Y.K. Lee, “BARI+: A Biometric Based Distributed Key Management Approach for Wireless Body Area Networks” in journal of Sensors, vol. , pp. 3911-3933, 2010.
  • Y. M. Huang, M.Y. Hsieh, H.C. Hung, J.H. Park, “Pervasive, Secure Access to a Hierarchical Sensor- Based Healthcare Monitoring Architecture in Wireless Heterogeneous Networks,” IEEE J. Select. Areas Commun., vol. 27, pp. 411, 2009.
  • M.M. Haque, A.S.K. Pathan, C.S. Hong, “Securing u-Healthcare Sensor Networks Using Public Key Based Scheme,” In Proceedings of 10th International Conference of Advance Communication Technology, Pyeongchang, Korea, 19–22 February 2008; pp. 1108-1111.
  • J. K. Liu, J. Beak, J.Zhou, Y. Yang and J. W. Wong, “Efficient online/offline identity based signature for wireless sensor network,” International journal of security, vol. , issue. 4, pp. 287-296, 2010.
  • D. Ma and G. Tsudik “Extended abstract: Forward-secure sequential aggregate authentication,” in proceeding of IEEE symposium on security and privacy (S&P), Oakland, CA, USA, May 2007, pp. 86-91.
  • D. Ma, “Practical forward secure sequential aggregate signatures, ” in proceeding of the 3rd ACM symposium on information, computer and communications security (ASIACCS’08), ACM, NY, USA, , pp. 341-352. D. Ma and G. Tsudik, “A new approach to secure logging,” ACM transaction on storage (TOS), vol. 5, no. 1, 2009, pp. 1-21.
  • Faezeh S. Babamir, Z. Eslami, “Data Security in Unattended Wireless Sensor Networks through Signcryption”, KSII Transactions on Internet and information systems, , 9, 287-296. Faezeh S. Babamir, A. Norouzi “Achieving key privacy and invisibility for unattended wireless sensor networks in healthcare”, The Computer journal, Oxford journal, doi: 10.1093/comjnl/bxt046.
  • Heidelberg: Springer-Verlag,1997, 179
  • F. Bao, RH. Deng, “A signcryption scheme with signature directly verifiable by public key,” In: Imai H., Zheng Y. ed. Public Key Cryptography’98, LNCS 1431,
  • Heidelberg: Springer-Verlag,1998, 59
  • A. S. S. Mateus, C. B. Margi, M. A. Simplicio, C. C. F. P. Geovandro and B. T. de Oliveira, “Implementation of data survival in unattended wireless sensor network using cryptography”, in proceeding of IEEE conference on Local Computer Networks (LCN), , USA, pp. 961-967. C. H. Lim and H. S. Hwang, “Fast implementation of elliptic curve algorithm in GF(pn), ” in public key cryptography series, lecture notes in computer science, vol. 1751, springer, , pp.405-421.
  • K.R.R.S. Muhammad, H. Lee, S. Lee, Y.K. Lee, “BARI+: A Biometric Based Distributed Key Management Approach for Wireless Body Area Networks” in journal of Sensors, vol. , pp. 3911-3933, 2010.
  • Y. M. Huang, M.Y. Hsieh, H.C. Hung, J.H. Park, “Pervasive, Secure Access to a Hierarchical Sensor- Based Healthcare Monitoring Architecture in Wireless Heterogeneous Networks,” IEEE J. Select. Areas Commun., vol. 27, pp. 411, 2009.
  • M.M. Haque, A.S.K. Pathan, C.S. Hong, “Securing u-Healthcare Sensor Networks Using Public Key Based Scheme,” In Proceedings of 10th International Conference of Advance Communication Technology, Pyeongchang, Korea, 19–22 February 2008; pp. 1108-1111.
  • J. K. Liu, J. Beak, J.Zhou, Y. Yang and J. W. Wong, “Efficient online/offline identity based signature for wireless sensor network,” International journal of security, vol. , issue. 4, pp. 287-296, 2010.
  • D. Ma and G. Tsudik “Extended abstract: Forward-secure sequential aggregate authentication,” in proceeding of IEEE symposium on security and privacy (S&P), Oakland, CA, USA, May 2007, pp. 86-91.
  • D. Ma, “Practical forward secure sequential aggregate signatures, ” in proceeding of the 3rd ACM symposium on information, computer and communications security (ASIACCS’08), ACM, NY, USA, , pp. 341-352. D. Ma and G. Tsudik, “A new approach to secure logging,” ACM transaction on storage (TOS), vol. 5, no. 1, 2009, pp. 1-21.
  • Faezeh S. Babamir, Z. Eslami, “Data Security in Unattended Wireless Sensor Networks through Signcryption”, KSII Transactions on Internet and information systems, , 9, 287-296. Faezeh S. Babamir, A. Norouzi “Achieving key privacy and invisibility for unattended wireless sensor networks in healthcare”, The Computer journal, Oxford journal, doi: 10.1093/comjnl/bxt046.

