MBPSKA: Multi-Biometric and Physiological Signal-Based Key Agreement for Body Area Networks

A body area network (BAN) consists of wireless sensors and actuators deployed on a patient’s body for real-time health monitoring and personalized medical care. It is essential and challenging to secure wireless communications in a BAN to protect the patient’s privacy while also allowing the authorized healthcare practitioners (e.g., emergency room doctors and nurses) to easily communicate with and configure the BAN devices transparent to the patient or even when the patient loses consciousness. With the existing schemes, the devices are based on a pre-installed secret password or a physiological signal feature to authenticate each other and to agree upon a cryptographic key for secure communications. The former requires a patient’s input to access and configure the BAN, and the latter is not sufficiently reliable or secure due to signal dynamics. This motivates us to design a new key agreement scheme in this paper, called multi-biometric and physiological signal-based key agreement (MBPSKA), to achieve more secure and reliable authentication and communication session establishment between the BAN devices while providing flexibility to authorized personnel to access, control, and adjust the BAN without patient involvement. The proposed scheme exploits both the reliable biometric traits and the time-variant physiological signal features of a patient along with the efficient fuzzy crypto-algorithms and key distribution protocols. The devices use multiple biometric and physiological features for mutual authentication and cryptographic key protection. We analyze the security characteristics of MBPSKA, including its capabilities against various attacks. Our evaluation results using the real-world datasets demonstrate that MBPSKA outperforms the existing physiological signal-based key agreement schemes in terms of security, authentication reliability, and accuracy.

[1]  Alessandra Lumini,et al.  Fingerprint Image Reconstruction from Standard Templates , 2007, IEEE Transactions on Pattern Analysis and Machine Intelligence.

[2]  Farinaz Koushanfar,et al.  Balancing security and utility in Medical Devices? , 2013, 2013 50th ACM/EDAC/IEEE Design Automation Conference (DAC).

[3]  Chithra Selvaraj,et al.  Bio-sensor Authentication for Medical Applications Using WBAN , 2016 .

[4]  Eryk Dutkiewicz,et al.  An ECG-based Secret Data Sharing scheme supporting emergency treatment of Implantable Medical Devices , 2014, 2014 International Symposium on Wireless Personal Multimedia Communications (WPMC).

[5]  Carmen C. Y. Poon,et al.  A novel biometrics method to secure wireless body area sensor networks for telemedicine and m-health , 2006, IEEE Communications Magazine.

[6]  Kevin Fu,et al.  Design challenges for secure implantable medical devices , 2012, DAC Design Automation Conference 2012.

[7]  Fengyuan Xu,et al.  IMDGuard: Securing implantable medical devices with the external wearable guardian , 2011, 2011 Proceedings IEEE INFOCOM.

[8]  Jia Wang,et al.  An ECG-Based Signal Key Establishment Protocol in Body Area Networks , 2010, 2010 7th International Conference on Ubiquitous Intelligence & Computing and 7th International Conference on Autonomic & Trusted Computing.

[9]  Michael D. Smith,et al.  A public-key infrastructure for key distribution in TinyOS based on elliptic curve cryptography , 2004, 2004 First Annual IEEE Communications Society Conference on Sensor and Ad Hoc Communications and Networks, 2004. IEEE SECON 2004..

[10]  Farinaz Koushanfar,et al.  Heart-to-heart (H2H): authentication for implanted medical devices , 2013, CCS.

[11]  Junbin Gao,et al.  Fingerprint Matching using A Hybrid Shape and Orientation Descriptor , 2011 .

[12]  Ethiopia Nigussie,et al.  Cryptographic key generation using ECG signal , 2017, 2017 14th IEEE Annual Consumer Communications & Networking Conference (CCNC).

[13]  Chandan Singh D Rawat,et al.  Biometric Personal Identification based on Iris Patterns , 2014 .

[14]  K.K. Venkatasubramanian,et al.  Plethysmogram-based secure inter-sensor communication in Body Area Networks , 2008, MILCOM 2008 - 2008 IEEE Military Communications Conference.

