{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,27]],"date-time":"2025-10-27T16:08:58Z","timestamp":1761581338619,"version":"3.37.3"},"reference-count":34,"publisher":"SAGE Publications","issue":"8","license":[{"start":{"date-parts":[[2015,8,1]],"date-time":"2015-08-01T00:00:00Z","timestamp":1438387200000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/journals.sagepub.com\/page\/policies\/text-and-data-mining-license"}],"funder":[{"name":"Shandong Provincial Key Laboratory of Computer Network","award":["SDKL-2013-05","201303013","ZR2011FL027","ZR2012FM005","61101162","61101085","60873041","71171122","XDA06010701"],"award-info":[{"award-number":["SDKL-2013-05","201303013","ZR2011FL027","ZR2012FM005","61101162","61101085","60873041","71171122","XDA06010701"]}]},{"name":"Jinan Independent Innovation Project","award":["SDKL-2013-05","201303013","ZR2011FL027","ZR2012FM005","61101162","61101085","60873041","71171122","XDA06010701"],"award-info":[{"award-number":["SDKL-2013-05","201303013","ZR2011FL027","ZR2012FM005","61101162","61101085","60873041","71171122","XDA06010701"]}]},{"DOI":"10.13039\/501100007129","name":"Shandong Provincial Natural Science Foundation","doi-asserted-by":"crossref","award":["SDKL-2013-05","201303013","ZR2011FL027","ZR2012FM005","61101162","61101085","60873041","71171122","XDA06010701"],"award-info":[{"award-number":["SDKL-2013-05","201303013","ZR2011FL027","ZR2012FM005","61101162","61101085","60873041","71171122","XDA06010701"]}],"id":[{"id":"10.13039\/501100007129","id-type":"DOI","asserted-by":"crossref"}]},{"DOI":"10.13039\/501100007129","name":"Shandong Provincial Natural Science Foundation","doi-asserted-by":"crossref","award":["SDKL-2013-05","201303013","ZR2011FL027","ZR2012FM005","61101162","61101085","60873041","71171122","XDA06010701"],"award-info":[{"award-number":["SDKL-2013-05","201303013","ZR2011FL027","ZR2012FM005","61101162","61101085","60873041","71171122","XDA06010701"]}],"id":[{"id":"10.13039\/501100007129","id-type":"DOI","asserted-by":"crossref"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["SDKL-2013-05","201303013","ZR2011FL027","ZR2012FM005","61101162","61101085","60873041","71171122","XDA06010701"],"award-info":[{"award-number":["SDKL-2013-05","201303013","ZR2011FL027","ZR2012FM005","61101162","61101085","60873041","71171122","XDA06010701"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["SDKL-2013-05","201303013","ZR2011FL027","ZR2012FM005","61101162","61101085","60873041","71171122","XDA06010701"],"award-info":[{"award-number":["SDKL-2013-05","201303013","ZR2011FL027","ZR2012FM005","61101162","61101085","60873041","71171122","XDA06010701"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["SDKL-2013-05","201303013","ZR2011FL027","ZR2012FM005","61101162","61101085","60873041","71171122","XDA06010701"],"award-info":[{"award-number":["SDKL-2013-05","201303013","ZR2011FL027","ZR2012FM005","61101162","61101085","60873041","71171122","XDA06010701"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["SDKL-2013-05","201303013","ZR2011FL027","ZR2012FM005","61101162","61101085","60873041","71171122","XDA06010701"],"award-info":[{"award-number":["SDKL-2013-05","201303013","ZR2011FL027","ZR2012FM005","61101162","61101085","60873041","71171122","XDA06010701"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100002367","name":"Chinese Academy of Sciences","doi-asserted-by":"publisher","award":["SDKL-2013-05","201303013","ZR2011FL027","ZR2012FM005","61101162","61101085","60873041","71171122","XDA06010701"],"award-info":[{"award-number":["SDKL-2013-05","201303013","ZR2011FL027","ZR2012FM005","61101162","61101085","60873041","71171122","XDA06010701"]}],"id":[{"id":"10.13039\/501100002367","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["journals.sagepub.com"],"crossmark-restriction":true},"short-container-title":["International Journal of Distributed Sensor Networks"],"published-print":{"date-parts":[[2015,8,1]]},"abstract":"<jats:p> We present two approaches that exploit biometric data to address security problems in the body sensor networks: a new key negotiation scheme based on the fuzzy extractor technology and an improved linear interpolation encryption method. The first approach designs two attack games to give the formal definition of fuzzy negotiation that forms a new key negotiation scheme based on fuzzy extractor technology. According to the definition, we further define a concrete structure of fuzzy negotiation that can enlarge the types of biometric data used to negotiate shared keys between biosensor nodes. The second approach includes a detailed key sampling method that uses shared secrets to generate linear interpolation factors and an improved linear interpolation encryption scheme based on linear equation group. Security analyses show that these two approaches are secure and can resist attacks launched by Ultra-Wide Band (UWB) technology, which has not received due attention in the existing studies. <\/jats:p>","DOI":"10.1155\/2015\/764919","type":"journal-article","created":{"date-parts":[[2015,8,17]],"date-time":"2015-08-17T21:05:18Z","timestamp":1439845518000},"page":"764919","update-policy":"https:\/\/doi.org\/10.1177\/sage-journals-update-policy","source":"Crossref","is-referenced-by-count":8,"title":["Securing Body Sensor Networks with Biometric Methods: A New Key Negotiation Method and a Key Sampling Method for Linear Interpolation