Using Physiological Signals for Authentication in a Group Key Agreement Protocol
View/ Open
Author(s)
Singh, K
Muthukkumarasamy, V
Griffith University Author(s)
Year published
2011
Metadata
Show full item recordAbstract
A Body Area Network (BAN) can be used to monitor the elderly people or patients with chronic diseases. Securing broadcasted data and commands within BANs is essential for preserving the privacy of health data and for ensuring the safety of the patient. We show how a group key can be securely established between the different sensors within a BAN. The proposed mechanism uses the inherent secure environmental values. An implementation of the protocols is carried out on mica2 motes and performance is examined in detail. The time elapsed, complexity of the code and memory requirements are analysed. The results confirm the potential ...
View more >A Body Area Network (BAN) can be used to monitor the elderly people or patients with chronic diseases. Securing broadcasted data and commands within BANs is essential for preserving the privacy of health data and for ensuring the safety of the patient. We show how a group key can be securely established between the different sensors within a BAN. The proposed mechanism uses the inherent secure environmental values. An implementation of the protocols is carried out on mica2 motes and performance is examined in detail. The time elapsed, complexity of the code and memory requirements are analysed. The results confirm the potential benefits in real-world application. We show that a key establishment protocol based on RSA has advantages over a protocol based on ECC for this application.
View less >
View more >A Body Area Network (BAN) can be used to monitor the elderly people or patients with chronic diseases. Securing broadcasted data and commands within BANs is essential for preserving the privacy of health data and for ensuring the safety of the patient. We show how a group key can be securely established between the different sensors within a BAN. The proposed mechanism uses the inherent secure environmental values. An implementation of the protocols is carried out on mica2 motes and performance is examined in detail. The time elapsed, complexity of the code and memory requirements are analysed. The results confirm the potential benefits in real-world application. We show that a key establishment protocol based on RSA has advantages over a protocol based on ECC for this application.
View less >
Conference Title
2011 IEEE Conference on Computer Communications Workshops, INFOCOM WKSHPS 2011
Copyright Statement
© 2011 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising or promotional purposes, creating new collective works, for resale or redistribution to servers or lists, or reuse of any copyrighted component of this work in other works.
Subject
Other information and computing sciences not elsewhere classified