{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T20:28:07Z","timestamp":1743020887683,"version":"3.40.3"},"publisher-location":"Cham","reference-count":23,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030298968"},{"type":"electronic","value":"9783030298975"}],"license":[{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020]]},"DOI":"10.1007\/978-3-030-29897-5_8","type":"book-chapter","created":{"date-parts":[[2020,3,3]],"date-time":"2020-03-03T05:03:13Z","timestamp":1583211793000},"page":"89-102","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Security in Body Networks: Watermark-Based Communications on Air-Gap Acoustic Channel"],"prefix":"10.1007","author":[{"given":"Simone","family":"Soderi","sequence":"first","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,3,4]]},"reference":[{"key":"8_CR1","volume-title":"Security Engineering - A Guide to Building Dependable Distributed Systems","author":"RJ Anderson","year":"2008","unstructured":"Anderson, R.J.: Security Engineering - A Guide to Building Dependable Distributed Systems, 2nd edn. Wiley, New York (2008)","edition":"2"},{"key":"8_CR2","doi-asserted-by":"publisher","DOI":"10.3390\/technologies5030043","volume-title":"Communication challenges in on-body and body-to-body wearable wireless networks \u2014 a connectivity perspective 5 (7","author":"DB Arbia","year":"2017","unstructured":"Arbia, D.B., Alam, M.M., Moullec, Y.L., Hamida, E.B.: Communication challenges in on-body and body-to-body wearable wireless networks \u2014 a connectivity perspective 5 (7 2017). \nhttps:\/\/doi.org\/10.3390\/technologies5030043"},{"issue":"12","key":"8_CR3","doi-asserted-by":"publisher","first-page":"1673","DOI":"10.1109\/83.650120","volume":"6","author":"IJ Cox","year":"1997","unstructured":"Cox, I.J., Kilian, J., Leighton, F., Shamoon, T.: Secure spread spectrum watermarking for multimedia. IEEE Trans. Image Process. 6(12), 1673\u20131687 (1997). \nhttps:\/\/doi.org\/10.1109\/83.650120","journal-title":"IEEE Trans. Image Process."},{"key":"8_CR4","unstructured":"Deshotels, L.: Inaudible sound as a covert channel in mobile devices. In: 8th USENIX Workshop on Offensive Technologies (WOOT 14). USENIX Association, San Diego (2014). \nhttps:\/\/www.usenix.org\/conference\/woot14\/workshop-program\/presentation\/deshotels"},{"key":"8_CR5","unstructured":"Guri, M., Solewicz, Y.A., Daidakulov, A., Elovici, Y.: MOSQUITO: covert ultrasonic transmissions between two air-gapped computers using speaker-to-speaker communication. CoRR abs\/1803.03422 (2018). \nhttp:\/\/arxiv.org\/abs\/1803.03422"},{"key":"8_CR6","doi-asserted-by":"publisher","first-page":"63","DOI":"10.1007\/s10776-017-0348-1","volume":"24","author":"M H\u00e4m\u00e4l\u00e4inen","year":"2017","unstructured":"H\u00e4m\u00e4l\u00e4inen, M., Li, X.: Recent advances in body area network technology and applications. Int. J. Wirel. Inf. Netw. 24, 63\u201364 (2017)","journal-title":"Int. J. Wirel. Inf. Netw."},{"key":"8_CR7","unstructured":"Hanspach, M., Goetz, M.: On covert acoustical mesh networks in air. CoRR abs\/1406.1213 (2014). \nhttp:\/\/arxiv.org\/abs\/1406.1213"},{"issue":"5","key":"8_CR8","doi-asserted-by":"publisher","first-page":"41","DOI":"10.1109\/MSP.2013.2265141","volume":"30","author":"W Harrison","year":"2013","unstructured":"Harrison, W., Almeida, J., Bloch, M., McLaughlin, S., Barros, J.: Coding for secrecy: an overview of error-control coding techniques for physical-layer security. IEEE Signal Process. Mag. 30(5), 41\u201350 (2013). \nhttps:\/\/doi.org\/10.1109\/MSP.2013.2265141","journal-title":"IEEE Signal Process. Mag."