References
- B. Latré, B. Braem, I. Moerman, C. Blondia and P. Demeester, “A survey on wireless body area networks,” Wireless Networks, vol. 17, no. 1, pp. 1-18, January, 2011. Article (CrossRef Link). https://doi.org/10.1007/s11276-010-0252-4
- H. Cao, V. Leung, C. Chow and H. Chan, “Enabling technologies for wireless body area networks: A survey and outlook,” IEEE Communications Magazine, vol. 47, no. 12, pp. 84-93, December, 2009. Article (CrossRef Link). https://doi.org/10.1109/MCOM.2009.5350373
- C. Otto, A. Milenkovic, C. Sanders and E. Jovanov, “System architecture of a wireless body area sensor network for ubiquitous health monitoring,” Journal of Mobile Multimedia, vol. 1, no. 4, pp. 307-326, January, 2006. Article (CrossRef Link).
- M. A. Hanson, H. C. Powell Jr, A. T. Barth, K. Ringgenberg, B. H. Calhoun, J. H. Aylor and J. Lach, “Body area sensor networks: Challenges and opportunities,” Computer, vol. 42, no. 1, pp. 58-65, January, 2009. Article (CrossRef Link). https://doi.org/10.1109/MC.2009.5
- J. Y. Khan, M .R .Yuce, G. Bulger and B. Harding, “Wireless body area network (WBAN) design techniques and performance evaluation,” Journal of Medical Systems, vol. 36, no. 3, pp. 1441-1457, October, 2012. Article (CrossRef Link). https://doi.org/10.1007/s10916-010-9605-x
- S. Lim and H. Lee, “Factors affecting medical incident care on WBAN,” KSII Transactions on Internet and Information Systems (TIIS), vol. 7, no. 5, pp. 1058-1076, May, 2013. Article (CrossRef Link). https://doi.org/10.3837/tiis.2013.05.007
- Y. O. Mohammed and U. A. Baroudi, “Partially observable Markov decision processes (POMDPS) and wireless body area networks (WBAN),” KSII Transactions on Internet and Information Systems (TIIS), vol. 7, no. 5, pp. 1036-1057, May, 2013. Article (CrossRef Link). https://doi.org/10.3837/tiis.2013.05.006
- T. Hayajneh, G. Almashaqbeh, S. Ullah and A.V. Vasilakos, “A survey of wireless technologies coexistence in WBAN: analysis and open research issues,” Wireless Networks, vol. 20 no. 8, pp. 2165-2199, May, 2014. Article (CrossRef Link). https://doi.org/10.1007/s11276-014-0736-8
- J. Liu, Q. Wang, J. Wan, J. Xiong and B. Zeng, “Towards key issues of disaster aid based on wireless body area networks,” KSII Transactions on Internet and Information Systems (TIIS), vol. 7, no. 5, pp. 1014-1035, May, 2013. Article (CrossRef Link). https://doi.org/10.3837/tiis.2013.05.005
- M. A. Ameen, J. Liu and K. Kwak, “Security and privacy issues in wireless sensor networks for healthcare applications,” Journal of medical systems, vol. 36, no. 1, pp. 93-101, February, 2012. Article (CrossRef Link). https://doi.org/10.1007/s10916-010-9449-4
- M. Li, W. Lou and K. Ren, “Data security and privacy in wireless body area networks,” Wireless Communications, IEEE, vol. 17, no. 1, pp. 51-58, February, 2010. Article (CrossRef Link). https://doi.org/10.1109/MWC.2010.5416350
- C. C. Tan , H. Wang , S. Zhong and L. Qun, "Body sensor network security: an identity-based cryptography approach," in Proc. of the 1st Conf. on Wireless network security, ACM, pp. 148-153, March 31-April 2, 2008. Article (CrossRef Link).
- X. Liu, Y. Ge, Y. Zhu and D. Wu, “A Lightweight Integrity Authentication Scheme based on Reversible Watermark for Wireless Body Area Networks,” KSII Transactions on Internet and Information Systems (TIIS), vol.8, no.12, pp. 4643-4660, December, 2014. Article (CrossRef Link). https://doi.org/10.3837/tiis.2014.12.023
- C.C.Y. Poon, Y.T. Zhang and S.D. Bao, “A novel biometrics method to secure wireless body area sensor networks for telemedicine and m-health,” IEEE Communications Magazine, vol. 44, no. 4, pp. 73-81, April, 2006. Article (CrossRef Link). https://doi.org/10.1109/MCOM.2006.1632652
- K. Zeng, K. Govindan and P. Mohapatra, “Non-cryptographic authentication and identification in wireless networks [security and privacy in emerging wireless networks],” IEEE Wireless Communications, vol. 17, no. 5, pp. 56 – 62, October, 2010. Article (CrossRef Link). https://doi.org/10.1109/MWC.2010.5601959
- L. Shi, M. Li, S. Yu and J. Yuan, “BANA: body area network authentication exploiting channel characteristics,” IEEE Journal on Selected Areas in Communications, vol. 31, no. 9, pp. 1803-1816, September, 2013.Article (CrossRef Link). https://doi.org/10.1109/JSAC.2013.130913
- L. Ma, Y. Ge and Y. Zhu, “TinyZKP: a lightweight authentication scheme based on zero-knowledge proof for wireless body area networks,” Wireless Personal Communications, vol. 77, no. 2, pp. 1077–1090, July, 2014. Article (CrossRef Link) https://doi.org/10.1007/s11277-013-1555-4
- M. Li, S. Yu, J.D. Guttman, W. Lou and K. Ren, “Secure ad hoc trust initialization and key management in wireless body area networks,” ACM Transactions on Sensor Networks, vol. 9, no. 2, pp. 18-52, March, 2013. Article (CrossRef Link). https://doi.org/10.1145/2422966.2422975
- S. Mathur, W. Trappe, N. Mandayam, C. Ye and A. Reznik, "Radio-telepathy: extracting a secret key from an unauthenticated wireless channel," in Proc. of the 14th Int. Conf. on Mobile computing and networking, ACM, pp. 128-139, September 14-19, 2008. Article (CrossRef Link).
