{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,21]],"date-time":"2025-05-21T05:53:36Z","timestamp":1747806816680,"version":"3.40.3"},"publisher-location":"Cham","reference-count":31,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319130651"},{"type":"electronic","value":"9783319130668"}],"license":[{"start":{"date-parts":[[2014,1,1]],"date-time":"2014-01-01T00:00:00Z","timestamp":1388534400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2014,1,1]],"date-time":"2014-01-01T00:00:00Z","timestamp":1388534400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014]]},"DOI":"10.1007\/978-3-319-13066-8_5","type":"book-chapter","created":{"date-parts":[[2014,11,14]],"date-time":"2014-11-14T23:26:21Z","timestamp":1416007581000},"page":"74-89","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":20,"title":["SeAK: Secure Authentication and Key Generation Protocol Based on Dual Antennas for Wireless Body Area Networks"],"prefix":"10.1007","author":[{"given":"Chitra","family":"Javali","sequence":"first","affiliation":[]},{"given":"Girish","family":"Revadigar","sequence":"additional","affiliation":[]},{"given":"Lavy","family":"Libman","sequence":"additional","affiliation":[]},{"given":"Sanjay","family":"Jha","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2014,11,15]]},"reference":[{"key":"5_CR1","unstructured":"AT86RF231\/ZU\/ZF datasheet. http:\/\/www.atmel.com\/images\/doc8111.pdf. Accessed 31 Jan 2014"},{"key":"5_CR2","unstructured":"Glucose monitor. http:\/\/www.medtronic.com.au\/your-health\/diabetes\/device\/continuous-glucose-monitor\/what-is-it\/index.html. Accessed 12 Feb 2014"},{"key":"5_CR3","unstructured":"InterStim iCon Patient Programmer. https:\/\/professional.medtronic.com. Accessed 18 Feb 2014"},{"key":"5_CR4","unstructured":"TG6 technical requirements document (TRD) IEEE P802.15-08-0644-09-0006. https:\/\/mentor.ieee.org\/802.15. Accessed 24 Feb 2014"},{"key":"5_CR5","doi-asserted-by":"crossref","unstructured":"Wearable medical devices market survey. http:\/\/www.prnewswire.com\/news-releases\/wearable-medical-devices-market-is-expected-to-reach-usd-58-billion-globally-in-2019-transparency-market-research-235220471.html. Accessed 18 Feb 2014","DOI":"10.1002\/rwm3.20147"},{"key":"5_CR6","unstructured":"Wearble Antennas. http:\/\/www.pharad.com\/wearable-antennas.html. Accessed 5 Feb 2014"},{"key":"5_CR7","doi-asserted-by":"crossref","unstructured":"Ali, S.T., Sivaraman, V., Ostry, D.: Zero reconciliation secret key generation for body-worn health monitoring devices. In: Proceedings of ACM Conference on Security and Privacy in Wireless and Mobile Networks (WiSec) (2012)","DOI":"10.1145\/2185448.2185455"},{"key":"5_CR8","doi-asserted-by":"crossref","unstructured":"Batchelor, J., Swaisaenyakorn, S., Miller, J.: Personal and body area network channels between dual band button antennas. In: Proceedings of Asia-Pacific Microwave Conference (APMC) (2009)","DOI":"10.1109\/APMC.2009.5385341"},{"key":"5_CR9","unstructured":"Cai, L., Zeng, K., Chen, H., Mohapatra, P.: Good neighbor: Ad hoc pairing of nearby wireless devices by multiple antennas. In: Proceedings of Network and Distributed System Security Symposium (NDSS) (2011)"},{"key":"5_CR10","doi-asserted-by":"publisher","DOI":"10.1002\/0471200611","volume-title":"Elements of Information Theory","author":"TM Cover","year":"1991","unstructured":"Cover, T.M., Thomas, J.A.: Elements of Information Theory. Wiley, New York (1991)"},{"key":"5_CR11","unstructured":"Demirbas, M., Song, Y.: An RSSI-based scheme