SlideShare ist ein Scribd-Unternehmen logo
1 von 29
SECURITY IN WIRELESS BODY
AREA NETWORK
PRESENTED BY : ANKITA DUTTA
SUBHRADEEP MITRA
(MCA student of Rajabazar sc college, kolkata)
Overview
 Wireless Body Area Network
 Challenges
 Security Requirements
 Possible Solutions
 Identity Based Encryption
 Weil Pairing
 Tate Pairing
 Weil Pairing Vs. Tate Pairing
 Conclusions
Wireless Body Area Network
• It is the integration of intelligent, miniaturized, low power sensor node in, on or
around
a human body to monitoring body function
• Different nodes such as ECG, EMG and EEG are deployed on the human body to
collect the physiological parameters and forward them to a remote medical server
for further service
• WBAN consist of two types:-
1) In-body area network
2) On-body area network
( Security in Wireless Body Area Networks:
A survey by M. Somasundaram+ and R.
Sivakumar )
Challenges
 Sensor nodes are Low energy devices
 Security threats
 Data consistency
 Interference
 Cost
 Consistent performance
Possible Security Threats and Attacks
Layers DoS Attacks Defenese
Physical Jamming
Tampering
Spread-spectrum, priority
messages, lower duty
cycle, region mapping,
Tamper-proof, hiding
Link Collision
Unfairness
Exhaustion
Error correcting code
Small frames
Rate limitation
Network Spoofing
Selective Forwarding
Sybil
Encryption
Egress filtering,
authorization monitoring
Authorization, monitoring,
redundancy
Transport Flooding
De-synchronization
Client Puzzles
Authentication
Security Requirements
 Data integrity
 Data Authentication
 Data freshness
 Secure localization
 Availability
 Secure management
 Data confidentiality
• In WBAN, data confidentiality is
considered to be the most important
issues.
• Protect the data from disclosure.
• Should not leak patient’s vital
information to external or
neighboring networks.
• To solve this security risk public-
key cryptography is too costly.
Possible Solutions
 Identity based encryption scheme is used to achieve Data confidentiality in
Wireless Sensor Networks.
Importance of using IBE:
• Ideal for low energy sensor devices
• Reduces cost
 Elliptic Curve Cryptography
 Bilinear Pairing Function
Identity Based Encryption
ALICE BOB
PKG
C
M
skIDbob
Upon receiving IDbob
M
ID bob
pkPKG
Sender Receiver
IBE has 4 steps :-
1) Setup
2) Private key Extraction
3) Encryption
4) Decryption ( A Survey of Identity-Based Cryptography by
Joonsang Baek, Jan Newmarch, Reihaneh
Safavi-Naini, and Willy Susilo)
Elliptic Curve
• Two families of elliptic curve E for use in pairing based cryptosystems:
1. The pairing takes values in the prime field Fp over which the curve is defined.
2. This family consists of super singular curves with embedding degree k=2
Let E be the elliptic curve Y2=x3+ax+b Defined over a finite field Fq, and let p be a
base point having prime order n dividing #E(Fq), where we assume that n does not
divide q.
• Usefulness of Elliptic curve in IBE:
Elliptic curve divide the keys (public key) one half or one forth then the power
consume and energy loss decreases in case of key exchange
Bilinear Pairing
• Bilinearity : ȇ(aP , bQ)=ȇ(P , Q)ab, where P , Q Є G and a,b Є Zq
*
• Non-degenerate: ȇ does not send all pair of points in G * G to the identity in F(Hence
if R is a generator of G then ȇ(R,R) is a generator of F)
• Computable: For all P , Q Є G the map ȇ(P , Q) is efficiently computable
• Type of Bilinear pairing:
Diffie-Hellman problem: Given( G, q, ȇ, P, aP, cP) where a,b and c are chosen at
random from Zq
* compute ȇ(P,P)abc
Other billnear pairing: 1) Boneh and Frankin’s IBE
2 ) Hierarchical IBE scheme
3) Cha and Cheon's IBE Scheme
Selected IBE Schemes
• Weil Pairing :
In mathematics, the Weil pairing is a pairing on the points of order
dividing n of an elliptic curve E, taking values in nth roots of unity. More
generally there is a similar Weil pairing between points of order n of an
abelian variety and its dual.
• Tate Pairing :
The Tate pairing was introduced by G. Fray and H.G. Ruck. Tate pairing
was firstly used to construct FR attack. Tate pairing is now an alternative
to Weil pairing due to its somewhat better computation efficiency.
Weil Pairing
Weil pairing have 4 stages:-
1. Setup
2. Extract
3. Encryption
4. Decryption
(Identity-Based Encryption from the Weil
Pairing by Dan Boneh Matthew Frankliny )
Weil Pairing (Contd…)
Setup : The PKG specifies
• A group G generated by P Є G* and the bilinear pairing
ȇ: G * G  F
• Two hash functions H1 : {0,1}*  G* and H2 : F {0,1}l where l denotes the length
of a plaintext
• PKG then picks a master key s Є Zq
* at random and computes a public key
PPKG = sP
Private key extraction:
• Bob,the receiver ,then contacts the PKG to get his private key DID = sQID
where QID= H1(ID)
Encryption:
Alice the sender, can now encrypt her message M {0,1}l using Bob’s identity ID by
computing U=rP and V=H2 (ȇ(QID, PPKG)r) M, where r is chosen at random from Zq
*
and QID = H1(ID).
Decryption:
• The resulting cipher text C=(U,V) is send to Bob
• Bob decrypts C by computing M=V H2 (ȇ(DID, U))
Weil Pairing (Contd…)
Tate Pairing