},{"key":"8_CR9","volume-title":"SqueakyChat: ultrasonic communication using commercial notebook computers","author":"Z Harvest","year":"2014","unstructured":"Harvest, Z., Bonnie, E.: SqueakyChat: ultrasonic communication using commercial notebook computers (2014). \nhttps:\/\/github.com\/bonniee\/ultrasonic\/blob\/master\/SqueakyChat.pdf"},{"key":"8_CR10","doi-asserted-by":"publisher","unstructured":"IEEE Standard for Local and metropolitan area networks - Part 15.6: Wireless Body Area Networks (Feb 2012). \nhttps:\/\/doi.org\/10.1109\/IEEESTD.2012.6161600","DOI":"10.1109\/IEEESTD.2012.6161600"},{"key":"8_CR11","doi-asserted-by":"publisher","unstructured":"Iinatti, J., Latva-aho, M.: A modified CLPDI for code acquisition in multipath channel. In: 12th IEEE International Symposium on Personal, Indoor and Mobile Radio Communications. PIMRC 2001. Proceedings (Cat. No.01TH8598), vol. 2, pp. F\u20136\u2013F\u201310 vol.2 (Sep 2001). \nhttps:\/\/doi.org\/10.1109\/PIMRC.2001.965284","DOI":"10.1109\/PIMRC.2001.965284"},{"key":"8_CR12","volume-title":"National Defense University Press for Technology","author":"F Kramer","year":"2009","unstructured":"Kramer, F., Starr, S., Wentz, L., National Defense University Press for Technology, National Security Policy: Cyberpower and National Security. Potomac Books, Washington (2009)"},{"issue":"10","key":"8_CR13","doi-asserted-by":"publisher","first-page":"613","DOI":"10.1145\/362375.362389","volume":"16","author":"BW Lampson","year":"1973","unstructured":"Lampson, B.W.: A note on the confinement problem. Commun. ACM 16(10), 613\u2013615 (1973). \nhttp:\/\/doi.acm.org\/10.1145\/362375.362389","journal-title":"Commun. ACM"},{"issue":"1","key":"8_CR14","doi-asserted-by":"publisher","first-page":"51","DOI":"10.1109\/MWC.2010.5416350","volume":"17","author":"M Li","year":"2010","unstructured":"Li, M., Lou, W., Ren, K.: Data security and privacy in wireless body area networks. Wirel. Commun. 17(1), 51\u201358 (2010). \nhttps:\/\/doi.org\/10.1109\/MWC.2010.5416350","journal-title":"Wirel. Commun."},{"issue":"4","key":"8_CR15","doi-asserted-by":"publisher","first-page":"898","DOI":"10.1109\/TSP.2003.809385","volume":"51","author":"H Malvar","year":"2003","unstructured":"Malvar, H., Florencio, D.: Improved spread spectrum: a new modulation technique for robust watermarking. IEEE Transactions on Signal Processing 51(4), 898\u2013905 (2003). \nhttps:\/\/doi.org\/10.1109\/TSP.2003.809385","journal-title":"IEEE Transactions on Signal Processing"},{"issue":"4","key":"8_CR16","first-page":"307","volume":"1","author":"C Otto","year":"2005","unstructured":"Otto, C., Milenkovi\u0107, A., Sanders, C., Jovanov, E.: System architecture of a wireless body area sensor network for ubiquitous health monitoring. J. Mob. Multimed. 1(4), 307\u2013326 (2005). \nhttp:\/\/dl.acm.org\/citation.cfm?id=2010498.2010502","journal-title":"J. Mob. Multimed."},{"key":"8_CR17","doi-asserted-by":"publisher","first-page":"243","DOI":"10.1109\/HealthCom.2013.6720675","volume":"2013","author":"J Partala","year":"2013","unstructured":"Partala, J., Ker\u00e4nen, N., S\u00e4rest\u00f6niemi, M., H\u00e4m\u00e4l\u00e4inen, M., Iinatti, J., J\u00e4ms\u00e4, T., Reponen, J., Sepp\u00e4nen, T.: Security threats against the transmission chain of a medical health monitoring system. In: 2013 IEEE 15th International Conference on e-Health Networking, Applications Services (Healthcom), October 2013, pp. 243\u2013248 (2013). \nhttps:\/\/doi.org\/10.1109\/HealthCom.2013.6720675","journal-title":"October"},{"key":"8_CR18","doi-asserted-by":"publisher","DOI":"10.5061\/dryad.24275c6","volume-title":"Data