Implementation of Aggregate Signcryption in Unattended Medical WSNs using Micaz

Yıl 2016, Cilt: 6 Sayı: 2, 1123 - 1135, 01.12.2016

Öz

Healthcare applications are promising fields for wireless sensor networks called wireless medical sensor networks. The main issues in wireless medical sensor networks are reliable communication, patient mobility and security of sensed physiological data. In order to mobile patient monitoring, disconnected or unattended setting of wireless medical sensor networks is considered. The disconnected property causes periodic or offline data delivery of information. Moreover, medical sensors nodes should retain data for long time while they have limited battery and capacity. These challenges provide attacker to threat security of sensed data without being detected. In this paper, we propose an efficient aggregate signcryption technique to provide simultaneously confidentiality, integrity (by encrypting) and authenticating (by signing) for collected data. Moreover, the aggregation property reduces communication and space overhead as well as signcryption provides time efficiency by applying mostly linear operators. We further, compare our technique with the nest alternative works in the literature to show the efficiency and resilience against various attacks

Kaynakça

  • P. Kumar, H. Jea Lee, “Security issues in healthcare applications using wireless medical sensor networks: a survey”, in journal of sensors, vol. 12, pp. 55-91, 2012.
  • Y. Zheng, “Digital signcryption or how to achieve cost (signature & encryption) << cost(signature) + cost(encryption),” In: Kaliski Jr. B.S. ed. Advances in Cryptology– CRYPTO’1997. LNCS1294, COMPARISON
  • Y. Zheng, “Digital signcryption or how to achieve cost (signature & encryption) << cost(signature) + cost(encryption),” In: Kaliski Jr. B.S. ed. Advances in Cryptology– CRYPTO’1997. LNCS1294,
  • Heidelberg: Springer-Verlag,1997, 179
  • F. Bao, RH. Deng, “A signcryption scheme with signature directly verifiable by public key,” In: Imai H., Zheng Y. ed. Public Key Cryptography’98, LNCS 1431,
  • Heidelberg: Springer-Verlag,1998, 59
  • A. S. S. Mateus, C. B. Margi, M. A. Simplicio, C. C. F. P. Geovandro and B. T. de Oliveira, “Implementation of data survival in unattended wireless sensor network using cryptography”, in proceeding of IEEE conference on Local Computer Networks (LCN), , USA, pp. 961-967. C. H. Lim and H. S. Hwang, “Fast implementation of elliptic curve algorithm in GF(pn), ” in public key cryptography series, lecture notes in computer science, vol. 1751, springer, , pp.405-421.
  • K.R.R.S. Muhammad, H. Lee, S. Lee, Y.K. Lee, “BARI+: A Biometric Based Distributed Key Management Approach for Wireless Body Area Networks” in journal of Sensors, vol. , pp. 3911-3933, 2010.
  • Y. M. Huang, M.Y. Hsieh, H.C. Hung, J.H. Park, “Pervasive, Secure Access to a Hierarchical Sensor- Based Healthcare Monitoring Architecture in Wireless Heterogeneous Networks,” IEEE J. Select. Areas Commun., vol. 27, pp. 411, 2009.
  • M.M. Haque, A.S.K. Pathan, C.S. Hong, “Securing u-Healthcare Sensor Networks Using Public Key Based Scheme,” In Proceedings of 10th International Conference of Advance Communication Technology, Pyeongchang, Korea, 19–22 February 2008; pp. 1108-1111.
  • J. K. Liu, J. Beak, J.Zhou, Y. Yang and J. W. Wong, “Efficient online/offline identity based signature for wireless sensor network,” International journal of security, vol. , issue. 4, pp. 287-296, 2010.
  • D. Ma and G. Tsudik “Extended abstract: Forward-secure sequential aggregate authentication,” in proceeding of IEEE symposium on security and privacy (S&P), Oakland, CA, USA, May 2007, pp. 86-91.
