A Secure Cross-Layer Protocol for Multi-hop Wireless Body Area Networks

The development of Wireless Body Area Networks (WBANs) for wireless sensing and monitoring of a person's vital functions, is an enabler in providing better personal health care whilst enhancing the quality of life. A critical factor in the acceptance of WBANs is providing appropriate security and privacy protection of the wireless communication. This paper first describes a general health care platform and pinpoints the security challenges and requirements. Further it proposes and analyzes the CICADA-S protocol, a secure cross-layer protocol for WBANs. It is an extension of CICADA, which is a cross-layer protocol that handles both medium access and the routing of data in WBANs. The CICADA-S protocol is the first integrated solution that copes with threats that occur in this mobile medical monitoring scenario. It is shown that the integration of key management and secure, privacy preserving communication techniques within the CICADA-S protocol has low impact on the power consumption and throughput.

[1]  P ? ? ? ? ? ? ? % ? ? ? ? , 1991 .

[2]  Carmen C. Y. Poon,et al.  A novel biometrics method to secure wireless body area sensor networks for telemedicine and m-health , 2006, IEEE Communications Magazine.

[3]  Ingrid Moerman,et al.  A Low-delay Protocol for Multihop Wireless Body Area Networks , 2007, 2007 Fourth Annual International Conference on Mobile and Ubiquitous Systems: Networking & Services (MobiQuitous).

[4]  Zygmunt J. Haas,et al.  Securing ad hoc networks , 1999, IEEE Netw..

[5]  Sasikanth Avancha,et al.  Security for Sensor Networks , 2004 .

[6]  Heribert Baldus,et al.  Reliable Set-Up of Medical Body-Sensor Networks , 2004, EWSN.

[7]  Christian Gehrmann,et al.  Manual authentication for wireless devices , 2004 .

[8]  Thomas Falck,et al.  Plug 'n Play Simplicity for Wireless Medical Body Sensors , 2006, 2006 Pervasive Health Conference and Workshops.

[9]  John A. Stankovic,et al.  Security in wireless sensor networks , 2004, SASN '04.

[10]  Morris Dworkin,et al.  Special Publication 800-38C, Recommendation for Block Cipher Modes of Operation: the CCM Mode for Authentication and Confidentiality , 2003 .

[11]  Yang Xiao,et al.  LTRT: Least Total-Route Temperature Routing for Embedded Biomedical Sensor Networks , 2007, IEEE GLOBECOM 2007 - IEEE Global Telecommunications Conference.

[12]  Morris J. Dworkin,et al.  SP 800-38D. Recommendation for Block Cipher Modes of Operation: Galois/Counter Mode (GCM) and GMAC , 2007 .

[13]  Gregory M. P. O'Hare,et al.  Energy-efficient multi-hop medical sensor networking , 2007, HealthNet '07.

[14]  Virgil D. Gligor,et al.  A key-management scheme for distributed sensor networks , 2002, CCS '02.

[15]  Frank Stajano,et al.  The Resurrecting Duckling: Security Issues for Ad-hoc Wireless Networks , 1999, Security Protocols Workshop.

[16]  Alfred Menezes,et al.  Handbook of Applied Cryptography , 2018 .

[17]  Vincent Rijmen,et al.  The Design of Rijndael: AES - The Advanced Encryption Standard , 2002 .

[18]  Aleksandar Milenkovic,et al.  System architecture of a wireless body area sensor network for ubiquitous health monitoring , 2005 .

[19]  Ian F. Akyildiz,et al.  Wireless sensor networks , 2007 .

[20]  Bart Preneel,et al.  Key Establishment Using Secure Distance Bounding Protocols , 2007, 2007 Fourth Annual International Conference on Mobile and Ubiquitous Systems: Networking & Services (MobiQuitous).

[21]  Melody Moh,et al.  On data gathering protocols for in-body biomedical sensor networks , 2005, GLOBECOM '05. IEEE Global Telecommunications Conference, 2005..

[22]  Morris J. Dworkin SP 800-38C. Recommendation for Block Cipher Modes of Operation: the CCM Mode for Authentication and Confidentiality , 2004 .