Accelerometer-Based Key Generation and Distribution Method for Wearable IoT Devices

With the fast development of wearable IoT devices, their applications are becoming more and more pervasive, ranging from social networking, payment, and navigation to health and activity monitoring. The security of the communication between these devices is essential to protect the transmitted sensitive information from tampering and eavesdropping. With the integration of accelerometers into wearable IoT devices, the gait-based biometric cryptography technology has emerged as a data securing tool for wearables. This article proposes a lightweight noise-based group key generation method, which utilizes the noise signals imposed on the raw acceleration signals to generate an M-bit key with high randomness and bit generation rate. Moreover, a signed sliding window coding (SSWC)-based common feature extraction method was designed to extract the common feature for sharing the generated M-bit key among devices worn on different body parts. Finally, a fuzzy vault-based group key distribution system was implemented and evaluated using a public data set. The performed comprehensive analysis of the proposed key generation and distribution method proved that the binary keys generated via the introduced noise-based procedure have high entropy and can pass both the NIST and Dieharder statistical tests with high efficiency. The experimental results obtained prove the robustness of the proposed SSWC-based common feature extraction method in terms of the similarity and discriminability of intra- and inter-class features, respectively.

[1]  Geng Yang,et al.  Wearable Internet of Things: Concept, architectural components and promises for person-centered healthcare , 2014 .

[2]  Anil K. Jain,et al.  Biometric cryptosystems: issues and challenges , 2004, Proceedings of the IEEE.

[3]  Ye Li,et al.  Accelerometer-Based Speed-Adaptive Gait Authentication Method for Wearable IoT Devices , 2019, IEEE Internet of Things Journal.

[4]  Geng Yang,et al.  Wearable Internet of Things: Concept, architectural components and promises for person-centered healthcare , 2014, 2014 4th International Conference on Wireless Mobile Communication and Healthcare - Transforming Healthcare Through Innovations in Mobile and Wireless Technologies (MOBIHEALTH).

[5]  Giancarlo Fortino,et al.  Gait-based identification for elderly users in wearable healthcare systems , 2020, Inf. Fusion.

[6]  Athanasios V. Vasilakos,et al.  Authenticated key management protocol for cloud-assisted body area sensor networks , 2018, J. Netw. Comput. Appl..

[7]  Timo Sztyler,et al.  On-body localization of wearable devices: An investigation of position-aware activity recognition , 2016, 2016 IEEE International Conference on Pervasive Computing and Communications (PerCom).

[8]  René Mayrhofer,et al.  Shake Well Before Use: Intuitive and Secure Pairing of Mobile Devices , 2009, IEEE Transactions on Mobile Computing.

[9]  Neil W. Bergmann,et al.  Walkie-Talkie: Motion-Assisted Automatic Key Generation for Secure On-Body Device Communication , 2016, 2016 15th ACM/IEEE International Conference on Information Processing in Sensor Networks (IPSN).

[10]  Madhu Sudan,et al.  A Fuzzy Vault Scheme , 2006, Des. Codes Cryptogr..

[11]  Carmen C. Y. Poon,et al.  Analysis of Using Interpulse Intervals to Generate 128-Bit Biometric Random Binary Sequences for Securing Wireless Body Sensor Networks , 2012, IEEE Transactions on Information Technology in Biomedicine.

[12]  Benny P. L. Lo,et al.  Random Number Generation Using Inertial Measurement Unit Signals for On-Body IoT Devices , 2018, IoT 2018.

[13]  Yingjiu Li,et al.  Lightweight Sharable and Traceable Secure Mobile Health System , 2020, IEEE Transactions on Dependable and Secure Computing.

[14]  Mario Huemer,et al.  Key Generation Based on Acceleration Data of Shaking Processes , 2007, UbiComp.

[15]  Athanasios V. Vasilakos,et al.  ECG-Cryptography and Authentication in Body Area Networks , 2012, IEEE Transactions on Information Technology in Biomedicine.

[16]  Athanasios V. Vasilakos,et al.  A Novel Authentication and Key Agreement Scheme for Implantable Medical Devices Deployment , 2018, IEEE Journal of Biomedical and Health Informatics.

[17]  Divya Sharma,et al.  Body area networks: A survey , 2016, 2016 3rd International Conference on Computing for Sustainable Global Development (INDIACom).

[18]  Jongmoo Choi,et al.  Security threat on wearable services: Empirical study using a commercial smartband , 2016, 2016 IEEE International Conference on Consumer Electronics-Asia (ICCE-Asia).