Definition: Tate pairing is essentially a bilinear map from G1 * G2  G3 where
G1 = S[q], G2 =T[q] and G3 is the multiplicative group of GF(p2)
Stages of ID based Tate pairing:-
1. Setup
2. Extract(Registration)
3. Encrypt
4. Decrypt
(An Identity based Encryption using Elliptic Curve Cryptography for Secure M2M
Communication by B S Adiga, Balamuralidhar P,Rajan M A, Ravishankara Shastry, Shivraj V L)
1. Setup :-
• PKG generates a prime p, the elliptic curve E/GF(p) with order n= #E/GF(p)
• Generate a torsion group of prime order q
• PKG selects a random master secret key “s” in range 0<s<q
2. Extract(Registration):-
• Alice submits her identity to PKG
• PKG convert its to a string and maps it to an element of GF(p)
• Find a point (Q_ida) on the torsion group
• Computes a point S_ida belongs to that group
• PKG sends the alice her public and private key along with the public
parameters
Tate Pairing (Contd…)
3. Encrypt:-
• Alice computes Q_idb of Bob knowing public parameters p,q,P,Q and Bob’s
identity.
• Alice selects a random no “r” in range 0<r<q
• Computes
C1=[r]P and C2 = m.e(Q_idb, φ(q))r
4. Decrypt:-
• Bob receives the ciphertext (C1, C2 )
• Computes m`= C2 * e(S_ida, φ(C1 )-1
• Check if m=m` or not
Tate Pairing (Contd…)
Why these two Schemes are selected?
• Weil pairing and Tate pairing both provide good functionality for use in
cryptosystems
• Fast implementations of these pairings
• Uses Elliptic Curve Cryptography and a very small number of bits
• Irrelevant factors and denominators are eliminated
• Super singular curves are used
• Uses random number generation to provide better security
Weil Pairing Vs. Tate Pairing
• Tate pairing is faster than Weil pairing..
Weil pairing is er (p , p) =
thus two application of Tate pairing.
According to computation facts, Weil pairing takes twice the computational time than
that of the Tate pairing.
However Weil pairing usually takes more than twice the time to compute than that of the
Tate pairing
• Tate pairing is used to reduce the discrete logarithm problem on certain elliptic curves
to the discrete logarithm problem over finite field.
Weil pairing of a point with itself is trivial as er (p , p) = 1
however, Tate pairing of a point with itself is not trivial as t (p , p) ≠ 1
• Tate pairing consumes less power and useful for Low-energy devices.
For example : the TinyTate implemented for sensor networks require the system
configuration :– 8-bit/7.3828-MHz ATmega128L microcontroller.
However for Weil pairing the computation requires two Hash function evaluation, two
Tate pairing computation which will gradually require higher system configuration.
( Weil Pairing vs. Tate Pairing in IBE systems
by Ezra Brown, Eric Errthum, David Fu )
Weil Pairing Vs. Tate Pairing (Contd…)
Implementation Tools
 Java
 JPBC Library (Java Pairing Based Cryptography
 PBC Library
 GMP Library
 MinGW (MSYS base system)
 Netbeans Profiler
Performance Analysis
Performance Analysis can be done in the following ways :
 Memory Analysis
 Runtime Analysis
 Power Consumption, requirement of resources and cost of
implementation
 Security Parameters
Among the above mentioned we will measure the performance on the basis of
Memory and Runtime analysis.
Memory Analysis
Weil Pairing Tate Pairing
Runtime Analysis
Weil Pairing Tate Pairing
Future Scope
Wireless Body Area Network comprised of low energy devices such as sensor nodes.
Smart Phones are used to store the medical data gathered by the sensor nodes. In
future these features can be implemented in android platform and then can be
deployed in a small network of low energy sensor nodes.
Conclusions
Through this presentation we have given an overview of the various Security issues in
Wireless Body Area Networking and the possible solutions to overcome these issues.
The solutions should be efficient in such a way that the low-energy sensor devices can
be able for functioning the entire implementation. As well as Data security and Data
confidentiality must be maintained and unauthorized accesses should be prohibited. For
these the optimistic cryptographic and IBE schemes are invented such that Weil pairing
and Tate pairing. And then to find the best scheme among the chosen options that is the
Tate pairing depending upon various measurements.
References
[1] A. Shamir, “Identity-based cryptosystems and signature schemes, “in Proc.
Crypto ’84, Santa Barbara, CA, Aug, 1984, pages 47-53.
[2] Dan Boneh, Matthew Franklin, “Identity-Based Encryption from the Weil
pairing”, in SIAM J. of Computing, Vol. 32, No. 3, pages 586-615, 2003.
[3] B S Adiga, Balamuralidhar P, Rajan M A, Ravishankara Shastry, Shivraj V L, "An
Identity based Encryption using Elliptic Curve Cryptography for Secure M2M
Communication", in TCS Innovation Labs, Bangalore, Karnataka, India, pp 68-75.
[4] IEEE 5931464, Moncef Amara, Amar Siad, "ELLIPTIC CURVE
CRYPTOGRAPHY AND ITS APPLICATIONS", in 7th International Workshop on
Systems, Signal Processing and their Applications (WOSSPA), pages 247-250, 2011.
Wireless Body Area Networking
Wireless Body Area Networking

