Authenticated Key Establishment Protocols for a Home Health Care System

Wireless sensor networks provide solutions to a range of monitoring problems. However, they also introduce a new set of problems mainly due to small memories, weak processors, limited energy and small packet size. Thus only a very few conventional protocols can readily be used in sensor networks. Sensor networks can exist in many different environments, and each environment has its own unique characteristics and requirements. As an example application, a home health care system is proposed and examined in detail in this paper. We show how cryptographically weak physiological data can be used to establish keys between body sensors, where the sensors have no other prior secret. This paper also proposes a protocol where a hand held device, such as a PDA, can establish a key with the majority of sensors found in our home health care system. This is achieved without the necessity of using traditional encryption. Detailed analysis of each of the protocols is provided. The protocols were implemented in TinyOS and simulated using TOSSIM and ATEMU. Energy consumption and memory requirements are analysed and it was found that an RSA implementation of our protocols has some advantages over an ECC implementation.

[1]  Carmen C. Y. Poon,et al.  A novel biometrics method to secure wireless body area sensor networks for telemedicine and m-health , 2006, IEEE Communications Magazine.

[2]  Yingli Tian S3-R1: the IBM smart surveillance system release 1 , 2005, 14th Annual International Conference on Wireless and Optical Communications, 2005. WOCC 2005.

[3]  Guang-Zhong Yang,et al.  Pervasive body sensor network: an approach to monitoring the post-operative surgical patient , 2006, International Workshop on Wearable and Implantable Body Sensor Networks (BSN'06).

[4]  David A. Wagner,et al.  TinySec: a link layer security architecture for wireless sensor networks , 2004, SenSys '04.

[5]  Jonathan W. Hui,et al.  Securing the Deluge network programming system , 2006, 2006 5th International Conference on Information Processing in Sensor Networks.

[6]  Yuan-Ting Zhang,et al.  A design proposal of security architecture for medical body sensor networks , 2006, International Workshop on Wearable and Implantable Body Sensor Networks (BSN'06).

[7]  Steven M. Bellovin,et al.  Encrypted key exchange: password-based protocols secure against dictionary attacks , 1992, Proceedings 1992 IEEE Computer Society Symposium on Research in Security and Privacy.

[8]  Colin Boyd,et al.  Protocols for Authentication and Key Establishment , 2003, Information Security and Cryptography.

[9]  Guang-Zhong Yang,et al.  A spatio-temporal architecture for context aware sensing , 2006, International Workshop on Wearable and Implantable Body Sensor Networks (BSN'06).

[10]  Adrian Perrig,et al.  PIKE: peer intermediaries for key establishment in sensor networks , 2005, Proceedings IEEE 24th Annual Joint Conference of the IEEE Computer and Communications Societies..

[11]  Panu Hämäläinen,et al.  Security in Wireless Sensor Networks: Considerations and Experiments , 2006, SAMOS.

[12]  Yuan-Ting Zhang,et al.  Physiological Signal Based Entity Authentication for Body Area Sensor Networks and Mobile Healthcare Systems , 2005, 2005 IEEE Engineering in Medicine and Biology 27th Annual Conference.

[13]  Mukesh Singhal,et al.  Security in wireless sensor networks , 2008, Wirel. Commun. Mob. Comput..

[14]  K.K. Venkatasubramanian,et al.  Security for Pervasive Health Monitoring Sensor Applications , 2006, 2006 Fourth International Conference on Intelligent Sensing and Information Processing.

[15]  V. Muthukkumarasamy,et al.  A Minimal Protocol for Authenticated Key Distribution in Wireless Sensor Networks , 2006, 2006 Fourth International Conference on Intelligent Sensing and Information Processing.

[16]  Energy Scavenging , 2003 .

[17]  Vallipuram Muthukkumarasamy,et al.  Protecting Small Keys in Authentication Protocols for Wireless Sensor Networks , 2006 .

[18]  E. M. Staderini,et al.  UWB radars in medicine , 2002 .

[19]  Mani Srivastava,et al.  Energy Harvesting Aware Power Management , 2005 .

[20]  Timo Hämäläinen,et al.  A Survey of Application Distribution in Wireless Sensor Networks , 2005, EURASIP J. Wirel. Commun. Netw..