Hybrid Authentication Protocol Framework Using Wireless Body Area Network (WBAN) for Multiple Concurrent Health Monitoring
WBAN has shown great potential in improving healthcare quality through a wide range of applications in health monitoring. However, it operates in an environment with open access by various people, which also accommodates attackers. The open wireless channel makes the data prone to be eavesdropped, modified and injected. These threats can be extremely hazardous to the patients who need to be treated timely and accurately. Recently, studies have focused more on securing inter-sensor communication within a WBAN due to the resource-constraint issues of biomedical sensors. Therefore, this study proposes a hybrid authentication protocol framework to protect data transmissions between patients and medical professionals when the patients need to be monitored concurrently. The hybrid model uses Electrocardiogram (ECG) signal as the biometric parameter, in combination with a set of random numbers for greater performance. For greater accuracy, an evaluation is performed by using different sampling frequencies of the ECG signals as inputs to the model. The evaluation implies that the best-fit feature would be obtained by using lower sampling frequency of the ECG signal.
Copyright © 2014 Praise Worthy Prize - All rights reserved.
J. I. Bangash, A. H. Abdullah, M. H. Anisi, and A. W. Khan, “A survey of routing protocols in wireless body sensor networks.,” Sensors (Basel)., vol. 14, no. 1, pp. 1322–57, Jan. 2014.
Meena Abarna, K.T., Venkatachalapathy, K., Priority based fault tolerant technique for wireless body area networks (WBANs), (2013) International Review on Computers and Software (IRECOS), 8 (5), pp. 1149-1155.
S. N. Ramli and R. Ahmad, “Surveying the Wireless Body Area Network in the realm of Wireless Communication,” in Information Assurance and Security (IAS), 2011 7th International Conference, 2011, pp. 58–61.
M. Haghighi, “An end-to-end middleware solution with multiple concurrent applications support for wireless body area networks,” 2013 IEEE 6th Int. Work. Comput. Intell. Appl., pp. 201–206, Jul. 2013.
S.-D. Bao, Y.-T. Zhang, and L.-F. Shen, “Physiological signal based entity authentication for body area sensor networks and mobile healthcare systems.,” in 27th Annual International Conference of the IEEE Engineering in Medicine and Biology Society., 2005, vol. 3, pp. 2455–2458.
C. C. Y. Poon, Y.-T. Zhang, and S.-D. Bao, “A novel biometrics method to secure wireless body area sensor networks for telemedicine and m-health,” IEEE Commun. Mag., vol. 44, no. 4, pp. 73–81, 2006.
K. K. Venkatasubramanian, A. Banerjee, and S. K. S. Gupta, “PSKA: usable and secure key agreement scheme for body area networks.,” IEEE Trans. Inf. Technol. Biomed. a Publ. IEEE Eng. Med. Biol. Soc., vol. 14, no. 1, pp. 60–68, 2010.
A. Juels and M. Sudan, “A fuzzy vault scheme,” Proc. IEEE Int. Symp. Inf. Theory, p. 408, 2002.
L. Yao, B. Liu, K. Yao, G. Wu, and J. Wang, “An ECG-Based Signal Key Establishment Protocol in Body Area Networks,” 2010 7th Int. Conf. Ubiquitous Intell. Comput. 7th Int. Conf. Auton. Trust. Comput., pp. 233–238, Oct. 2010.
D. Yevgeniy, R. Leonid, and S. Adam, “Fuzzy Extractors: How to Generate Strong Keys from Biometrics and Other Noisy Data,” in Advances in Cryptology - EUROCRYPT 2004: International Conference on the Theory and Applications of Cryptographic Techniques, Interlaken, Switzerland, May 2-6, 2004. Proceedings, 2004, vol. 3027, pp. 523–540.
Z. Zhang, H. Wang, A. V Vasilakos, and H. Fang, “ECG-Cryptography and Authentication in Body Area Networks,” IEEE Trans. Inf. Technol. Biomed., vol. 16, no. 6, pp. 1070–1078, 2012.
“The MIT-BIH Normal Sinus Rhythm Database.” [Online]. Available: www.physionet.org/cgi-bin/atm/ATM.
“The MIT-BIH Arrhythmia Database.” [Online]. Available: www.physionet.org/cgi-bin/atm/ATM.
S. N. Ramli, R. Ahmad, M. F. Abdollah, and E. Dutkiewicz, “A Biometric-based Security for Data Authentication in Wireless Body Area Network ( WBAN ),” in Advanced Communication Technology (ICACT), 2013 15th International Conference, 2013, pp. 998–1001.
S. N. Ramli, R. Ahmad, and M. F. Abdollah, “Electrocardiogram (ECG) signals as biometrics in securing Wireless Body Area Network,” in The 8th International Conference for Internet Technology and Secured Transactions, 2013, pp. 536–541.
S. Ullah, M. Mohaisen, and M. A. Alnuem, “A Review of IEEE 802.15.6 MAC, PHY, and Security Specifications,” Int. J. Distrib. Sens. Networks, vol. 2013, pp. 1–12, 2013.
Azimiyan, F., Kheirkhah, E., Jalali, M., Classification of routing protocols in wireless sensor networks, (2012) International Review on Computers and Software (IRECOS), 7 (4), pp. 1614-1623.
Alla, S.B., Ezzati, A., A QoS-guaranteed coverage and connectivity preservation routing protocol for heterogeneous wireless sensor networks, (2012) International Journal on Communications Antenna and Propagation (IRECAP), 2 (6), pp. 363-371.
Krief, F., Bennani, Y., Gomes, D., Neuman de Souza, J., LECSOM: A low-energy routing algorithm based on SOM clustering for static and mobile wireless sensor networks, (2011) International Journal on Communications Antenna and Propagation (IRECAP), 1 (1), pp. 55-63.
Eroglu, A., Design of wireless data acquisition sensor system for health care applications, (2012) International Journal on Communications Antenna and Propagation (IRECAP), 2 (6), pp. 386-391.
Shankar, T., Shanmugavel, S., Karthikeyan, A., Hybrid approach for energy optimization in wireless sensor networks using PSO, (2013) International Journal on Communications Antenna and Propagation (IRECAP), 3 (4), pp. 221-226.
Maizate, A., El Kamoun, N., A new metric based cluster head selection technique for prolonged lifetime in wireless sensor networks, (2013) International Journal on Communications Antenna and Propagation (IRECAP), 3 (4), pp. 227-236.
- There are currently no refbacks.
Please send any question about this web site to email@example.com
Copyright © 2005-2020 Praise Worthy Prize