for sybil attack detection in wireless sensor networks. In: Proceedings of International Symposium on World of Wireless, Mobile and Multimedia Networks (WoWMoM) (2006)"},{"key":"5_CR12","doi-asserted-by":"crossref","unstructured":"Gollakota, S., Hassanieh, H., Ransford, B., Katabi, D., Fu, K.: They can hear your heartbeats: non-invasive security for implantable medical devices. In: Proceedings of ACM SIGCOMM (2011)","DOI":"10.1145\/2018436.2018438"},{"key":"5_CR13","doi-asserted-by":"crossref","unstructured":"Haeberlen, A., Flannery, E., Ladd, A.M., Rudys, A., Wallach, D.S., Kavraki, L.E.: Practical robust localization over large-scale 802.11 wireless networks. In: Proceedings of ACM MobiCom (2004)","DOI":"10.1145\/1023720.1023728"},{"key":"5_CR14","doi-asserted-by":"crossref","unstructured":"Hanlen, L.W., Smith, D., Zhang, J.A., Lewis, D.: Key-sharing via channel randomness in narrowband body area networks: is everyday movement sufficient?. In: Proceedings of International Conference on Body Area Networks (BodyNets) (2009)","DOI":"10.4108\/ICST.BODYNETS2009.5941"},{"issue":"4","key":"5_CR15","doi-asserted-by":"publisher","first-page":"121","DOI":"10.1109\/LES.2011.2177065","volume":"3","author":"R Jurdak","year":"2011","unstructured":"Jurdak, R., Klues, K., Kusy, B., Richter, C., Langendoen, K., Br\u00fcnig, M.: Opal: a multi-radio platform for high throughput wireless sensor networks. IEEE Embed. Syst. Lett. 3(4), 121\u2013124 (2011)","journal-title":"IEEE Embed. Syst. Lett."},{"key":"5_CR16","doi-asserted-by":"crossref","unstructured":"Kalamandeen, A., Scannell, A., de Lara, E., Sheth, A., LaMarca, A.: Ensemble: cooperative proximity-based authentication. In: Proceedings of ACM MobiSys (2010)","DOI":"10.1145\/1814433.1814466"},{"key":"5_CR17","doi-asserted-by":"crossref","unstructured":"Khaleel, H.R., Al-Rizzo, H.M., Rucker, D.G., Elwi, T.A.: Wearable yagi microstrip antenna for telemedicine applications. In: Proceedings of IEEE Radio and Wireless Symposium (RWS) (2010)","DOI":"10.1109\/RWS.2010.5434177"},{"key":"5_CR18","doi-asserted-by":"crossref","unstructured":"Li, Q., Han, D., Gnawali, O., Sommer, P., Kusy, B.: Twonet: large-scale wireless sensor network testbed with dual-radio nodes. In: Proceedings of ACM Conference on Embedded Networked Sensor Systems (SenSys) (2013)","DOI":"10.1145\/2517351.2517440"},{"key":"5_CR19","doi-asserted-by":"crossref","unstructured":"Lim, R., Ferrari, F., Zimmerling, M., Walser, C., Sommer, P., Beutel, J.: Flocklab: a testbed for distributed, synchronized tracing and profiling of wireless embedded systems. In: Proceedings of International Conference on Information Processing in Sensor Networks (IPSN) (2013)","DOI":"10.1145\/2461381.2461402"},{"key":"5_CR20","doi-asserted-by":"crossref","unstructured":"Mathur, S., Miller, R.D., Varshavsky, A., Trappe, W., Mandayam, N.B.: ProxiMate: proximity-based secure pairing using ambient wireless signals. In: Proceedings of MobiSys (2011)","DOI":"10.1145\/1999995.2000016"},{"key":"5_CR21","doi-asserted-by":"crossref","unstructured":"Park, J.G., Curtis, D., Teller, S.J., Ledlie, J.: Implications of device diversity for organic localization. In: Proceedings of IEEE INFOCOM (2011)","DOI":"10.1109\/INFCOM.2011.5935166"},{"key":"5_CR22","volume-title":"Wireless Communications: Principles and Practice","author":"TS Rappaport","year":"2001","unstructured":"Rappaport, T.S.: Wireless Communications: Principles and Practice. Prentice Hall, Englewood Cliffs (2001)"},{"key":"5_CR23","doi-asserted-by":"crossref","unstructured":"Shi, L., Li, M., Yu, S., Yuan, J.: