A Secure Cross-Layer Protocol for Multi-hop Wireless Body Area Networks

  • Dave Singelée
  • Benoît Latré
  • Bart Braem
  • Michael Peeters
  • Marijke De Soete
  • Peter De Cleyn
  • Bart Preneel
  • Ingrid Moerman
  • Chris Blondia
Part of the Lecture Notes in Computer Science book series (LNCS, volume 5198)

Abstract

The development of Wireless Body Area Networks (WBANs) for wireless sensing and monitoring of a person’s vital functions, is an enabler in providing better personal health care whilst enhancing the quality of life. A critical factor in the acceptance of WBANs is providing appropriate security and privacy protection of the wireless communication. This paper first describes a general health care platform and pinpoints the security challenges and requirements. Further it proposes and analyzes the CICADA-S protocol, a secure cross-layer protocol for WBANs. It is an extension of CICADA, which is a cross-layer protocol that handles both medium access and the routing of data in WBANs. The CICADA-S protocol is the first integrated solution that copes with threats that occur in this mobile medical monitoring scenario. It is shown that the integration of key management and secure, privacy preserving communication techniques within the CICADA-S protocol has low impact on the power consumption and throughput.

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    Takahashi, D., Xiao, Y., Hu, F.: LTRT: Least total-route temperature routing for embedded biomedical sensor networks. In: Proceedings of the 50th IEEE Global Telecommunications Conference, GLOBECOM 2007 (November 2007)Google Scholar
  2. 2.
    Moh, M., Culpepper, B.J., Lan, D., Teng-Sheng, M., Hamada, T., Ching-Fong, S.: On data gathering protocols for in-body biomedical sensor networks. In: Proceedings of the 48th IEEE Global Telecommunications Conference, GLOBECOM 2005 (November/December 2005)Google Scholar
  3. 3.
    Ruzzelli, A.G., Jurdak, R., O’Hare, G.M.P., Van Der Stok, P.: Energy-efficient multi-hop medical sensor networking. In: Proceedings of the 1st ACM SIGMOBILE international workshop on Systems and networking support for healthcare and assisted living environments, HealthNet 2007, New York, NY, USA, pp. 37–42 (2007)Google Scholar
  4. 4.
    Latré, B., Braem, B., Moerman, I., Blondia, C., Reusens, E., Joseph, W., Demeester, P.: A low-delay protocol for multihop wireless body area networks. In: Proceedings of the 4th Annual International Conference on Mobile and Ubiquitous Systems: Networking & Services, Philadelphia, PA, USA (August 2007)Google Scholar
  5. 5.
    Otto, C., Milenkovic, A., Sanders, C., Jovanov, E.: System architecture of a wireless body area sensor network for ubiquitous health monitoring. Journal of Mobile Multimedia 1(4), 307–326 (2006)Google Scholar
  6. 6.
    IBBT IM3-project, http://projects.ibbt.be/im3
  7. 7.
    Perrig, A., Stankovic, J., Wagner, D.: Security in wireless sensor networks. Communications of the ACM 47(6), 53–57 (2004)CrossRefGoogle Scholar
  8. 8.
    Zhou, L., Haas, Z.J.: Securing ad hoc networks. IEEE Network 13(6), 24–30 (1999)CrossRefGoogle Scholar
  9. 9.
    Eschenauer, L., Gligor, V.: A key-management scheme for distributed sensor networks. In: Proceedings of the 9th ACM Conference on Computer and Communications Security, CCS 2002, pp. 41–47 (November 2002)Google Scholar
  10. 10.
    Perrig, A., Szewczyk, R., Wen, V., Culler, D.E., Tygar, J.D.: SPINS: Security protocols for sensor networks. In: Mobile Computing and Networking, pp. 189–199 (2001)Google Scholar
  11. 11.
    Baldus, H., Klabunde, K., Msch, G.: Reliable set-up of medical body-sensor networks. In: Karl, H., Wolisz, A., Willig, A. (eds.) EWSN 2004. LNCS, vol. 2920, pp. 353–363. Springer, Heidelberg (2004)Google Scholar
  12. 12.
    Poon, C.C.Y., Yuan-Ting, Z., Shu-Di, B.: A novel biometrics method to secure wireless body area sensor networks for telemedicine and m-health. IEEE Communications Magazine 44(4), 73–81 (2006)CrossRefGoogle Scholar
  13. 13.
    Falck, T., Baldus, H., Espina, J., Klabunde, K.: Plug ’n play simplicity for wireless medical body sensors. Mobile Networks and Applications 12(2-3), 143–153 (2007)CrossRefGoogle Scholar
  14. 14.
    Gehrmann, C., Mitchell, C., Nyberg, K.: Manual authentication for wireless devices. RSA Cryptobytes 7(1), 29–37 (2004)Google Scholar
  15. 15.
    Singelée, D., Preneel, B.: Key establishment using secure distance bounding protocols. In: Proceedings of the first Workshop on the Security and Privacy of Emerging Ubiquitous Communication Systems, SPEUCS 2007, Philadelphia, PA, USA, August 2007. IEEE Computer Society Press, Los Alamitos (2007)Google Scholar
  16. 16.
    Stajano, F., Anderson, R.: The resurrecting duckling: Security issues in ad–hoc wireless networks. In: Malcolm, J.A., Christianson, B., Crispo, B., Roe, M. (eds.) Security Protocols 1999. LNCS, vol. 1796, pp. 172–182. Springer, Heidelberg (2000)CrossRefGoogle Scholar
  17. 17.
    Menezes, A.J., van Oorschot, P.C., Vanstone, S.A.: Handbook of Applied Cryptography. CRC Press, Boca Raton (1996)Google Scholar
  18. 18.
    ISO/IEC 9798-2. Information technology – Security techniques – Entity authentication – Part 2: Mechanisms using symmetric encipherment algorithms (1999)Google Scholar
  19. 19.
    Daemen, J., Rijmen, V.: The Design of Rijndael – AES – The Advanced Encryption Standard. Springer, Heidelberg (2002)MATHGoogle Scholar
  20. 20.
    NIST Special Publication 800-38C. Recommendation for block cipher modes of operation – the CCM mode for authentication and confidentiality. U.S. DoC/NIST (May 2004), http://csrc.nist.gov/publications/
  21. 21.
    NIST Special Publication 800-38D. Recommendation for block cipher modes of operation – galois/counter mode (GCM) and GMAC. U.S. DoC/NIST (November 2007), http://csrc.nist.gov/publications/

Copyright information

© Springer-Verlag Berlin Heidelberg 2008

Authors and Affiliations

  • Dave Singelée
    • 1
  • Benoît Latré
    • 2
  • Bart Braem
    • 3
  • Michael Peeters
    • 4
  • Marijke De Soete
    • 4
  • Peter De Cleyn
    • 3
  • Bart Preneel
    • 1
  • Ingrid Moerman
    • 2
  • Chris Blondia
    • 3
  1. 1.ESAT–SCD–COSICKatholieke Universiteit Leuven — IBBTHeverlee-LeuvenBelgium
  2. 2.IBCN, Dept. of Information Technology (INTEC)Ghent University — IBBTGentBelgium
  3. 3.PATS, Dept. of Mathematics and Computer Sc.University of Antwerp — IBBTAntwerpBelgium
  4. 4.NXP Semiconductors, Competence Center System Security & DRMA&I Innovation & Development Center LeuvenLeuvenBelgium

Personalised recommendations