Study on peak misdetection recovery of key exchange protocol using heartbeat

Various studies have been conducted on a secret key exchange using the inter-pulse interval (IPI) extracted from a pulse wave. The IPI-based key exchange method uses a point where the body can measure an IPI of similar value anywhere. The IPI measured to generate the secret key shares the error correction code between biometric sensors and generates the key using the corrected IPI. Peak misdetection negatively affects key generation because the IPI does not consistently match. In this paper, we propose a method to detect misdetection and recover IPI using thresholds. The proposed method reduces the cost of communication compared to the previous method, which is not only energy efficient but also key generating. The efficiency of the recovery method is also demonstrated. Tests results show the total number of IPI recoveries is 19, while the key generation rate is 99.4%.

[1]  Carmen C. Y. Poon,et al.  A novel biometrics method to secure wireless body area sensor networks for telemedicine and m-health , 2006, IEEE Communications Magazine.

[2]  Ravinder Kumar,et al.  A Robust Fingerprint Matching System Using Orientation Features , 2016, J. Inf. Process. Syst..

[3]  Manesh Kokare,et al.  Iris Recognition Using Ridgelets , 2012, J. Inf. Process. Syst..

[4]  李烨,et al.  Physiological Signal Based Biometrics for Securing Body Sensor Network , 2012 .

[5]  Gengfa Fang,et al.  A comparison of key distribution schemes using fuzzy commitment and fuzzy vault within wireless body area networks , 2015, 2015 IEEE 26th Annual International Symposium on Personal, Indoor, and Mobile Radio Communications (PIMRC).

[6]  Christos Strydis,et al.  Secure key-exchange protocol for implants using heartbeats , 2016, Conf. Computing Frontiers.

[7]  Jiankun Hu,et al.  Physiological-Signal-Based Key Negotiation Protocols for Body Sensor Networks: A Survey , 2015, 2015 IEEE Twelfth International Symposium on Autonomous Decentralized Systems.

[8]  Farinaz Koushanfar,et al.  Heart-to-heart (H2H): authentication for implanted medical devices , 2013, CCS.

[9]  Ye Li,et al.  Physiological Signal Based Biometrics for Securing Body Sensor Network , 2012 .

[10]  Carmen C. Y. Poon,et al.  A biometrics based security solution for encryption and authentication in tele-healthcare systems , 2009, 2009 2nd International Symposium on Applied Sciences in Biomedical and Communication Technologies.

[11]  Yuan-Ting Zhang,et al.  An Efficient Biometric-Based Algorithm Using Heart Rate Variability for Securing Body Sensor Networks , 2015, Sensors.

[12]  Ayan Banerjee,et al.  PSKA: Usable and Secure Key Agreement Scheme for Body Area Networks , 2010, IEEE Transactions on Information Technology in Biomedicine.

[13]  Ju-Sung Kang,et al.  Probabilistic Analysis of AIS.31 Statistical Tests for TRNGs and Their Applications to Security Evaluations , 2016 .

[14]  Carmen C. Y. Poon,et al.  Using the Timing Information of Heartbeats as an Entity Identifier to Secure Body Sensor Network , 2008, IEEE Transactions on Information Technology in Biomedicine.

[15]  Colleen Swanson,et al.  SoK: Security and Privacy in Implantable Medical Devices and Body Area Networks , 2014, 2014 IEEE Symposium on Security and Privacy.

[16]  Axel Munk,et al.  The Fuzzy Vault for Fingerprints is Vulnerable to Brute Force Attack , 2007, BIOSIG.

[17]  Rabah Attia,et al.  ELPA: A new key agreement scheme based on linear prediction of ECG features for WBAN , 2015, 2015 23rd European Signal Processing Conference (EUSIPCO).

[18]  Sandeep K. S. Gupta,et al.  Physiological value-based efficient usable security solutions for body sensor networks , 2010, TOSN.

[19]  Hsing-Chung Chen,et al.  A fusion approach based on infrared finger vein transmitting model by using multi-light-intensity imaging , 2017, Human-centric Computing and Information Sciences.

[20]  Sandeep K. S. Gupta,et al.  Biosec: a biometric based approach for securing communication in wireless networks of biosensors implanted in the human body , 2003, 2003 International Conference on Parallel Processing Workshops, 2003. Proceedings..