Encryption"],"prefix":"10.1177","volume":"11","author":[{"given":"Huawei","family":"Zhao","sequence":"first","affiliation":[{"name":"Department of Internet Finance, Qilu University of Technology, Jinan 250100, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5491-0542","authenticated-orcid":false,"given":"Chi","family":"Chen","sequence":"additional","affiliation":[{"name":"State Key Laboratory of Information Security, Institute of Information Engineering, Chinese Academy of Sciences, Beijing 100093, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0230-1432","authenticated-orcid":false,"given":"Jiankun","family":"Hu","sequence":"additional","affiliation":[{"name":"School of Engineering and Information Technology, University of NSW (UNSW) at the Australian Defence Force Academy (ADFA), Canberra, ACT 2600, Australia"}]},{"given":"Jing","family":"Qin","sequence":"additional","affiliation":[{"name":"School of Mathematics, Shandong University, Jinan 250100, China"}]}],"member":"179","published-online":{"date-parts":[[2015,8,17]]},"reference":[{"key":"B1-2015-764919","doi-asserted-by":"publisher","DOI":"10.12720\/jcm.8.5.307-314"},{"key":"B2-2015-764919","doi-asserted-by":"publisher","DOI":"10.1109\/JBHI.2013.2292883"},{"issue":"4","key":"B3-2015-764919","first-page":"307","volume":"1","author":"Otto C.","year":"2005","journal-title":"Journal of Mobile Multimedia"},{"key":"B4-2015-764919","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2012.133"},{"key":"B5-2015-764919","doi-asserted-by":"publisher","DOI":"10.1145\/2462096.2462123"},{"key":"B6-2015-764919","doi-asserted-by":"publisher","DOI":"10.1186\/1743-0003-2-6"},{"key":"B7-2015-764919","doi-asserted-by":"publisher","DOI":"10.1007\/1-84628-484-8"},{"key":"B8-2015-764919","doi-asserted-by":"publisher","DOI":"10.1016\/j.csi.2009.04.005"},{"key":"B9-2015-764919","doi-asserted-by":"publisher","DOI":"10.1109\/HEALTH.2007.381595"},{"key":"B11-2015-764919","doi-asserted-by":"publisher","DOI":"10.1109\/TITB.2007.906101"},{"key":"B12-2015-764919","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2009.171"},{"key":"B13-2015-764919","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2009.109"},{"key":"B14-2015-764919","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2012.170"},{"key":"B15-2015-764919","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2010.185"},{"key":"B16-2015-764919","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2010.36"},{"key":"B35-2015-764919","volume-title":"Service-Oriented Computing and Web Software Integration","author":"Chen Y.","year":"2014","edition":"4"},{"key":"B17-2015-764919","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2007.1003"},{"key":"B18-2015-764919","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-04117-4"},{"key":"B19-2015-764919","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-04117-4_7"},{"key":"B20-2015-764919","doi-asserted-by":"publisher","DOI":"10.1002\/sec.225"},{"key":"B21-2015-764919","doi-asserted-by":"publisher","DOI":"10.1145\/319709.319714"},{"key":"B22-2015-764919","doi-asserted-by":"publisher","DOI":"10.1155\/2008\/529879"},{"key":"B23-2015-764919","doi-asserted-by":"publisher","DOI":"10.1109\/ICPPW.2003.1240399"},{"key":"B24-2015-764919","doi-asserted-by":"publisher","DOI":"10.5121\/ijnsa.2011.3512"},{"key":"B25-2015-764919","doi-asserted-by":"publisher","DOI":"10.1109\/ICISIP.2006.4286096"},{"key":"B26-2015-764919","doi-asserted-by":"publisher","DOI":"10.1109\/BIOCAS.2004.1454091"},{"key":"B27-2015-764919","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2012.320"},{"key":"B28-2015-764919","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-27890-7_17"},{"key":"B29-2015-764919","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-24676-3_31"},{"first-page":"82","volume-title":"Proceedings of the 11th ACM Conference on Computer and Communications Security (CCS \u203204)","author":"Boyen X.","key":"B30-2015-764919"},{"volume-title":"Security with Noisy Data","year":"2007","author":"Dodis Y.","key":"B31-2015-764919"},{"key":"B32-2015-764919","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2009.24"},{"first-page":"68","volume-title":"Proceedings of the International Conference on Security and Cryptography (SECRYPT \u203211)","author":"Blanton M.","key":"B33-2015-764919"},{"key":"B34-2015-764919","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2012.2200290"}],"container-title":["International Journal of Distributed Sensor Networks"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/journals.sagepub.com\/doi\/pdf\/10.1155\/2015\/764919","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/journals.sagepub.com\/doi\/full-xml\/10.1155\/2015\/764919","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/journals.sagepub.com\/doi\/pdf\/10.1155\/2015\/764919","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,5,5]],"date-time":"2021-05-05T11:54:41Z","timestamp":1620215681000},"score":1,"resource":{"primary":{"URL":"http:\/\/journals.sagepub.com\/doi\/10.1155\/2015\/764919"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,8,1]]},"references-count":34,"journal-issue":{"issue":"8","published-print":{"date-parts":[[2015,8,1]]}},"alternative-id":["10.1155\/2015\/764919"],"URL":"https:\/\/doi.org\/10.1155\/2015\/764919","relation":{},"ISSN":["1550-1477","1550-1477"],"issn-type":[{"type":"print","value":"1550-1477"},{"type":"electronic","value":"1550-1477"}],"subject":[],"published":{"date-parts":[[2015,8,1]]}}}