{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2022,4,3]],"date-time":"2022-04-03T04:29:06Z","timestamp":1648960146348},"reference-count":27,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2017,5,13]],"date-time":"2017-05-13T00:00:00Z","timestamp":1494633600000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Cluster Comput"],"published-print":{"date-parts":[[2018,3]]},"DOI":"10.1007\/s10586-017-0903-7","type":"journal-article","created":{"date-parts":[[2017,5,13]],"date-time":"2017-05-13T06:53:36Z","timestamp":1494658416000},"page":"469-480","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["Energy efficient key agreement scheme for ubiquitous and continuous remote healthcare systems using data mining technique"],"prefix":"10.1007","volume":"21","author":[{"given":"Saleh M.","family":"Al-Saleem","sequence":"first","affiliation":[]},{"given":"Aftab","family":"Ali","sequence":"additional","affiliation":[]},{"given":"Naveed","family":"Khan","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,5,13]]},"reference":[{"key":"903_CR1","doi-asserted-by":"crossref","unstructured":"Venkatasubramanian, K., Gupta, S.K.S.: Security for pervasive health monitoring sensor applications. Proceeding of the 4th International Conference Intelligent Sensing & Information Processing. Bangalore pp. 197\u2013202 (2006)","DOI":"10.1109\/ICISIP.2006.4286096"},{"key":"903_CR2","first-page":"2","volume":"8","author":"W Yong","year":"2006","unstructured":"Yong, W., Attebury, G., Ramamurthy, B.: A survey of security issues in wireless sensor networks. IEEE Commun. Surv. Tutor. 8, 2\u201323 (2006)","journal-title":"IEEE Commun. Surv. Tutor."},{"issue":"5","key":"903_CR3","first-page":"1","volume":"38","author":"A Ali","year":"2014","unstructured":"Ali, A., Khan, F.A.: A broadcast-based key agreement scheme using set reconciliation for wireless body area networks. J. Med. Syst. 38(5), 1\u201312 (2014)","journal-title":"J. Med. Syst."},{"issue":"7","key":"903_CR4","doi-asserted-by":"crossref","first-page":"422","DOI":"10.1145\/362686.362692","volume":"13","author":"BH Bloom","year":"1970","unstructured":"Bloom, B.H.: Space\/time trade-offs in Hash coding with allowable errors. Comm. ACM 13(7), 422\u2013426 (1970)","journal-title":"Comm. ACM"},{"key":"903_CR5","unstructured":"Kristof, L., LoBenny, P., Jason, N.G., et al.: Medical healthcare monitoring with wearable and implantable sensors. Presented at 3rd International Workshop on Ubiquitous Computing for Pervasive Healthcare Applications (UbiHealth), Nottingham (2004)"},{"key":"903_CR6","doi-asserted-by":"crossref","first-page":"55","DOI":"10.3390\/s120100055","volume":"12","author":"P Kumar","year":"2011","unstructured":"Kumar, P., Lee, H.J.: Security issues in healthcare applications using wireless medical sensor networks: a survey. Sensors 12, 55\u201391 (2011)","journal-title":"Sensors"},{"key":"903_CR7","doi-asserted-by":"crossref","first-page":"1289","DOI":"10.1007\/s10916-011-9669-2","volume":"35","author":"G Selimis","year":"2011","unstructured":"Selimis, G., Huang, L., Mass, F., Tsekoura, I., Ashouei, M., Catthoor, F., et al.: lightweight security scheme for wireless body area networks: design, energy evaluation and proposed microprocessor design. J. Med. Syst. 35, 1289\u20131295 (2011)","journal-title":"J. Med. Syst."