Weitere ähnliche Inhalte

Was ist angesagt?

Energy efficient intrusion detection system
Energy efficient intrusion detection systemEnergy efficient intrusion detection system
Energy efficient intrusion detection systemiaemedu
 
A SECURITY PROTOCOL FOR WIRELESS SENSOR NETWORKS
A SECURITY PROTOCOL FOR WIRELESS SENSOR NETWORKSA SECURITY PROTOCOL FOR WIRELESS SENSOR NETWORKS
A SECURITY PROTOCOL FOR WIRELESS SENSOR NETWORKSIAEME Publication
 
Wireless Micro-Sensor Network Models
Wireless Micro-Sensor Network ModelsWireless Micro-Sensor Network Models
Wireless Micro-Sensor Network ModelsIOSR Journals
 
Ndsp: Neighbor Assisted Distributed Self-Healing Protocol for Compromised Nod...
Ndsp: Neighbor Assisted Distributed Self-Healing Protocol for Compromised Nod...Ndsp: Neighbor Assisted Distributed Self-Healing Protocol for Compromised Nod...
Ndsp: Neighbor Assisted Distributed Self-Healing Protocol for Compromised Nod...iosrjce
 
Multi-Tiered Communication Security Schemes in Wireless Ad-Hoc Sensor Networks
Multi-Tiered Communication Security Schemes in Wireless Ad-Hoc Sensor NetworksMulti-Tiered Communication Security Schemes in Wireless Ad-Hoc Sensor Networks
Multi-Tiered Communication Security Schemes in Wireless Ad-Hoc Sensor NetworksIDES Editor
 
Network security ppt
Network security pptNetwork security ppt
Network security pptvidyapol01
 
A-SURVEY SECURITY PROTOCOL FOR WIRELESS SENSOR NETWORK
A-SURVEY SECURITY PROTOCOL FOR WIRELESS SENSOR NETWORKA-SURVEY SECURITY PROTOCOL FOR WIRELESS SENSOR NETWORK
A-SURVEY SECURITY PROTOCOL FOR WIRELESS SENSOR NETWORKEditor IJMTER
 
Secure data dissemination protocol in wireless sensor networks using xor netw...
Secure data dissemination protocol in wireless sensor networks using xor netw...Secure data dissemination protocol in wireless sensor networks using xor netw...
Secure data dissemination protocol in wireless sensor networks using xor netw...eSAT Publishing House
 
Efficient Data Aggregation in Wireless Sensor Networks
Efficient Data Aggregation in Wireless Sensor NetworksEfficient Data Aggregation in Wireless Sensor Networks
Efficient Data Aggregation in Wireless Sensor NetworksIJAEMSJORNAL
 
A Review on Wireless Sensor Network Security
A Review on Wireless Sensor Network SecurityA Review on Wireless Sensor Network Security
A Review on Wireless Sensor Network Securityijtsrd
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER) International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER) ijceronline
 
An Efficient Security Way of Authentication and Pair wise Key Distribution wi...
An Efficient Security Way of Authentication and Pair wise Key Distribution wi...An Efficient Security Way of Authentication and Pair wise Key Distribution wi...
An Efficient Security Way of Authentication and Pair wise Key Distribution wi...IJMER
 
Ijarcet vol-2-issue-2-756-760
Ijarcet vol-2-issue-2-756-760Ijarcet vol-2-issue-2-756-760
Ijarcet vol-2-issue-2-756-760Editor IJARCET
 

Was ist angesagt? (17)

S04404116120
S04404116120S04404116120
S04404116120
 
Energy efficient intrusion detection system
Energy efficient intrusion detection systemEnergy efficient intrusion detection system
Energy efficient intrusion detection system
 
A SECURITY PROTOCOL FOR WIRELESS SENSOR NETWORKS
A SECURITY PROTOCOL FOR WIRELESS SENSOR NETWORKSA SECURITY PROTOCOL FOR WIRELESS SENSOR NETWORKS
A SECURITY PROTOCOL FOR WIRELESS SENSOR NETWORKS
 
A0320105
A0320105A0320105
A0320105
 
Wireless Micro-Sensor Network Models
Wireless Micro-Sensor Network ModelsWireless Micro-Sensor Network Models
Wireless Micro-Sensor Network Models
 
Ndsp: Neighbor Assisted Distributed Self-Healing Protocol for Compromised Nod...
Ndsp: Neighbor Assisted Distributed Self-Healing Protocol for Compromised Nod...Ndsp: Neighbor Assisted Distributed Self-Healing Protocol for Compromised Nod...
Ndsp: Neighbor Assisted Distributed Self-Healing Protocol for Compromised Nod...
 
Bi33349355
Bi33349355Bi33349355
Bi33349355
 
Multi-Tiered Communication Security Schemes in Wireless Ad-Hoc Sensor Networks
Multi-Tiered Communication Security Schemes in Wireless Ad-Hoc Sensor NetworksMulti-Tiered Communication Security Schemes in Wireless Ad-Hoc Sensor Networks
Multi-Tiered Communication Security Schemes in Wireless Ad-Hoc Sensor Networks
 
Network security ppt
Network security pptNetwork security ppt
Network security ppt
 
A-SURVEY SECURITY PROTOCOL FOR WIRELESS SENSOR NETWORK
A-SURVEY SECURITY PROTOCOL FOR WIRELESS SENSOR NETWORKA-SURVEY SECURITY PROTOCOL FOR WIRELESS SENSOR NETWORK
A-SURVEY SECURITY PROTOCOL FOR WIRELESS SENSOR NETWORK
 
Secure data dissemination protocol in wireless sensor networks using xor netw...
Secure data dissemination protocol in wireless sensor networks using xor netw...Secure data dissemination protocol in wireless sensor networks using xor netw...
Secure data dissemination protocol in wireless sensor networks using xor netw...
 
Efficient Data Aggregation in Wireless Sensor Networks
Efficient Data Aggregation in Wireless Sensor NetworksEfficient Data Aggregation in Wireless Sensor Networks
Efficient Data Aggregation in Wireless Sensor Networks
 
A Review on Wireless Sensor Network Security
A Review on Wireless Sensor Network SecurityA Review on Wireless Sensor Network Security
A Review on Wireless Sensor Network Security
 
D0371028039
D0371028039D0371028039
D0371028039
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER) International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)
 
An Efficient Security Way of Authentication and Pair wise Key Distribution wi...
An Efficient Security Way of Authentication and Pair wise Key Distribution wi...An Efficient Security Way of Authentication and Pair wise Key Distribution wi...
An Efficient Security Way of Authentication and Pair wise Key Distribution wi...
 
