IJTEEE

Open Access Journal of Scientific, Technology & Engineering Research


International Journal of Technology Enhancements and Emerging Engineering Research (ISSN 2347-4289)
QUICK LINKS
CURRENT PUBLICATIONS



IJTEEE >> Volume 3 - Issue 3, March 2015 Edition



International Journal of Technology Enhancements and Emerging Engineering Research  
International Journal of Technology Enhancements and Emerging Engineering Research

Website: http://www.ijteee.org

ISSN 2347-4289



Building A Secure System For Patient Data Transmission And Bug Indication In Sensor Networks

[Full Text]

 

AUTHOR(S)

Vidhyasagar, NulynPunitha J

 

KEYWORDS

Keywords: sensor; patient; bug; wearable

 

ABSTRACT

Abstract: Wireless medical sensor networks is a key enabling technology in e-healthcare that allows the data of a patient’s vital body parameters and used in indicating the bug ’s of patient.

 

REFERENCES

[1] K.Lorincz,D.Malan,T.Fulford-Jones,A.Nawoj,A.pp.1946-1956,May2012.

[2] V.Shnayder,B.-R.Chen,K.Lorincz,T.R.F.Fulford-Jones,andM.Welsh,“Sensornetworksformedicalcare,”TechnicalReportTR-08-05,HarvardUniversity,2005.

[3] CrossbowSolutionsNewsletter.Motesformobilecommunicationandtele-medicine.2005.

[4] K.MalasriandL.Wang,“Addressingsecurityinmedicalsensornetworks,”inProc.ACMHealthNet,pp.7-12,2007.

[5] R.Rajasekaran,V.Manjula,V.Kishore,T.Sridhar,andC.Jayakumar,“AnefficientandsecurekeyagreementschemeusingClavel,V.Shnay-der,G.Mainland,S.Moulton,andM.Welsh,“Sensornetworksforemergencyresponse:challengesandopportunities,”IEEEPervasiveComputing,vol.3,no.4,pp.16-23,Oct.2004.

[6] Choi,B.Ahmed,andR.Gutierrez-Osuna,“Developmentandevaluationofanambulatorystressmonitorbasedonwearablesensors,”IEEETrans.Inf.Technol.Biomed.,vol.16,no.2,pp.279-286,Mar.2012.

[7] D.He,C.Chen,S.Chan,andJ.Bu,“DiCode:DoS-resistantanddistributedcodedisseminationinwirelesssensornetworks,”IEEETrans.WirelessCommun.,vol.11,no.5,physiologicalsignalsinbodyareanetworks,”inProc.ICACCI,pp.1143-1147,2012.

[8] H.Wang,H.Fang,L.Xing,andM.Chen,“Anintegratedbiometric-basedsecurityframeworkusingwavelet-domainHMMinwirelessbodyareanetworks(WBAN),”inProc.IEEEICC,pp.1-5,2011.

[9] K.MalasriandL.Wang,“Designandimplementationofasecurewirelessmote-basedmedicalsensornetwork,”Sensors,vol.9,no.8,pp.6273-6297,Aug.2009.

[10] S.Keoh,“Efficientgroupkeymanagementand authenticationforbodysensornetworks,”inProc.IEEEICC,pp.1-6,2011.

[11] C.C.Tan,H.Wang,S.Zhong,andQ.Li,“IBE-lite:Alightweightidentity-basedcryptographyforbodysensornetworks”IEEETrans.Inf.Technol.Biomed.,vol.13,no.6,pp.926-932,Nov.2009.

[12] X.Le,M.Khalid,R.Sankar,andS.Lee,“Anefficientmutualauthenticationandaccesscontrolschemeforwirelesssensornetworkinhealthcare,”JournalofNetworks,vol.6,no.3,355-364,2011.

[13] P.KumarandH.-J.Lee,“Securityissuesinhealthcareapplicationsusingwirelessmedicalsensornetworks:asurvey,”sensor,vol.12,pp.55-91,2012.

[14] D.He,J.Bu,S.Zhu,S.Chan,andC.Chen,“Distributedaccesscontrolwithprivacysupportinwirelesssensornetworks,”IEEETrans.WirelessCommunication.,vol.10,no.10,pp.3472-3481,Oct.2011.

[15] W.He,Y.Huang,R.Sathyam,K.Nahrstedt,andW.Lee,“SMOCK:Ascalablemethodofcryptographickeymanagementformission-criticalwirelessad-hocnetworks,”IEEETrans.InformationForensicsandSecurity,vol.4,no.1,pp.140-150,Mar.2009.

[16] S.Zhao,A.Aggarwal,R.Frost,andX.Bai,“Asurveyofapplicationsofidentity-basedcryptographyinmobilead-hocnetworks,”IEEECommun.Surveys&Tutorials,vol.14,no.2,pp.380-400,SecondQuarter2012.

[17] D.MaandG.Tsudik,“Securityandprivacyinemergingwirelessnetworks,”IEEEWirelessCommun.,vol.17,no.5,pp.12-21,Oct.2010.

[18] C.CordeiroandM.Patel,“Bodyareanetworkstandardization:presentandfuturedirections,”inProc.BodyNets’07,pp.1-2,2007.

[19] Z.Shao,“Provablysecureproxy-protectedsignatureschemesbasedonRSA,”Computers&ElectricalEngineering,vol.35,no.3,pp.497-505,May2009.

[20] Z.Shao,“Proxysignatureschemesbasedonfactoring,”InformationProcessingLetters,vol.85,no.3,pp.137-143,2003.

[21] K.C.BarrandK.Asanovi,“Energyawarelosslessdatacompression,”ACMTrans.Comput.Syst.,vol.24,no.3,pp.250-291,Aug.2006.

[22] OpenSSL,http://www.openssl.org.


[23] TinyOS:Anopen-sourceOSforthenetworkedsensorregime.http://www.tinyos.net/.

[24] Kapitanova,andS.Son,“Thepriceofsecurityinwirelesssensornetworks,”ComputerNetworks,vol.54,no.17,pp.2967-2978,Dec.2010.

[25] A.LiuandP.Ning,“TinyECC:Aconfigurablelibraryforellipticcurvecryptographyinwirelesssensornetworks,”inProc.IPSN,pp.245-256,2008.

[26] SoftwareAES,http://tinyos.cvs.sourceforge.net/viewvc/tinyos/tinyos-2.x-contrib/crypto/index.html

[27] A.Milenkovi,C.Otto,andE.Jovanov,“Wirelesssensornetworksforpersonalhealthmonitoring:Issuesandanimplementation,”ComputerCommunications,vol.29,no.13-14,pp.2521-2533,Aug.2006.