Information Technology Reference
In-Depth Information
the first challenge is represented in achieving the
correct balance between the complexity of the
security operations and the energy consumption
they incur and the second challenge is to attain the
right tradeoff between privacy and safety by utiliz-
ing the patient's vital signals and other context-
related information to minimize the amount of
patient private data released. The chapter ends by
providing a brief overview of some cryptographic
APIs in the TinyOS sensor operating system and
blueprint guidelines and patterns for designing
BSN security and privacy protocols.
Certicom. (1997, November). The Certicom ECC
challenge . Retrieved from www. certicom. com/
index.php/the-certicom-ecc-challenge
Chan, A. D. C., Hamdy, M. M., Badre, A., &
Badee, V. (2008). Wavelet distance measure for
person identification using electrocardiograms.
IEEE Transactions on Instrumentation and
Measurement , 57 (2), 248-253. doi:10.1109/
TIM.2007.909996
Cherukuri, S., Venkatasubramanian, K. K., &
Gupta, S. K. S. (2003). BioSec: A biometric based
approach for securing communication in wireless
networks of biosensors implanted in the human
body. In Proceedings of the 2003 International
Conference on Parallel Processing Workshops
(pp. 432-439).
REFERENCES
Anderson, M. P., & Woessner, W. W. (1992).
Applied groundwater modeling: Simulation of
flow and advective transport . Sand Diego, CA:
Academic Press.
Diffie, W., & Hellman, M. E. (1976). Multiuser
cryptographic techniques. In Proceedings of the
National Computer Conference and Exposition
(pp. 109-112). June 7-10, 1976.
Annas, G. J. (2003). HIPAA regulations - A new
era of medical-record privacy? The New England
Journal of Medicine , 348 (15), 1486. doi:10.1056/
NEJMlim035027
Diffie, W., Oorschot, P. C., & Wiener, M. J. (1992).
Authentication and authenticated key exchanges.
Designs, Codes and Cryptography , 2 (2), 107-125.
doi:10.1007/BF00124891
Biel, L., Pettersson, O., Philipson, L., & Wide,
P. (2002). ECG analysis: A new approach in
human identification. IEEE Transactions on In-
strumentation and Measurement , 50 (3), 808-812.
doi:10.1109/19.930458
Dimitriou, T., & Ioannis, K. (2008). Security issues
in biomedical wireless sensor networks. Applied
Sciences on Biomedical and Communication
Technologies, 2008 (ISABEL'08).
Boneh, D., & Franklin, M. (2001). Identity-based
encryption from the Weil pairing. Advances in
Cryptology—CRYPTO 2001, 213-229.
El Gamal, T. (1985). A public key cryptosystem and
a signature scheme based on discrete logarithms
(pp. 10-18). Advances in Cryptology.
Bricon-Souf, N., & Newman, C. R. (2007).
Context awareness in health care: A review.
International Journal of Medical Informatics ,
76 (1), 2-12. doi:10.1016/j.ijmedinf.2006.01.003
Esbensen, K. H., Guyot, D., Westad, F., &
Houmøller, L. P. (2002). Multivariate data analy-
sis: In practice: An introduction to multivariate
data analysis and experimental design .
Bui, F. M., & Hatzinakos, D. (2008). Biometric
methods for secure communications in body sensor
networks: Resource-efficient key management and
signal-level data scrambling. EURASIP Journal
on Advances in Signal Processing , 2008 , 1-16.
doi:10.1155/2008/529879
Garcia-Morchon, O., & Wehrle, K. (2010).
Modular context-aware access control for medi-
cal sensor networks. In Proceeding of the 15 th
ACM Symposium on Access Control Models and
Technologies (pp. 129-138).
Search WWH ::




Custom Search