IAMKeys: Independent and Adaptive Management of Keys for Security in Wireless Body Area Networks
Wireless Body Area Networks (WBANs) have gained a lot of research attention in recent years since they offer tremendous benefits for remote health monitoring and continuous, real-time patient care. However, as with any wireless communication, data security in WBANs is a challenging design issue. Since such networks consist of small sensors placed on the human body, they impose resource and computational restrictions, thereby making the use of sophisticated and advanced encryption algorithms infeasible. This calls for the design of algorithms with a robust key generation / management scheme, which are reasonably resource optimal. This paper presents IAMKeys, an independent and adaptive key management scheme for improving the security of WBANs. The novelty of this scheme lies in the use of a randomly generated key for encrypting each data frame that is generated independently at both the sender and the receiver, eliminating the need for any key exchange. The simplicity of the encryption scheme, combined with the adaptability in key management makes the scheme simple, yet secure. The proposed algorithm is validated by performance analysis.
Keywordsbody area networks body area network security wireless network security key management encryption
Unable to display preview. Download preview PDF.
- 1.Otto, C., Milenkovic, A., Sanders, C., Jovanov, E.: System Architecture of a Wireless Body Area Sensor Network for Ubiquitous Health Monitoring. Journal of Mobile Multimedia 1(4), 307–326 (2006)Google Scholar
- 2.Tan, C.C., Wang, H., Zhong, S., Li, Q.: Body Sensor Network Security: An Identity-Based Cryptography Approach. In: Proc. WiSec 2008, March 31-April 02 (2008)Google Scholar
- 3.Venkatasubramanian, K.K., Banerjee, A., Gupta, S.K.S.: EKG-based Key Agreement in Body Sensor Networks. In: Proceedings of IEEE INFOCOM Workshops 2008, pp. 1–6 (April 2008), doi:10.1109/INFOCOM.2008.4544608Google Scholar
- 4.Mana, M., Feham, M., Bensaber, B.A.: SEKEBAN (Secure and Efficient Key Exchange for Wireless Body Area Network). International Journal of Advanced Science and Technology 12, 45–60 (2009)Google Scholar
- 5.Mana, M., Feham, M., Bensaber, B.A.: Trust Key Management Scheme for Wireless Body Area Networks. International Journal of Network Security 12(2), 71–79 (2011)Google Scholar
- 6.Raazi, S.M.K., Lee, H.: BARI: A Distributed Key Management Approach for Wireless Body Area Networks. In: Proceedings of 2009 International Conference on Computational Intelligence and Security, pp. 324–329 (December 2009), doi:10.1109/CIS.2009.186Google Scholar
- 7.Robshaw, M.J.B.: Stream Ciphers, in RSA Laboratories Technical Report TR-701, version 2.0 (July 1995)Google Scholar
- 8.Mano, M.M., Ciletti, M.D.: Combinational Logic. In: Digital Design, 4th edn., pp. 135–196. Pearson Prentice Hall, New Delhi (2008)Google Scholar