Ijarcet vol-2-issue-2-756-760
Ijarcet vol-2-issue-2-756-760Ijarcet vol-2-issue-2-756-760
Ijarcet vol-2-issue-2-756-760
 

Andere mochten auch

wireless body area networks(WBAN)
wireless body area networks(WBAN)wireless body area networks(WBAN)
wireless body area networks(WBAN)kramsheeda
 
Wireless body area network
Wireless body area networkWireless body area network
Wireless body area networkPratik Gondaliya
 
Wireless Body Area Networks
Wireless Body Area Networks Wireless Body Area Networks
Wireless Body Area Networks Musfiqur Rahman
 
Wireless Body Area network
Wireless Body Area networkWireless Body Area network
Wireless Body Area networkRajeev N
 
WIRELESS BODY AREA NETWORK
WIRELESS BODY AREA NETWORKWIRELESS BODY AREA NETWORK
WIRELESS BODY AREA NETWORKmadhushreek
 
MICS Band Wireless Body Sensor Network
MICS Band Wireless Body Sensor NetworkMICS Band Wireless Body Sensor Network
MICS Band Wireless Body Sensor NetworkMyo Naung Lwin
 
Over flow multi site aware big data management for scientific workflows on cl...
Over flow multi site aware big data management for scientific workflows on cl...Over flow multi site aware big data management for scientific workflows on cl...
Over flow multi site aware big data management for scientific workflows on cl...ieeepondy
 
Tutorial Dr G V Rangaraj Wireless Security in Medical Devices
Tutorial Dr G V Rangaraj Wireless Security in Medical DevicesTutorial Dr G V Rangaraj Wireless Security in Medical Devices
Tutorial Dr G V Rangaraj Wireless Security in Medical Devicesgvrangaraj
 
Wireless Body Area Networks for healthcare (Wban)
Wireless Body Area Networks  for healthcare (Wban)Wireless Body Area Networks  for healthcare (Wban)
Wireless Body Area Networks for healthcare (Wban)no0orcom
 
Socket Programming in C++
Socket Programming in C++Socket Programming in C++
Socket Programming in C++saeed_delphi
 

Andere mochten auch (20)

wireless body area networks(WBAN)
wireless body area networks(WBAN)wireless body area networks(WBAN)
wireless body area networks(WBAN)
 
Wireless body area network
Wireless body area networkWireless body area network
Wireless body area network
 
Wireless Body Area Network
Wireless Body Area NetworkWireless Body Area Network
Wireless Body Area Network
 
Body Area Network
Body Area NetworkBody Area Network
Body Area Network
 
Wireless Body Area Networks
Wireless Body Area Networks Wireless Body Area Networks
Wireless Body Area Networks
 
Wban
WbanWban
Wban
 
Wireless Body Area network
Wireless Body Area networkWireless Body Area network
Wireless Body Area network
 
Wireless Body Area Network (WBAN)
Wireless Body Area Network (WBAN)Wireless Body Area Network (WBAN)
Wireless Body Area Network (WBAN)
 
WIRELESS BODY AREA NETWORK
WIRELESS BODY AREA NETWORKWIRELESS BODY AREA NETWORK
WIRELESS BODY AREA NETWORK
 
WSN IN BODY AREA NETWORK BASED ON EGERGY CONSERVATION
WSN IN BODY AREA NETWORK BASED ON EGERGY CONSERVATIONWSN IN BODY AREA NETWORK BASED ON EGERGY CONSERVATION
WSN IN BODY AREA NETWORK BASED ON EGERGY CONSERVATION
 
MICS Band Wireless Body Sensor Network
MICS Band Wireless Body Sensor NetworkMICS Band Wireless Body Sensor Network
MICS Band Wireless Body Sensor Network
 
Over flow multi site aware big data management for scientific workflows on cl...
Over flow multi site aware big data management for scientific workflows on cl...Over flow multi site aware big data management for scientific workflows on cl...
Over flow multi site aware big data management for scientific workflows on cl...
 
Comsnets wban ppt
Comsnets wban pptComsnets wban ppt
Comsnets wban ppt
 
Tutorial Dr G V Rangaraj Wireless Security in Medical Devices
Tutorial Dr G V Rangaraj Wireless Security in Medical DevicesTutorial Dr G V Rangaraj Wireless Security in Medical Devices
Tutorial Dr G V Rangaraj Wireless Security in Medical Devices
 
Brain gate
Brain gate Brain gate
Brain gate
 
Calculator
CalculatorCalculator
Calculator
 
Go Programming Language
Go Programming LanguageGo Programming Language
Go Programming Language
 
WBAN
WBANWBAN
WBAN
 
Wireless Body Area Networks for healthcare (Wban)
Wireless Body Area Networks  for healthcare (Wban)Wireless Body Area Networks  for healthcare (Wban)
Wireless Body Area Networks for healthcare (Wban)
 
Socket Programming in C++
Socket Programming in C++Socket Programming in C++
Socket Programming in C++
 

Ähnlich wie Wireless Body Area Networking

Modified Koblitz Encoding Method for ECC
Modified Koblitz Encoding Method for ECCModified Koblitz Encoding Method for ECC
Modified Koblitz Encoding Method for ECCidescitation
 
“Proposed Model for Network Security Issues Using Elliptical Curve Cryptography”
“Proposed Model for Network Security Issues Using Elliptical Curve Cryptography”“Proposed Model for Network Security Issues Using Elliptical Curve Cryptography”
“Proposed Model for Network Security Issues Using Elliptical Curve Cryptography”IOSR Journals
 
Ecc cipher processor based on knapsack algorithm
Ecc cipher processor based on knapsack algorithmEcc cipher processor based on knapsack algorithm
Ecc cipher processor based on knapsack algorithmAlexander Decker
 
Efficient ECC encryption for WSN’s
Efficient ECC encryption for WSN’sEfficient ECC encryption for WSN’s
Efficient ECC encryption for WSN’sIDES Editor
 
