Shield yourself from pattern detection

In a Wireless Body Area Network (WBAN), biosensors are implanted or worn in/on an individual to acquire medical data for a clinical diagnosis or physical monitoring. To achieve confidentiality and privacy of a WBAN, authentication and crypto contribute a lot. However, besides data itself, the pattern of data transmission contains more secretes than it seems to. Various medical sensors deliver data in different patterns and these patterns leak the fact of what sensors are used, which implies diseases the individual has, and how urgent the situation of a patient is. To hide a pattern, we design a container, which packs real data session in a type-independent transmission model at transmission layer. All valid data packets are equably sent at the frequency of container and at the same length to clutter the inherent pace of valid data transmission and other parameters. To construct a container, extra consumption is due for extra container packets. We also find a strategy PAS to achieve an optimized solution of minimizing it while protecting transmission pattern from eavesdropping.

[1]  Fengyuan Xu,et al.  IMDGuard: Securing implantable medical devices with the external wearable guardian , 2011, 2011 Proceedings IEEE INFOCOM.

[2]  Suhas N. Diggavi,et al.  Exchanging Secrets without Using Cryptography , 2011, ArXiv.

[3]  JeongGil Ko,et al.  MEDiSN: medical emergency detection in sensor networks , 2008, SenSys '08.

[4]  Minho Shin,et al.  Plug-n-trust: practical trusted sensing for mhealth , 2012, MobiSys '12.

[5]  Stephen B. Wicker,et al.  CareNet: an integrated wireless sensor networking environment for remote healthcare , 2008, BODYNETS.

[6]  Carsten Peterson,et al.  Clustering ECG complexes using Hermite functions and self-organizing maps , 2000, IEEE Trans. Biomed. Eng..

[7]  P. Heidenreich,et al.  Long-Term Outcome After ICD and CRT Implantation and Influence of Remote Device Follow-Up: The ALTITUDE Survival Study , 2010, Circulation.

[8]  Kevin Fu,et al.  They can hear your heartbeats: non-invasive security for implantable medical devices , 2011, SIGCOMM.

[9]  Leonie Welberg,et al.  Consciousness: Effective detection , 2012, Nature Reviews Neuroscience.

[10]  T. Kohno,et al.  Improving the security and privacy of implantable medical devices. , 2010, The New England journal of medicine.

[11]  Matt Welsh,et al.  Sensor networks for medical care , 2005, SenSys '05.

[12]  Majid Sarrafzadeh,et al.  The Advanced Health and Disaster Aid Network: A Light-Weight Wireless Medical System for Triage , 2007, IEEE Transactions on Biomedical Circuits and Systems.

[13]  Stuart E. Schechter Security That Is Meant to Be Skin Deep: Using Ultraviolet Micropigmentation to Store Emergency-Access Keys for Implantable Medical Devices , 2010, HealthSec.

[14]  Dina Katabi,et al.  Physical layer wireless security made fast and channel independent , 2011, 2011 Proceedings IEEE INFOCOM.

[15]  Shaojie Tang,et al.  Locating sensors in the forest: A case study in GreenOrbs , 2012, 2012 Proceedings IEEE INFOCOM.

[16]  Peng Ning,et al.  Randomized Differential DSSS: Jamming-Resistant Wireless Broadcast Communication , 2010, 2010 Proceedings IEEE INFOCOM.

[17]  Robert A. Greenes,et al.  Physiological signal monitoring in the waiting areas of an emergency room , 2008, BODYNETS.