{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,7]],"date-time":"2025-11-07T08:56:46Z","timestamp":1762505806663,"version":"3.37.3"},"reference-count":44,"publisher":"SAGE Publications","issue":"1","license":[{"start":{"date-parts":[[2011,1,1]],"date-time":"2011-01-01T00:00:00Z","timestamp":1293840000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/journals.sagepub.com\/page\/policies\/text-and-data-mining-license"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["60703101","60903153"],"award-info":[{"award-number":["60703101","60903153"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["60703101","60903153"],"award-info":[{"award-number":["60703101","60903153"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100012226","name":"Fundamental Research Funds for the Central Universities","doi-asserted-by":"crossref","award":["60703101","60903153"],"award-info":[{"award-number":["60703101","60903153"]}],"id":[{"id":"10.13039\/501100012226","id-type":"DOI","asserted-by":"crossref"}]}],"content-domain":{"domain":["journals.sagepub.com"],"crossmark-restriction":true},"short-container-title":["International Journal of Distributed Sensor Networks"],"published-print":{"date-parts":[[2011,1,1]]},"abstract":"<jats:p> Current advances in semiconductor technology have made it possible to implant a network of biosensors inside the human body for health monitoring. In the context of a body area network (BAN), the confidentiality and integrity of the sensitive health information is particularly important. In this paper, we present an ECG (electrocardiogram)-signal-based key establishment protocol to secure the communication between every sensor and the control unit before the physiological data are transferred to external networks for remote analysis or diagnosis. The uniqueness of ECG signal guarantees that our protocol can provide long, random, distinctive and temporal variant keys. Biometric Encryption technique is applied to achieve the mutual authentication and derive a non-linkable session key between every sensor and the control unit. The correctness of the proposed key establishment protocol is formally verified based on SVO logic. Security analysis shows that our protocol can guarantee data confidentiality, authenticity and integrity. Performance analysis shows that it is a lightweight protocol. <\/jats:p>","DOI":"10.1155\/2011\/282986","type":"journal-article","created":{"date-parts":[[2011,8,14]],"date-time":"2011-08-14T19:00:24Z","timestamp":1313348424000},"page":"282986","update-policy":"https:\/\/doi.org\/10.1177\/sage-journals-update-policy","source":"Crossref","is-referenced-by-count":19,"title":["A Biometric Key Establishment Protocol for Body Area Networks"],"prefix":"10.1177","volume":"7","author":[{"given":"Lin","family":"Yao","sequence":"first","affiliation":[{"name":"School of Software, Dalian University of Technology, Dalian 116023, China"}]},{"given":"Bing","family":"Liu","sequence":"additional","affiliation":[{"name":"School of Software, Dalian University of Technology, Dalian 116023, China"}]},{"given":"Guowei","family":"Wu","sequence":"additional","affiliation":[{"name":"School of Software, Dalian University of Technology, Dalian 116023, China"}]},{"given":"Kai","family":"Yao","sequence":"additional","affiliation":[{"name":"Library Information Center, Shenyang University of Technology, Shenyang 110178, China"}]},{"given":"Jia","family":"Wang","sequence":"additional","affiliation":[{"name":"School of Software, Dalian University of Technology, Dalian 116023, China"}]}],"member":"179","published-online":{"date-parts":[[2011,8,14]]},"reference":[{"key":"B1-2011-282986","doi-asserted-by":"publisher","DOI":"10.1186\/1743-0003-2-6"},{"key":"B2-2011-282986","doi-asserted-by":"publisher","DOI":"10.1109\/MPRV.2008.16"},{"key":"B3-2011-282986","doi-asserted-by":"publisher","DOI":"10.1109\/MPRV.2004.18"},{"key":"B4-2011-282986","doi-asserted-by":"publisher","DOI":"10.1109\/ISABEL.2009.5373688"},{"key":"B5-2011-282986","doi-asserted-by":"publisher","DOI":"10.1109\/SUTC.2010.61"},{"key":"B6-2011-282986","doi-asserted-by":"publisher","DOI":"10.1109\/TITB.2009.2037617"},{"key":"B7-2011-282986","doi-asserted-by":"publisher","DOI":"10.1109\/ICDSP.2009.5201080"},{"key":"B8-2011-282986","doi-asserted-by":"publisher","DOI":"10.1007\/11527923_114"},{"key":"B9-2011-282986","doi-asserted-by":"publisher","DOI":"10.1007\/s11767-008-0089-5"},{"first-page":"233","volume-title":"Proceedings of the Symposia and Workshops on Ubiquitous, Autonomic and Trusted Computing","author":"Yao L.","key":"B10-2011-282986"},{"journal-title":"European Patent Application","year":"2007","author":"Amer M. M. M. B.","key":"B12-2011-282986"},{"volume-title":"Proceedings of the EEE'05 Workshop: Mobility, Agents, and Mobile Services (MAM)","author":"Jih W. R.","key":"B13-2011-282986"},{"volume-title":"Proceedings of the Euro mGov 2005","author":"Adam K.","key":"B14-2011-282986"},{"volume-title":"Proceedings of the Communication Networks and Distributed Systems Modeling and Simulation Conference, (CNDS '04)","series-title":"Western MultiConference (WMC)","author":"Zhang G.","key":"B15-2011-282986"},{"key":"B16-2011-282986","doi-asserted-by":"publisher","DOI":"10.1145\/1248054.1248059"},{"key":"B17-2011-282986","doi-asserted-by":"publisher","DOI":"10.1109\/MIS.2006.118"},{"issue":"3","key":"B18-2011-282986","first-page":"203","volume":"3","author":"Haque M.","year":"2006","journal-title":"International Journal of Network Security"},{"key":"B19-2011-282986","first-page":"3309","volume-title":"Proceedings of the 26th Annual International Conference of the IEEE Engineering in Medicine and Biology Society, (EMBC '04)","volume":"2","author":"Shin S. C."