Raja et al., 2013 - Google Patents
Level based fault monitoring and security for long range transmission in wbanRaja et al., 2013
View PDF- Document ID
- 12855905337683974150
- Author
- Raja S
- Jebarajan T
- Publication year
- Publication venue
- Int. J. Comput. Appl
External Links
Snippet
ABSTRACT In Wireless Body Area Network (WBAN), detection of fault node improves reliability and security for long range transmission. In this paper, we propose a combined approach for reliable and secured data transmission in WBAN. The proposed architecture …
- 230000005540 biological transmission 0 title abstract description 44
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATIONS NETWORKS
- H04W88/00—Devices specially adapted for wireless communication networks, e.g. terminals, base stations or access point devices
- H04W88/02—Terminal devices
- H04W88/04—Terminal devices adapted for relaying to or from another terminal or user
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATIONS NETWORKS
- H04W84/00—Network topologies
- H04W84/18—Self-organizing networks, e.g. ad-hoc networks or sensor networks
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L12/00—Data switching networks
- H04L12/02—Details
- H04L12/26—Monitoring arrangements; Testing arrangements
- H04L12/2602—Monitoring arrangements
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L1/00—Arrangements for detecting or preventing errors in the information received
- H04L1/004—Arrangements for detecting or preventing errors in the information received by using forward error control
- H04L1/0056—Systems characterized by the type of code used
- H04L1/0061—Error detection codes
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L1/00—Arrangements for detecting or preventing errors in the information received
- H04L2001/0092—Error control systems characterised by the topology of the transmission link
- H04L2001/0097—Relays
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATIONS NETWORKS
- H04W84/00—Network topologies
- H04W84/02—Hierarchical pre-organized networks, e.g. paging networks, cellular networks, WLAN [Wireless Local Area Network] or WLL [Wireless Local Loop]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATIONS NETWORKS
- H04W40/00—Communication routing or communication path finding
- H04W40/24—Connectivity information management, e.g. connectivity discovery or connectivity update
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATIONS NETWORKS
- H04W12/00—Security arrangements, e.g. access security or fraud detection; Authentication, e.g. verifying user identity or authorisation; Protecting privacy or anonymity
- H04W12/06—Authentication
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATIONS NETWORKS
- H04W28/00—Network traffic or resource management
- H04W28/02—Traffic management, e.g. flow control or congestion control
- H04W28/04—Error control, e.g. treating errors, collisions, noise or interference
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATIONS NETWORKS
- H04W40/00—Communication routing or communication path finding
- H04W40/02—Communication route or path selection, e.g. power-based or shortest path routing
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Yugha et al. | A survey on technologies and security protocols: Reference for future generation IoT | |
Mainanwal et al. | A survey on wireless body area network: Security technology and its design methodology issue | |
Ataei Nezhad et al. | An authentication-based secure data aggregation method in internet of things | |
Javadi et al. | Security and privacy in wireless body area networks for health care applications | |
Tan et al. | A PUF-based and cloud-assisted lightweight authentication for multi-hop body area network | |
Mana et al. | Trust key management scheme for wireless body area networks. | |
Saleem et al. | On the security issues in wireless body area networks | |
Kang et al. | A review of security protocols in mHealth wireless body area networks (WBAN) | |
Kumar et al. | State of the art: Security in wireless body area networks | |
CN103929741B (en) | A kind of wireless body area network data encryption and transmission method based on function certification | |
Singelée et al. | A secure cross-layer protocol for multi-hop wireless body area networks | |
Jang et al. | Hybrid security protocol for wireless body area networks | |
Nikolaevskiy et al. | Security for medical sensor networks in mobile health systems | |
Kang | Systematic analysis of security implementation for internet of health things in mobile health networks | |
Ekong et al. | A survey of security vulnerabilities in wireless sensor networks | |
Saleem et al. | Towards security issues and solutions in wireless body area networks | |
Nagasundharamoorthi et al. | Hash message authentication codes for securing data in wireless body area networks | |
Amini et al. | Toward a security model for a body sensor platform | |
Vignesh et al. | Healthcare sensors issues, challenges & security threats in wireless body area network: A comprehensive survey | |
Raja et al. | Level based fault monitoring and security for long range transmission in wban | |
Almuhaideb et al. | Authentication in wireless body area network: Taxonomy and open challenges | |
Mustafa et al. | Group-based key exchange for medical IoT device-to-device communication (D2D) combining secret sharing and physical layer key exchange | |
Carrasco et al. | Securing a wireless sensor network for human tracking: a review of solutions | |
Venkatasubramanian et al. | Integrated authentication and security check with CDMA modulation technique in physical layer of Wireless Body Area Network | |
Al-Hamadi et al. | Lightweight security protocol for health monitoring in Ambient Assisted Living environment |