[15]  Niraj K. Jha,et al.  Hijacking an insulin pump: Security attacks and defenses for a diabetes therapy system , 2011, 2011 IEEE 13th International Conference on e-Health Networking, Applications and Services.

[16]  Majid R Alshammari,et al.  Efficient key distribution protocol for wireless sensor networks , 2018, 2018 IEEE 8th Annual Computing and Communication Workshop and Conference (CCWC).

[17]  Anton H. M. Akkermans,et al.  Face biometrics with renewable templates , 2006, Electronic Imaging.

[18]  Ye Li,et al.  A Modified Fuzzy Vault Scheme for Biometrics-Based Body Sensor Networks Security , 2010, 2010 IEEE Global Telecommunications Conference GLOBECOM 2010.

[19]  Sharath Pankanti,et al.  Fingerprint-Based Fuzzy Vault: Implementation and Performance , 2007, IEEE Transactions on Information Forensics and Security.

[20]  Qian Li,et al.  Efficient authenticated key exchange protocols for wireless body area networks , 2015, EURASIP Journal on Wireless Communications and Networking.

[21]  Haiping Lu,et al.  Face recognition with biometric encryption for privacy-enhancing self-exclusion , 2009, 2009 16th International Conference on Digital Signal Processing.

[22]  Sanjay Kumar,et al.  Secure authentication approach using Diffie-Hellman key exchange algorithm for WSN , 2016, Int. J. Commun. Networks Distributed Syst..

[23]  Sharath Pankanti,et al.  Fuzzy Vault for Fingerprints , 2005, AVBPA.

[24]  L. Benedicenti,et al.  The electroencephalogram as a biometric , 2001, Canadian Conference on Electrical and Computer Engineering 2001. Conference Proceedings (Cat. No.01TH8555).

[25]  Tieniu Tan,et al.  Combining Face and Iris Biometrics for Identity Verification , 2003, AVBPA.

[26]  Sheng Zhong,et al.  Body sensor network security: an identity-based cryptography approach , 2008, WiSec '08.

[27]  Fang Liu,et al.  LKE: A Self-Configuring Scheme for Location-Aware Key Establishment in Wireless Sensor Networks , 2008, IEEE Transactions on Wireless Communications.

[28]  Pravin Yannawar,et al.  Fingerprint Recognition for Person Identification and Verification Based on Minutiae Matching , 2016, 2016 IEEE 6th International Conference on Advanced Computing (IACC).

[29]  Sandeep K. S. Gupta,et al.  Research challenges in wireless networks of biomedical sensors , 2001, MobiCom '01.

[30]  Inampudi Ramesh Babu,et al.  Authentication Using Fuzzy Vault Based on Iris Textures , 2008, Asia International Conference on Modelling and Simulation.

[31]  Ayan Banerjee,et al.  PSKA: Usable and Secure Key Agreement Scheme for Body Area Networks , 2010, IEEE Transactions on Information Technology in Biomedicine.

[32]  K K Venkatasubramanian,et al.  Interoperable Medical Devices , 2010, IEEE Pulse.

[33]  Ming Li,et al.  Secure ad hoc trust initialization and key management in wireless body area networks , 2013, TOSN.

[34]  Fang Liu,et al.  SBK: A Self-Configuring Framework for Bootstrapping Keys in Sensor Networks , 2008, IEEE Transactions on Mobile Computing.

[35]  Vincenzo Conti,et al.  A Frequency-based Approach for Features Fusion in Fingerprint and Iris Multimodal Biometric Identification Systems , 2010, IEEE Transactions on Systems, Man, and Cybernetics, Part C (Applications and Reviews).

[36]  Christos Strydis,et al.  Enhancing Heart-Beat-Based Security for mHealth Applications , 2017, IEEE Journal of Biomedical and Health Informatics.

[37]  Anil K. Jain,et al.  Fingerprint Image Enhancement: Algorithm and Performance Evaluation , 1998, IEEE Trans. Pattern Anal. Mach. Intell..