Design And Implementation Of Tiny Encryption Algorithm
Design And Implementation Of Tiny Encryption AlgorithmDesign And Implementation Of Tiny Encryption Algorithm
Design And Implementation Of Tiny Encryption AlgorithmIJERA Editor
 
PEC - AN ALTERNATE AND MORE EFFICIENT PUBLIC KEY CRYPTOSYSTEM
PEC - AN ALTERNATE AND MORE EFFICIENT PUBLIC KEY CRYPTOSYSTEMPEC - AN ALTERNATE AND MORE EFFICIENT PUBLIC KEY CRYPTOSYSTEM
PEC - AN ALTERNATE AND MORE EFFICIENT PUBLIC KEY CRYPTOSYSTEMijcisjournal
 
Elgamal signature for content distribution with network coding
Elgamal signature for content distribution with network codingElgamal signature for content distribution with network coding
Elgamal signature for content distribution with network codingijwmn
 
Data Security Using Elliptic Curve Cryptography
Data Security Using Elliptic Curve CryptographyData Security Using Elliptic Curve Cryptography
Data Security Using Elliptic Curve CryptographyIJCERT
 
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...ijceronline
 
S.a.kalaiselvan udrpg dynamic key management based node
S.a.kalaiselvan   udrpg dynamic key management based nodeS.a.kalaiselvan   udrpg dynamic key management based node
S.a.kalaiselvan udrpg dynamic key management based nodekalaiselvanresearch
 
UDRPG: Dynamic Key Management Based Node Authentication for Secret Communica...
 UDRPG: Dynamic Key Management Based Node Authentication for Secret Communica... UDRPG: Dynamic Key Management Based Node Authentication for Secret Communica...
UDRPG: Dynamic Key Management Based Node Authentication for Secret Communica...Venkata Swaroop
 
Quantum cryptography for secured communication networks
Quantum cryptography for secured communication networksQuantum cryptography for secured communication networks
Quantum cryptography for secured communication networksIJECEIAES
 
Secrecy and Performance Analysis of Symmetric Key Encryption Algorithms
Secrecy and Performance Analysis of Symmetric Key Encryption AlgorithmsSecrecy and Performance Analysis of Symmetric Key Encryption Algorithms
Secrecy and Performance Analysis of Symmetric Key Encryption AlgorithmsTharindu Weerasinghe
 
IRJET- FPGA Implementation of Image Encryption and Decryption using Fully Hom...
IRJET- FPGA Implementation of Image Encryption and Decryption using Fully Hom...IRJET- FPGA Implementation of Image Encryption and Decryption using Fully Hom...
IRJET- FPGA Implementation of Image Encryption and Decryption using Fully Hom...IRJET Journal
 
Pairwise Keys Generation Using Prime Number Function in Wireless Sensor Networks
Pairwise Keys Generation Using Prime Number Function in Wireless Sensor NetworksPairwise Keys Generation Using Prime Number Function in Wireless Sensor Networks
Pairwise Keys Generation Using Prime Number Function in Wireless Sensor NetworksIDES Editor
 
IRJET- Symmetric Cryptography using Neural Networks
IRJET-  	  Symmetric Cryptography using Neural NetworksIRJET-  	  Symmetric Cryptography using Neural Networks
IRJET- Symmetric Cryptography using Neural NetworksIRJET Journal
 
Crack Wep Wifi Under100seconds
Crack Wep Wifi Under100secondsCrack Wep Wifi Under100seconds
Crack Wep Wifi Under100secondsmvde3000
 
Analysis and improvement of pairing free certificate-less two-party authentic...
Analysis and improvement of pairing free certificate-less two-party authentic...Analysis and improvement of pairing free certificate-less two-party authentic...
Analysis and improvement of pairing free certificate-less two-party authentic...ijsptm
 
Secure and Efficient Data Transmission for Cluster-Based Wireless Sensor Net...
Secure and Efficient Data Transmission  for Cluster-Based Wireless Sensor Net...Secure and Efficient Data Transmission  for Cluster-Based Wireless Sensor Net...
Secure and Efficient Data Transmission for Cluster-Based Wireless Sensor Net...Walchand college of Engineering,Sangli
 

Ähnlich wie Wireless Body Area Networking (20)

Modified Koblitz Encoding Method for ECC
Modified Koblitz Encoding Method for ECCModified Koblitz Encoding Method for ECC
Modified Koblitz Encoding Method for ECC
 
“Proposed Model for Network Security Issues Using Elliptical Curve Cryptography”
“Proposed Model for Network Security Issues Using Elliptical Curve Cryptography”“Proposed Model for Network Security Issues Using Elliptical Curve Cryptography”
“Proposed Model for Network Security Issues Using Elliptical Curve Cryptography”
 
Ecc cipher processor based on knapsack algorithm
Ecc cipher processor based on knapsack algorithmEcc cipher processor based on knapsack algorithm
Ecc cipher processor based on knapsack algorithm
 
Efficient ECC encryption for WSN’s
Efficient ECC encryption for WSN’sEfficient ECC encryption for WSN’s
Efficient ECC encryption for WSN’s
 
Design And Implementation Of Tiny Encryption Algorithm
Design And Implementation Of Tiny Encryption AlgorithmDesign And Implementation Of Tiny Encryption Algorithm
Design And Implementation Of Tiny Encryption Algorithm
 
PEC - AN ALTERNATE AND MORE EFFICIENT PUBLIC KEY CRYPTOSYSTEM
PEC - AN ALTERNATE AND MORE EFFICIENT PUBLIC KEY CRYPTOSYSTEMPEC - AN ALTERNATE AND MORE EFFICIENT PUBLIC KEY CRYPTOSYSTEM
PEC - AN ALTERNATE AND MORE EFFICIENT PUBLIC KEY CRYPTOSYSTEM
 
Elgamal signature for content distribution with network coding
Elgamal signature for content distribution with network codingElgamal signature for content distribution with network coding
Elgamal signature for content distribution with network coding
 
Data Security Using Elliptic Curve Cryptography
Data Security Using Elliptic Curve CryptographyData Security Using Elliptic Curve Cryptography
Data Security Using Elliptic Curve Cryptography
 
Ci25500508
Ci25500508Ci25500508
Ci25500508
 
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
 
S.a.kalaiselvan udrpg dynamic key management based node
S.a.kalaiselvan   udrpg dynamic key management based nodeS.a.kalaiselvan   udrpg dynamic key management based node
S.a.kalaiselvan udrpg dynamic key management based node
 
UDRPG: Dynamic Key Management Based Node Authentication for Secret Communica...
 UDRPG: Dynamic Key Management Based Node Authentication for Secret Communica... UDRPG: Dynamic Key Management Based Node Authentication for Secret Communica...
UDRPG: Dynamic Key Management Based Node Authentication for Secret Communica...
 
