Authentication of lossy data in body-sensor networks for healthcare monitoring

Growing pressures on healthcare costs are spurring development of lightweight bodyworn sensors for real-time and continuous physiological monitoring. Data from these sensors is streamed wirelessly to a handheld device such as a mobile phone, and then archived over the Internet at a central database. Authenticating the data is vital to ensure proper diagnosis, traceability, and validation of claims. Digital signatures at the packet-level are too resource-intensive for bodyworn devices, while block-level signatures are not robust to loss. In this paper we propose, analyse, and validate a practical, lightweight robust authentication scheme suitable for health-monitoring. We make three specific contributions: (a) We develop an authentication scheme that is both low-cost (using a Merkle hash tree to amortise digital signature costs), and loss-resilient (using network coding to recover strategic nodes within the tree). (b) We develop a framework for optimising placement of network coding within the tree to maximise data verifiability for a given overhead and loss environment. (c) We validate our scheme using experimental traces of typical operating conditions to show that it achieves high success (over 99% of the medical data can be authenticated) at very low overheads (as low as 5% extra transmissions) and at very low cost (the bodyworn device has to perform a digital signature operation no more than once per hour). We believe our novel authentication scheme can be a key ingredient in the integration of wearable medical monitoring devices into current healthcare systems.

[1]  Rosario Gennaro,et al.  How to Sign Digital Streams , 1997, Inf. Comput..

[2]  Kok-Kiong Yap,et al.  Link layer behavior of body area networks at 2.4 GHz , 2009, MobiCom '09.

[3]  Peter Sanders,et al.  Polynomial time algorithms for network information flow , 2003, SPAA '03.

[4]  Dimitri Konstantas,et al.  MobiHealth-Innovative 2.5/3G mobile services and applications for health care , 2002 .

[5]  Peter Langendörfer,et al.  How public key cryptography influences wireless sensor node lifetime , 2006, SASN '06.

[6]  Philippe Golle,et al.  Authenticating Streamed Data in the Presence of Random Packet Loss , 2001, NDSS.

[7]  Ran Canetti,et al.  Efficient authentication and signing of multicast streams over lossy channels , 2000, Proceeding 2000 IEEE Symposium on Security and Privacy. S&P 2000.

[8]  Duncan Graham-Rowe Body organs can send status updates to yo ur cellphone , 2010 .

[9]  Peng Ning,et al.  Seluge: Secure and DoS-Resistant Code Dissemination in Wireless Sensor Networks , 2008, 2008 International Conference on Information Processing in Sensor Networks (ipsn 2008).

[10]  Ralph C. Merkle,et al.  A Digital Signature Based on a Conventional Encryption Function , 1987, CRYPTO.

[11]  Simon S. Lam,et al.  Digital signatures for flows and multicasts , 1998, Proceedings Sixth International Conference on Network Protocols (Cat. No.98TB100256).

[12]  Edwin K. P. Chong,et al.  Efficient multicast stream authentication using erasure codes , 2003, TSEC.

[13]  J. Deng,et al.  Secure code distribution in dynamically programmable wireless sensor networks , 2006, 2006 5th International Conference on Information Processing in Sensor Networks.

[14]  Lawrence Wai-Choong Wong,et al.  A proposal of butterfly-graph based stream authentication over lossy networks , 2005, 2005 IEEE International Conference on Multimedia and Expo.

[15]  Bharat K. Bhargava,et al.  A tree-based forward digest protocol to verify data integrity in distributed media streaming , 2005, IEEE Transactions on Knowledge and Data Engineering.

[16]  M. Anwar Hasan,et al.  Look-Up Table-Based Large Finite Field Multiplication in Memory Constrained Cryptosystems , 2000, IEEE Trans. Computers.

[17]  X. N. Zhang Secure Code Distribution , 1997, Computer.

[18]  Refik Molva,et al.  Efficient Multicast Packet Authentication , 2003, NDSS.

[19]  Muriel Médard,et al.  On coding for reliable communication over packet networks , 2005, Phys. Commun..

[20]  Vijay Sivaraman,et al.  Transmission Power Control in Body Area Sensor Networks for Healthcare Monitoring , 2009, IEEE Journal on Selected Areas in Communications.