An authenticated key agreement with rekeying for secured body sensor networks based on hybrid cryptosystem

In recent years personal health monitoring Body Sensor Network (BSN) have got significant importance. Due to its sensitive and constrained nature, health data should be transported / kept confidentially, therefore, lightweight cryptographic technique and key management schemes are required in BSN. In this paper we have proposed a hybrid authenticated key agreement with rekeying for Body Sensor Network. Our scheme is based on Symmetric and Elliptic Curve Cryptography. The proposed scheme reduces seventy four percent memory requirements for keys storage, eighty seven percent Computation Cost and sixty one percent Communication Overhead.

[1]  Iti Saha Misra,et al.  Implementation of RSA security protocol for sensor network security: Design and network lifetime analysis , 2011, 2011 2nd International Conference on Wireless Communication, Vehicular Technology, Information Theory and Aerospace & Electronic Systems Technology (Wireless VITAE).

[2]  Carmen C. Y. Poon,et al.  A novel biometrics method to secure wireless body area sensor networks for telemedicine and m-health , 2006, IEEE Communications Magazine.

[3]  Roberto Di Pietro,et al.  Emergent properties: detection of the node-capture attack in mobile wireless sensor networks , 2008, WiSec '08.

[4]  Donggang Liu,et al.  Establishing pairwise keys in distributed sensor networks , 2005, ACM Trans. Inf. Syst. Secur..

[5]  Muhammad Khurram Khan,et al.  A key agreement algorithm with rekeying for wireless sensor networks using public key cryptography , 2010, 2010 International Conference on Anti-Counterfeiting, Security and Identification.

[6]  S. Sastry,et al.  Security and Privacy Issues with Health Care Information Technology , 2006, 2006 International Conference of the IEEE Engineering in Medicine and Biology Society.

[7]  Azzedine Boukerche,et al.  The design of a secure key management system for mobile ad hoc networks , 2008, 2008 33rd IEEE Conference on Local Computer Networks (LCN).

[8]  Bao Li,et al.  An Efficient Scheme for User Authentication in Wireless Sensor Networks , 2007, 21st International Conference on Advanced Information Networking and Applications Workshops (AINAW'07).

[9]  N. Foukia,et al.  Using Trust in Key Distribution in Wireless Sensor Networks , 2007, 2007 IEEE Globecom Workshops.

[10]  Hans Eberle,et al.  Comparing Elliptic Curve Cryptography and RSA on 8-bit CPUs , 2004, CHES.

[11]  Nathan Lewis,et al.  Using trust for key distribution and route selection in Wireless Sensor Networks , 2008, NOMS 2008 - 2008 IEEE Network Operations and Management Symposium.

[12]  Alvin S. Lim,et al.  ACAR: Adaptive Connectivity Aware Routing Protocol for Vehicular Ad Hoc Networks , 2008, 2008 Proceedings of 17th International Conference on Computer Communications and Networks.

[13]  Lan Wang,et al.  Addressing security in medical sensor networks , 2007, HealthNet '07.