},{"volume-title":"Proceedings of the 3rd IASTED International Conference on Advances in Computer Science and Technology, (ACST '07)","author":"Bose R.","key":"B20-2011-282986"},{"first-page":"119","volume-title":"Proceedings of the 19th Annual Computer Security Applications Conference, (ACSAC '03)","author":"Lim S.","key":"B21-2011-282986"},{"issue":"2","key":"B22-2011-282986","first-page":"61","volume":"12","author":"Mana M.","year":"2011","journal-title":"International Journal of Network Security"},{"first-page":"162","volume-title":"Proceedings of the 2nd International Conference on Embedded Networked Sensor Systems, (SenSys '04)","author":"Karlof C.","key":"B23-2011-282986"},{"key":"B24-2011-282986","doi-asserted-by":"publisher","DOI":"10.1109\/ICTTA.2008.4530273"},{"first-page":"305","volume-title":"Proceedings of the 5th European Conference on Wireless Sensor Networks","author":"Szczechowiak P.","key":"B25-2011-282986"},{"first-page":"141","volume-title":"Proceedings of the International Workshop on Wireless Sensor Networks and Applications, (WSNA '03)","author":"Huang Q.","key":"B26-2011-282986"},{"volume-title":"Proceedings of the First Annual IEEE Communications Society Conference on Sensor and Ad Hoc Communications and Networks, (SECON '04)","author":"Malan D. J.","key":"B27-2011-282986"},{"volume-title":"Fundamentals of Mobile and Pervasive Computing","year":"2005","author":"Adelstein F.","key":"B28-2011-282986"},{"key":"B29-2011-282986","first-page":"500","volume-title":"Proceedings of the 10th ACM Conference on Computer and Communications Security, (CCS '03)","volume":"2","author":"Zhu S."},{"first-page":"432","volume-title":"Proceedings of the International Conference on Parallel Processing Workshops","author":"Cherukuri S.","key":"B31-2011-282986"},{"key":"B30-2011-282986","doi-asserted-by":"publisher","DOI":"10.3390\/s100403911"},{"key":"B32-2011-282986","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2006.1632652"},{"key":"B33-2011-282986","doi-asserted-by":"publisher","DOI":"10.1109\/TITB.2008.926434"},{"key":"B34-2011-282986","doi-asserted-by":"publisher","DOI":"10.1155\/2008\/529879"},{"key":"B35-2011-282986","doi-asserted-by":"publisher","DOI":"10.1109\/ACSSC.2008.5074642"},{"key":"B36-2011-282986","doi-asserted-by":"crossref","first-page":"310","DOI":"10.1007\/11527923_32","volume-title":"Proceedings of the Audio- and Video-Based Biometric Person Authentication (AVBPA '05)","volume":"3546","author":"Uludag U."},{"key":"B37-2011-282986","doi-asserted-by":"publisher","DOI":"10.1109\/AMS.2008.112"},{"key":"B38-2011-282986","first-page":"237","volume-title":"Proceedings of the International Symposium on Information Theory","volume":"38","author":"Juels A."},{"key":"B39-2011-282986","doi-asserted-by":"publisher","DOI":"10.1155\/2008\/579416"},{"key":"B40-2011-282986","doi-asserted-by":"publisher","DOI":"10.1016\/j.camwa.2010.01.010"},{"key":"B41-2011-282986","doi-asserted-by":"publisher","DOI":"10.1016\/j.patcog.2004.04.011"},{"key":"B42-2011-282986","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2002.806125"},{"key":"B43-2011-282986","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-45608-2_2"},{"key":"B44-2011-282986","first-page":"673","volume":"27","author":"Laguna P.","year":"1997","journal-title":"Computers in Cardiology"},{"key":"B45-2011-282986","doi-asserted-by":"publisher","DOI":"10.1161\/01.CIR.101.23.e215"}],"container-title":["International Journal of Distributed Sensor Networks"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/downloads.hindawi.com\/journals\/ijdsn\/2011\/282986.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/journals.sagepub.com\/doi\/full-xml\/10.1155\/2011\/282986","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/journals.sagepub.com\/doi\/full\/10.1155\/2011\/282986","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,5,28]],"date-time":"2021-05-28T14:48:20Z","timestamp":1622213300000},"score":1,"resource":{"primary":{"URL":"http:\/\/journals.sagepub.com\/doi\/10.1155\/2011\/282986"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011,1,1]]},"references-count":44,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2011,1,1]]}},"alternative-id":["10.1155\/2011\/282986"],"URL":"https:\/\/doi.org\/10.1155\/2011\/282986","relation":{},"ISSN":["1550-1477","1550-1477"],"issn-type":[{"type":"print","value":"1550-1477"},{"type":"electronic","value":"1550-1477"}],"subject":[],"published":{"date-parts":[[2011,1,1]]}}}