Biometrics Based on Healthcare Sensors

  • Mohammad S. Obaidat
  • Tanmoy Maitra
  • Debasis Giri


Data inaccuracy hampers the performance of a healthcare system in terms of throughput, end-to-end delay, and energy consumption. Runtime secret key generation is highly required during communication between a controller and healthcare sensors in order to protect and maintain accuracy of sensitive data of a human. Runtime secret key generation is possible after getting the physiological and behavioral information from a human. Therefore, the healthcare sensors with different sensing capabilities collect biometrics like heartbeat rate, blood pressure, and iris and generate runtime secret key by extracting features from these biometrics to communicate with the controller. On the other hand, the controller maintains a secure biometric template so that the generated key by a healthcare sensor can be verified. Thus biometric-based communication helps to protect sensitive data as well as helps to authenticate the communicators in real-time environment.


  1. 1.
    M.S. Obaidat, S. Misra, Principles of Wireless Sensor Networks (Cambridge University Press, Cambridge/New York, 2014)Google Scholar
  2. 2.
    S. Misra, V. Tiwari, M.S. Obaidat, LACAS: learning automata-based congestion avoidance scheme for healthcare wireless sensor networks. IEEE J. Sel. Area Commun. 27(4), 466–479 (2009)CrossRefGoogle Scholar
  3. 3.
    M.S. Obaidat, B. Sadoun, Verification of computer users using keystroke dynamics. IEEE Trans. Syst. Man Cybernet. Part B 27(2), 261–269 (1997)CrossRefGoogle Scholar
  4. 4.
  5. 5.
  6. 6.
  7. 7.
    Olea Sensor Networks.
  8. 8.
  9. 9.
    S. Prabhakar, S. Pankanti, A.K. Jain, Biometric recognition: security and privacy concerns. IEEE Secur. Priv. 1(2), 33–42 (2003)CrossRefGoogle Scholar
  10. 10.
    D. Giri, R.S. Sherratt, T. Maitra, A novel and efficient session spanning biometric and password based three-factor authentication protocol for consumer usb mass storage devices. IEEE Trans. Consum. Electron. 62(3), 283–291 (2016)CrossRefGoogle Scholar
  11. 11.
    M.S. Obaidat, D.T. Macchairllo, An on-line neural network system for computer access security. IEEE Trans. Ind. Electron. 40(2), 235–242 (1993)CrossRefGoogle Scholar
  12. 12.
    I. Traore, I. Woungang, B. Khalilian, M.S. Obaidat, A. Ahmed, Dynamic sample size detection in learning command line sequence for continuous authentication. IEEE Trans. Syst. Man Cybern. B 42(5), 1343–1356 (2012)CrossRefGoogle Scholar
  13. 13.
    M.A. Zahhad, S.M. Ahmed, S.N. Abbas, Biometric authentication based on PCG and ECG signals: present status and future directions. SIViP 8(4), 739–751 (2014)CrossRefGoogle Scholar
  14. 14.
    M.S. Obaidat, N. Boudriga, Security of e-Systems and Computer Networks (Cambridge University Press, 2007)Google Scholar
  15. 15.
    M.S. Obaidat, B. Sadoun, in Biometrics: Personal Identification in Networked Society. Keystroke dynamics based identification (Kluwer, Boston, 1999), pp. 213–229CrossRefGoogle Scholar
  16. 16.
    M.F. Zanuy, On the vulnerability of biometric security systems. IEEE Aerosp. Electron. Syst. Mag. 19(6), 3–8 (2004)CrossRefGoogle Scholar
  17. 17.
    C.C.Y. Poon, Y.-T. Zhang, S.-D. Bao, A novel biometrics method to secure wireless body area sensor networks for telemedicine and m-health. IEEE Commun. Mag. 44(4), 73–81 (2006)CrossRefGoogle Scholar
  18. 18.
    S.D. Bao, C.C.Y. Poon, Y.T. Zhang, L.F. Shen, Using the timing information of heartbeats as an entity identifier to secure body sensor network. IEEE Trans. Inf. Technol. Biomed. 12(6), 772–779 (2008)CrossRefGoogle Scholar
  19. 19.
    S. Cherukuri, K.K. Venkatasubramanian, S.K.S. Gupta, Biosec: a biometric based approach for securing communication in wireless networks of biosensors implanted in the human body, in Proc. of International Conference on Parallel Processing Workshops, Taiwan, pp. 432–439, 2003Google Scholar
  20. 20.
    F. Miao, L. Jiang, Y. Li, Y.T. Zhang, Biometrics based novel key distribution solution for body sensor networks, in Proc. of Annual International Conference of the IEEE Engineering in Medicine and Biology Society, Minneapolis, pp. 2458–2461, 2009Google Scholar
  21. 21.
    H. Wang, H. Fang, L. Xing, M. Chen, An integrated biometric-based security framework using wavelet-domain HMM in wireless body area networks (WBAN), in Proc. of IEEE International Conference on Communications (ICC), Kyoto, pp. 1–5, 2011Google Scholar
  22. 22.
    M.S. Crouse, R.G. Baraniuk, R.D. Nowak, Hidden Markov modelsfor wavelet-based signal processing, in Signals, Systems and Computers, the Thirtieth Asilomar Conference, pp. 1029–1035, vol. 2, 1996Google Scholar
  23. 23.
    S.-D. Bao, Y.-T. Zhang, L.-F. Shen, Physiological signal based entity authentication for body area sensor networks and mobile healthcare systems, in Proc. of IEEE Engineering in Medicine and Biology 27th Annual Conference, Shanghai, pp. 2455–2458, 2005Google Scholar
  24. 24.
    B. Shanthini, S. Swamynathan, Genetic-based biometric security system for wireless sensor-based health care systems, in Proc. of International Conference on Recent Advances in Computing and Software Systems, Chennai, pp. 180–184, 2012Google Scholar

Copyright information

© Springer Nature Switzerland AG 2019

Authors and Affiliations

  • Mohammad S. Obaidat
    • 2
    • 3
    • 4
    • 1
  • Tanmoy Maitra
    • 5
  • Debasis Giri
    • 6
  1. 1.Fordham UniversityNew York CityUSA
  2. 2.ECE DepartmentNazarbayev UniversityAstanaKazakhstan
  3. 3.King Abdullah II School of Information Technology (KASIT), University of JordanAmmanJordan
  4. 4.University of Science and Technology Beijing (USTB)BeijingChina
  5. 5.School of Computer EngineeringKIIT UniversityBhubaneswarIndia
  6. 6.Department of Information TechnologyMaulana Abul Kalam Azad University of TechnologyNadiaIndia

Personalised recommendations