Group-Based Cooperation on Symmetric Key Generation for Wireless Body Area Networks

Wireless body area networks (WBANs) require lightweight and resource efficient security approaches. In the literature, biometric-based security approaches have been well studied for WBANs when each individual person may have unique biometric features. However, additional sensing hardware (e.g., ECG sensors) are usually required for every sensor in these approaches, which make them unpractical in real application settings. Unlike them, in this paper, we propose a physical layer-based security approach utilizing physical channel information and remove the extra hardware requirements. Especially, a group-based cooperation on symmetric secret key generation via physical or link layer received signal strength indicator (RSSI) data accumulating is investigated. We propose a practical cooperative group solution to increase the similarity, fluctuation and density of RSSI data for high efficient key generation. The major innovation is to make full use of multiple channels between a participant node and a group or between two groups to randomly synthesize RSSI data with multifold data density and improved data similarity and fluctuation. In addition, several group models are described with the details of their specific protocol design. Furthermore, a prototype is implemented and verified in an experimental environment to demonstrate the high practicality and efficiency of our solution.

[1]  Ming Li,et al.  BANA: Body Area Network Authentication Exploiting Channel Characteristics , 2012, IEEE Journal on Selected Areas in Communications.

[2]  Wenliang Du,et al.  Cooperative Key Generation in Wireless Networks , 2012, IEEE Journal on Selected Areas in Communications.

[3]  Madhu Sudan,et al.  A Fuzzy Vault Scheme , 2006, Des. Codes Cryptogr..

[4]  Jian Shen,et al.  An Efficient Public Auditing Protocol With Novel Dynamic Structure for Cloud Data , 2017, IEEE Transactions on Information Forensics and Security.

[5]  Zhihua Xia,et al.  A Secure and Dynamic Multi-Keyword Ranked Search Scheme over Encrypted Cloud Data , 2016, IEEE Transactions on Parallel and Distributed Systems.

[6]  Wenjia Li,et al.  BAN-trust: An attack-resilient malicious node detection scheme for body area networks , 2016, 2016 International Conference on Computing, Networking and Communications (ICNC).

[7]  Hao Li Secure OFDM System Design for Wireless Communications , 2013 .

[8]  Sherali Zeadally,et al.  Anonymous Authentication for Wireless Body Area Networks With Provable Security , 2017, IEEE Systems Journal.

[9]  T. Ohira,et al.  Wireless secret key generation exploiting the reactance-domain scalar response of multipath fading channels : RSSI interleaving scheme , 2005, The European Conference on Wireless Technology, 2005..

[10]  Aggelos Kiayias,et al.  Robust key generation from signal envelopes in wireless networks , 2007, CCS '07.

[11]  Sanjay Jha,et al.  Mobility Independent Secret Key Generation for Wearable Health-care Devices , 2015, BODYNETS.

[12]  V. Janaki,et al.  Secure and Efficient Data Communication Protocol for Wireless Body Area Networks , 2017 .

[13]  Xiaohui Liang,et al.  Wanda: Securely introducing mobile devices , 2016, IEEE INFOCOM 2016 - The 35th Annual IEEE International Conference on Computer Communications.

[14]  Chonggang Wang,et al.  Handover schemes in heterogeneous LTE networks: challenges and opportunities , 2016, IEEE Wireless Communications.

[15]  Ruijiao Li,et al.  Cognitive assisted living ambient system: a survey , 2015, Digit. Commun. Networks.

[16]  Andrea Zanella,et al.  The challenges of M2M massive access in wireless cellular networks , 2015, Digit. Commun. Networks.

[17]  Chenming Zhou,et al.  Channel reciprocity and time-reversed propagation for ultra-wideband communications , 2007, 2007 IEEE Antennas and Propagation Society International Symposium.

[18]  Sneha Kumar Kasera,et al.  Secret Key Extraction from Wireless Signal Strength in Real Environments , 2009, IEEE Transactions on Mobile Computing.

[19]  Hai Su,et al.  Secret key generation exploiting channel characteristics in wireless communications , 2011, IEEE Wireless Communications.

[20]  Xingming Sun,et al.  Toward Efficient Multi-Keyword Fuzzy Search Over Encrypted Outsourced Data With Accuracy Improvement , 2016, IEEE Transactions on Information Forensics and Security.

[21]  Athanasios V. Vasilakos,et al.  Channel Information based Cryptography and Authentication in Wireless Body Area Networks , 2013, BODYNETS.

[22]  Raymond Knopp,et al.  A practical method for wireless channel reciprocity exploitation through relative calibration , 2005, Proceedings of the Eighth International Symposium on Signal Processing and Its Applications, 2005..

[23]  Suela Kodra Fuzzy extractors : How to generate strong keys from biometrics and other noisy data , 2015 .

[24]  Honggang Wang,et al.  Secure and efficient key generation and agreement methods for wireless body area networks , 2017, 2017 IEEE International Conference on Communications (ICC).

[25]  Honggang Wang,et al.  A key agreement method for wireless body area networks , 2016, 2016 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS).

[26]  Sanjay Jha,et al.  SeAK: Secure Authentication and Key Generation Protocol Based on Dual Antennas for Wireless Body Area Networks , 2014, RFIDSec.