Open Access Open Access  Restricted Access Subscription or Fee Access

Comparative Survey of Key Management Schemes for Body Area Networks

J. Mohana, V. Thulasibai

Abstract


A number of tiny sensors are placed or implanted on the human body to form a network called as Wireless Body Area Networks (WBANs). The function of the network includes the monitoring of the vital physionlogical values and communicating it to the physician for early diagnosis. The transmitted parameters are the personal record of a patient which demands security and privacy. It is an open issue to provide security to these kinds of networks since they are limited in together energy and power resources. Key establishment is an essential service for protected communication between a central device and each biosensor implanted in the human body. Though there are number of schemes, key generation using physiological values is considered to be efficient. The paper provides a biometric system to simulate ECG signals and also gives a comparative survey of various key establishment schemes using physiological values. The False Acceptance Rate (FAR) and False Rejection Rate FRR) are the performance metrics taken for the comparison.

Keywords


WBANs, Biometric, Cryptography Key, Security

Full Text:

PDF

References


Otto, C., Milenkovic, A., Sanders, C., &Jovanov, E (2006) “System Architecture of a WirelessBody Area Sensor Network for Ubiquitous Health Monitoring”, In Journal of MobileMultimedia, Vol. 1, No. 4, pp307-326.

R. S. H. Istepanian, E. Jovanov, and Y. T. Zhang,Guest editorial introduction to the special sectionon m-health: Beyond seamless mobility and globalwireless health-care connectivity," IEEE Transactions on Information Technology in Biomedicine, vol.8, no. 4, pp. 405-414, Dec. 2004.

S. Lim, T. H. Oh, Y. B. Choi, and T. Lakshman, “Security issueson wireless body area network for remote healthcare monitoring,”in Proceedings of the IEEE International Conferenceon Sensor Networks, Ubiquitous, and Trustworthy Computing,(SUTC ’10), pp. 327–332, Newport Beach, Calif, USA, June2010.

K. Malasri and L. Wang, Addressing Security inMedical Sensor Networks," HealthNet '07, pp. 7-12,San Juan, Puerto Rico, USA, June 11, 2007.

HaoFeng, Anderson Ross, Daugman John, “CombiningCryptography with Biometrics Effectively”, ComputerLaboratory, University of Cambridge, Technical Report No.640, UCAM-CL-TR-640, July 2005.

Goh A., Ngo D.C.L., Computation of cryptographic keysfrom face biometrics, International Federation for InformationProcessing 2003, Springer-Verlag, LNCS 2828, 2003.

Chouakri S.A., Bereksi-Reguig F., Ahmaidi S., FokapuO.Waveletdenoising of the electrocardiogram signal based onthe corrupted noise estimation, Univ. DjillaliLiabes, SidiBelAbbes, Computers in Cardiology, 2005, 1021-1024.

S. Cherukuri, K. K. Venkatasubramanian, and S. K. S. Gupta, “BioSec: A biometric based approach forsecuring communication in wireless networks of biosensors implanted in the human body,” in Proceedings ofthe Workshop on Wireless Security and Privacy (WiSPr), International Conference on Parallel ProcessingWorkshops, 2003, pp. 432–439.

N. Asokan, K. Kostiainen, P. Ginzboorg, J. Ott, and C. Luo. "Applicability of identity-based cryptographyfor disruption-tolerant networking". In MobiOpp 2007.

C. C. Y. Poon, Y.-T. Zhang, and S.-D. Bao, “A Novel Biometrics MethodTo Secure Wireless Body Area Sensor Networks for Telemedicine AndM-Health,” IEEE Communications Magazine, vol. 44, no. 4, pp. 73–81,2006.

Ruangchaijatupon, P. Krishnamurthy, ''Encryptionand Power Consumption in Wireless LANs-N,’’ TheThird IEEE Workshop on Wireless LANs – September27-28, 2001- Newton, Massachusetts.

Hardjono, ''Security In Wireless LANS AndMANS,'' Artech House Publishers 2005.

C. C. Y. Poon, Y.-T. Zhang and S.-D. Bao, “A novel biometricsmethod to secure wireless body area sensor networks fortelemedicine and m-health,” IEEE Communications Magazine,vol. 44, no. 4, pp. 73–81, 2006

K. Venkatasubramanian, A. Banerjee, and S. K. S. Gupta. EKG-basedKey Agreement in Body Sensor Networks. pages 1–6, April 2008. Proc.of 2nd Workshop on Mission Critical Networks.

K. K. Venkatasubramanian, A. Banerjee, and S. K. S. Gupta,“PSKA: usable and secure key agreement scheme for bodyarea networks,” IEEE Transactions on Information Technologyin Biomedicine, vol. 14, no. 1, pp. 60–68, 2010.

Mana, M., Feham, M., &Bensaber, B. A., (2011) “Trust Key Management Scheme for Wireless Body Area Networks”, In International Journal of Network Security, vol. 12, no. 2, pp71-79.

Lin Yao,1 Bing Liu,1 Guowei Wu,1 Kai Yao,2 and Jia Wang1 “A Biometric Key Establishment Protocol for Body Area Networks. Hindawi Publishing CorporationInternational Journal of Distributed Sensor Networks Volume 2011.

Garcia-Baleon H.A., Alarcon-Aquino V., Starostenko O., AWavelet-Based 128-bit Key Generator Using ElectrocardiogramSignals, IEEE International Midwest Symposium onCircuits and Systems, MWSCAS 2009, August 2009.

Garcia-Baleon H. A., Alarcon-Aquino V., ”CryptographicKey Generation from Biometric Data Using Wavelets,” IEEEElectronics,

Robotics and Automotive Mechanics ConferenceCERMA 2009, Mexico, September 2009, in press.

Goh A., Ngo D.C.L., Computation of cryptographic keysfrom face biometrics, International Federation for InformationProcessing 2003, Springer-Verlag, LNCS 2828, 2003.

Clancy T.C., Kiyavash N., Lin D.J. Secure smart card-basedfingerprint authentication, Proceedings of the 2003 ACMSIGMM Workshop of Biometrics Methods and Application,WBMA 2003.

Hao F., Chan C.W., Private key generation from on-linehandwritten signatures, Information Management & ComputerSociety, Issue 10, No.2, 2002.

Garcia-Baleon HA, Alarcon-Aquino V, Cryptographic Key Generation from Biometric Data Using Wavelets, Electronics, Robotics and Automotive Mechanics Conference, 2009. CERMA '09, 2009, Pages:15-20

L. Yao, B. Liu, K. Yao, G. W. Wu, and J. Wang, “An ecgbasedsignal key establishment protocol in body area network,”in Proceedings of the Symposia and Workshops on Ubiquitous,Autonomic and Trusted Computing, pp. 233–238,October20


Refbacks

  • There are currently no refbacks.


Creative Commons License
This work is licensed under a Creative Commons Attribution 3.0 License.