[go: up one dir, main page]

Raja et al., 2013 - Google Patents

Level based fault monitoring and security for long range transmission in wban

Raja et al., 2013

View PDF
Document ID
12855905337683974150
Author
Raja S
Jebarajan T
Publication year
Publication venue
Int. J. Comput. Appl

External Links

Snippet

ABSTRACT In Wireless Body Area Network (WBAN), detection of fault node improves reliability and security for long range transmission. In this paper, we propose a combined approach for reliable and secured data transmission in WBAN. The proposed architecture …
Continue reading at www.academia.edu (PDF) (other versions)

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATIONS NETWORKS
    • H04W88/00Devices specially adapted for wireless communication networks, e.g. terminals, base stations or access point devices
    • H04W88/02Terminal devices
    • H04W88/04Terminal devices adapted for relaying to or from another terminal or user
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATIONS NETWORKS
    • H04W84/00Network topologies
    • H04W84/18Self-organizing networks, e.g. ad-hoc networks or sensor networks
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L12/00Data switching networks
    • H04L12/02Details
    • H04L12/26Monitoring arrangements; Testing arrangements
    • H04L12/2602Monitoring arrangements
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L1/00Arrangements for detecting or preventing errors in the information received
    • H04L1/004Arrangements for detecting or preventing errors in the information received by using forward error control
    • H04L1/0056Systems characterized by the type of code used
    • H04L1/0061Error detection codes
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L1/00Arrangements for detecting or preventing errors in the information received
    • H04L2001/0092Error control systems characterised by the topology of the transmission link
    • H04L2001/0097Relays
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATIONS NETWORKS
    • H04W84/00Network topologies
    • H04W84/02Hierarchical pre-organized networks, e.g. paging networks, cellular networks, WLAN [Wireless Local Area Network] or WLL [Wireless Local Loop]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATIONS NETWORKS
    • H04W40/00Communication routing or communication path finding
    • H04W40/24Connectivity information management, e.g. connectivity discovery or connectivity update
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATIONS NETWORKS
    • H04W12/00Security arrangements, e.g. access security or fraud detection; Authentication, e.g. verifying user identity or authorisation; Protecting privacy or anonymity
    • H04W12/06Authentication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATIONS NETWORKS
    • H04W28/00Network traffic or resource management
    • H04W28/02Traffic management, e.g. flow control or congestion control
    • H04W28/04Error control, e.g. treating errors, collisions, noise or interference
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATIONS NETWORKS
    • H04W40/00Communication routing or communication path finding
    • H04W40/02Communication route or path selection, e.g. power-based or shortest path routing

Similar Documents

Publication Publication Date Title
Yugha et al. A survey on technologies and security protocols: Reference for future generation IoT
Mainanwal et al. A survey on wireless body area network: Security technology and its design methodology issue
Ataei Nezhad et al. An authentication-based secure data aggregation method in internet of things
Javadi et al. Security and privacy in wireless body area networks for health care applications
Tan et al. A PUF-based and cloud-assisted lightweight authentication for multi-hop body area network
Mana et al. Trust key management scheme for wireless body area networks.
Saleem et al. On the security issues in wireless body area networks
Kang et al. A review of security protocols in mHealth wireless body area networks (WBAN)
Kumar et al. State of the art: Security in wireless body area networks
CN103929741B (en) A kind of wireless body area network data encryption and transmission method based on function certification
Singelée et al. A secure cross-layer protocol for multi-hop wireless body area networks
Jang et al. Hybrid security protocol for wireless body area networks
Nikolaevskiy et al. Security for medical sensor networks in mobile health systems
Kang Systematic analysis of security implementation for internet of health things in mobile health networks
Ekong et al. A survey of security vulnerabilities in wireless sensor networks
Saleem et al. Towards security issues and solutions in wireless body area networks
Nagasundharamoorthi et al. Hash message authentication codes for securing data in wireless body area networks
Amini et al. Toward a security model for a body sensor platform
Vignesh et al. Healthcare sensors issues, challenges & security threats in wireless body area network: A comprehensive survey
Raja et al. Level based fault monitoring and security for long range transmission in wban
Almuhaideb et al. Authentication in wireless body area network: Taxonomy and open challenges
Mustafa et al. Group-based key exchange for medical IoT device-to-device communication (D2D) combining secret sharing and physical layer key exchange
Carrasco et al. Securing a wireless sensor network for human tracking: a review of solutions
Venkatasubramanian et al. Integrated authentication and security check with CDMA modulation technique in physical layer of Wireless Body Area Network
Al-Hamadi et al. Lightweight security protocol for health monitoring in Ambient Assisted Living environment