Verification of key establishment protocols for a home health care system

A body sensor network can be used in a home health care system to monitor the elderly or patients with chronic diseases. The security and requirements of the home health care system is complex. We show how genetic design methodology models the requirements of the health care system. In our system, physiological data can be used to establish keys amongst body sensors, where the sensors have no other prior secret. We show how the requirements of the key establishment protocol can be placed into a requirement behaviour tree. A model is generated from the behaviour tree, and a model checker is used to formally verify the protocol within our system. Implementation of the salient features of each of the protocols is provided. The salient features of the protocols were implemented in TinyOS and run on mica2 motes. The time elapsed, complexity of the code, and memory requirements are analysed in detail.

[1]  Ronald L. Rivest,et al.  The MD5 Message-Digest Algorithm , 1992, RFC.

[2]  Adrian Perrig,et al.  PIKE: peer intermediaries for key establishment in sensor networks , 2005, Proceedings IEEE 24th Annual Joint Conference of the IEEE Computer and Communications Societies..

[3]  Mani Srivastava,et al.  Energy Harvesting Aware Power Management , 2005 .

[4]  Yingli Tian S3-R1: the IBM smart surveillance system release 1 , 2005, 14th Annual International Conference on Wireless and Optical Communications, 2005. WOCC 2005.

[5]  Guang-Zhong Yang,et al.  Pervasive body sensor network: an approach to monitoring the post-operative surgical patient , 2006, International Workshop on Wearable and Implantable Body Sensor Networks (BSN'06).

[6]  Hugo Krawczyk,et al.  HMAC: Keyed-Hashing for Message Authentication , 1997, RFC.

[7]  Michael Grüninger,et al.  Introduction , 2002, CACM.

[8]  Vallipuram Muthukkumarasamy,et al.  Protecting Small Keys in Authentication Protocols for Wireless Sensor Networks , 2006 .

[9]  V. Muthukkumarasamy,et al.  Authenticated Key Establishment Protocols for a Home Health Care System , 2007, 2007 3rd International Conference on Intelligent Sensors, Sensor Networks and Information.

[10]  Carmen C. Y. Poon,et al.  A novel biometrics method to secure wireless body area sensor networks for telemedicine and m-health , 2006, IEEE Communications Magazine.

[11]  David A. Wagner,et al.  TinySec: a link layer security architecture for wireless sensor networks , 2004, SenSys '04.

[12]  Panu Hämäläinen,et al.  Security in Wireless Sensor Networks: Considerations and Experiments , 2006, SAMOS.

[13]  Donggang Liu,et al.  Security for Wireless Sensor Networks , 2006, Advances in Information Security.

[14]  David E. Culler,et al.  Securing the Deluge network programming system , 2006, 2006 5th International Conference on Information Processing in Sensor Networks.

[15]  R. Geoff Dromey,et al.  From requirements to design: formalizing the key steps , 2003, First International Conference onSoftware Engineering and Formal Methods, 2003.Proceedings..

[16]  C. H. West,et al.  General technique for communications protocol validation , 1978 .

[17]  Steven M. Bellovin,et al.  Encrypted key exchange: password-based protocols secure against dictionary attacks , 1992, Proceedings 1992 IEEE Computer Society Symposium on Research in Security and Privacy.

[18]  Vallipuram Muthukkumarasamy,et al.  Analysis of Proposed Key Establishment Protocols in Multi-Tiered Sensor Networks , 2008, J. Networks.

[19]  Edmund M. Clarke,et al.  Formal Methods: State of the Art and Future Directions Working Group Members , 1996 .

[20]  Vallipuram Muthukkumarasamy,et al.  Formal verification of the IEEE 802.11i WLAN security protocol , 2006, Australian Software Engineering Conference (ASWEC'06).

[21]  Yuan-Ting Zhang,et al.  Physiological Signal Based Entity Authentication for Body Area Sensor Networks and Mobile Healthcare Systems , 2005, 2005 IEEE Engineering in Medicine and Biology 27th Annual Conference.

[22]  K.K. Venkatasubramanian,et al.  Security for Pervasive Health Monitoring Sensor Applications , 2006, 2006 Fourth International Conference on Intelligent Sensing and Information Processing.