Efficient high-rate key management technique for wireless body area networks

Wireless body area network (WBAN) is an emerging technology that focuses on healthcare monitoring in indoor and outdoor areas. WBAN technology allows medical sensors to collect vital physiological data and transfer it from a source to a destination via low-energy communication. To be able to encrypt and decrypt healthcare data, it is important for medical sensing and health-related devices to generate and extract the same secret keys at both end points. Recent studies show that two medical sensing devices can generate and share secret keys using their wireless channel properties, such as the received signal strength indicator (RSSI). However, existing approaches have low bit rate values and the key entropy is insufficient. These limitations pose a major threat to WBANs and must be addressed. In this paper, we first provide an overview of existing studies related to key extraction between two devices. We then describe the basic principles of wireless channel properties and the key parameters needed to generate secret keys. Finally, we propose a practical scheme to generate secret keys while avoiding information reconciliation and privacy amplification. The proposed scheme can generate 128 symmetric secret keys in a short time frame, and allows to secure the communication between sensor devices and improve the quality of services in WBANs.

[1]  Sneha Kumar Kasera,et al.  High-Rate Uncorrelated Bit Extraction for Shared Secret Key Generation from Channel Measurements , 2010, IEEE Transactions on Mobile Computing.

[2]  Nick S. Jones,et al.  Key Distillation and the Secret-Bit Fraction , 2006, IEEE Transactions on Information Theory.

[3]  Farinaz Koushanfar,et al.  Balancing security and utility in Medical Devices? , 2013, 2013 50th ACM/EDAC/IEEE Design Automation Conference (DAC).

[4]  Akbar M. Sayeed,et al.  Secure wireless communications: Secret keys through multipath , 2008, 2008 IEEE International Conference on Acoustics, Speech and Signal Processing.

[5]  Ghassan O. Karame,et al.  Integrity Regions: Authentication through Presence in Wireless Networks , 2006, IEEE Transactions on Mobile Computing.

[6]  Lenan Wu,et al.  A Secret Key Extraction Technique Applied in Vehicular Networks , 2014, 2014 IEEE 17th International Conference on Computational Science and Engineering.

[7]  Ali Farrokhtala,et al.  Detection of sinkhole attack in wireless sensor networks , 2013, 2013 IEEE International Conference on Space Science and Communication (IconSpace).

[8]  Gill R. Tsouri,et al.  Securing While Sampling in Wireless Body Area Networks With Application to Electrocardiography , 2016, IEEE Journal of Biomedical and Health Informatics.

[9]  Chiara Buratti,et al.  A Survey on Wireless Body Area Networks: Technologies and Design Challenges , 2014, IEEE Communications Surveys & Tutorials.

[10]  Ming Li,et al.  BANA: Body Area Network Authentication Exploiting Channel Characteristics , 2012, IEEE Journal on Selected Areas in Communications.

[11]  Sneha Kumar Kasera,et al.  Secret key extraction using Bluetooth wireless signal strength measurements , 2014, 2014 Eleventh Annual IEEE International Conference on Sensing, Communication, and Networking (SECON).

[12]  Sanjay Jha,et al.  Mobility Independent Secret Key Generation for Wearable Health-care Devices , 2015, BODYNETS.

[13]  Ingrid Moerman,et al.  A survey on wireless body area networks , 2011, Wirel. Networks.

[14]  Dhammika Jayalath,et al.  Understanding data flow and security requirements in wireless Body Area Networks for healthcare , 2015, 2015 17th International Conference on E-health Networking, Application & Services (HealthCom).

[15]  Jiankun Hu,et al.  An Energy Efficient Key Management Scheme for Body Sensor Networks , 2013, IEEE Transactions on Parallel and Distributed Systems.

[16]  Kyung Sup Kwak,et al.  A Review of Wireless Body Area Networks for Medical Applications , 2009, Int. J. Commun. Netw. Syst. Sci..

[17]  Ali Farrokhtala,et al.  Security in Wireless Sensor Networks: Issues and challanges , 2013, 2013 IEEE International Conference on Space Science and Communication (IconSpace).

[18]  Jingjing Huang,et al.  Secret key generation exploiting Ultra-wideband indoor wireless channel characteristics , 2015, Secur. Commun. Networks.

[19]  Wade Trappe,et al.  Radio-telepathy: extracting a secret key from an unauthenticated wireless channel , 2008, MobiCom '08.

[20]  Inmaculada Tomeo-Reyes,et al.  IEEE 802.15.6 standard in wireless body area networks from a healthcare point of view , 2016, 2016 22nd Asia-Pacific Conference on Communications (APCC).

[21]  Athanasios V. Vasilakos,et al.  An Enhanced Mobile-Healthcare Emergency System Based on Extended Chaotic Maps , 2013, Journal of Medical Systems.

[22]  Syed Taha Ali,et al.  Decorrelating secret bit extraction via channel hopping in body area networks , 2012, 2012 IEEE 23rd International Symposium on Personal, Indoor and Mobile Radio Communications - (PIMRC).

[23]  Sanjay Jha,et al.  SeAK: Secure Authentication and Key Generation Protocol Based on Dual Antennas for Wireless Body Area Networks , 2014, RFIDSec.

[24]  Fan Zhang,et al.  OPFKA: Secure and efficient Ordered-Physiological-Feature-based key agreement for wireless Body Area Networks , 2013, 2013 Proceedings IEEE INFOCOM.

[25]  Ivan Martinovic,et al.  Key Generation in Wireless Sensor Networks Based on Frequency-selective Channels - Design, Implementation, and Analysis , 2010, ArXiv.

[26]  Sneha Kumar Kasera,et al.  On Fast and Accurate Detection of Unauthorized Wireless Access Points Using Clock Skews , 2008, IEEE Transactions on Mobile Computing.

[27]  Sneha Kumar Kasera,et al.  Secret Key Extraction from Wireless Signal Strength in Real Environments , 2009, IEEE Transactions on Mobile Computing.

[28]  Kui Ren,et al.  Cooperative Secret Key Generation from Phase Estimation in Narrowband Fading Channels , 2011, IEEE Journal on Selected Areas in Communications.

[29]  Marimuthu Palaniswami,et al.  KALwEN: a new practical and interoperable key management scheme for body sensor networks , 2008, Secur. Commun. Networks.

[30]  Nenghai Yu,et al.  A Multihop Key Agreement Scheme for Wireless Ad Hoc Networks Based on Channel Characteristics , 2013, TheScientificWorldJournal.

[31]  Aggelos Kiayias,et al.  Robust key generation from signal envelopes in wireless networks , 2007, CCS '07.

[32]  Yuefeng Ji,et al.  Low Mismatch Key Agreement Based on Wavelet-Transform Trend and Fuzzy Vault in Body Area Network , 2013, Int. J. Distributed Sens. Networks.

[33]  Wade Trappe,et al.  Information-Theoretically Secret Key Generation for Fading Wireless Channels , 2009, IEEE Transactions on Information Forensics and Security.