Nothing Special   »   [go: up one dir, main page]

skip to main content
10.5555/2442691.2442700acmotherconferencesArticle/Chapter ViewAbstractPublication PagesbodynetsConference Proceedingsconference-collections
research-article

Authenticated health monitoring scheme for wireless body sensor networks

Published: 24 February 2012 Publication History

Abstract

Security and privacy are the main concern for patients to seek wireless body sensor network monitoring their health. Considering the limitations of power, computation capability and storage resources, it is a big challenge to find out suitable secure scheme for patients when relying on wireless body sensor networks to monitor their healthy information. Many schemes based on asymmetric and symmetric have been investigated for such kind problems. In this paper, we present an authenticated identity-based key encryption scheme for patients to secure their healthy privacy based on wireless body sensor networks monitoring their health. We review briefly about identity-based encryption and decryption first, and then describe an authenticated key establishment and encryption scheme based on the basic Boneh-Franklin algorithm for wireless body sensor networks. Finally we compare the proposed scheme with other technique with analysis and simulations. The results show that the proposed scheme is efficient and secure.

References

[1]
Akyildiz I. F, Su W, Sankarasubramaniam Y, "Wireless body sensor networks: A survey" {J}. computer Networks, vol. 38, no. 4, pp. 393--422, 2002.
[2]
C C. Y. Poon and Y-T Zhang, "A Novel Biometrics to SecureWireless Body Area Sensor Networks for Telemedicine and M-Health", IEEE Communications Magazine, vol: 44, no: 4, April 2006, pp. 73--81.
[3]
Pietro R D, Mancin i L V, and Andmei A "Random key assignment for secure Wireless body sensor networks," {C}.in ACM Workshop on Security in Ad Hoc and Body wireless body sensor networks (SASN '03), pp. 62--71, 2003.
[4]
Aniket K, Ian G. Distributed private-key generators for identity-based cryptography{A}. Security and Cryptography for Networks{ C}. 2010.436--453. 4
[5]
Gura N, Patel A, Wander A, Eberle H et al. Shantz, "Comparing Elliptic Curve Cryptography and RSA on 8-bit CPUs," {C}.in Proceedings of the Workshop on Cryptography Hardware and Embedded Systems (CHES 2004), Boston, August 11--13 2004.
[6]
Malan D J, Welsh M, and Smith M D, "A public-key infrastructure for key distribution in TinyOS based on elliptic curve cryptography,"{C}.in The First IEEE International Conference on Sensor and Ad Hoc Communications and Networks, Santa Clara, California, pp. 71--79, October 2004.
[7]
Shamir A, "Identity-based cryptography and signature schemes," {J}. Advances in Cryptology, CRYPTO'84, Lecture Notes in Computer Science, vol. 196, pp. 47--53, 1985.
[8]
Boneh D and Franklin M, "Identity-based encryption from the Weil pairing," {J}. in Advances in Cryptology, CRYPTO 2001, Lecture Notes in Computer Science, vol. 2139, pp. 213--229, 2001.
[9]
Boyen X, "Multipurpose Identity-based signcryption, a Swiss army knife for identity-based cryptography," {C}. in Proceedings of the 23rd Interna. Conf. On Advances in Cryptology, Lecture Notes in Computer Science, vol. 2729, pp. 383--399, 2003.
[10]
Abdalla M, Birkett J, Catalano D, et al. Wildcarded identity-based encryption{J}. Journal of Cryptology, 2011, 24(1): 42--82.
[11]
Cheng H B, Yang G, Wang J T, Huang X. An authenticated identity_based key establishment and encryption scheme for Wireless sensor networks {J}. The Journal of China University of Posts and telecommunications, 2006, 13(2):31--38.
[12]
Kalpakis K, Dasgupta K, Namjoshi P. Efficient algorithms for maximum lifetime data gathering and aggregation in Wireless sensor networks. ACM Computer Networks, 2003, 42(6):697--716.
[13]
Intanagonwiwat C, Govindan R, Estrin D, Heidemann J, Silva F. Directed diffusion for Wireless body sensor networking. IEEE/ACM Trans. on Networking, 2003, 11(1):2--16.
[14]
C. Intanagonwiwat, R. Govindan, D. Estrin, J. Heidemann, and F. Silva, "Directed diffusion for wireless sensor networking", IEEE Trans. Networking, vol. 11, no. 1, pp. 2--16 2003
[15]
Hartung C., Balasalle J., and Han R., "Node Compromise in Body wireless body sensor networks: The Need for Secure Systems," Technical Report CU-CS-988-04, Department of Computer Science, University of Colorado, Boulder, 2004.
[16]
Seshadri, A., et al., "Swatt: Software-based Attestation for sensor node device" Proc. IEEE Symposium on Security and Privacy, Oakland, CA, May 2004.

Cited By

View all

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image ACM Other conferences
BodyNets '12: Proceedings of the 7th International Conference on Body Area Networks
February 2012
287 pages
ISBN:9781936968602
  • General Chair:
  • Ilangko Balasingham

Sponsors

  • ICST: International Communication Sciences and Technology Association

In-Cooperation

Publisher

ICST (Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering)

Brussels, Belgium

Publication History

Published: 24 February 2012

Check for updates

Author Tags

  1. identity-based cryptography
  2. network security
  3. wireless body sensor network

Qualifiers

  • Research-article

Funding Sources

Conference

BODYNETS'12
Sponsor:
  • ICST

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)3
  • Downloads (Last 6 weeks)0
Reflects downloads up to 24 Nov 2024

Other Metrics

Citations

Cited By

View all
  • (2016)Biometric Inspired Mobile Network Authentication and Protocol ValidationMobile Networks and Applications10.1007/s11036-016-0701-021:1(130-138)Online publication date: 1-Feb-2016
  • (2016)Authentication and key relay in medical cyber-physical systemsSecurity and Communication Networks10.1002/sec.10099:9(874-885)Online publication date: 1-Jun-2016
  • (2014)Validating biometric authentication protocolProceedings of the 8th International Conference on Bioinspired Information and Communications Technologies10.4108/icst.bict.2014.258080(126-132)Online publication date: 1-Dec-2014
  • (2013)Modeling of WBAN and cloud integration for secure and reliable healthcareProceedings of the 8th International Conference on Body Area Networks10.4108/icst.bodynets.2013.253706(128-131)Online publication date: 30-Sep-2013
  • (2013)A generic authentication protocol for wireless body area networksProceedings of the 8th International Conference on Body Area Networks10.4108/icst.bodynets.2013.253681(502-508)Online publication date: 30-Sep-2013

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media