[1] ZIMMERMAN T G. Personal area networks:near-field intrabody communication[J]. IBM Systems Journal, 1996, 35(3/4):609-617. [2] HE D, ZEADALLY S, KUMAR N, et al. Anonymous authentication for wireless body area networks with provable security[J]. IEEE Systems Journal,2017,11(4):2590-2601. [3] XU Z, XU C, LIANG W, et al. A lightweight mutual authentication and key agreement scheme for medical internet of things[J]. IEEE Access,2019,7:53922-53931. [4] CAO H,LEUNG V,CHOW C,et al. Enabling technologies for wireless body area networks:a survey and outlook[J]. IEEE Communications Magazine,2009,47(12):84-93. [5] AKKAYA K,YOUNIS M,YOUSSEF M. Efficient aggregation of delay-constrained data in wireless sensor networks[C]//Proceedings of the 3rd ACS/IEEE International Conference on Computer Systems and Applications. Piscataway:IEEE,2005:904-909. [6] LATRÉ B,BREAM B,MOERMAN I,et al. A survey on wireless body area network[J]. Wireless Networks,2011,17(1):1-18. [7] HOYLE R,TEMPLEMAN R,ARMES S,et al. Privacy behaviors of lifeloggers using wearable cameras[C]//Proceedings of the 2014 ACM International Joint Conference Pervasive and Ubiquitous Computing. New York:ACM,2014:571-582. [8] YAN T,LU Y,ZHANG N. Privacy disclosure from wearable devices[C]//Proceedings of the 2015 Workshop on Privacy-Aware Mobile Computing. New York:ACM,2015:13-18. [9] 彭辉, 陈红, 张晓莹, 等. 无线传感器网络位置隐私保护技术[J]. 软件学报,2015,26(3):617-639.(PENG H,CHEN H,ZHANG X Y,et al. Location Privacy preservation in wireless sensor network[J]. Journal of Software,2015,26(3):617-639.) [10] SWEENEY L. k-anonymity:a model for protecting privacy[J]. International Journal on Uncertainty,Fuzziness and Knowledgebased Systems,2002,10(5):557-570. [11] MACHANVAIJJHALA A, KIFER D, GEHRKE J, et al. ℓ-diversity:privacy beyond k-anonymity[J]. ACM Transactions on Knowledge Discovery from Data,2007,1(1):No. 3. [12] CAMARA C,PERIS-LOPEZ P,TAPIADOR J E. Security and privacy issues in implantable medical devices:a comprehensive survey[J]. Journal of Biomedical Informatics, 2015, 55:272-289. [13] DAS A K,PATHAK P H,CHUAH C N,et al. Uncovering privacy leak age in BLE network traffic of wearable fitness tracker[C]//Proceedings the 17th International Workshop on Mobile Computing Systems and Applications. New York:ACM,2016:99-104. [14] LI H,WU J,GAO Y,et al. Examining individuals' adoption of health care wearable devices:an empirical study from privacy calculus perspective[J]. International Journal of Medical Informatics,2016,88:8-17. [15] XIONG H. Cost-effective scalable and anonymous certificateless remote authentication protocol[J]. IEEE Transactions on Information Forensics and Security,2014,9(12):2327-2339. [16] ZHENG G,FANG G,SHANKARAN R,et al. Multiple ECG fiducial points based random binary sequence generation for securing wireless body area networks[J]. IEEE Journal of Biomedical and Health Informatics,2017,21(3):655-663. [17] WAZID M,DAS A K,VASILAKOS A V. Authenticated key management protocol for cloud-assisted body area sensor networks[J]. Journal of Network Computer Applications,2018,123:112-126. [18] HE D,ZEADALLY S. Authentication protocol for an ambient assisted living system[J]. IEEE Communications Magazine, 2015,53(1):71-77. [19] WU F,XU L,KUMARI S,et al. An improved and anonymous two-factor authentication protocol for health-care applications with wireless medical sensor networks[J]. Multimedia Systems,2017, 23(2):195-205. [20] IBRAHIM M H,KUMARI S,DAS A K,et al. Secure anonymous mutual authentication for star two-tier wireless body area networks[J]. Computer Methods and Programs in Biomedicine,2016, 135:37-50. [21] LI X,IBRAHIM M H,KUMARI S,et al. Anonymous mutual authentication and key agreement scheme for wearable sensors in wireless body area networks[J]. Computer Networks,2017,129(Pt 2):429-443. [22] ARFAOUI A,BEN LETAIFA A,KRIBECHE A,et al. Adaptive anonymous authentication for wearable sensors in wireless body area networks[C]//Proceedings of the 14th International Wireless Communications and Mobile Computing Conference. Piscataway:IEEE,2018:606-611. [23] LIU J, ZHANG L, SUN R. 1-RAAP:an efficient 1-round anonymous authentication protocol for wireless body area networks[J]. Sensors,2016,16(5):No. 728. [24] LI X, PENG J, KUMARI S, et al. An enhanced 1-round authentication protocol for wireless body area networks with user anonymity[J]. Computers and Electrical Engineering,2017,61:238-249. [25] AMIN R,ISLAM S H,BISWAS G P,et al. A robust and anonymous patient monitoring system using wireless medical sensor networks[J]. Future Generation Computer Systems,2018, 80:483-495. [26] SHEN