},{"key":"903_CR8","unstructured":"Balfanz, D., Smetters, D.K., Stewart, P., Wong, H.C.: Talking to strangers: authentication in ad-hoc wireless networks, Proceeding of the Network and Distributed System Security Symposium, San Diego, pp. 1-13 (2002)"},{"key":"903_CR9","first-page":"97","volume":"4","author":"RV Sampangi","year":"2012","unstructured":"Sampangi, R.V., Saurabh, D., Urs, S.R., Sampalli, S.: A security suite for wireless body area networks. Int. J. Netw. Secur. Appl. (IJNSA) 4, 97\u2013116 (2012)","journal-title":"Int. J. Netw. Secur. Appl. (IJNSA)"},{"issue":"3","key":"903_CR10","doi-asserted-by":"crossref","first-page":"664","DOI":"10.1109\/JBHI.2012.2235180","volume":"17","author":"D He","year":"2013","unstructured":"He, D., Chen, C., Chan, S., Bu, J., Zhang, P.: Secure and lightweight network admission and transmission protocol for body sensor networks. IEEE J. Biomed. Health Inform. 17(3), 664\u2013674 (2013)","journal-title":"IEEE J. Biomed. Health Inform."},{"issue":"9","key":"903_CR11","doi-asserted-by":"crossref","first-page":"37","DOI":"10.1109\/JSAC.2013.SUP.0513004","volume":"31","author":"C Hu","year":"2013","unstructured":"Hu, C., Zhang, N., Li, H., Cheng, X., Liao, X.: Body area network security: a fuzzy attribute-based signcryption scheme. IEEE J. Sel. Areas Commun. 31(9), 37\u201346 (2013)","journal-title":"IEEE J. Sel. Areas Commun."},{"key":"903_CR12","doi-asserted-by":"crossref","first-page":"115","DOI":"10.1007\/s10916-015-0272-9","volume":"39","author":"A Ali","year":"2015","unstructured":"Ali, A., Khan, F.A.: Key agreement schemes in wireless body area networks: taxonomy and state-of-the-art. J. Med. Syst. 39, 115 (2015)","journal-title":"J. Med. Syst."},{"key":"903_CR13","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1155\/2013\/469076","volume":"2013","author":"Y Wu","year":"2013","unstructured":"Wu, Y., Sun, Y., Zhan, L., Ji, Y.: Low mismatch key agreement based on wavelet-transform trend and fuzzy vault in body area network. Int. J. Distrib. Sens. Netw. 2013, 1\u201316 (2013)","journal-title":"Int. J. Distrib. Sens. Netw."},{"issue":"1","key":"903_CR14","doi-asserted-by":"crossref","first-page":"30","DOI":"10.1049\/iet-ifs.2012.0080","volume":"7","author":"H Xin","year":"2013","unstructured":"Xin, H., Bangdao, C., Markham, A., Qinghua, W., Zheng, Y., Roscoe, A.W.: Human interactive secure key and identity exchange protocols in body sensor networks. IET Inf. Secur. 7(1), 30\u201338 (2013)","journal-title":"IET Inf. Secur."},{"key":"903_CR15","doi-asserted-by":"crossref","unstructured":"Juels, A., Sudan, M.: A fuzzy vault scheme, Proceeding of the International Symposium Information Theory, IEEE, Lausanne pp. 408 (2002)","DOI":"10.1109\/ISIT.2002.1023680"},{"key":"903_CR16","doi-asserted-by":"crossref","unstructured":"Cherukuri, S., Venkatasubramanian, K.K., Gupta, S.K.S.: Biosec: a biometric based approach for securing communication in wireless networks of biosensors implanted in the human body, Proceeding of the Parallel Processing Workshops, Kaohsiung, pp. 432\u2013439 (2003)","DOI":"10.1109\/ICPPW.2003.1240399"},{"key":"903_CR17","doi-asserted-by":"crossref","unstructured":"Ali, A., Khan, F.: An improved EKG-based key agreement scheme for body area networks, Proceeding of the 4th International Conference on Information Security and Assurance (ISA 2010). Miyazaki, Japan, CCIS, vol. 76, pp. 298\u2013308 (2010)","DOI":"10.1007\/978-3-642-13365-7_29"},{"key":"903_CR18","doi-asserted-by":"crossref","first-page":"201","DOI":"10.1007\/s11042-011-0791-4","volume":"66","author":"A Ali","year":"2013","unstructured":"Ali, A., Irum, S., Kausar, F., Khan, F.: A cluster-based key agreement scheme using keyed hashing for Body Area Networks. Multimed. Tools Appl. 66, 201\u2013214 (2013)","journal-title":"Multimed. Tools Appl."