  • D. Ma, “Practical forward secure sequential aggregate signatures, ” in proceeding of the 3rd ACM symposium on information, computer and communications security (ASIACCS’08), ACM, NY, USA, , pp. 341-352. D. Ma and G. Tsudik, “A new approach to secure logging,” ACM transaction on storage (TOS), vol. 5, no. 1, 2009, pp. 1-21.
  • Faezeh S. Babamir, Z. Eslami, “Data Security in Unattended Wireless Sensor Networks through Signcryption”, KSII Transactions on Internet and information systems, , 9, 287-296. Faezeh S. Babamir, A. Norouzi “Achieving key privacy and invisibility for unattended wireless sensor networks in healthcare”, The Computer journal, Oxford journal, doi: 10.1093/comjnl/bxt046.
  • Heidelberg: Springer-Verlag,1997, 179
  • F. Bao, RH. Deng, “A signcryption scheme with signature directly verifiable by public key,” In: Imai H., Zheng Y. ed. Public Key Cryptography’98, LNCS 1431,
  • Heidelberg: Springer-Verlag,1998, 59
  • A. S. S. Mateus, C. B. Margi, M. A. Simplicio, C. C. F. P. Geovandro and B. T. de Oliveira, “Implementation of data survival in unattended wireless sensor network using cryptography”, in proceeding of IEEE conference on Local Computer Networks (LCN), , USA, pp. 961-967. C. H. Lim and H. S. Hwang, “Fast implementation of elliptic curve algorithm in GF(pn), ” in public key cryptography series, lecture notes in computer science, vol. 1751, springer, , pp.405-421.
  • K.R.R.S. Muhammad, H. Lee, S. Lee, Y.K. Lee, “BARI+: A Biometric Based Distributed Key Management Approach for Wireless Body Area Networks” in journal of Sensors, vol. , pp. 3911-3933, 2010.
  • Y. M. Huang, M.Y. Hsieh, H.C. Hung, J.H. Park, “Pervasive, Secure Access to a Hierarchical Sensor- Based Healthcare Monitoring Architecture in Wireless Heterogeneous Networks,” IEEE J. Select. Areas Commun., vol. 27, pp. 411, 2009.
  • M.M. Haque, A.S.K. Pathan, C.S. Hong, “Securing u-Healthcare Sensor Networks Using Public Key Based Scheme,” In Proceedings of 10th International Conference of Advance Communication Technology, Pyeongchang, Korea, 19–22 February 2008; pp. 1108-1111.
  • J. K. Liu, J. Beak, J.Zhou, Y. Yang and J. W. Wong, “Efficient online/offline identity based signature for wireless sensor network,” International journal of security, vol. , issue. 4, pp. 287-296, 2010.
  • D. Ma and G. Tsudik “Extended abstract: Forward-secure sequential aggregate authentication,” in proceeding of IEEE symposium on security and privacy (S&P), Oakland, CA, USA, May 2007, pp. 86-91.
  • D. Ma, “Practical forward secure sequential aggregate signatures, ” in proceeding of the 3rd ACM symposium on information, computer and communications security (ASIACCS’08), ACM, NY, USA, , pp. 341-352. D. Ma and G. Tsudik, “A new approach to secure logging,” ACM transaction on storage (TOS), vol. 5, no. 1, 2009, pp. 1-21.
  • Faezeh S. Babamir, Z. Eslami, “Data Security in Unattended Wireless Sensor Networks through Signcryption”, KSII Transactions on Internet and information systems, , 9, 287-296. Faezeh S. Babamir, A. Norouzi “Achieving key privacy and invisibility for unattended wireless sensor networks in healthcare”, The Computer journal, Oxford journal, doi: 10.1093/comjnl/bxt046.
Toplam 25 adet kaynakça vardır.

Ayrıntılar

Diğer ID JA22MB39PR
Bölüm Makaleler
Yazarlar

Faezeh S. Babamır Bu kişi benim

Yayımlanma Tarihi 1 Aralık 2016
Yayımlandığı Sayı Yıl 2016 Cilt: 6 Sayı: 2

Kaynak Göster

APA Babamır, F. S. (2016). Implementation of Aggregate Signcryption in Unattended Medical WSNs using Micaz. International Journal of Electronics Mechanical and Mechatronics Engineering, 6(2), 1123-1135.