Quantum cryptography for secured communication networks
Quantum cryptography for secured communication networksQuantum cryptography for secured communication networks
Quantum cryptography for secured communication networks
 
Secrecy and Performance Analysis of Symmetric Key Encryption Algorithms
Secrecy and Performance Analysis of Symmetric Key Encryption AlgorithmsSecrecy and Performance Analysis of Symmetric Key Encryption Algorithms
Secrecy and Performance Analysis of Symmetric Key Encryption Algorithms
 
IRJET- FPGA Implementation of Image Encryption and Decryption using Fully Hom...
IRJET- FPGA Implementation of Image Encryption and Decryption using Fully Hom...IRJET- FPGA Implementation of Image Encryption and Decryption using Fully Hom...
IRJET- FPGA Implementation of Image Encryption and Decryption using Fully Hom...
 
Pairwise Keys Generation Using Prime Number Function in Wireless Sensor Networks
Pairwise Keys Generation Using Prime Number Function in Wireless Sensor NetworksPairwise Keys Generation Using Prime Number Function in Wireless Sensor Networks
Pairwise Keys Generation Using Prime Number Function in Wireless Sensor Networks
 
IRJET- Symmetric Cryptography using Neural Networks
IRJET-  	  Symmetric Cryptography using Neural NetworksIRJET-  	  Symmetric Cryptography using Neural Networks
IRJET- Symmetric Cryptography using Neural Networks
 
Crack Wep Wifi Under100seconds
Crack Wep Wifi Under100secondsCrack Wep Wifi Under100seconds
Crack Wep Wifi Under100seconds
 
Analysis and improvement of pairing free certificate-less two-party authentic...
Analysis and improvement of pairing free certificate-less two-party authentic...Analysis and improvement of pairing free certificate-less two-party authentic...
Analysis and improvement of pairing free certificate-less two-party authentic...
 
Secure and Efficient Data Transmission for Cluster-Based Wireless Sensor Net...
Secure and Efficient Data Transmission  for Cluster-Based Wireless Sensor Net...Secure and Efficient Data Transmission  for Cluster-Based Wireless Sensor Net...
Secure and Efficient Data Transmission for Cluster-Based Wireless Sensor Net...
 

Mehr von subhradeep mitra

Different Transmission Media
Different Transmission MediaDifferent Transmission Media
Different Transmission Mediasubhradeep mitra
 
Different types of Symmetric key Cryptography
Different types of Symmetric key CryptographyDifferent types of Symmetric key Cryptography
Different types of Symmetric key Cryptographysubhradeep mitra
 
Automatic temperature control using 8085 microprocessor
Automatic temperature control using 8085 microprocessorAutomatic temperature control using 8085 microprocessor
Automatic temperature control using 8085 microprocessorsubhradeep mitra
 
crosstalk minimisation using vlsi
crosstalk minimisation using vlsicrosstalk minimisation using vlsi
crosstalk minimisation using vlsisubhradeep mitra
 

Mehr von subhradeep mitra (11)

INTERNET TECHNOLOGY
INTERNET  TECHNOLOGYINTERNET  TECHNOLOGY
INTERNET TECHNOLOGY
 
Different Transmission Media
Different Transmission MediaDifferent Transmission Media
Different Transmission Media
 
Fifa world cup
Fifa world cupFifa world cup
Fifa world cup
 
West bengal-tourism
West bengal-tourismWest bengal-tourism
West bengal-tourism
 
Generation Of Computer
Generation Of ComputerGeneration Of Computer
Generation Of Computer
 
Students Profile
Students ProfileStudents Profile
Students Profile
 
GLOBAL INSURANCE PVT LTD.
GLOBAL INSURANCE PVT LTD.GLOBAL INSURANCE PVT LTD.
GLOBAL INSURANCE PVT LTD.
 
Different types of Symmetric key Cryptography
Different types of Symmetric key CryptographyDifferent types of Symmetric key Cryptography
Different types of Symmetric key Cryptography
 
Automatic temperature control using 8085 microprocessor
Automatic temperature control using 8085 microprocessorAutomatic temperature control using 8085 microprocessor
Automatic temperature control using 8085 microprocessor
 
crosstalk minimisation using vlsi
crosstalk minimisation using vlsicrosstalk minimisation using vlsi
crosstalk minimisation using vlsi
 
Backtracking
BacktrackingBacktracking
Backtracking
 

Kürzlich hochgeladen

Call Girls Service Anantapur 📲 6297143586 Book Now VIP Call Girls in Anantapur
Call Girls Service Anantapur 📲 6297143586 Book Now VIP Call Girls in AnantapurCall Girls Service Anantapur 📲 6297143586 Book Now VIP Call Girls in Anantapur
Call Girls Service Anantapur 📲 6297143586 Book Now VIP Call Girls in Anantapurgragmanisha42
 
Call Girls Hyderabad Just Call 9907093804 Top Class Call Girl Service Available
Call Girls Hyderabad Just Call 9907093804 Top Class Call Girl Service AvailableCall Girls Hyderabad Just Call 9907093804 Top Class Call Girl Service Available
Call Girls Hyderabad Just Call 9907093804 Top Class Call Girl Service AvailableDipal Arora
 
