Ubiquity of wearable and implantable devices sparks a new set of mobile computing applications that leverage the prolific information of sensors. For many of these applications, to ensure the security of communication between legitimate devices is a crucial problem. In this paper, we design Walkie-Talkie, a shared secret key generation scheme that allows two legitimate devices to establish a common cryptographic key by exploiting users' walking characteristics (gait). The intuition is that the sensors on different locations of the same body experience similar accelerometer signal when the user is walking. However, the accelerometer also captures motion signal produced by other body parts (e.g., swinging arms). We address this issue by emplo...
Security in Wireless Body Area Networks (WBAN) is of major concern as the miniature personal health-...
Body-worn sensor networks are important for rescue-workers, medical and many other applications. Sen...
Abstract—In this paper, we investigate the feasibility of real-time derivation of cryptographic keys...
Recent years have witnessed a remarkable growth in the number of smart wearable devices. For many of...
The increased usage of smart wearables in various applications, specifically in health-care, emphasi...
The increased usage of smart wearables in various applications, specifically in health-care, emphasi...
The last decade has witnessed a rapid surge in application of body sensor net-works, especially in t...
Smart wearable devices have enormous applications in today's world and hence their usage is increasi...
Abstract—Medical data collected by wearable wireless sensor devices must be adequately secured. A pr...
With the recent trend in wearable technology adoption, the security of these wearable devices has be...
Devices equipped with accelerometer sensors such as today's mobile devices can make use of motion to...
Since ancient Greece, handshaking has been commonly practiced between two people as a friendly gestu...
Smart environments established by the development of mobile technology have brought vast benefits to...
License, which permits unrestricted use, distribution, and reproduction in any medium, provided the ...
Since ancient Greece, handshaking has been commonly practiced between two people as a friendly gestu...
Security in Wireless Body Area Networks (WBAN) is of major concern as the miniature personal health-...
Body-worn sensor networks are important for rescue-workers, medical and many other applications. Sen...
Abstract—In this paper, we investigate the feasibility of real-time derivation of cryptographic keys...
Recent years have witnessed a remarkable growth in the number of smart wearable devices. For many of...
The increased usage of smart wearables in various applications, specifically in health-care, emphasi...
The increased usage of smart wearables in various applications, specifically in health-care, emphasi...
The last decade has witnessed a rapid surge in application of body sensor net-works, especially in t...
Smart wearable devices have enormous applications in today's world and hence their usage is increasi...
Abstract—Medical data collected by wearable wireless sensor devices must be adequately secured. A pr...
With the recent trend in wearable technology adoption, the security of these wearable devices has be...
Devices equipped with accelerometer sensors such as today's mobile devices can make use of motion to...
Since ancient Greece, handshaking has been commonly practiced between two people as a friendly gestu...
Smart environments established by the development of mobile technology have brought vast benefits to...
License, which permits unrestricted use, distribution, and reproduction in any medium, provided the ...
Since ancient Greece, handshaking has been commonly practiced between two people as a friendly gestu...
Security in Wireless Body Area Networks (WBAN) is of major concern as the miniature personal health-...
Body-worn sensor networks are important for rescue-workers, medical and many other applications. Sen...
Abstract—In this paper, we investigate the feasibility of real-time derivation of cryptographic keys...