- S. Jana, S.N. Premnath, M. Clark, S.K. Kasera, N.Patwari and S.V. Krishnamurthy, "On the effectiveness of secret key extraction from wireless signal strength in real environments," in Proc. of the 15th annual Int. Conf. on Mobile computing and networking, ACM, pp. 321-332, September 20-25, 2009. Article (CrossRef Link).
- K.K. Venkatasubramanian, A. Banerjee and S.K.S. Gupta, “PSKA: usable and secure key agreement scheme for body area networks,” IEEE Transactions on Information Technology in Biomedicine, vol. 14, no. 1, pp. 60-68, January, 2010. Article (CrossRef Link). https://doi.org/10.1109/TITB.2009.2037617
- K.K. Venkatasubramanian and S.K.S. Gupta, “Physiological value-based efficient usable security solutions for body sensor networks,” ACM Transactions on Sensor Networks, vol. 6, no. 4, pp. 31-64, July, 2010.Article (CrossRef Link). https://doi.org/10.1145/1777406.1777410
- J. Zhou, Z. Cao, X. Dong, N. Xiong and A.V. Vasilakos, “4S: A secure and privacy-preserving key management scheme for cloud-assisted wireless body area network in m-healthcare social networks,” Information Sciences, vol. 314, pp. 255-276, September, 2015. Article (CrossRef Link). https://doi.org/10.1016/j.ins.2014.09.003
- U.C. Niranjan, S.S. Iyengar, N. Kannathal and L. C. Mina, “Simultaneous storage of patient information with medical images in the frequency domain,” Computer methods and programs in Biomedicine, vol. 76, no. 1, pp. 13-19, October, 2004. Article (CrossRef Link). https://doi.org/10.1016/j.cmpb.2004.02.009
- D.C. Lou, M.C. Hu and J.L. Liu, “Multiple layer data hiding scheme for medical images,” Computer Standards & Interfaces, vol. 31 no. 2, pp. 329-335, February, 2009. Article (CrossRef Link). https://doi.org/10.1016/j.csi.2008.05.009
- M. Ulutas, G. Ulutas, V.V. Nabiyev, “Medical image security and EPR hiding using Shamir's secret sharing scheme,” Journal of Systems and Software, vol. 84, no. 3, pp.341-353, March, 2011. Article (CrossRef Link). https://doi.org/10.1016/j.jss.2010.11.928
- N.A. Memon, S.A.M. Gilani, A. Ali, "Watermarking of chest CT scan medical images for content authentication," In Int. Conf. on Information and Communication Technologies, pp. 175-180, August 15-16, 2009. Article (CrossRef Link).
- S. Rawat and B. Raman, “A blind watermarking algorithm based on fractional Fourier transform and visual cryptography,” Signal Process, vol. 92 no. 6, pp. 1480–1491, June, 2012. Article (CrossRef Link). https://doi.org/10.1016/j.sigpro.2011.12.006
- B. Surekha, G.N. Swamy and K.R.L. Reddy, "A novel copyright protection scheme based on Visual Secret Sharing," in Proc. of 3rd Int. Conf. on Computing Communication & Networking Technologies (ICCCNT), pp. 1-5, July 26-28, 2012. Article (CrossRef Link).
- T.R. Singh, K.M. Singh and S Roy, “Video watermarking scheme based on visual cryptography and scene change detection,” AEU-International Journal of Electronics and Communications, vol. 67, no. 8, pp. 645–651, August, 2013. Article (CrossRef Link). https://doi.org/10.1016/j.aeue.2013.01.008
- M. Naor and A. Shamir, "Visual cryptography," Advances in Cryptology-EUROCRYPT'94 Lecture Notes in Computer Science, vol. 950, pp. 1-12, May 23, 2006. Article (CrossRef Link).
- CrossBow, MICAZ datasheet, 2010.Available: Article (CrossRef Link).
- Sparkfun, "Pulse Sensor SEN-11574." Available: Article (CrossRef Link).