Abstract

Wireless body area networks (WBANs) are formed by using tiny health monitoring sensors on the human body in order to collect and communicate the human personal data. WBANs serve as a solution to facilitate the tasks performed in the medical sector, and minimize the chances of errors during the process of medical diagnosis. Due to the unreliable wireless media, the communication in a WBAN is exposed to a variety of attacks. These attacks pose major threats to WBAN security. In order to overcome these threats, several cryptographic techniques have been proposed in the recent past. Effectiveness of these cryptographic techniques largely depends on a good key management scheme. However, using an expensive key management scheme is not feasible in highly resource-constrained WBANs. Therefore, we propose and evaluate an energy-efficient key management scheme for WBANs that takes into account available resources of a node during the whole life cycle of key management. Our proposed scheme is a cluster-based hybrid security framework that supports both intra-WBAN and inter-WBAN communications. By using multiple clusters, energy-efficiency can be ensured. The cluster formation process itself is secured by using electrocardiogram (EKG)-based key agreement scheme. The proposed technique is hybrid because we use both preloading of keys and physiological value-based generated keys. We use highly dynamic and random EKG values of the human body for pairwise key generation and refreshment. The performance comparison of our proposed cluster-based key management scheme and low-energy adaptive clustering hierarchy (LEACH)-based key agreement scheme shows that the proposed scheme is secure, more energy-efficient, and provides better network lifetime.

Highlights

  • Wireless body area network (WBAN) is a special kind of network, which is formed by putting the biometric sensors on the human body

  • During the communication between WBAN and remote base station (RBS), the WBAN might not be in the transmission range of the RBS. In this case the WBAN will communicate with another WBAN (WBAN-to-WBAN communication) to reach the RBS. (3) We present a key refreshment mechanism for both intra-WBAN and inter-WBAN communications based on physiological value (PV)

  • Clustering is performed for ten rounds for both proposed and low-energy adaptive clustering hierarchy (LEACH)-based schemes.The simulation area is kept as 100 × 100 m for 60, 100, and 300 nodes

Read more

Summary

Introduction

Wireless body area network (WBAN) is a special kind of network, which is formed by putting the biometric sensors on the human body. The nodes (WBANs) act as routers to forward data to the RBS In both the applications, the WBAN (single human body) may not always be in the range of the remote MS or the RBS. In intra-WBAN communication, we use physiological value (PV)-based solution for establishing trust among sensor nodes. For secure cluster formation and exchange of EKG blocks in intra-WBAN communication, we use EKGbased generated pairwise keys using keyed-hashing digest. An important requirement of inter-WBAN communication is the efficiency of energy, which increases the lifetime of a network For this purpose, we use an energyefficient secure cluster formation technique in interWBAN communication. These randomly selected keys from CH are assigned to cluster members (CMs) in the pre-deployment phase

Result accuracy
Secure cluster formation in inter-WBAN communication
Neighborhood discovery in inter-WBAN communication
Results and analysis
Key refreshment in inter-WBAN communication
Conclusions
Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.