{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,10]],"date-time":"2024-09-10T21:35:42Z","timestamp":1726004142860},"publisher-location":"Cham","reference-count":15,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030028183"},{"type":"electronic","value":"9783030028190"}],"license":[{"start":{"date-parts":[[2018,12,30]],"date-time":"2018-12-30T00:00:00Z","timestamp":1546128000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019]]},"DOI":"10.1007\/978-3-030-02819-0_17","type":"book-chapter","created":{"date-parts":[[2018,12,29]],"date-time":"2018-12-29T12:44:17Z","timestamp":1546087457000},"page":"221-233","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["An Encryption Method for BAN Using the Channel Characteristics"],"prefix":"10.1007","author":[{"given":"Liangguang","family":"Peng","sequence":"first","affiliation":[]},{"given":"Jinzhao","family":"Lin","sequence":"additional","affiliation":[]},{"given":"Tong","family":"Bai","sequence":"additional","affiliation":[]},{"given":"Yu","family":"Pang","sequence":"additional","affiliation":[]},{"given":"Guoquan","family":"Li","sequence":"additional","affiliation":[]},{"given":"Huiquan","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Xiaoming","family":"Jiang","sequence":"additional","affiliation":[]},{"given":"Junchao","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Zeljko","family":"Zilic","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,12,30]]},"reference":[{"issue":"8","key":"17_CR1","doi-asserted-by":"publisher","first-page":"2067","DOI":"10.1109\/TBME.2013.2254714","volume":"60","author":"MirHojjat Seyedi","year":"2013","unstructured":"Seyedi, M, et al.: A survey on intrabody communications for body area network applications. IEEE Trans. Bio-Med. Eng. 60(8), 2067 (2013)","journal-title":"IEEE Transactions on Biomedical Engineering"},{"key":"17_CR2","doi-asserted-by":"crossref","unstructured":"Barakah, D.M., Ammad-Uddin, M.: A survey of challenges and applications of wireless body area network (WBAN) and role of a virtual doctor server in existing architecture. In: International Conference on Intelligent Systems, pp. 214\u2013219. IEEE (2012)","DOI":"10.1109\/ISMS.2012.108"},{"issue":"2","key":"17_CR3","doi-asserted-by":"publisher","first-page":"215","DOI":"10.1049\/iet-com:20070046","volume":"2","author":"E Monton","year":"2008","unstructured":"Monton, E., et al.: Body area network for wireless patient monitoring. IET Commun. 2(2), 215\u2013222 (2008)","journal-title":"IET Commun."},{"issue":"3","key":"17_CR4","doi-asserted-by":"publisher","first-page":"1065","DOI":"10.1007\/s10916-010-9571-3","volume":"36","author":"S Ullah","year":"2012","unstructured":"Ullah, S., et al.: A comprehensive survey of wireless body area networks: on PHY, MAC, and Network layers solutions. J. Med. Syst. 36(3), 1065 (2012)","journal-title":"J. Med. Syst."},{"key":"17_CR5","doi-asserted-by":"crossref","unstructured":"Lim, S., et al.: Security issues on wireless body area network for remote healthcare monitoring. In: IEEE International Conference on Sensor Networks, Ubiquitous, and Trustworthy Computing, pp. 327\u2013332. IEEE Computer Society (2010)","DOI":"10.1109\/SUTC.2010.61"},{"key":"17_CR6","doi-asserted-by":"crossref","unstructured":"Warren, S., et al.: Interoperability and security in wireless body area network infrastructures. In: International Conference of the Engineering in Medicine & Biology Society, p. 3837 (2005)","DOI":"10.1109\/IEMBS.2005.1615297"},{"key":"17_CR7","doi-asserted-by":"crossref","unstructured":"Mainanwal, V., Gupta, M., Upadhayay, S.K.: A survey on wireless body area network: security technology and its design methodology issue. In: International Conference on Innovations in Information, Embedded and Communication Systems, pp. 1\u20135. IEEE (2015)","DOI":"10.1109\/ICIIECS.2015.7193088"},{"key":"17_CR8","unstructured":"Chan, H., Perrig, A., Song, D.: Random key predistribution schemes for sensor networks. In: Proceedings of 2003 Symposium on Security and Privacy. IEEE (2003)"},{"key":"17_CR9","first-page":"298","volume-title":"Communications in Computer and Information Science","author":"Aftab Ali","year":"2010","unstructured":"Ali, A., Khan, F.A.: An improved EKG-based key agreement scheme for body area networks. In: Proceedings of the International Conference on Information Security and Assurance, ISA 2010, DBLP, Miyazaki, Japan, June 23\u201325 2010, pp. 298\u2013308 (2010)"},{"key":"17_CR10","unstructured":"Mana, M., Feham, M., Bensaber, B.A.: SEKEBAN (Secure and efficient key exchange for wireless body area network). Int. J. Advanc. Sci. Technol.\u00a012.12 (2009)"},{"key":"17_CR11","unstructured":"Yao, L., et al.: A biometric key establishment protocol for body area networks. Int. J. Distrib. Sens. Netw. 1550\u20131329, 1063\u20131067 (2011)"},{"issue":"3","key":"17_CR12","doi-asserted-by":"publisher","first-page":"177","DOI":"10.1049\/htl.2016.0033","volume":"3","author":"Bhoopal Rao Gangadari","year":"2016","unstructured":"Gangadari, Bhoopal Rao, Ahamed, Shaik Rafi: Design of cryptographically secure AES like S-Box using second-order reversible cellular automata for wireless body area network applications. Healthcare Technol. Lett. 3(3), 177\u2013183 (2016)","journal-title":"Healthcare Technol. Lett."},{"key":"17_CR13","doi-asserted-by":"crossref","unstructured":"Al-Janabi, S., et al.: Survey of main challenges (security and privacy) in wireless body area networks for healthcare applications. Egyptian Informat. J. (2016)","DOI":"10.1016\/j.eij.2016.11.001"},{"key":"17_CR14","doi-asserted-by":"crossref","unstructured":"Sharma, K., et al.: Use of LFSR for sensor network security: a new approach. In: International Conference on Information Security and Assurance, pp. 61\u201366. IEEE Computer Society (2008)","DOI":"10.1109\/ISA.2008.115"},{"key":"17_CR15","doi-asserted-by":"crossref","unstructured":"Sharaf, M., et al.: A complex linear feedback shift register design for the A5 keystream generator. National\u00a0IEEE Xplore 395\u2013402 (2005)","DOI":"10.1109\/NRSC.2005.194024"}],"container-title":["Internet of Things","Advances in Body Area Networks I"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-02819-0_17","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,11,13]],"date-time":"2019-11-13T02:36:51Z","timestamp":1573612611000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-02819-0_17"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,12,30]]},"ISBN":["9783030028183","9783030028190"],"references-count":15,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-02819-0_17","relation":{},"ISSN":["2199-1073","2199-1081"],"issn-type":[{"type":"print","value":"2199-1073"},{"type":"electronic","value":"2199-1081"}],"subject":[],"published":{"date-parts":[[2018,12,30]]}}}