Call for papers :

Submission Last Date 28/02/2018
Status Notification Within 2 Days
Submit Paper Online

Check Paper Status

Paper Status

News & Updates

IJAERD provides Hard Copy of Published Certificates of Publication to each author.

We have started accepting articles by online means directly through website. Article submission link is given on left side

IJAERD Provide Review card, Acceptance Letter and Fee Receipt without taking any extra charges

IJAERD invites research paper from various engineering disciplines for Vol.1 Issue 12 (Dec. - 2014) issue,

Conference Proceedings

National Conference on Emerging Trends in Computer & Electrical Engineering (ETCEE - 2014) March 7-8, 2014, Organized by Atmiya Institute of Technology and Science, Rajkot

National Conference on Recent Research in Engineering and Technology (NCRRET-2015) organizing by Dr. Jivraj Mehta Institute of Technology, Mogar-Anand

National Conference on Emerging Trends in Computer, Electrical & Electronics (ETCEE - 2015), March 13-14, 2015, Organized by Atmiya Institute of Technology and Science, Rajkot

Paper Details

Paper Title
To reinforce the pleasant of existence for patients, Implantable medical objects are opening new possibilities for holistic wellbeing care monitoring and treatment of quite various scientific stipulations. Implanting radio frequency modules in IMDs proves priceless in wi-fi connectivity and facilitated access to on-device know-how and put up-deployment tuning during medication. Nevertheless when you consider that of this IMDs are prone to relatively plenty of safety attacks. Amazing encryptions algorithms had been developed to preclude well identified attacks on IMDs. In most applications, currently, authentication is applied on the factor of preliminary login to examine if the man or woman has the proper credentials to acquire entry to the method. Nevertheless, this mechanism suffers from many safeguard flaws; attackers can obtain entry if the procedure is left unlocked and unattended. Continuous authentication targets to at all times verify the identification of the consumer and make detailed that he/she is the identical character who was once at first authenticated. We focal point on starting a prototype of a continuous authentication system making use of Bio charisma, a couple of organic alerts accumulated in real time from at the moment present wearable scientific sensors. The sensors used within the prototype gather data passively, noninvasively, and regularly. This work demonstrates that an ensemble of sensors will also be utilized to build up a couple of physiological signals and follow potent desktop finding out items to continuously verify the identification of the consumer with high accuracy. We accumulate know-how from a consumer study of 30 members and design the process balancing the tradeoffs between usability and protection, making precise that it is extensible for any authentication utility. We reveal the feasibility of CABA by way of evaluation of traces from the MIMIC-II dataset. We suggest various capabilities of CABA, and describe how it can be accelerated to the individual identification and adaptive access manipulates authorization. Finally, we speak about viable attacks on the proposed scheme and advise corresponding countermeasures.
CABA, Protocol, Data set, Feasibility, Authorization, eavaluation .
Others Details
Paper Id : 18424
Author Name : Mousumi Rani Bala
Co-Author Name(s) : M.Alekhya
Volume/Issue No : Volume 05 Issue 02
Page No : 126-129
DOI Number : DOI:10.21090/IJAERD.18424
Publication Date : 2018-02-12
License : This work is licensed under a Creative Commons Attribution 4.0 International License.
website :
Impact Factor : 4.72, SJIF-2016
ISSN Details : eISSN: 2348-4470, pISSN:2348-6406