[19]  Ye Li,et al.  Biometric key distribution solution with energy distribution information of physiological signals for body sensor network security , 2013, IET Inf. Secur..

[20]  Zhelong Wang,et al.  Adaptive gait detection based on foot-mounted inertial sensors and multi-sensor fusion , 2019, Inf. Fusion.

[21]  Martin Wattenberg,et al.  A fuzzy commitment scheme , 1999, CCS '99.

[22]  Zhaohui Wu,et al.  Accelerometer-Based Gait Recognition by Sparse Representation of Signature Points With Clusters , 2015, IEEE Transactions on Cybernetics.

[23]  Sherali Zeadally,et al.  Privacy Issues and Solutions for Consumer Wearables , 2018, IT Professional.

[24]  Jiankun Hu,et al.  A New Biocryptosystem-Oriented Security Analysis Framework and Implementation of Multibiometric Cryptosystems Based on Decision Level Fusion , 2015, IEEE Transactions on Information Forensics and Security.

[25]  Wu Yuezhong,et al.  Auto-Key , 2020, Proc. ACM Interact. Mob. Wearable Ubiquitous Technol..

[26]  Elaine B. Barker,et al.  A Statistical Test Suite for Random and Pseudorandom Number Generators for Cryptographic Applications , 2000 .

[27]  David Mohaisen,et al.  Sensor-Based Continuous Authentication of Smartphones’ Users Using Behavioral Biometrics: A Contemporary Survey , 2021, IEEE Internet of Things Journal.

[28]  Aleksandr Ometov,et al.  Feasibility characterization of cryptographic primitives for constrained (wearable) IoT devices , 2016, 2016 IEEE International Conference on Pervasive Computing and Communication Workshops (PerCom Workshops).

[29]  Yuan-Ting Zhang,et al.  Heartbeats Based Biometric Random Binary Sequences Generation to Secure Wireless Body Sensor Networks , 2018, IEEE Transactions on Biomedical Engineering.

[30]  Ayan Banerjee,et al.  PSKA: Usable and Secure Key Agreement Scheme for Body Area Networks , 2010, IEEE Transactions on Information Technology in Biomedicine.

[31]  Guang-Zhong Yang,et al.  Secure key generation using gait features for Body Sensor Networks , 2017, 2017 IEEE 14th International Conference on Wearable and Implantable Body Sensor Networks (BSN).

[32]  Athanasios V. Vasilakos,et al.  LAM-CIoT: Lightweight authentication mechanism in cloud-based IoT environment , 2020, J. Netw. Comput. Appl..

[33]  Mahbub Hassan,et al.  KEH-Gait: Using Kinetic Energy Harvesting for Gait-based User Authentication Systems , 2019, IEEE Transactions on Mobile Computing.

[34]  Craig Valli,et al.  A Critical Analysis of ECG-Based Key Distribution for Securing Wearable and Implantable Medical Devices , 2019, IEEE Sensors Journal.

[35]  Rahat Ali Khan,et al.  The state-of-the-art wireless body area sensor networks: A survey , 2018, Int. J. Distributed Sens. Networks.

[36]  Alexandru Popa,et al.  Analyzing of LAM-CIoT: Lightweight Authentication Mechanism in Cloud-based IoT Environment , 2020, 2020 IEEE Symposium Series on Computational Intelligence (SSCI).

[37]  Yier Jin,et al.  Privacy and Security in Internet of Things and Wearable Devices , 2015, IEEE Transactions on Multi-Scale Computing Systems.

[38]  Ngu Nguyen,et al.  Security Properties of Gait for Mobile Device Pairing , 2018, IEEE Transactions on Mobile Computing.

[39]  Matti Siekkinen,et al.  Modeling, Profiling, and Debugging the Energy Consumption of Mobile Devices , 2015, ACM Comput. Surv..

[40]  Athanasios V. Vasilakos,et al.  Security of the Internet of Things: perspectives and challenges , 2014, Wireless Networks.

[41]  Athanasios V. Vasilakos,et al.  Accelerometer and Fuzzy Vault-Based Secure Group Key Generation and Sharing Protocol for Smart Wearables , 2017, IEEE Transactions on Information Forensics and Security.

[42]  David Mohaisen,et al.  Sensor-based Continuous Authentication of Smartphones' Users Using Behavioral Biometrics: A Survey , 2020, ArXiv.