Efficient Group Key Management and Authentication for Body Sensor Networks

Wireless body sensor networks (BSN) are being used to continuously monitor the patient's conditions and recovery progress. It is very important to secure the confidentiality, integrity and authenticity of the patient's health record in such applications. In this paper, we propose a novel key distribution and management scheme that uses keychains to establish group keys for body sensor networks. This scheme caters for efficient group key update and re-keying in order to adapt to membership changes. We also present a lightweight approach to enable sensor-to-sensor authentication in the BSNs. Sensors authenticate each other by computing a Elliptic Curve Diffie-Hellman (ECDH) key between each other based on an authenticated membership broadcast received from the patient's device. Both protocols have been implemented on Tmote Sky platform, analysed and evaluated to demonstrate their feasibility. We also shows the security analysis of the protocols using BAN Logic.

[1]  Georgios Kambourakis,et al.  Clustering Oriented Architectures in Medical Sensor Environments , 2008, 2008 Third International Conference on Availability, Reliability and Security.

[2]  Roger M. Needham,et al.  Using encryption for authentication in large networks of computers , 1978, CACM.

[3]  Dawn Song,et al.  The TESLA Broadcast Authentication Protocol , 2002 .

[4]  H. S. Ng,et al.  Security issues of wireless sensor networks in healthcare applications , 2006 .

[5]  Leslie Lamport,et al.  Password authentication with insecure communication , 1981, CACM.

[6]  Virgil D. Gligor,et al.  A key-management scheme for distributed sensor networks , 2002, CCS '02.

[7]  Jakob E. Bardram,et al.  BLIG: A New Approach for Sensor Identification, Grouping, and Authorisation in Body Sensor Networks , 2007, BSN.

[8]  David A. Wagner,et al.  TinySec: a link layer security architecture for wireless sensor networks , 2004, SenSys '04.

[9]  Donggang Liu,et al.  Group-based key pre-distribution in wireless sensor networks , 2005, WiSe '05.

[10]  Martín Abadi,et al.  A logic of authentication , 1989, Proceedings of the Royal Society of London. A. Mathematical and Physical Sciences.

[11]  Bao Li,et al.  An Efficient Scheme for User Authentication in Wireless Sensor Networks , 2007, 21st International Conference on Advanced Information Networking and Applications Workshops (AINAW'07).

[12]  Donggang Liu,et al.  Establishing pairwise keys in distributed sensor networks , 2005, TSEC.

[13]  Bo Sheng,et al.  TelosB Implementation of Elliptic Curve Cryptography over Primary Field WM-CS Technical Report (WM-CS-2005-12) , 2005 .

[14]  Sheng Zhong,et al.  Body sensor network security: an identity-based cryptography approach , 2008, WiSec '08.

[15]  Peter Kruus,et al.  TinyPK: securing sensor networks with public key technology , 2004, SASN '04.

[16]  Lan Wang,et al.  Addressing security in medical sensor networks , 2007, HealthNet '07.