Energy cost analyses of key management techniques for secure patient monitoring in WSN

Since the sensors collect personal medical data, security and privacy are important factors in wireless sensor networks. Due to small memory capacity, constrained power supply, limited computational capability and communications bandwidth of WSNs, applying key management in wireless sensor networks is hard to achieve. Energy is a central concern in the deployment of cryptographic techniques in WSNs. This paper has identified the most suitable key management technique among the popular techniques available to secure data in consideration of the application requirements and the WSN constraints. To achieve this objective, some common key management techniques are implemented, simulated and compared based on their energy cost and then best techniques for healthcare application will be suggested. Simulation results show that hybrid technique consumes the lowest amount of energy among the others for secure patient monitoring in wireless sensor network environment.

[1]  T. Dimitriou,et al.  Security issues in biomedical wireless sensor networks , 2008, 2008 First International Symposium on Applied Sciences on Biomedical and Communication Technologies.

[2]  François-Xavier Standaert,et al.  On the Energy Cost of Communication and Cryptography in Wireless Sensor Networks , 2008, 2008 IEEE International Conference on Wireless and Mobile Computing, Networking and Communications.

[3]  Biswanath Mukherjee,et al.  Wireless sensor network survey , 2008, Comput. Networks.

[4]  Jelena Misic,et al.  On Security Attacks in HealthcareWSNs Implemented on 802.15.4 Beacon Enabled Clusters , 2007, 2007 4th IEEE Consumer Communications and Networking Conference.

[5]  M. Saraogi SECURITY IN WIRELESS SENSOR NETWORKS , 2005 .

[6]  Weisong Shi,et al.  Wireless Sensor Network Security: A Survey , 2006 .

[7]  P ? ? ? ? ? ? ? % ? ? ? ? , 1991 .

[8]  Mohammed Feham,et al.  Trust Key Management Scheme for Wireless Body Area Networks , 2011, Int. J. Netw. Secur..

[9]  Anna Hać,et al.  Wireless Sensor Network Designs , 2003 .

[10]  H. S. Ng,et al.  Security issues of wireless sensor networks in healthcare applications , 2006 .

[11]  C. Karlof,et al.  Secure routing in wireless sensor networks: attacks and countermeasures , 2003, Proceedings of the First IEEE International Workshop on Sensor Network Protocols and Applications, 2003..

[12]  Hans Eberle,et al.  Comparing Elliptic Curve Cryptography and RSA on 8-bit CPUs , 2004, CHES.

[13]  David Boyle,et al.  Securing Wireless Sensor Networks: Security Architectures , 2008, J. Networks.

[14]  Vijay Varadharajan,et al.  Wireless sensor network key management survey and taxonomy , 2010, J. Netw. Comput. Appl..

[15]  Hiren Kumar Deva Sarma,et al.  Security Threats in Wireless Sensor Networks , 2006, Proceedings 40th Annual 2006 International Carnahan Conference on Security Technology.

[16]  Saurabh Singh,et al.  Security For Wireless Sensor Network , 2011 .

[17]  Sasikanth Avancha,et al.  Security for Sensor Networks , 2004 .

[18]  Vipul Gupta,et al.  Energy analysis of public-key cryptography for wireless sensor networks , 2005, Third IEEE International Conference on Pervasive Computing and Communications.

[19]  Mingbo Xiao,et al.  Cross-Layer Design for the Security of Wireless Sensor Networks , 2006, 2006 6th World Congress on Intelligent Control and Automation.

[20]  Deep Medhi,et al.  Location-aware key management scheme for wireless sensor networks , 2004, SASN '04.

[21]  Xiaojiang Du,et al.  A survey of key management schemes in wireless sensor networks , 2007, Comput. Commun..

[22]  Stefano Chessa,et al.  Wireless sensor networks: A survey on the state of the art and the 802.15.4 and ZigBee standards , 2007, Comput. Commun..

[23]  Sushma,et al.  Security Threats in Wireless Sensor Networks , 2011 .

[24]  Carlo Snickars,et al.  Design of a wirelessHART simulator for studying delay compensation in networked control systems , 2008 .

[25]  David A. Wagner,et al.  Security in wireless sensor networks , 2004, SASN '04.