Enforcing Patient Privacy in Healthcare WSNs Using ECC Implemented on 802.15.4 Beacon Enabled Clusters

We consider healthcare wireless sensor networks implemented using 802.15.4 beacon enabled technology, in which security processors are implemented with low power microcontrollers. In this setting, we propose to use elliptic curve cryptography for key distribution, in order to decrease energy consumption compared to the better known RSA algorithm.

[1]  Johann Großschädl,et al.  TinySA: a security architecture for wireless sensor networks , 2006, CoNEXT '06.

[2]  Peter Langendörfer,et al.  How public key cryptography influences wireless sensor node lifetime , 2006, SASN '06.

[3]  Guido Bertoni,et al.  Power aware design of an elliptic curve coprocessor for 8 bit platforms , 2006, Fourth Annual IEEE International Conference on Pervasive Computing and Communications Workshops (PERCOMW'06).

[4]  Hairong Qi,et al.  Revisiting Public-Key Cryptography for Wireless Sensor Networks , 2005, Computer.

[5]  Vipul Gupta,et al.  Energy analysis of public-key cryptography for wireless sensor networks , 2005, Third IEEE International Conference on Pervasive Computing and Communications.

[6]  Berk Sunar,et al.  State of the art in ultra-low power public key cryptography for wireless sensor networks , 2005, Third IEEE International Conference on Pervasive Computing and Communications Workshops.

[7]  Michael D. Smith,et al.  A public-key infrastructure for key distribution in TinyOS based on elliptic curve cryptography , 2004, 2004 First Annual IEEE Communications Society Conference on Sensor and Ad Hoc Communications and Networks, 2004. IEEE SECON 2004..

[8]  Matt Bishop,et al.  Computer Security: Art and Science , 2002 .

[9]  Ross J. Anderson,et al.  A security policy model for clinical information systems , 1996, Proceedings 1996 IEEE Symposium on Security and Privacy.

[10]  Whitfield Diffie,et al.  New Directions in Cryptography , 1976, IEEE Trans. Inf. Theory.

[11]  Alfred Menezes,et al.  Guide to Elliptic Curve Cryptography , 2004, Springer Professional Computing.

[12]  A. Murat Fiskiran,et al.  Workload characterization of elliptic curve cryptography and other network security algorithms for constrained environments , 2002, 2002 IEEE International Workshop on Workload Characterization.