{"title":"人机应用中高效密钥管理的新体系结构","authors":"S. K. Raazi, Sungyoung Lee, Young-Koo Lee","doi":"10.1109/NCM.2009.335","DOIUrl":null,"url":null,"abstract":"In humanware applications, resource constrained sensor devices are tactically placed on human body to form Wireless Body Area Networks (WBAN). Then the WBAN is used for monitoring biometrics and movements of human body. Keeping in mind the resource constrained devices, WBANs are treated just like wireless sensor networks when considering a solution for key management. However, WBANs differ from traditional wireless sensor networks in scale, topology and security requirements. Also, the WBANs can also use random values from biometric measurements for the generation of keys. These differences render the key management schemes of WSNs inefficient and overly complex for WBANs scenario. Therefore, we propose a key management scheme that is efficient and fulfills the security requirements of WBAN.","PeriodicalId":119669,"journal":{"name":"2009 Fifth International Joint Conference on INC, IMS and IDC","volume":"20 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2009-08-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"4","resultStr":"{\"title\":\"A Novel Architecture for Efficient Key Management in Humanware Applications\",\"authors\":\"S. K. Raazi, Sungyoung Lee, Young-Koo Lee\",\"doi\":\"10.1109/NCM.2009.335\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"In humanware applications, resource constrained sensor devices are tactically placed on human body to form Wireless Body Area Networks (WBAN). Then the WBAN is used for monitoring biometrics and movements of human body. Keeping in mind the resource constrained devices, WBANs are treated just like wireless sensor networks when considering a solution for key management. However, WBANs differ from traditional wireless sensor networks in scale, topology and security requirements. Also, the WBANs can also use random values from biometric measurements for the generation of keys. These differences render the key management schemes of WSNs inefficient and overly complex for WBANs scenario. Therefore, we propose a key management scheme that is efficient and fulfills the security requirements of WBAN.\",\"PeriodicalId\":119669,\"journal\":{\"name\":\"2009 Fifth International Joint Conference on INC, IMS and IDC\",\"volume\":\"20 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2009-08-25\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"4\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2009 Fifth International Joint Conference on INC, IMS and IDC\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/NCM.2009.335\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2009 Fifth International Joint Conference on INC, IMS and IDC","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/NCM.2009.335","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
A Novel Architecture for Efficient Key Management in Humanware Applications
In humanware applications, resource constrained sensor devices are tactically placed on human body to form Wireless Body Area Networks (WBAN). Then the WBAN is used for monitoring biometrics and movements of human body. Keeping in mind the resource constrained devices, WBANs are treated just like wireless sensor networks when considering a solution for key management. However, WBANs differ from traditional wireless sensor networks in scale, topology and security requirements. Also, the WBANs can also use random values from biometric measurements for the generation of keys. These differences render the key management schemes of WSNs inefficient and overly complex for WBANs scenario. Therefore, we propose a key management scheme that is efficient and fulfills the security requirements of WBAN.