Trust Key Management Scheme for Wireless Body Sensor Network

T Sangeetha, S Adhinarayanan

Abstract


With recent advances in wireless sensor networks and embedded computing technologies, miniaturized pervasive health monitoring devices have become practically feasible. In addition to providing continuous monitoring and analysis of physiological parameters, the recently proposed Wireless Body Area Networks (WBAN) incorporates context aware sensing for increased sensitivity and specicity. A number of tiny wireless sensors, strategically placed on the human body, create a WBAN that can monitor various vital signs, providing real-time feedback to the user and medical personnel. The wireless body area networks promise to revolutionize health monitoring. Since the sensors collect personal medical data,security and privacy are important components in thiskind of networks. It is a challenge to implement traditional security infrastructures in these types of lightweight networks, since they are by design limited in both computational and communication resources. A key enabling technology for secure communications in WBANs has emerged to be biometrics. In this paper, we present an approach that exploits physiological signals (electro cardiogram (ECG)) to address security issues in WBAN: a Trust Key Management Scheme for Wireless Body Area Network. This approach manages the generation and distribution of symmetric cryptographic keys to constituent sensors in a WBAN (using ECG signal) and protects the privacy.


Keywords


WBAN, ECG, ALARMNET, CCM.

References


S. D. Bao, C. Y. Poon, Y. T. Zhang, and L. F.Shen, Using the timing information of heartbeats as an entity identifier to secure body sensor network," IEEE Transactions on Information Technology in Biomedicine, pp. 772-779, 2008.

S. Cherukuri, K. K. Venkatasubramanian, and S.K. S. Gupta, Biosec: A biometric based approach for securing communication in wireless networks of biosensors implanted in the human body," Proceedings of the 32nd International Conference on Parallel Processing, pp. 432-439, 2003.

E. Dishman, Inventing wellness systems for aging in place," IEEE Computer, vol. 37, no. 5, pp. 34-41, May 2004.

M. R. Doomun and K. M. S. Soyjaudah, Analytical comparison of cryptographic techniques for resource constrained wireless security," International Journal of Network Security, vol. 9, no. 1, pp. 82-94, July 2009.

J. GrosschLadl, TinySA: A security architecturefor wireless sensor networks (extended abstract),"Proceedings of the 2nd International Conference onEmerging Networking Experiments and Technologies(CoNEXT 2006), Lisbon, Portugal, December 4{7,ACM Press, 2006.

J, GrosschLadl, Alexander Szekely, Stefan Tillich, "The Energy Cost of Cryptographic Key Establishment in Wireless Sensor Networks (Extended Abstract)", ASIACCS '07, pp. 380-382, Singapore, Mar20-22, 2007.

M. Guennoun, M. Zandi, and K. E. Khatib, On theuse of biometrics to secure wireless biosensor networks," Information and Communication Technologies: From Theory to Applications, pp. 1-5, 2008.


Full Text: PDF

Refbacks

  • There are currently no refbacks.


Creative Commons License
This work is licensed under a Creative Commons Attribution 3.0 License.

.......................................................................................................................................................................................................................

ISSN  2279 – 0381 |  IST HOMEJOURNAL HOME | Copyright IST 2012-13

.......................................................................................................................................................................................................................