(Deeksha) 💓 9920725232 💓High Profile Call Girls Navi Mumbai You Can Get The S...
(Deeksha) 💓 9920725232 💓High Profile Call Girls Navi Mumbai You Can Get The S...(Deeksha) 💓 9920725232 💓High Profile Call Girls Navi Mumbai You Can Get The S...
(Deeksha) 💓 9920725232 💓High Profile Call Girls Navi Mumbai You Can Get The S...Ahmedabad Call Girls
 
neemuch Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real Meet
neemuch Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real Meetneemuch Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real Meet
neemuch Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real MeetCall Girls Service
 
Escorts Service Ahmedabad🌹6367187148 🌹 No Need For Advance Payments
Escorts Service Ahmedabad🌹6367187148 🌹 No Need For Advance PaymentsEscorts Service Ahmedabad🌹6367187148 🌹 No Need For Advance Payments
Escorts Service Ahmedabad🌹6367187148 🌹 No Need For Advance PaymentsAhmedabad Call Girls
 
dehradun Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real Meet
dehradun Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real Meetdehradun Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real Meet
dehradun Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real MeetCall Girls Service
 
Thrissur Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real Meet
Thrissur Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real MeetThrissur Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real Meet
Thrissur Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real MeetCall Girls Service
 
bhopal Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real Meet
bhopal Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real Meetbhopal Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real Meet
bhopal Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real MeetCall Girls Service
 
Call Girls Service In Goa 💋 9316020077💋 Goa Call Girls By Russian Call Girl...
Call Girls Service In Goa  💋 9316020077💋 Goa Call Girls  By Russian Call Girl...Call Girls Service In Goa  💋 9316020077💋 Goa Call Girls  By Russian Call Girl...
Call Girls Service In Goa 💋 9316020077💋 Goa Call Girls By Russian Call Girl...russian goa call girl and escorts service
 
ooty Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real Meet
ooty Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real Meetooty Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real Meet
ooty Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real MeetCall Girls Service
 
Bhagalpur Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real Meet
Bhagalpur Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real MeetBhagalpur Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real Meet
Bhagalpur Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real MeetCall Girls Service
 
❤️Call girls in Jalandhar ☎️9876848877☎️ Call Girl service in Jalandhar☎️ Jal...
❤️Call girls in Jalandhar ☎️9876848877☎️ Call Girl service in Jalandhar☎️ Jal...❤️Call girls in Jalandhar ☎️9876848877☎️ Call Girl service in Jalandhar☎️ Jal...
❤️Call girls in Jalandhar ☎️9876848877☎️ Call Girl service in Jalandhar☎️ Jal...chandigarhentertainm
 
bhubaneswar Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real Meet
bhubaneswar Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real Meetbhubaneswar Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real Meet
bhubaneswar Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real MeetCall Girls Service
 
Krishnagiri call girls Tamil aunty 7877702510
Krishnagiri call girls Tamil aunty 7877702510Krishnagiri call girls Tamil aunty 7877702510
Krishnagiri call girls Tamil aunty 7877702510Vipesco
 
VIP Call Girls Noida Jhanvi 9711199171 Best VIP Call Girls Near Me
VIP Call Girls Noida Jhanvi 9711199171 Best VIP Call Girls Near MeVIP Call Girls Noida Jhanvi 9711199171 Best VIP Call Girls Near Me
VIP Call Girls Noida Jhanvi 9711199171 Best VIP Call Girls Near Memriyagarg453
 
Call Girl in Bangalore 9632137771 {LowPrice} ❤️ (Navya) Bangalore Call Girls ...
Call Girl in Bangalore 9632137771 {LowPrice} ❤️ (Navya) Bangalore Call Girls ...Call Girl in Bangalore 9632137771 {LowPrice} ❤️ (Navya) Bangalore Call Girls ...
Call Girl in Bangalore 9632137771 {LowPrice} ❤️ (Navya) Bangalore Call Girls ...mahaiklolahd
 
Mangalore Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real Meet
Mangalore Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real MeetMangalore Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real Meet
Mangalore Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real MeetCall Girls Service
 
Kochi call girls Mallu escort girls available 7877702510
Kochi call girls Mallu escort girls available 7877702510Kochi call girls Mallu escort girls available 7877702510
Kochi call girls Mallu escort girls available 7877702510Vipesco
 
Jaipur Call Girls 9257276172 Call Girl in Jaipur Rajasthan
Jaipur Call Girls 9257276172 Call Girl in Jaipur RajasthanJaipur Call Girls 9257276172 Call Girl in Jaipur Rajasthan
Jaipur Call Girls 9257276172 Call Girl in Jaipur Rajasthanindiancallgirl4rent
 

Kürzlich hochgeladen (20)

Call Girls Service Anantapur 📲 6297143586 Book Now VIP Call Girls in Anantapur
Call Girls Service Anantapur 📲 6297143586 Book Now VIP Call Girls in AnantapurCall Girls Service Anantapur 📲 6297143586 Book Now VIP Call Girls in Anantapur
Call Girls Service Anantapur 📲 6297143586 Book Now VIP Call Girls in Anantapur
 
Call Girls Hyderabad Just Call 9907093804 Top Class Call Girl Service Available
Call Girls Hyderabad Just Call 9907093804 Top Class Call Girl Service AvailableCall Girls Hyderabad Just Call 9907093804 Top Class Call Girl Service Available
Call Girls Hyderabad Just Call 9907093804 Top Class Call Girl Service Available
 
(Deeksha) 💓 9920725232 💓High Profile Call Girls Navi Mumbai You Can Get The S...
(Deeksha) 💓 9920725232 💓High Profile Call Girls Navi Mumbai You Can Get The S...(Deeksha) 💓 9920725232 💓High Profile Call Girls Navi Mumbai You Can Get The S...
(Deeksha) 💓 9920725232 💓High Profile Call Girls Navi Mumbai You Can Get The S...
 