J,GUI Z,JI S,et al. Cloud-aided lightweight certificateless authentication protocol with anonymity for wireless body area networks[J]. Journal of Network and Computer Applications, 2018,106:117-123. [27] FAN K,JIANG W,LI H,et al. Lightweight RFID protocol for medical privacy protection in IoT[J]. IEEE Transactions on Industrial Informatics,2018,14(4):1156-1665. [28] LIU J, ZHANG Z, CHEN X, et al. Certificateless remote anonymous authentication schemes for wireless body area networks[J]. IEEE Transactions on Parallel and Distributed Systems, 2014,25(2):332-342. [29] POLAI M,MOHANTY S,SAHOO S S. A lightweight mutual authentication protocol for wireless body area network[C]//Proceedings of the 6th International Conference on Signal Processing and Integrated Networks. Piscataway:IEEE,2019:760-765. [30] HUANG R,RHEE K H,UCHIDA S. A parallel image encryption method based on compressive sensing[J]. Multimedia Tools and Applications,2014,72(1):71-93. [31] CHEN T, ZHANG M, WU J, et al. Image encryption and compression based on Kronecker compressed sensing and elementary cellular automata scrambling[J]. Optics and Laser Technology,2016,84:118-133. [32] DAUTOV R,TSOURI G R. Securing while sampling in wireless body area networks with application to electrocardiography[J]. IEEE Journal of Biomedical and Health Informatics,2016,20(1):135-142. [33] LI L, LIU L, PENG H, et al. Flexible and secure data transmission system based on semitensor compressive sensing in wireless body area networks[J]. IEEE Internet of Things Journal, 2019,6(2):3212-3227. [34] PENG H,TIAN Y,KURTHS J,et al. Secure and energy-efficient data transmission system based on chaotic compressive sensing in body-to-body networks[J]. IEEE Transactions on Biomedical Circuits and Systems,2017,11(3):558-573. [35] TSENG K K, HE X, KUNG W M, et al. Wavelet-based watermarking and compression for ECG signals with verification evaluation[J]. Sensors,2014,14(2):3721-3736. [36] LIJI C A,INDIRADEVI K P,BADU K K A. Integer-to-integer wavelet transform based ECG steganography for securing patient confidential information[J]. Procedia Technology,2016,24:1039-1047. [37] IBAIDA A,KHALIL I. Wavelet-based ECG steganography for protecting patient confidential information in point-of-care systems[J]. IEEE Transactions on Biomedical Engineering,2013,60(12):3322-3330. [38] PATEL S S,SANKPAL S V. Secure patients data transmission using XOR ciphering encryption and ECG steganography[C]//Proceedings of the 2016 International Conference on Electrical, Electronics,and Optimization Techniques. Piscataway:IEEE, 2016:1311-1315. [39] SANKARI V,NANDHINI K. Steganography technique to secure patient confidential information using ECG signal[C]//Proceedings of the 2014 International Conference on Information Communication and Embedded Systems. Piscataway:IEEE, 2014:1-7. [40] MATTHEWS R. On the derivation of a"chaotic" encryption algorithm[J]. Cryptologia,1989,13(1):29-42. [41] MURILLO-ESCOBAR M A,CARDOZA-AVENDAÑO L,LÓPEZGUTIÉRREZ R M, et al. A double chaotic layer encryption algorithm for clinical signals in telemedicine[J]. Journal of Medical Systems,2017,41(4):No. 59. [42] PANDEY A,SINGH B,SAINI B S,et al. A novel fused coupled chaotic map based confidential data embedding-then-encryption of electrocardiogram signal[J]. Biocybernetics and Biomedical Engineering,2019,39(2):282-300. [43] SHAHZADI R,ANWAR S M,QAMAR F,et al. Chaos based enhanced RC5 algorithm for security and integrity of clinical images in remote health monitoring[J]. IEEE Access,2019,7:52858-52870. [44] YE G,JIAO K,PAN C,et al. An effective framework for chaotic image encryption based on 3D logistic map[J]. Security and Communication Networks,2018,2018:No. 8402578. [45] LIN F,SONG C,ZHUANG Y,et al. Cardiac Scan:a non-contact and continuous heart-based user authentication system[C]//Proceedings of the 23rd Annual International Conference on Mobile Computing and Networking. New York:ACM,2017:315-328. [46] ALTOP D K,LEVI A,TUZCU V. Deriving cryptographic keys from physiological signals[J]. Pervasive and Mobile Computing, 2017,39:65-79. [47] ZHANG Z, WANG H, VASILAKOS A V, et al. ECGcryptography and authentication in body area networks[J]. IEEE Transactions on Information Technology in Biomedicine,2012,16(6):1070-1078. [48] KOYA A M, DEEPTHI P P. Anonymous hybrid mutual authentication and key agreement scheme for wireless body area network[J]. Computer Networks,2018,140:138-151. [49] MARTINOVIC I,RASMUSSEN K B,ROESCHLIN M,et al. Authentication using pulse-response biometrics[J]. Communications of the ACM,2017,60(2):108-115. |