A Solanas, C Patsakis, M Conti, I Vlachos, V Ramos, F Falcone, O Postolache, P Perez-martinez, R Pietro, D Perrea, et al., Smart health: a context-aware health paradigm within smart cities. Commun. Mag. IEEE. 52(8), 74–81 (2014).
Article
Google Scholar
RS Istepanaian, Y-T Zhang, Guest editorial introduction to the special section: 4g health—the long-term evolution of m-health. Inf. Technol. Biomed. IEEE Trans.16(1), 1–5 (2012).
Article
Google Scholar
S Movassaghi, M Abolhasan, J Lipman, D Smith, A Jamalipour, Wireless body area networks: a survey. Commun. Surv. Tutorials IEEE. 16(3), 1658–1686 (2014).
Article
Google Scholar
M Fengou, G Mantas, D Lymberopoulos, N Komninos, S Fengos, N Lazarou, A new framework architecture for next generation e-health services. Biomed. Health Inf. IEEE J.17(1), 9–18 (2013).
Article
Google Scholar
U Varshney, Pervasive healthcare: applications, challenges and wireless solutions. Commun. Assoc. Inf. Syst.16(1), 3 (2005).
Google Scholar
G Mantas, D Lymberopoulos, N Komninos, in Engineering in Medicine and Biology Society, 2009. EMBC 2009. Annual International Conference of the IEEE, Minneapolis, Minnesota, USA. Integrity mechanism for ehealth tele-monitoring system in smart home environment (2009), pp. 3509–3512.
B Latré, B Braem, I Moerman, C Blondia, P Demeester, A survey on wireless body area networks. Wireless Netw.17(1), 1–18 (2011).
Article
Google Scholar
E Kartsakli, A Antonopoulos, L Alonso, C Verikoukis, A cloud-assisted random linear network coding medium access control protocol for healthcare applications. Sensors. 14(3), 4806–4830 (2014).
Article
Google Scholar
E Kartsakli, AS Lalos, A Antonopoulos, S Tennina, MD Renzo, L Alonso, C Verikoukis, A survey on M2M systems for mHealth: a wireless communications perspective. Sensors. 14(10), 18009–18052 (2014).
Article
Google Scholar
M Chen, S Gonzalez, A Vasilakos, H Cao, VC Leung, Body area networks: a survey. Mobile Netw. Appl.16(2), 171–193 (2011).
Article
Google Scholar
J Sen, A survey on wireless sensor network security. Int. J. Commun. Netw. Inf. Secur. 1:, 55–78 (2009).
Google Scholar
A Boulis, D Smith, D Miniutti, L Libman, Y Tselishchev, Challenges in body area networks for healthcare: The mac. Commun. Mag. IEEE. 50(5), 100–106 (2012).
Article
Google Scholar
E Kartsakli, A Antonopoulos, A Lalos, S Tennina, M Renzo, L Alonso, C Verikoukis, Reliable mac design for ambient assisted living: Moving the coordination to the cloud. Commun. Mag. IEEE. 53(1), 78–86 (2015).
Article
Google Scholar
S Tennina, M Di Renzo, E Kartsakli, F Graziosi, A Lalos, A Antonopoulos, PV Mekikis, L Alonso, WSN4QoL: a WSN-oriented healthcare system architecture. Int. J. Distributed Sensor Netw.2014:, 1–16 (2014).
Article
Google Scholar
S Movassaghi, M Shirvanimoghaddam, M Abolhasan, D Smith, in Local Computer Networks (LCN), 2013 IEEE 38th Conference On, Sydney, NSW. An energy efficient network coding approach for wireless body area networks (2013), pp. 468–475.
AS Lalos, E Kartsakli, A Antonopoulos, S Termina, M Di Renzo, L Alonso, C Verikoukis, in Global Communications Conference (GLOBECOM), 2014 IEEE. Cooperative compressed sensing schemes for telemonitoring of vital signals in wbans (IEEE, 2014), pp. 2387–2392.
