ASK-BAN: authenticated secret key extraction utilizing channel characteristics for body area networks

Recently there has been an increasing interest on bootstrapping security for wireless networks merely using physical layer characteristics. In particular, the focus has been on two fundamental security issues - device authentication and secret key extraction. While most existing works emphasize on tackling the two issues separately, it remains an open problem to simultaneously achieve device authentication and fast secret key extraction merely using wireless physical layer characteristics, without the help of advanced hardware or out-of-band channel. In this paper, for the first time, we answer this open problem in the setting of Wireless Body Area Networks (BANs). We propose ASK-BAN, a lightweight fast authenticated secret key extraction scheme for intra-BAN communication. Our scheme neither introduces any advanced hardware nor relies on out-of-band channels. To perform device authentication and fast secret key extraction at the same time, we exploit the heterogeneous channel characteristics among the collection of on-body channels during body motion. Specifically, with simple body movements, channel variations between line-of-sight on-body devices are relatively stable while those for non-line-of-sight devices are unstable. ASK-BAN utilizes the relatively static channels for device authentication and the dynamic ones for secret key generation. On one hand, ASK-BAN achieves authentication through multi-hop stable channels, which greatly reduces the false positive rate as compared to existing work. On the other hand, based on dynamic channels, the key extraction process between two on-body devices with multi-hop relay nodes is modeled as a max-flow problem, and a novel collaborative secret key generation algorithm is introduced to maximize the key generation rate. Extensive real-world experiments on low-end COTS sensor devices validate that ASK-BAN has a high secret key generation rate while being able to authenticate body devices effectively.

[1]  Mario Huemer,et al.  Key Generation Based on Acceleration Data of Shaking Processes , 2007, UbiComp.

[2]  Sandeep K. S. Gupta,et al.  Physiological value-based efficient usable security solutions for body sensor networks , 2010, TOSN.

[3]  Ming Li,et al.  BANA: Body Area Network Authentication Exploiting Channel Characteristics , 2012, IEEE Journal on Selected Areas in Communications.

[4]  Xiaojiang Du,et al.  Biometric-based two-level secure access control for Implantable Medical Devices during emergencies , 2011, 2011 Proceedings IEEE INFOCOM.

[5]  René Mayrhofer,et al.  Shake Well Before Use: Authentication Based on Accelerometer Data , 2007, Pervasive.

[6]  Simon L. Cotton,et al.  Received signal characteristics of outdoor body-to-body communications channels at 2.45 GHz , 2011, 2011 Loughborough Antennas & Propagation Conference.

[7]  David Kotz,et al.  Recognizing whether sensors are on the same body , 2011, Pervasive Mob. Comput..

[8]  Nick F. Timmons,et al.  On-body to on-body channel characterization , 2011, 2011 IEEE SENSORS Proceedings.

[9]  Wenliang Du,et al.  PHY-based cooperative key generation in wireless networks , 2011, 2011 49th Annual Allerton Conference on Communication, Control, and Computing (Allerton).

[10]  Sneha Kumar Kasera,et al.  Secret Key Extraction from Wireless Signal Strength in Real Environments , 2009, IEEE Transactions on Mobile Computing.

[11]  Eyal de Lara,et al.  Amigo: Proximity-Based Authentication of Mobile Devices , 2007, UbiComp.

[12]  Sandeep K. S. Gupta,et al.  Biosec: a biometric based approach for securing communication in wireless networks of biosensors implanted in the human body , 2003, 2003 International Conference on Parallel Processing Workshops, 2003. Proceedings..

[13]  Gilles Brassard,et al.  Secret-Key Reconciliation by Public Discussion , 1994, EUROCRYPT.

[14]  Leonid A. Levin,et al.  Pseudo-random generation from one-way functions , 1989, STOC '89.

[15]  W. G. Scanlon,et al.  An experimental study on the impact of human body shadowing in off-body communications channels at 2.45 GHz , 2011, Proceedings of the 5th European Conference on Antennas and Propagation (EUCAP).

[16]  Ivan Martinovic,et al.  A Practical Man-In-The-Middle Attack on Signal-Based Key Generation Protocols , 2012, ESORICS.

[17]  Ingrid Moerman,et al.  A survey on wireless body area networks , 2011, Wirel. Networks.

[18]  René Mayrhofer,et al.  Shake Well Before Use: Intuitive and Secure Pairing of Mobile Devices , 2009, IEEE Transactions on Mobile Computing.

[19]  Fabio Di Franco,et al.  The effect of body shape and gender on wireless Body Area Network on-body channels , 2010, IEEE Middle East Conference on Antennas and Propagation (MECAP 2010).

[20]  Wade Trappe,et al.  Radio-telepathy: extracting a secret key from an unauthenticated wireless channel , 2008, MobiCom '08.

[21]  Julien Ryckaert,et al.  Channel model for wireless communication around human body , 2004 .

[22]  Farhad Shahrokhi,et al.  The maximum concurrent flow problem , 1990, JACM.

[23]  Donald F. Towsley,et al.  Secure Wireless Communication with Dynamic Secrets , 2010, 2010 Proceedings IEEE INFOCOM.

[24]  V. Muthukkumarasamy,et al.  Authenticated Key Establishment Protocols for a Home Health Care System , 2007, 2007 3rd International Conference on Intelligent Sensors, Sensor Networks and Information.

[25]  Ayan Banerjee,et al.  PSKA: Usable and Secure Key Agreement Scheme for Body Area Networks , 2010, IEEE Transactions on Information Technology in Biomedicine.

[26]  Prasant Mohapatra,et al.  Good Neighbor: Ad hoc Pairing of Nearby Wireless Devices by Multiple Antennas , 2011, NDSS.

[27]  Carmen C. Y. Poon,et al.  A novel biometrics method to secure wireless body area sensor networks for telemedicine and m-health , 2006, IEEE Communications Magazine.

[28]  Fengyuan Xu,et al.  IMDGuard: Securing implantable medical devices with the external wearable guardian , 2011, 2011 Proceedings IEEE INFOCOM.

[29]  Eyal de Lara,et al.  Ensemble: cooperative proximity-based authentication , 2010, MobiSys '10.

[30]  Wade Trappe,et al.  ProxiMate: proximity-based secure pairing using ambient wireless signals , 2011, MobiSys '11.