TIMAR: an efficient key management scheme for ubiquitous health care environments

Wireless Sensor Networks (WSN) are worthy to use in ubiquitous healthcare environments. They provide comfort to patients and make patient monitoring systems more efficient. WSN, when applied in ubiquitous healthcare environments, have different characteristics and security requirements. Number of sensors is very small as compared to other WSN applications and all nodes are close to each other in the network. Possibility of human intervention in ubiquitous healthcare environments and randomness properties of biometric measurements, which are collected in ubiquitous healthcare environments, reduce the security requirements as compared to other WSN applications. Key Management Schemes, proposed for generic WSN, prove to be overly complex and inefficient for ubiquitous healthcare environments. In this paper, we present TIMAR, which is an efficient Key Management Scheme specifically designed for ubiquitous healthcare environments.

[1]  Mohamed Eltoweissy,et al.  Combinatorial Optimization of Group Key Management , 2003, Journal of Network and Systems Management.

[2]  Dawn Xiaodong Song,et al.  Random key predistribution schemes for sensor networks , 2003, 2003 Symposium on Security and Privacy, 2003..

[3]  Thomas Falck,et al.  Plug 'n Play Simplicity for Wireless Medical Body Sensors , 2006, 2006 Pervasive Health Conference and Workshops.

[4]  Young-Koo Lee,et al.  MUQAMI: A Locally Distributed Key Management Scheme for Clustered Sensor Networks , 2007, IFIPTM.

[5]  Christopher Allen,et al.  The TLS Protocol Version 1.0 , 1999, RFC.

[6]  Dimitrios Hatzinakos,et al.  Biometric Methods for Secure Communications in Body Sensor Networks: Resource-Efficient Key Management and Signal-Level Data Scrambling , 2008, EURASIP J. Adv. Signal Process..

[7]  Sushil Jajodia,et al.  LEAP+: Efficient security mechanisms for large-scale distributed sensor networks , 2006, TOSN.

[8]  Nael B. Abu-Ghazaleh,et al.  A taxonomy of wireless micro-sensor network models , 2002, MOCO.

[9]  Ying Zhang,et al.  Minimum power configuration in wireless sensor networks , 2005, MobiHoc '05.

[10]  Yunghsiang Sam Han,et al.  A pairwise key pre-distribution scheme for wireless sensor networks , 2003, CCS '03.

[11]  Carmen C. Y. Poon,et al.  A novel biometrics method to secure wireless body area sensor networks for telemedicine and m-health , 2006, IEEE Communications Magazine.

[12]  Bülent Yener,et al.  Combinatorial Design of Key Distribution Mechanisms for Wireless Sensor Networks , 2004, ESORICS.

[13]  Mohamed F. Younis,et al.  Location-Aware Combinatorial Key Management Scheme for Clustered Sensor Networks , 2006, IEEE Transactions on Parallel and Distributed Systems.

[14]  Virgil D. Gligor,et al.  A key-management scheme for distributed sensor networks , 2002, CCS '02.

[15]  Jingsha He,et al.  A hexagon-based key predistribution scheme in sensor networks , 2006, 2006 International Conference on Parallel Processing Workshops (ICPPW'06).

[16]  Chong-Sun Hwang,et al.  An Energy-Efficient Key Management Protocol For Large-Scale Wireless Sensor Networks , 2007, 2007 International Conference on Multimedia and Ubiquitous Engineering (MUE'07).

[17]  Qiang Huang,et al.  Fast authenticated key establishment protocols for self-organizing sensor networks , 2003, WSNA '03.

[18]  Deva Seetharam,et al.  An efficient pseudo random number generator for low-power sensor networks [wireless networks] , 2004, 29th Annual IEEE International Conference on Local Computer Networks.

[19]  David A. Wagner,et al.  TinySec: a link layer security architecture for wireless sensor networks , 2004, SenSys '04.

[20]  Bruno Dutertre,et al.  Lightweight Key Management in Wireless Sensor Networks by Leveraging Initial Trust , 2004 .

[21]  Sandeep K. S. Gupta,et al.  Biosec: a biometric based approach for securing communication in wireless networks of biosensors implanted in the human body , 2003, 2003 International Conference on Parallel Processing Workshops, 2003. Proceedings..

[22]  Aleksandar Milenkovic,et al.  System architecture of a wireless body area sensor network for ubiquitous health monitoring , 2005 .

[23]  John T. Kohl,et al.  The Kerberos Network Authentication Service (V5 , 2004 .

[24]  Frank Mueller,et al.  Encryption overhead in embedded systems and sensor network nodes: modeling and analysis , 2003, CASES '03.

[25]  Panayiotis Kotzanikolaou,et al.  Secure and practical key establishment for distributed sensor networks , 2009, Secur. Commun. Networks.

[26]  K.K. Venkatasubramanian,et al.  Security for Pervasive Health Monitoring Sensor Applications , 2006, 2006 Fourth International Conference on Intelligent Sensing and Information Processing.

[27]  Leslie Lamport,et al.  Password authentication with insecure communication , 1981, CACM.

[28]  Sungyoung Lee,et al.  LSec: Lightweight Security Protocol for Distributed Wireless Sensor Network , 2006, PWC.

[29]  Gianluca Dini,et al.  An efficient key revocation protocol for wireless sensor networks , 2006, 2006 International Symposium on a World of Wireless, Mobile and Multimedia Networks(WoWMoM'06).