[1] CAVALLARI R,MARTELLI F,ROSINI R,et al.A survey on wireless body area networks:technologies and design challenges[J].IEEE Communications Surveys and Tutorials,2014,16(3):1635-1657. [2] DEY N,ASHOUR S A,SHI F Q,et al.Medical cyber-physical systems:a survey[J].Journal of Medical Systems,2018,42(74):1-13. [3] ARTHUR G,YOUAKIM B,BERTR M,et al.Internet of medical things:a review of recent contributions dealing with cyber-physical systems in medicine[J].IEEE Internet of Things Journal,2018,5(5):3810-3822. [4] LU Rongxing,ZHU Hui,LIU Ximeng,et al.Toward efficient and privacy-preserving computing in big data era[J].IEEE Network,2014,28(4):46-50. [5] WU Xindong,ZHU Xingquan,WU Gongqing,et al.Data mining with big data[J].IEEE Transactions on Knowledge and Data Engineering,2014,26(1):97-107. [6] ZHANG Y,QIU M K,TSAI C W,et al.Health-CPS:healthcare cyber-physical system assisted by cloud and big data[J].IEEE Systems Journal,2017,11(1):88-95. [7] WAN J F,ZOU C F,ULLAH S,et al.Cloud-enabled wireless body area networks for pervasive healthcare[J].IEEE Network,2013,27(5):56-61. [8] ULLAH S,VASILAKOS A,SUZUKI J,et al.Cloud-assisted wireless body area networks[J].Information Sciences,2014,28(4):81-83. [9] ZHANG Yuan,XU Chunxiang,LI Hongwei,et al.HealthDep:an efficient and secure deduplication scheme for cloud-assisted eHealth systems[J].IEEE Transactions on Industrial Informatics,2018,14(9):4101-4112. [10] WANG Huaqun,WU Qianhong,QIN Bobo,et al.FRR:fair remote retrieval of put sourced private medical records in electronic health networks[J].Journal of Biomedical Informatics,2014,50(8):226-233. [11] ZHOU Jun,CAO Zhenfu,DONG Xiaolei,et al.Security and privacy in cloud-assisted wireless wearable communica-tions:challenges,solutions,and future directions[J].IEEE Wireless Communications,2015,22(2):136-144. [12] NHLABATSI A M,HONG J B,KIM D S,et al.Threat-specific security risk evaluation in the cloud[EB/OL].[2020-06-20].https://ieeexplore.ieee.org/document/8543671. [13] ZHANG Y H,ZHENG D,DENG R H.Security and privacy in smart health:efficient policy-hiding attribute-based access control[J].IEEE Internet of Things Journal,2018,5(3):2130-2145. [14] LU Rongxing,LIANG Xiaohui,LI Xu,et al.EPPA:an efficient and privacy-preserving aggregation scheme for secure smart grid communications[J].IEEE Transactions on Parallel & Distributed Systems,2012,23(9):1621-1632. [15] CHEN Zhiwei,DU Min,YANG Yatao,et al.Homo-morphic cloud computing scheme based on RSA and Paillier[J].Computer Engineering,2013,39(7):35-39.(in Chinese)陈志伟,杜敏,杨亚涛,等.基于RSA和Paillier的同态云计算方案[J].计算机工程,2013,39(7):35-39. [16] HE D B,ZEADALLY S,WU L B.Certificateless public auditing scheme for cloud-assisted wireless body area networks[J].IEEE Systems Journal,2018,12(1):64-73. [17] ZHANG Xiaojun,ZHAO Jie,XU Chunxiang,et al.CIPPPA:conditional identity privacy-preserving public auditing for cloud-based WBANs against malicious auditors[J].IEEE Transactions on Cloud Computing,2019,15(6):15-39. [18] GUI Yihong.Research on HEDSA data aggregation of wireless sensor networks[J].Computer Engineering,2011,37(7):160-162.(in Chinese)归奕红.无线传感器网络HEDSA数据聚合研究[J].计算机工程,2011,37(7):160-162. [19] ZHANG K,LIANG X H,BAURA M,et al.PHDA:a priority based health data aggregation with privacy preservation for cloud assisted WBANs[J].Information Sciences,2014,284:130-141. [20] HAN Song,ZHAO Shuai,LI Qinghua,et al.PPM-HDA:privacy-preserving and multifunctional health data aggrega-tion with fault tolerance for cloud assisted WBANs[J].IEEE Transactions on Information Forensics & Security,2016,11(9):1940-1955. [21] LI R N,STURTIVANT C,YU J G,et al.A novel secure and efficient data aggregation scheme for IoT[J].IEEE Internet of Things Journal,2018,6(2):1551-1560. [22] ARA A,AL-RODHAAN M,TIAN Y,et al.SPPDA scheme based on bilinear elgamal cryptosystem[J].IEEE Access,2017,5:12601-12617. [23] LI Xiong,LIU Shanpeng,WU Fan,et al.Privacy preserving data aggregation scheme for mobile edge computing assisted IoT applications[J].IEEE Internet of Things Journal,2019,6(3):4755-4763. [24] LU Rongxing.Privacy-enhancing aggregation techniques for smart grid communications[M].Berlin,Germany:Springer,2016. [25] WANG Chenyu,WANG Ding,WANG Feifei,et al.Multi-factor user authentication scheme for multi-gateway wire-less sensor networks[J].Chinese Journal of Computers,2020,43(4):683-700.(in Chinese)王晨宇,汪定,王菲菲,等.面向多网关的无线传感器网络多因素认证协议[J].计算机学报,2020,43(4):683-700. [26] WANG Ding,WANG Ping,LEI Ming.Cryptanalysis and improvement of gateway-oriented password authenticated key exchange protocol based on RSA[J].Acta Electronica Sinica,2015,43(1):176-184.(in Chinese)汪定,王平,雷鸣.基于RSA的网关口令认证密钥交换协议的分析与改进[J].电子学报,2015,43(1):176-184. [27] WANG Ding,WANG Peng.Two birds with one stone:two-factor authentication with security beyond conventional bound[J].IEEE Transactions on Dependable and Secure Computing,2016,15(4):708-722. |