-
Article
Study on peak misdetection recovery of key exchange protocol using heartbeat
Various studies have been conducted on a secret key exchange using the inter-pulse interval (IPI) extracted from a pulse wave. The IPI-based key exchange method uses a point where the body can measure an IPI o...
-
Chapter and Conference Paper
A Study on the Security Vulnerabilities of Fuzzy Vault Based on Photoplethysmogram
Recently, various studies have been conducted on secret key generation and authentication using biosignals. PPG signals in biosignals are easy to measure, and signals generated from the inside of the body are ...
-
Chapter and Conference Paper
A Study on the Recovery Method of PPG Signal for IPI-Based Key Exchange
Various studies have been conducted on secret key exchange using IPI (Inter Pulse Interval) extracted from a pulse wave. The IPI-based key exchange method uses a point where the body can measure IPI of similar...
-
Chapter and Conference Paper
Self-certified Privacy-Preserving Scheme for Vehicle-to-Vehicle Communications
In vehicular ad hoc networks (VANETs), vehicles should exchange safety-related messages with each other while processing them within short time in their embedded on-board units. Most previous authentication sc...
-
Article
Low-priced and efficient replica detection framework for wireless sensor networks
A replica attack is one of the most challenging problems in wireless sensor networks. Once a node is physically captured, it can be reprogrammed and replicated into a large number of replicas, and thus malicio...
-
Chapter and Conference Paper
Biometric Based Secure Communications without Pre-deployed Key for Biosensor Implanted in Body Sensor Networks
Key establishment is a fundamental service for secure communications between a central device and each biosensor implanted in the human body. It provides and manages the cryptographic keys to enable security s...