Advertisement

IAMKeys: Independent and Adaptive Management of Keys for Security in Wireless Body Area Networks

  • Raghav. V. Sampangi
  • Saurabh Dey
  • Shalini. R. Urs
  • Srinivas Sampalli
Part of the Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering book series (LNICST, volume 86)

Abstract

Wireless Body Area Networks (WBANs) have gained a lot of research attention in recent years since they offer tremendous benefits for remote health monitoring and continuous, real-time patient care. However, as with any wireless communication, data security in WBANs is a challenging design issue. Since such networks consist of small sensors placed on the human body, they impose resource and computational restrictions, thereby making the use of sophisticated and advanced encryption algorithms infeasible. This calls for the design of algorithms with a robust key generation / management scheme, which are reasonably resource optimal. This paper presents IAMKeys, an independent and adaptive key management scheme for improving the security of WBANs. The novelty of this scheme lies in the use of a randomly generated key for encrypting each data frame that is generated independently at both the sender and the receiver, eliminating the need for any key exchange. The simplicity of the encryption scheme, combined with the adaptability in key management makes the scheme simple, yet secure. The proposed algorithm is validated by performance analysis.

Keywords

body area networks body area network security wireless network security key management encryption 

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    Otto, C., Milenkovic, A., Sanders, C., Jovanov, E.: System Architecture of a Wireless Body Area Sensor Network for Ubiquitous Health Monitoring. Journal of Mobile Multimedia 1(4), 307–326 (2006)Google Scholar
  2. 2.
    Tan, C.C., Wang, H., Zhong, S., Li, Q.: Body Sensor Network Security: An Identity-Based Cryptography Approach. In: Proc. WiSec 2008, March 31-April 02 (2008)Google Scholar
  3. 3.
    Venkatasubramanian, K.K., Banerjee, A., Gupta, S.K.S.: EKG-based Key Agreement in Body Sensor Networks. In: Proceedings of IEEE INFOCOM Workshops 2008, pp. 1–6 (April 2008), doi:10.1109/INFOCOM.2008.4544608Google Scholar
  4. 4.
    Mana, M., Feham, M., Bensaber, B.A.: SEKEBAN (Secure and Efficient Key Exchange for Wireless Body Area Network). International Journal of Advanced Science and Technology 12, 45–60 (2009)Google Scholar
  5. 5.
    Mana, M., Feham, M., Bensaber, B.A.: Trust Key Management Scheme for Wireless Body Area Networks. International Journal of Network Security 12(2), 71–79 (2011)Google Scholar
  6. 6.
    Raazi, S.M.K., Lee, H.: BARI: A Distributed Key Management Approach for Wireless Body Area Networks. In: Proceedings of 2009 International Conference on Computational Intelligence and Security, pp. 324–329 (December 2009), doi:10.1109/CIS.2009.186Google Scholar
  7. 7.
    Robshaw, M.J.B.: Stream Ciphers, in RSA Laboratories Technical Report TR-701, version 2.0 (July 1995)Google Scholar
  8. 8.
    Mano, M.M., Ciletti, M.D.: Combinational Logic. In: Digital Design, 4th edn., pp. 135–196. Pearson Prentice Hall, New Delhi (2008)Google Scholar

Copyright information

© ICST Institute for Computer Science, Social Informatics and Telecommunications Engineering 2012

Authors and Affiliations

  • Raghav. V. Sampangi
    • 1
  • Saurabh Dey
    • 2
  • Shalini. R. Urs
    • 2
  • Srinivas Sampalli
    • 1
  1. 1.Faculty of Computer ScienceDalhousie UniversityCanada
  2. 2.International School of Information ManagementIndia

Personalised recommendations