Biosec: a biometric based approach for securing communication in wireless networks of biosensors implanted in the human body

Advances in microelectronics, material science and wireless technology have led to the development of sensors that can be used for accurate monitoring of inaccessible environments. Health monitoring, telemedicine, military and environmental monitoring are some of the applications where sensors can be used. The sensors implanted inside the human body to monitor parts of the body are called biosensors. These biosensors form a network and collectively monitor the health condition of their carrier or host. Health monitoring involves collection of data about vital body parameters from different parts of the body and making decisions based on it. This information is of personal nature and is required to be secured. Insecurity may also lead to dangerous consequences. Due to the extreme constraints of energy, memory and computation securing the communication among the biosensors is not a trivial problem. Key distribution is central to any security mechanism. In this paper we propose an approach wherein, biometrics derived from the body are used for securing the keying material. This method obviates the need for expensive computation and avoids unnecessary communication making our approach novel compared to existing approaches.

[1]  Sandeep K. S. Gupta,et al.  Ayushman: A Wireless Sensor Network Based Health Monitoring Infrastructure and Testbed , 2005, DCOSS.

[2]  Peter Kruus,et al.  CONSTRAINTS AND APPROACHES FOR DISTRIBUTED SENSOR NETWORK SECURITY , 2000 .

[3]  David E. Culler,et al.  SPINS: security protocols for sensor networks , 2001, MobiCom '01.

[4]  Ronald L. Rivest,et al.  The RC5 Encryption Algorithm , 1994, FSE.

[5]  Sandeep K. S. Gupta,et al.  An adaptive protocol for efficient and secure multicasting in IEEE 802.11 based wireless LANs , 2003, 2003 IEEE Wireless Communications and Networking, 2003. WCNC 2003..

[6]  Joseph D. Touch,et al.  Performance analysis of MD5 , 1995, SIGCOMM '95.

[7]  Sandeep K. S. Gupta,et al.  Energy-efficient protocols for wireless communication in biosensor networks , 2001, 12th IEEE International Symposium on Personal, Indoor and Mobile Radio Communications. PIMRC 2001. Proceedings (Cat. No.01TH8598).

[8]  Anupam Joshi,et al.  Security in Sensor Networks , 2020, Texts in Computer Science.

[9]  Sandeep K. S. Gupta,et al.  On tree-based convergecasting in wireless sensor networks , 2003, 2003 IEEE Wireless Communications and Networking, 2003. WCNC 2003..

[10]  J. Ramanujam,et al.  Proceedings 2003 International Conference on Parallel Processing Workshops , 2003, 2003 International Conference on Parallel Processing Workshops, 2003. Proceedings..

[11]  Yair Frankel,et al.  On enabling secure applications through off-line biometric identification , 1998, Proceedings. 1998 IEEE Symposium on Security and Privacy (Cat. No.98CB36186).

[12]  Bruce Schneier,et al.  Fast Software Encryption: Designing Encryption Algorithms for Optimal Software Speed on the Intel Pentium Processor , 1997, FSE.

[13]  Martin Wattenberg,et al.  A fuzzy commitment scheme , 1999, CCS '99.

[14]  Ronald L. Rivest,et al.  The MD5 Message-Digest Algorithm , 1992, RFC.