{"title":"保护身体传感器网络:传感器关联和密钥管理","authors":"S. Keoh, Emil C. Lupu, M. Sloman","doi":"10.1109/PERCOM.2009.4912756","DOIUrl":null,"url":null,"abstract":"Body Sensor Networks can be used to continuously monitor patients' health. However, secure association of sensors with the patient and key management for providing integrity and confidentiality to the sensor readings are essential. We propose a secure discovery protocol based on the synchronised LED blinking pattern, to enable healthcare workers to authorise the sensor-to-patient association. We also propose a novel key distribution and management scheme that uses keychains to establish group keys for body sensor networks and caters for group key update and re-keying to adapt to membership changes. These protocols have been implemented to demonstrate their feasibility and an initial performance evaluation is presented.","PeriodicalId":322416,"journal":{"name":"2009 IEEE International Conference on Pervasive Computing and Communications","volume":"148 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2009-03-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"54","resultStr":"{\"title\":\"Securing body sensor networks: Sensor association and key management\",\"authors\":\"S. Keoh, Emil C. Lupu, M. Sloman\",\"doi\":\"10.1109/PERCOM.2009.4912756\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Body Sensor Networks can be used to continuously monitor patients' health. However, secure association of sensors with the patient and key management for providing integrity and confidentiality to the sensor readings are essential. We propose a secure discovery protocol based on the synchronised LED blinking pattern, to enable healthcare workers to authorise the sensor-to-patient association. We also propose a novel key distribution and management scheme that uses keychains to establish group keys for body sensor networks and caters for group key update and re-keying to adapt to membership changes. These protocols have been implemented to demonstrate their feasibility and an initial performance evaluation is presented.\",\"PeriodicalId\":322416,\"journal\":{\"name\":\"2009 IEEE International Conference on Pervasive Computing and Communications\",\"volume\":\"148 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2009-03-09\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"54\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2009 IEEE International Conference on Pervasive Computing and Communications\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/PERCOM.2009.4912756\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2009 IEEE International Conference on Pervasive Computing and Communications","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/PERCOM.2009.4912756","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Securing body sensor networks: Sensor association and key management
Body Sensor Networks can be used to continuously monitor patients' health. However, secure association of sensors with the patient and key management for providing integrity and confidentiality to the sensor readings are essential. We propose a secure discovery protocol based on the synchronised LED blinking pattern, to enable healthcare workers to authorise the sensor-to-patient association. We also propose a novel key distribution and management scheme that uses keychains to establish group keys for body sensor networks and caters for group key update and re-keying to adapt to membership changes. These protocols have been implemented to demonstrate their feasibility and an initial performance evaluation is presented.