I-H Hou, Y-E Tsai, TF Abdelzaher, I Gupta, in INFOCOM 2008. The 27th Conference on Computer Communications. IEEE. Adapcode: Adaptive network coding for code updates in wireless sensor networks (IEEE, 2008).
A Antonopoulos, C Verikoukis, Network-coding-based cooperative ARQ medium access control protocol for wireless sensor networks. Int. J. Distributed Sensor Netw.2012: (2011). Article ID 601321, 9 pages.
R Ahlswede, N Cai, S-Y Li, RW Yeung, Network information flow. Inf. Theory IEEE Trans.46(4), 1204–1216 (2000).
Article
MathSciNet
MATH
Google Scholar
S-YR Li, RW Yeung, N Cai, Linear network coding. Inf. Theory IEEE Trans.49(2), 371–381 (2003).
Article
MathSciNet
MATH
Google Scholar
T Ho, R Koetter, M Medard, DR Karger, M Effros, in Proc. IEEE Int. Symp. Information Theory, Yokohama, Japan, Jun./Jul. 2003. The benefits of coding over routing in a randomized setting (2003), p. 442.
T Ho, M Médard, R Koetter, DR Karger, M Effros, J Shi, B Leong, A random linear network coding approach to multicast. Inf. Theory IEEE Trans.52(10), 4413–4430 (2006).
Article
MathSciNet
MATH
Google Scholar
S Katti, H Rahul, W Hu, D Katabi, M Médard, J Crowcroft, XORs in the air: practical wireless network coding. IEEE/ACM Trans. Netw. (ToN). 16(3), 497–510 (2008).
Article
Google Scholar
Z Yu, Y Wei, B Ramkumar, Y Guan, in INFOCOM 2009, IEEE. An efficient scheme for securing XOR network coding against pollution attacks (IEEERio de Janeiro, 2009), pp. 406–414.
Google Scholar
W Cheng, L Yu, F Xiong, W Wang, in Global Telecommunications Conference (GLOBECOM 2010), 2010 IEEE. Trusted network coding in wireless ad hoc networks (IEEEMiami, FL, 2010), pp. 1–5.
Chapter
Google Scholar
J Dong, R Curtmola, C Nita-Rotaru, DK Yau, Pollution attacks and defenses in wireless interflow network coding systems. Dependable Secure Comput. IEEE Trans.9(5), 741–755 (2012).
Article
Google Scholar
A Esfahani, A Nascimento, J Rodriguez, JC Neves, in Computers and Communication (ISCC), 2014 IEEE Symposium On. An efficient MAC-signature scheme for authentication in XOR network coding (IEEEFunchal, Madeira, 2014), pp. 1–5.
Chapter
Google Scholar
MN Krohn, MJ Freedman, D Mazieres, in Security and Privacy, 2004. Proceedings. 2004 IEEE Symposium On. On-the-fly verification of rateless erasure codes for efficient content distribution (IEEE, 2004), pp. 226–240.
C Cheng, T Jiang, Q Zhang, TESLA-based homomorphic MAC for authentication in p2p system for live streaming with network coding. Selected Areas Commun. IEEE J.31(9), 291–298 (2013).
Article
Google Scholar
A Esfahani, D Yang, G Mantas, A Nascimento, J Rodriguez, Dual-homomorphic message authentication code scheme for network coding-enabled wireless sensor networks. Int. J. Distributed Sensor Netw.2015:, 510251 (2015). doi:10.1155/2015/510251. Accessed 2015-02-06.
Google Scholar
R Canetti, J Garay, G Itkis, D Micciancio, M Naor, B Pinkas, in INFOCOM’99. Eighteenth Annual Joint Conference of the IEEE Computer and Communications Societies. Proceedings. IEEE, 2. Multicast security: a taxonomy and some efficient constructions (IEEENew York, NY, USA, 1999), pp. 708–716.
Google Scholar