Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
body area networks
biblio
Physical Layer Security Proposal for Wireless Body Area Networks
Submitted by grigby1 on Mon, 11/08/2021 - 12:33pm
Wireless communication
WBAN
sensor security
sensors
security
Resiliency
resilience
pubcrawl
probability
Physical layer
Metrics
Jamming
Human behavior
composability
body area networks
wireless sensor networks
biblio
Using Machine Learning for Intrusion Detection System in Wireless Body Area Network
Submitted by aekwall on Wed, 08/11/2021 - 1:30pm
wireless sensor networks
security threats
machine learning
machine learning algorithms
Wireless communication
pubcrawl
Resiliency
composability
Noise measurement
Artificial Neural Networks
intrusion tolerance
body area networks
denial of service
Intrusion Detection Systems
wireless body area network
biblio
A new mutual authentication and key agreement protocol in wireless body area network
Submitted by grigby1 on Thu, 05/13/2021 - 11:10am
anonymous messaging
authentication
Biomedical monitoring
body area networks
Cryptography
key agreement
mutual authentication
Protocols
pubcrawl
resilience
Resiliency
security
WBAN
Wireless communication
wireless sensor networks
biblio
Augmented Randomness for Secure Key Agreement using Physiological Signals
Submitted by grigby1 on Tue, 03/09/2021 - 2:03pm
Scalability
Metrics
physiological signals
physiology
predecessor SKA-PS protocol
Protocols
pubcrawl
quantisation (signal)
resilience
Resiliency
medical signal processing
secure cryptographic key generation
secure key agreement
security
set reconciliation mechanism
SKA-PSAR system
telecommunication security
wearable biosensors
Wireless communication
cryptographic key generation
Augmented Randomness
BANs
Bio-cryptography
BIOS
biosensors
body area networks
Communication system security
correct key generation rate
random key generation
Cryptographic Protocols
Cryptography
false key generation rate
generated keys
highly random cryptographic keys
Human behavior
key agreement
lightweight security mechanisms
biblio
A Secure Authentication and Key Establishment Scheme for Wearable Devices
Submitted by grigby1 on Thu, 08/13/2020 - 4:21pm
resilience
wireless sensor networks
Wireless communication
Wireless body area networks
smart-home
smart-healthcare
Servers
sensors
security shortcomings
secure services
secure mutual authentication
secure authentication
Scalability
Resiliency
anonymous messages
pubcrawl
message authentication
Medical services
lightweight mutual authentication
lightweight anonymous user authentication
legitimate users
key establishment scheme
computer network security
body area networks
authorisation
authentication
anonymous messaging
biblio
Secure Device Bootstrapping Without Secrets Resistant to Signal Manipulation Attacks
Submitted by grigby1 on Wed, 10/30/2019 - 9:53am
Secret free
industrial automation sensors
key establishment
key establishment processes
man in the middle attack
medical devices
Message Integrity Protection
multiple devices
multiple legitimate devices
ON OFF Keying
out-of-band channels
pairing process
physical layer security
physical-layer group message integrity
in-band message integrity verification
secure deployment
secure device bootstrapping
secure pairing
shared secrets
signal manipulation attacks
VERSE
wireless channel
wireless devices
wireless signal annihilation
wireless signal injection
Wireless Signal Manipulation Attack
wireless signal manipulations
Security by Default
Cryptographic Protocols
Internet of Things
security of data
resilience
wireless sensor networks
pubcrawl
Resiliency
Scalability
Protocols
Wireless communication
telecommunication security
message authentication
performance evaluation
Communication system security
authentication
authorisation
wireless channels
body area networks
public key cryptography
data integrity
autonomous vehicles
man-in-the-middle attacks
advanced wireless attacks
authenticated channels
bootstrapping protocol
extensive human involvement
Group Bootstrapping
hub
biblio
Context-Aware Authorization and Anonymous Authentication in Wireless Body Area Networks
Submitted by grigby1 on Thu, 01/31/2019 - 11:21am
Scalability
Internet of Things
message authentication
mobile radio
privacy
pubcrawl
Public key
resilience
Resiliency
identity-based broadcast signcryption
telecommunication control
ubiquitous computing
ubiquitous healthcare system
WBAN
Wireless body area networks
Wireless communication
Wireless communications
context-aware access control
adaptive access control scheme
adaptive contextual privacy
anonymous authentication approach
anonymous messaging
authentication
authorisation
body area networks
ciphertext authenticity
Access Control
context-aware authorization
context-aware privacy
Cryptography
data privacy
health care
healthcare services
hybrid certificateless signcryption
biblio
Formal Modeling and Verification of a Wireless Body Area Network (WBAN) Protocol: S-TDMA Protocol
Submitted by grigby1 on Wed, 05/09/2018 - 1:47pm
time division multiple access
resilience
Resiliency
S-TDMA protocol
Scalability
scalable verification
TDMA
TDMA bus arbitration
temporal aspect modeling
real-time model checker
timed automata
WBAN
Wearable devices
wireless body area network protocol
Wireless communication
wireless sensor networks
WSN
access protocols
pubcrawl
model checking
Metrics
Medium Access Control
Media Access Protocol
MAC protocols
MAC protocol
information processing systems
implanted devices
formal verification
formal validation
Connectors
Compositionality
body sensor networks
body area networks
biblio
Cybersecurity of Wearable Devices: An Experimental Analysis and a Vulnerability Assessment Method
Submitted by grigby1 on Mon, 04/02/2018 - 11:56am
resilience
wireless sensor networks
wireless protocols
Wireless communication
wearables security
Wearable devices
vulnerability assessment method
smartphone
smart phones
security of data
security
Scalability
Resiliency
Biomedical monitoring
pubcrawl
Protocols
privacy
Internet-connected devices
Internet of Things (IoT)
Internet of Things
Human behavior
Cybersecurity
body area networks
bluetooth low energy
Bluetooth
biblio
Distributed Intrusion Detection Using Mobile Agents in Wireless Body Area Networks
Submitted by grigby1 on Mon, 04/02/2018 - 11:55am
security of data
patient monitoring
privacy
pubcrawl
real-time patient monitoring
resilience
Resiliency
Scalability
security
patient data
sensors
telecommunication security
Wearable devices
wearables security
Wireless body area networks
Wireless communication
wireless medical sensors
wireless sensor networks
Human behavior
body area networks
body sensor networks
Communication system security
Data protection
distributed intrusion detection
distributed mobile agent-based intrusion detection system
health care
healthcare systems
autonomous mobile agents
implanted medical devices
learning (artificial intelligence)
local network level anomaly detection
machine learning algorithms
medical healthcare applications
mobile agents
patient care
1
2
next ›
last »