A hybrid key management scheme for healthcare sensor networks

Recent research in the performance of public key algorithms, such as Elliptic Curve Cryptography (ECC), have illustrated upon their practical applicability in sensor networks. With this research, we are proposing an optimization to one of the most critical operations in Public Key Cryptography (PKC)-authentication of the public key. Here, we provide a framework that proposes a resource-efficient, lightweight and scalable key management scheme for the network under consideration. The proposed scheme uses a one-way hash function to construct a hash tree (Merkle Tree) as an alternative to traditional public key authentication techniques. Security and privacy are two foundational pillars in the design of electronic health systems, with users demanding high confidentiality of their personal data. Without the right infrastructure it is difficult to secure the ecosystem of wearable devices. We envision that by harnessing the performance capabilities of traditional symmetric-key algorithms coupled with the inherent benefits of the PKC architecture, the proposed scheme will provide a more robust and efficient security solution for e-Health driven applications.

[1]  Matt Welsh,et al.  CodeBlue: An Ad Hoc Sensor Network Infrastructure for Emergency Medical Care , 2004 .

[2]  Dharma P. Agrawal,et al.  Secure and efficient authentication in Wireless Mesh Networks using merkle trees , 2008, 2008 33rd IEEE Conference on Local Computer Networks (LCN).

[3]  Virgil D. Gligor,et al.  A key-management scheme for distributed sensor networks , 2002, CCS '02.

[4]  Dawn Xiaodong Song,et al.  Random key predistribution schemes for sensor networks , 2003, 2003 Symposium on Security and Privacy, 2003..

[5]  Hans Eberle,et al.  Comparing Elliptic Curve Cryptography and RSA on 8-bit CPUs , 2004, CHES.

[6]  Peng Ning,et al.  2008 International Conference on Information Processing in Sensor Networks TinyECC: A Configurable Library for Elliptic Curve Cryptography in Wireless Sensor Networks ∗ , 2022 .

[7]  Peng Ning,et al.  An efficient scheme for authenticating public keys in sensor networks , 2005, MobiHoc '05.

[8]  F. Kargl,et al.  Security, Privacy and Legal Issues in Pervasive eHealth Monitoring Systems , 2008, 2008 7th International Conference on Mobile Business.

[9]  S. Sastry,et al.  Security and Privacy Issues with Health Care Information Technology , 2006, 2006 International Conference of the IEEE Engineering in Medicine and Biology Society.

[10]  Nuria Oliver,et al.  HealthGear: a real-time wearable system for monitoring and analyzing physiological signals , 2006, International Workshop on Wearable and Implantable Body Sensor Networks (BSN'06).

[11]  Ming Li,et al.  Secure ad hoc trust initialization and key management in wireless body area networks , 2013, TOSN.

[12]  Dharma P. Agrawal,et al.  The Human Key: Identification and Authentication in Wearable Devices Using Gait , 2015 .