Energy-efficient key agreement protocols for wireless body area networks

Owing to the emerging demands of medical equipment nowadays, wireless body area network (WBAN) is imperative, while the vulnerable nature of wireless channel introduces various security threats and impedes its further development. Although a large set of security mechanisms have been designed for wireless sensor networks (WSNs), few of them can be applied for WBAN because of its unique networking and communications characteristics. By taking into account the special design requirements, we propose a series of authenticated key agreement protocols based on a two-hop star network topology model, which may accommodate a number of different application situations. Both security analysis and performance evaluation demonstrate that the proposed key agreement protocols can preserve desired security properties with light computation and communication overhead. The proposed protocols provide a primitive to develop efficient and secure WBAN systems.

[1]  Vipul Gupta,et al.  Energy analysis of public-key cryptography for wireless sensor networks , 2005, Third IEEE International Conference on Pervasive Computing and Communications.

[2]  Steve Goddard,et al.  SYS-EDF: a system-wide energy-efficient scheduling algorithm for hard real-time systems , 2009, Int. J. Embed. Syst..

[3]  Kyung Sup Kwak,et al.  Hybrid security mechanisms for wireless body area networks , 2010, 2010 Second International Conference on Ubiquitous and Future Networks (ICUFN).

[4]  Enrique Mario Spinelli,et al.  An embedded system for evoked biopotential acquisition and processing , 2014, Int. J. Embed. Syst..

[5]  Kyung-Ah Shim,et al.  Efficient one round tripartite authenticated key agreement protocol from Weil pairing , 2003 .

[6]  Chun-Ta Li,et al.  An efficient biometrics-based remote user authentication scheme using smart cards , 2010, J. Netw. Comput. Appl..

[7]  Pejman Khadivi,et al.  Using relay network to increase life time in wireless body area sensor networks , 2009, 2009 IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks & Workshops.

[8]  Colin Boyd,et al.  Elliptic Curve Based Password Authenticated Key Exchange Protocols , 2001, ACISP.

[9]  Antoine Joux A One Round Protocol for Tripartite Diffie-Hellman , 2000, ANTS.

[10]  Kevin Fu,et al.  Design challenges for secure implantable medical devices , 2012, DAC Design Automation Conference 2012.

[11]  David Jao,et al.  A Study of Two-Party Certificateless Authenticated Key-Agreement Protocols , 2009, INDOCRYPT.

[12]  Lev Kirischian,et al.  A framework of embedded reconfigurable systems based on re-locatable virtual components , 2010, Int. J. Embed. Syst..

[13]  Whitfield Diffie,et al.  New Directions in Cryptography , 1976, IEEE Trans. Inf. Theory.

[14]  Kenneth G. Paterson,et al.  Tripartite Authenticated Key Agreement Protocols from Pairings , 2003, IMACC.

[15]  Mihir Bellare,et al.  Authenticated Key Exchange Secure against Dictionary Attacks , 2000, EUROCRYPT.

[16]  Dyi-Rong Duh,et al.  Real-time reconfigurable cache for low-power embedded systems , 2010, Int. J. Embed. Syst..

[17]  Jin-Meng Ho,et al.  A versatile suite of strong authenticated key agreement protocols for body area networks , 2012, 2012 8th International Wireless Communications and Mobile Computing Conference (IWCMC).

[18]  Jun Li,et al.  Security Verification of 802.11i 4-Way Handshake Protocol , 2008, 2008 IEEE International Conference on Communications.