BANA: body area network authentication exploiting channel characteristics. In: Proceedings of ACM Conference on Security and Privacy in Wireless and Mobile Networks (WiSec) (2012)","DOI":"10.1145\/2185448.2185454"},{"key":"5_CR24","doi-asserted-by":"crossref","unstructured":"Shi, L., Yuan, J., Yu, S., Li, M.: ASK-BAN: authenticated secret key extraction utilizing channel characteristics for body area networks. In: Proceedings of ACM Conference on Security and Privacy in Wireless and Mobile Networks (WiSec) (2013)","DOI":"10.1145\/2462096.2462123"},{"key":"5_CR25","doi-asserted-by":"crossref","unstructured":"Shnayder, V., Chen, B.R., Lorincz, K., Jones, T.R.F.F., Welsh, M.: Sensor networks for medical care. In: Proceedings of International Conference on Embedded Networked Sensor Systems (SenSys) (2005)","DOI":"10.1145\/1098918.1098979"},{"key":"5_CR26","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"253","DOI":"10.1007\/978-3-540-74853-3_15","volume-title":"UbiComp 2007: Ubiquitous Computing","author":"A Varshavsky","year":"2007","unstructured":"Varshavsky, A., Scannell, A., LaMarca, A., de Lara, E.: Amigo: proximity-based authentication of mobile devices. In: Krumm, J., Abowd, G.D., Seneviratne, A., Strang, T. (eds.) UbiComp 2007. LNCS, vol. 4717, pp. 253\u2013270. Springer, Heidelberg (2007)"},{"key":"5_CR27","doi-asserted-by":"crossref","unstructured":"Wilhelm, M., Martinovic, I., Schmitt, J.B.: Secret keys from entangled sensor motes: Implementation and analysis. In: Proceedings of ACM Conference on Security and Privacy in Wireless and Mobile Networks (WiSec) (2010)","DOI":"10.1145\/1741866.1741889"},{"issue":"4","key":"5_CR28","doi-asserted-by":"publisher","first-page":"543","DOI":"10.1109\/TMC.2011.44","volume":"11","author":"K Wu","year":"2012","unstructured":"Wu, K., Tan, H., Ngan, H., Liu, Y., Ni, L.M.: Chip error pattern analysis in IEEE 802.15.4. IEEE Trans. Mob. Comput. 11(4), 543\u2013552 (2012)","journal-title":"IEEE Trans. Mob. Comput."},{"key":"5_CR29","doi-asserted-by":"crossref","unstructured":"Xiao, L., Greenstein, L.J., Mandayam, N.B., Trappe, W.: Fingerprints in the ether: using the physical layer for wireless authentication. In: Proceedings of IEEE ICC (2007)","DOI":"10.1109\/ICC.2007.767"},{"key":"5_CR30","doi-asserted-by":"crossref","unstructured":"Zeng, K., Wu, D., Chan, A., Mohapatra, P.: Exploiting multiple-antenna diversity for shared secret key generation in wireless networks. In: Proceedings of IEEE INFOCOM (2010)","DOI":"10.1109\/INFCOM.2010.5462004"},{"key":"5_CR31","doi-asserted-by":"crossref","unstructured":"Zhou, G., He, T., Krishnamurthy, S., Stankovic, J.A.: Impact of radio irregularity on wireless sensor networks. In: Proceedings of ACM MobiSys (2004)","DOI":"10.1145\/990064.990081"}],"container-title":["Lecture Notes in Computer Science","Radio Frequency Identification: Security and Privacy Issues"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-13066-8_5","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,2,1]],"date-time":"2023-02-01T12:20:37Z","timestamp":1675254037000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-319-13066-8_5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014]]},"ISBN":["9783319130651","9783319130668"],"references-count":31,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-13066-8_5","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2014]]},"assertion":[{"value":"15 November 2014","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}