[38]  Virgil D. Gligor,et al.  A key-management scheme for distributed sensor networks , 2002, CCS '02.

[39]  Francisco Herrera,et al.  A survey on fingerprint minutiae-based local matching for verification and identification: Taxonomy and experimental evaluation , 2015, Inf. Sci..

[40]  Emil C. Lupu,et al.  Securing body sensor networks: Sensor association and key management , 2009, 2009 IEEE International Conference on Pervasive Computing and Communications.

[41]  K.K. Venkatasubramanian,et al.  EKG-based key agreement in Body Sensor Networks , 2008, IEEE INFOCOM Workshops 2008.

[42]  Gérard D. Cohen,et al.  Theoretical and Practical Boundaries of Binary Secure Sketches , 2008, IEEE Transactions on Information Forensics and Security.

[43]  Athanasios V. Vasilakos,et al.  Body Area Networks: A Survey , 2010, Mob. Networks Appl..

[44]  Gengfa Fang,et al.  Multiple ECG Fiducial Points-Based Random Binary Sequence Generation for Securing Wireless Body Area Networks , 2017, IEEE Journal of Biomedical and Health Informatics.

[45]  Chandrashekar M Patil,et al.  Feature Extraction Classification for Personal Identification using Iris , 2017, 2017 International Conference on Current Trends in Computer, Electrical, Electronics and Communication (CTCEEC).

[46]  Xiong Li,et al.  Anonymous mutual authentication and key agreement scheme for wearable sensors in wireless body area networks , 2017, Comput. Networks.

[47]  M. V. Karthikeyan,et al.  A novel fast chaff point generation method using bio-inspired flower pollination algorithm for fuzzy vault systems with physiological signal for wireless body area sensor networks , 2017 .

[48]  Sushil Jajodia,et al.  LEAP+: Efficient security mechanisms for large-scale distributed sensor networks , 2006, TOSN.

[49]  Martin Wattenberg,et al.  A fuzzy commitment scheme , 1999, CCS '99.

[50]  Neal Leavitt,et al.  Researchers Fight to Keep Implanted Medical Devices Safe from Hackers , 2010, Computer.

[51]  Alessandro Neri,et al.  IRIS template protection using a digital modulation paradigm , 2014, 2014 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP).

[52]  Fang Liu,et al.  iPAK: An In-Situ Pairwise Key Bootstrapping Scheme for Wireless Sensor Networks , 2007, IEEE Transactions on Parallel and Distributed Systems.

[53]  K.K. Venkatasubramanian,et al.  Security for Pervasive Health Monitoring Sensor Applications , 2006, 2006 Fourth International Conference on Intelligent Sensing and Information Processing.

[54]  Kevin Fu,et al.  Security and Privacy for Implantable Medical Devices , 2008, IEEE Pervasive Comput..

[55]  Brenda K. Wiederhold,et al.  ECG to identify individuals , 2005, Pattern Recognit..

[56]  Jeffrey M. Hausdorff,et al.  Physionet: Components of a New Research Resource for Complex Physiologic Signals". Circu-lation Vol , 2000 .

[57]  Raymond N. J. Veldhuis,et al.  Fingerprint Verification Using Spectral Minutiae Representations , 2009, IEEE Transactions on Information Forensics and Security.

[58]  Sandeep K. S. Gupta,et al.  Biosec: a biometric based approach for securing communication in wireless networks of biosensors implanted in the human body , 2003, 2003 International Conference on Parallel Processing Workshops, 2003. Proceedings..

[59]  Marimuthu Palaniswami,et al.  KALwEN: a new practical and interoperable key management scheme for body sensor networks , 2008, Secur. Commun. Networks.

[60]  Julien Penders,et al.  Potential and challenges of body area networks for personal health , 2009, 2009 Annual International Conference of the IEEE Engineering in Medicine and Biology Society.

[61]  Whitfield Diffie,et al.  New Directions in Cryptography , 1976, IEEE Trans. Inf. Theory.

