Advertisement

An Encryption Method for BAN Using the Channel Characteristics

  • Liangguang Peng
  • Jinzhao LinEmail author
  • Tong BaiEmail author
  • Yu Pang
  • Guoquan Li
  • Huiquan Wang
  • Xiaoming Jiang
  • Junchao Wang
  • Zeljko Zilic
Conference paper
Part of the Internet of Things book series (ITTCC)

Abstract

The protection of information security is a very important technique requirement in Body area networks (BANs). According to the limitation of energy, the traditional encryption methods which adopt the complex algorithm and the large consumption are not suitable for BANs. This paper proposes a new encryption method based on the channel model of BANs, which adopts the path loss from the BAN systems to form the initial key, utilizes the LFSR (Linear Feedback Shift Register) circuit to generate the key stream, and then encrypts the data in the coordinator of the BAN system. This new encryption method has the advantages of low energy consumption, simple hardware implementation, and dynamic key updating.

Keywords

Body area network Channel model Path loss LFSR Encryption method 

Notes

Acknowledgements

This work is supported by the National Science Foundation of China (Grant no. 61471075, 61671091), National Key Technology Research and Development Program of the Ministry of Science and Technology of China (2014BAI11B10), Key National Science Foundation of Chongqing (cstc2017jcyjB0203), Chongqing Integrated Demonstration Project (CSTC2013jcsf10029), Wenfeng Innovation Foundation of CQUPT, University Innovation Team Construction Plan Funding Project of Chongqing (Smart Medical System and Key Techniques, CXTDG201602009), Chongqing Key Laboratory Improvement Plan (Chongqing Key Laboratory of Photoelectronic Information Sensing and Transmitting Technology, cstc2014pt-sy40001), Chongqing Research Program of Basic Research and Frontier Technology (cstc2017jcyjA0982), Science and Technology research project of Chongqing Education Commission (KJ1704073), Research and Innovation Project of Graduate Students in Chongqing (CYS17239), the Scientific Research Foundation of CQUPT (A2016-73), the Priority Academic Program Development of Jiangsu Higer Education Institutions (PAPD) Fund, and Jiangsu Collaborative Innovation Center on Atmospheric Environment and Equipment Technology (CICAEET) Fund.

References

  1. 1.
    Seyedi, M, et al.: A survey on intrabody communications for body area network applications. IEEE Trans. Bio-Med. Eng. 60(8), 2067 (2013)CrossRefGoogle Scholar
  2. 2.
    Barakah, D.M., Ammad-Uddin, M.: A survey of challenges and applications of wireless body area network (WBAN) and role of a virtual doctor server in existing architecture. In: International Conference on Intelligent Systems, pp. 214–219. IEEE (2012)Google Scholar
  3. 3.
    Monton, E., et al.: Body area network for wireless patient monitoring. IET Commun. 2(2), 215–222 (2008)CrossRefGoogle Scholar
  4. 4.
    Ullah, S., et al.: A comprehensive survey of wireless body area networks: on PHY, MAC, and Network layers solutions. J. Med. Syst. 36(3), 1065 (2012)CrossRefGoogle Scholar
  5. 5.
    Lim, S., et al.: Security issues on wireless body area network for remote healthcare monitoring. In: IEEE International Conference on Sensor Networks, Ubiquitous, and Trustworthy Computing, pp. 327–332. IEEE Computer Society (2010)Google Scholar
  6. 6.
    Warren, S., et al.: Interoperability and security in wireless body area network infrastructures. In: International Conference of the Engineering in Medicine & Biology Society, p. 3837 (2005)Google Scholar
  7. 7.
    Mainanwal, V., Gupta, M., Upadhayay, S.K.: A survey on wireless body area network: security technology and its design methodology issue. In: International Conference on Innovations in Information, Embedded and Communication Systems, pp. 1–5. IEEE (2015)Google Scholar
  8. 8.
    Chan, H., Perrig, A., Song, D.: Random key predistribution schemes for sensor networks. In: Proceedings of 2003 Symposium on Security and Privacy. IEEE (2003)Google Scholar
  9. 9.
    Ali, A., Khan, F.A.: An improved EKG-based key agreement scheme for body area networks. In: Proceedings of the International Conference on Information Security and Assurance, ISA 2010, DBLP, Miyazaki, Japan, June 23–25 2010, pp. 298–308 (2010)Google Scholar
  10. 10.
    Mana, M., Feham, M., Bensaber, B.A.: SEKEBAN (Secure and efficient key exchange for wireless body area network). Int. J. Advanc. Sci. Technol. 12.12 (2009)Google Scholar
  11. 11.
    Yao, L., et al.: A biometric key establishment protocol for body area networks. Int. J. Distrib. Sens. Netw. 1550–1329, 1063–1067 (2011)Google Scholar
  12. 12.
    Gangadari, Bhoopal Rao, Ahamed, Shaik Rafi: Design of cryptographically secure AES like S-Box using second-order reversible cellular automata for wireless body area network applications. Healthcare Technol. Lett. 3(3), 177–183 (2016)CrossRefGoogle Scholar
  13. 13.
    Al-Janabi, S., et al.: Survey of main challenges (security and privacy) in wireless body area networks for healthcare applications. Egyptian Informat. J. (2016)Google Scholar
  14. 14.
    Sharma, K., et al.: Use of LFSR for sensor network security: a new approach. In: International Conference on Information Security and Assurance, pp. 61–66. IEEE Computer Society (2008)Google Scholar
  15. 15.
    Sharaf, M., et al.: A complex linear feedback shift register design for the A5 keystream generator. National IEEE Xplore 395–402 (2005)Google Scholar

Copyright information

© Springer Nature Switzerland AG 2019

Authors and Affiliations

  • Liangguang Peng
    • 1
  • Jinzhao Lin
    • 1
    Email author
  • Tong Bai
    • 1
    Email author
  • Yu Pang
    • 1
  • Guoquan Li
    • 1
  • Huiquan Wang
    • 1
  • Xiaoming Jiang
    • 1
  • Junchao Wang
    • 2
  • Zeljko Zilic
    • 2
  1. 1.Chongqing University of Posts and TelecommunicationsChongqingChina
  2. 2.McGill UniversityMontrealCanada

Personalised recommendations