from: health it, hacking, and cybersecurity: national trends in data breaches of protected health information","author":"J Ronquillo","year":"2018","unstructured":"Ronquillo, J., Winterholler, J., Cwikla, K., Szymanski, R., Levy, C.: Data from: health it, hacking, and cybersecurity: national trends in data breaches of protected health information (2018). \nhttps:\/\/doi.org\/10.5061\/dryad.24275c6"},{"issue":"1","key":"8_CR19","doi-asserted-by":"publisher","first-page":"10","DOI":"10.1109\/JRPROC.1949.232969","volume":"37","author":"CE Shannon","year":"1949","unstructured":"Shannon, C.E.: Communication in the presence of noise. Proc. IRE 37(1), 10\u201321 (1949). \nhttps:\/\/doi.org\/10.1109\/JRPROC.1949.232969","journal-title":"Proc. IRE"},{"issue":"4","key":"8_CR20","doi-asserted-by":"publisher","first-page":"656","DOI":"10.1002\/j.1538-7305.1949.tb00928.x","volume":"28","author":"C Shannon","year":"1949","unstructured":"Shannon, C.: Communication theory of secrecy systems. Bell Syst. Tech. J. 28(4), 656\u2013715 (1949). \nhttps:\/\/doi.org\/10.1002\/j.1538-7305.1949.tb00928.x","journal-title":"Bell Syst. Tech. J."},{"key":"8_CR21","unstructured":"Smart body area networks (SmartBAN); system description. Tech. Rep. ETSI TR 103 394 V1.1.1, European Telecommunication Standard Institute (ETSI) (1 2018). \nhttp:\/\/www.etsi.org\/deliver\/etsi_tr\/103300_103399\/103394\/01.01.01_60\/tr_103394v010101p.pdf"},{"key":"8_CR22","unstructured":"Soderi, S., Iinatti, J., H\u00e4m\u00e4l\u00e4inen, M.: CLPDI algorithm in UWB synchronization. In: Proceedings of the 2003 International Workshop on UWB Systems, pp. 759\u2013763 (2003)"},{"key":"8_CR23","unstructured":"Soderi, S., Mucchi, L., H\u00e4m\u00e4l\u00e4inen, M., Piva, A., Iinatti, J.H.: Physical layer security based on spread-spectrum watermarking and jamming receiver. Trans. Emerg. Telecommun. Technol. 28(7) (2017). \nhttp:\/\/dblp.uni-trier.de\/db\/journals\/ett\/ett28.html#SoderiMHPI17"}],"container-title":["EAI\/Springer Innovations in Communication and Computing","13th EAI International Conference on Body Area Networks"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-29897-5_8","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,3,3]],"date-time":"2020-03-03T16:15:55Z","timestamp":1583252155000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-29897-5_8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020]]},"ISBN":["9783030298968","9783030298975"],"references-count":23,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-29897-5_8","relation":{},"ISSN":["2522-8595","2522-8609"],"issn-type":[{"type":"print","value":"2522-8595"},{"type":"electronic","value":"2522-8609"}],"subject":[],"published":{"date-parts":[[2020]]},"assertion":[{"value":"4 March 2020","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"BODYNETS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"EAI International Conference on Body Area Networks","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Oulu","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Finland","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2018","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2 October 2018","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"3 October 2018","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"13","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"bodynets2018","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/bodynets.org\/2018","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}