[62]  Ming Li,et al.  Group Device Pairing based Secure Sensor Association and Key Management for Body Area Networks , 2010, 2010 Proceedings IEEE INFOCOM.

[63]  Chien-Ming Chen,et al.  An Anonymous Mutual Authenticated Key Agreement Scheme for Wearable Sensors in Wireless Body Area Networks , 2018, Applied Sciences.

[64]  Madhu Sudan,et al.  A Fuzzy Vault Scheme , 2006, Des. Codes Cryptogr..

[65]  Anil K. Jain,et al.  Multibiometric Cryptosystems Based on Feature-Level Fusion , 2012, IEEE Transactions on Information Forensics and Security.

[66]  Xiaofeng Liao,et al.  Body Area Network Security: A Fuzzy Attribute-Based Signcryption Scheme , 2013, IEEE Journal on Selected Areas in Communications.

[67]  Fan Zhang,et al.  OPFKA: Secure and efficient Ordered-Physiological-Feature-based key agreement for wireless Body Area Networks , 2013, 2013 Proceedings IEEE INFOCOM.

[68]  Feng Hao,et al.  Combining Crypto with Biometrics Effectively , 2006, IEEE Transactions on Computers.

[69]  Bo Fu,et al.  Multibiometric Cryptosystem: Model Structure and Performance Analysis , 2009, IEEE Transactions on Information Forensics and Security.

[70]  Axel Munk,et al.  The Fuzzy Vault for Fingerprints is Vulnerable to Brute Force Attack , 2007, BIOSIG.

[71]  Jian Shen,et al.  A lightweight multi-layer authentication protocol for wireless body area networks , 2018, Future Gener. Comput. Syst..

[72]  Berrin A. Yanikoglu,et al.  Realization of correlation attack against the fuzzy vault scheme , 2008, Electronic Imaging.

[73]  B. Ripley,et al.  Pattern Recognition , 1968, Nature.

[74]  Sheng Zhong,et al.  IBE-Lite: A Lightweight Identity-Based Cryptography for Body Sensor Networks , 2009, IEEE Transactions on Information Technology in Biomedicine.

[75]  Andreas Uhl,et al.  A survey on biometric cryptosystems and cancelable biometrics , 2011, EURASIP J. Inf. Secur..

[76]  Nalini K. Ratha,et al.  Generating Cancelable Fingerprint Templates , 2007, IEEE Transactions on Pattern Analysis and Machine Intelligence.

[77]  Karthik Nandakumar,et al.  A fingerprint cryptosystem based on minutiae phase spectrum , 2010, 2010 IEEE International Workshop on Information Forensics and Security.

[78]  Marios Poulos,et al.  Person identification via the EEG using computational geometry algorithms , 1998, 9th European Signal Processing Conference (EUSIPCO 1998).

[79]  Enrique Argones-Rúa,et al.  A survey on physiological-signal-based security for medical devices , 2016, IACR Cryptol. ePrint Arch..

[80]  Suela Kodra Fuzzy extractors : How to generate strong keys from biometrics and other noisy data , 2015 .

[81]  Anil K. Jain,et al.  FVC2002: Second Fingerprint Verification Competition , 2002, Object recognition supported by user interaction for service robots.

[82]  F. Moore,et al.  Polynomial Codes Over Certain Finite Fields , 2017 .

[83]  Mohamed Elhoseny,et al.  Cascade Multimodal Biometric System Using Fingerprint and Iris Patterns , 2017, AISI.

[84]  T.E. Boult,et al.  Cracking Fuzzy Vaults and Biometric Encryption , 2007, 2007 Biometrics Symposium.

[85]  Josef Bernhard,et al.  Body Area Network BAN – a Key Infrastructure Element for Patient-Centered Medical Applications , 2002, Biomedizinische Technik. Biomedical engineering.

[86]  Tetsuo Asano,et al.  Fingerprint Matching Using Minutia Polygons , 2006, 18th International Conference on Pattern Recognition (ICPR'06).

[87]  Marko Hölbl,et al.  Survey on security in intra-body area network communication , 2018, Ad Hoc Networks.