Accesso libero

Security of Wireless Sensor Networks for Health Monitoring Helmets with Anomaly Detection using Power Analysis and Probabilistic Model

INFORMAZIONI SU QUESTO ARTICOLO

Cita

News, V. (2013). NFL agrees to deal in concussion lawsuit. Lanham: Federal Information & News Dispatch, Inc. Retrieved from http://search.proquest.com/docview/1428838809?accountid=14584 Search in Google Scholar

Lomberg, J. (2013, January 29). Sensor pad analyzes impacts in football helmets. Electronic Component News. Retrieved October 22, 2013, from http://www.ecnmag.com/articles/2013/01/sensor-pad-analyzes-impacts-football-helmets Search in Google Scholar

Sen, J. (2010). A survey on wireless sensor network security. arXiv preprint arXiv:1011.1529. Search in Google Scholar

Oh, S., Kumar, P.S., Kwon, H., Rai, P., Ramasamy, M., Varadan, V.K. (2013, April 9) Wireless health monitoring helmet for football players to diagnose concussion and track fatigue. Proc. SPIE 8691, Nanosensors, Biosensors, and Info-Tech Sensors and Systems, 869106 (April 9, 2013); doi:10.1117/12.2009719.10.1117/12.2009719 Search in Google Scholar

Giannetsos, T., & Dimitriou, T. (2013, April). Spy-Sense: spyware tool for executing stealthy exploits against sensor networks. Proceedings of the 2nd ACM workshop on Hot topics on wireless network security and privacy (pp. 7-12). ACM.10.1145/2463183.2463186 Search in Google Scholar

Clark, S. S., Ransford, B., Rahmati, A., Guineau, S., Sorber, J., Fu, K., Xu, W. (2013) WattsUpDoc: Power Side Channels to Nonintrusively Discover Untargeted Malware on Embedded Medical Devices. Proceedings of USENIX Workshop on Health Information Technologies. Search in Google Scholar

Wang, Y. T., & Bagrodia, R. (2012, August). ComSen: A Detection System for Identifying Compromised Nodes in Wireless Sensor Networks. In SECURWARE 2012, The Sixth International Conference on Emerging Security Information, Systems and Technologies (pp. 148-156). Search in Google Scholar

Hahnsang Kim, Joshua Smith, and Kang G. Shin. (2008). Detecting energy-greedy anomalies and mobile malware variants. In Proceedings of the 6th international conference on Mobile systems, applications, and services (MobiSys ‘08). ACM, New York, NY, USA, 239-252. DOI=10.1145/1378600.1378627 http://doi.acm.org/10.1145/1378600.137862710.1145/1378600.1378627 Search in Google Scholar

Fix, E., Hodges, J. L. (1951) Discriminatory analysis, nonparametric discrimination: Consistency properties US Air Force School of Aviation Medicine, Vol. Technical Report 4, No. 3.10.1037/e471672008-001 Search in Google Scholar

Dudani, S. A. (1976). The distance-weighted k-nearest-neighbor rule. Systems, Man and Cybernetics, IEEE Transactions on, (4), 325-327.10.1109/TSMC.1976.5408784 Search in Google Scholar

Engels, D., Fan, X., Gong, G., Hu, H., & Smith, E. M. (2010). Hummingbird: ultralightweight cryptography for resource-constrained devices. In Financial Cryptography and Data Security (pp. 3-18). Springer Berlin Heidelberg.10.1007/978-3-642-14992-4_2 Search in Google Scholar

A. Bogdanov et al. (2007). PRESENT: An Ultra-Lightweight Block Cipher. Proc. Workshop Cryptographic Hardware and Embedded Systems (CHES 07), LNCS 4727, Springer, pp. 450-466.10.1007/978-3-540-74735-2_31 Search in Google Scholar

Hu, L., & Evans, D. (2004, February). Using Directional Antennas to Prevent Wormhole Attacks. In NDSS. Search in Google Scholar

Banerjee, S., & Majumder, K. (2012). A Comparative Study on Wormhole Attack Prevention Schemes in Mobile Ad-Hoc Network. In Recent Trends in Computer Networks and Distributed Systems Security (pp. 372-384). Springer Berlin Heidelberg.10.1007/978-3-642-34135-9_37 Search in Google Scholar

Wood, A.D., & Stankovic, J.A. (2002). Denial of Service in Sensor Networks. IEEE Computer,Vol. 35, No. 10, pp. 54-62, 2002.10.1109/MC.2002.1039518 Search in Google Scholar

Lee, Y., Kim, J., Son, M., & Lee, J. H. (2007, August). Implementation of accelerometer sensor module and fall detection monitoring system based on wireless sensor network. In Engineering in Medicine and Biology Society, 2007. EMBS 2007. 29th Annual International Conference of the IEEE (pp. 2315-2318). IEEE.10.1109/IEMBS.2007.435278918002455 Search in Google Scholar

Algredo-Badillo, I., Feregrino-Uribe, C., Cumplido, R., & Morales-Sandoval, M. (2010). Efficient hardware architecture for the AES-CCM protocol of the IEEE 802.11 i standard. Computers & Electrical Engineering, 36(3), 565-577.10.1016/j.compeleceng.2009.12.011 Search in Google Scholar

Heron, S. (2009). Advanced encryption standard (AES). Network Security, 2009(12), 812. doi:10.1016/S1353-4858(10)70006-410.1016/S1353-4858(10)70006-4 Search in Google Scholar

Crisco, J. J., Wilcox, B. J., Beckwith, J. G., Chu, J. J., Duhaime, A., Rowson, S., . . . Greenwald, R. M. (2011). Head impact exposure in collegiate football players. Journal of Biomechanics, 44(15), 2673-2678. doi:10.1016/j.jbiomech.2011.08.00310.1016/j.jbiomech.2011.08.003318929621872862 Search in Google Scholar

Ibrahim S. I. Abuhaiba, & Hubboub, H. B. (2012). Swarm flooding attack against directed diffusion in wireless sensor networks. International Journal of Computer Network and Information Security, 4(12), 18-30.10.5815/ijcnis.2012.12.02 Search in Google Scholar

Casson, I. R., Pellman, E. J., & Viano, D. C. (2008). Concussion in the national football league: An overview for neurologists. Neurologic Clinics, 26(1), 217-241. doi:10.1016/j.ncl.2007.11.00510.1016/j.ncl.2007.11.00518295092 Search in Google Scholar

Shen, Yanfeng, and Victor Giurgiutiu. “Predictive modeling of nonlinear wave propagation for structural health monitoring with piezoelectric wafer active sensors.” Journal of Intelligent Material Systems and Structures 25.4 (2014): 506-52010.1177/1045389X13500572Search in Google Scholar

eISSN:
1178-5608
Lingua:
Inglese
Frequenza di pubblicazione:
Volume Open
Argomenti della rivista:
Engineering, Introductions and Overviews, other