},{"issue":"5","key":"903_CR19","doi-asserted-by":"crossref","first-page":"1111","DOI":"10.1109\/18.57210","volume":"36","author":"A Orlitsky","year":"1990","unstructured":"Orlitsky, A.: Worst-case interactive communication. I. Two messages are almost optimal. IEEE Trans. Inf. Theory 36(5), 1111\u20131126 (1990)","journal-title":"IEEE Trans. Inf. Theory"},{"key":"903_CR20","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/1777406.1777410","volume":"6","author":"KK Venkatasubramanian","year":"2016","unstructured":"Venkatasubramanian, K.K., Gupta, S.K.S.: Physiological value-based efficient usable security solutions for body sensor net- works. ACM Trans. Sens. Netw. 6, 1\u201336 (2016)","journal-title":"ACM Trans. Sens. Netw."},{"key":"903_CR21","first-page":"11","volume":"2013","author":"S Irum","year":"2013","unstructured":"Irum, S., Ali, A., Khan, F.A., Abbas, H.: A hybrid security mechanism for intra-WBAN and inter-WBAN communications. Int. J. Distrib. Sens. Netw. 2013, 11 (2013)","journal-title":"Int. J. Distrib. Sens. Netw."},{"key":"903_CR22","doi-asserted-by":"crossref","first-page":"216","DOI":"10.1186\/1687-1499-2013-216","volume":"2013","author":"A Ali","year":"2013","unstructured":"Ali, A., Khan, F.A.: Energy-efficient cluster-based security mechanism for intra-WBAN and inter-WBAN communications for healthcare applications. EURASIP J. Wirel. Commun. Netw. 2013, 216 (2013)","journal-title":"EURASIP J. Wirel. Commun. Netw."},{"key":"903_CR23","doi-asserted-by":"crossref","first-page":"881","DOI":"10.1109\/TPAMI.2002.1017616","volume":"24","author":"T Kanungo","year":"2002","unstructured":"Kanungo, T., Mount, D.M., Netanyahu, N.S., Piatko, C.D., Silverman, R., Wu, A.Y.: An efficiant k\u00c5means clustering algorithm: analysis and implementation. IEEE Trans. Patern. Anal. Mach. Intell. 24, 881\u2013892 (2002)","journal-title":"IEEE Trans. Patern. Anal. Mach. Intell."},{"key":"903_CR24","unstructured":"MIT PhysioBank.: http:\/\/www.physionet.org\/physiobank\/database\/ecgiddb\/ . Accessed 24 Nov 2016"},{"key":"903_CR25","unstructured":"Brown, R.G.: Dieharder: a random number testing suite, http:\/\/www.phy.duke.edu\/rgb\/General\/dieharder.php . Accessed 1 Nov 2016"},{"key":"903_CR26","doi-asserted-by":"crossref","first-page":"2213","DOI":"10.1109\/TIT.2003.815784","volume":"49","author":"Y Minsky","year":"2003","unstructured":"Minsky, Y., Trachtenberg, A., Zippel, R.: Set reconciliation with nearly optimal communication complexity. IEEE Trans. Inf. Theory 49, 2213\u20132218 (2003)","journal-title":"IEEE Trans. Inf. Theory"},{"key":"903_CR27","doi-asserted-by":"crossref","unstructured":"Wander, A.S., Gura, N., Eberle, H., Gupta, V., Shantz, S.C.: Energy analysis of public-key cryptography for wireless sensor networks, Proceeding of the Pervasive Computing and Communications, PerCom 2005, Kauai, pp. 324\u2013328 (2005)","DOI":"10.1109\/PERCOM.2005.18"}],"container-title":["Cluster Computing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10586-017-0903-7\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10586-017-0903-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10586-017-0903-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,9,24]],"date-time":"2019-09-24T12:17:07Z","timestamp":1569327427000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10586-017-0903-7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,5,13]]},"references-count":27,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2018,3]]}},"alternative-id":["903"],"URL":"https:\/\/doi.org\/10.1007\/s10586-017-0903-7","relation":{},"ISSN":["1386-7857","1573-7543"],"issn-type":[{"value":"1386-7857","type":"print"},{"value":"1573-7543","type":"electronic"}],"subject":[],"published":{"date-parts":[[2017,5,13]]}}}