【摘 要】
:
With the development of wireless network and electronic technologies,the wireless sensor network (WSN) has been widely used in many applications.One of the most important applications is wireless medical sensor network (WMSN),which makes modern health-car
【机 构】
:
School of Computer and Communication Engineering, Zhengzhou University of Light Industry, Zhengzhou
论文部分内容阅读
With the development of wireless network and electronic technologies,the wireless sensor network (WSN) has been widely used in many applications.One of the most important applications is wireless medical sensor network (WMSN),which makes modern health-care more popular.However,most of the sensor data transmitted in the WMSN is patient-related information.The sensor data are important and should be confidential.In addition,the attackers may also maliciously modify these sensor data.Therefore,both security and privacy are two very important issues in WMSN.A user authentication protocol and data security transmission mechanism based on bilinear pairing is proposed to protect data security and privacy.The proposed protocol enables the medical staff to monitor the health status of health care workers and provide timely and comprehensive health care information to the patient.Finally,through security and performance analysis,it can be found that the proposed authentication and key agreement protocol can resist common attacks such as impersonation attack,replay attack,online or offline password guessing attack,and stolen verifier attack.At the same time,this agreement is also in line with the performance of WMSN application environment.
其他文献
Two-party certificateless authenticated key agreement (CL-AKA) protocol is a hot topic in the field of wireless communication security.An improved two-party CL-AKA protocol with enhanced security is proposed,which is of provable security and unforgeabilit
An ensemble learning algorithm based on game theory is proposed to evaluate algorithms of image analysis and image feature extraction.A competition system is established to implement the algorithm for evaluating the applicability and efficiency of differe
To improve the evolutionary algorithm performance,especially in convergence speed and global optimization ability,a self-adaptive mechanism is designed both for the conventional genetic algorithm (CGA) and the quantum inspired genetic algorithm (QIGA).For
The indoor positioning system based on fingerprint receives more and more attention due to its high positioning accuracy and time efficiency.In the existing positioning approaches,much consideration is given to the positioning accuracy improvement by usin
The independent hypothesis between frames in vocal effect (VE) recognition makes it difficult for frame based spectral features to describe the intrinsic temporal correlation and dynamic change information in speech phenomena.A novel VE detection method b
A 12-bit 2.6 GS/s radio frequency digital to analog converter (RF DAC) based on 1 μm GaAs heterojunction bipolar transistor (HBT) process is presented.The DAC integrates a 4∶1 multiplexer to reduce the data rate of input ports,which greatly facilitates th
A system model consisting of macro and micro base stations (BS) is introduced to solve the problem of power allocation in heterogeneous dense network.In this hierarchical framework,the problem of power allocation is modeled as a stackelberg game.Based on
A novel single-cavity equilateral triangular substrate integrated waveguide (TSIW) bandpass filter (BPF) with a complementary triangular split ring resonator (CTSRR) is designed in this paper.A metallic via-hole is used to split the degenerate modes and a
Achterbahn-128 is a stream cipher proposed by Gammel et al.and submitted to the eSTREAM project.Though many attacks have been published,no recovery attack better than Naya-Plasencia\'s results with 256 bit keystream limitation.Similar approach is shown
High efficiency video coding (HEVC) uses half of the bitrate compared to H.264/advanced video coding (AVC) for encoding the same sequence with similar quality.Because of the advanced hierarchical structures of coding units (CUs),predicting units (PUs),and