neemuch Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real Meet
neemuch Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real Meetneemuch Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real Meet
neemuch Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real Meet
 
Escorts Service Ahmedabad🌹6367187148 🌹 No Need For Advance Payments
Escorts Service Ahmedabad🌹6367187148 🌹 No Need For Advance PaymentsEscorts Service Ahmedabad🌹6367187148 🌹 No Need For Advance Payments
Escorts Service Ahmedabad🌹6367187148 🌹 No Need For Advance Payments
 
dehradun Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real Meet
dehradun Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real Meetdehradun Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real Meet
dehradun Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real Meet
 
Thrissur Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real Meet
Thrissur Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real MeetThrissur Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real Meet
Thrissur Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real Meet
 
bhopal Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real Meet
bhopal Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real Meetbhopal Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real Meet
bhopal Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real Meet
 
9316020077📞Goa Call Girls Numbers, Call Girls Whatsapp Numbers Goa
9316020077📞Goa  Call Girls  Numbers, Call Girls  Whatsapp Numbers Goa9316020077📞Goa  Call Girls  Numbers, Call Girls  Whatsapp Numbers Goa
9316020077📞Goa Call Girls Numbers, Call Girls Whatsapp Numbers Goa
 
Call Girls Service In Goa 💋 9316020077💋 Goa Call Girls By Russian Call Girl...
Call Girls Service In Goa  💋 9316020077💋 Goa Call Girls  By Russian Call Girl...Call Girls Service In Goa  💋 9316020077💋 Goa Call Girls  By Russian Call Girl...
Call Girls Service In Goa 💋 9316020077💋 Goa Call Girls By Russian Call Girl...
 
ooty Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real Meet
ooty Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real Meetooty Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real Meet
ooty Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real Meet
 
Bhagalpur Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real Meet
Bhagalpur Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real MeetBhagalpur Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real Meet
Bhagalpur Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real Meet
 
❤️Call girls in Jalandhar ☎️9876848877☎️ Call Girl service in Jalandhar☎️ Jal...
❤️Call girls in Jalandhar ☎️9876848877☎️ Call Girl service in Jalandhar☎️ Jal...❤️Call girls in Jalandhar ☎️9876848877☎️ Call Girl service in Jalandhar☎️ Jal...
❤️Call girls in Jalandhar ☎️9876848877☎️ Call Girl service in Jalandhar☎️ Jal...
 
bhubaneswar Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real Meet
bhubaneswar Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real Meetbhubaneswar Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real Meet
bhubaneswar Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real Meet
 
Krishnagiri call girls Tamil aunty 7877702510
Krishnagiri call girls Tamil aunty 7877702510Krishnagiri call girls Tamil aunty 7877702510
Krishnagiri call girls Tamil aunty 7877702510
 
VIP Call Girls Noida Jhanvi 9711199171 Best VIP Call Girls Near Me
VIP Call Girls Noida Jhanvi 9711199171 Best VIP Call Girls Near MeVIP Call Girls Noida Jhanvi 9711199171 Best VIP Call Girls Near Me
VIP Call Girls Noida Jhanvi 9711199171 Best VIP Call Girls Near Me
 
Call Girl in Bangalore 9632137771 {LowPrice} ❤️ (Navya) Bangalore Call Girls ...
Call Girl in Bangalore 9632137771 {LowPrice} ❤️ (Navya) Bangalore Call Girls ...Call Girl in Bangalore 9632137771 {LowPrice} ❤️ (Navya) Bangalore Call Girls ...
Call Girl in Bangalore 9632137771 {LowPrice} ❤️ (Navya) Bangalore Call Girls ...
 
Mangalore Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real Meet
Mangalore Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real MeetMangalore Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real Meet
Mangalore Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real Meet
 
Kochi call girls Mallu escort girls available 7877702510
Kochi call girls Mallu escort girls available 7877702510Kochi call girls Mallu escort girls available 7877702510
Kochi call girls Mallu escort girls available 7877702510
 
Jaipur Call Girls 9257276172 Call Girl in Jaipur Rajasthan
Jaipur Call Girls 9257276172 Call Girl in Jaipur RajasthanJaipur Call Girls 9257276172 Call Girl in Jaipur Rajasthan
Jaipur Call Girls 9257276172 Call Girl in Jaipur Rajasthan
 

Wireless Body Area Networking

  • 1. SECURITY IN WIRELESS BODY AREA NETWORK PRESENTED BY : ANKITA DUTTA SUBHRADEEP MITRA (MCA student of Rajabazar sc college, kolkata)
  • 2. Overview  Wireless Body Area Network  Challenges  Security Requirements  Possible Solutions  Identity Based Encryption  Weil Pairing  Tate Pairing  Weil Pairing Vs. Tate Pairing  Conclusions
  • 3. Wireless Body Area Network • It is the integration of intelligent, miniaturized, low power sensor node in, on or around a human body to monitoring body function • Different nodes such as ECG, EMG and EEG are deployed on the human body to collect the physiological parameters and forward them to a remote medical server for further service • WBAN consist of two types:- 1) In-body area network 2) On-body area network ( Security in Wireless Body Area Networks: A survey by M. Somasundaram+ and R. Sivakumar )
  • 4. Challenges  Sensor nodes are Low energy devices  Security threats  Data consistency  Interference  Cost  Consistent performance
  • 5. Possible Security Threats and Attacks Layers DoS Attacks Defenese Physical Jamming Tampering Spread-spectrum, priority messages, lower duty cycle, region mapping, Tamper-proof, hiding Link Collision Unfairness Exhaustion Error correcting code Small frames Rate limitation Network Spoofing Selective Forwarding Sybil Encryption Egress filtering, authorization monitoring Authorization, monitoring, redundancy Transport Flooding De-synchronization Client Puzzles Authentication
  • 6. Security Requirements  Data integrity  Data Authentication  Data freshness  Secure localization  Availability  Secure management  Data confidentiality • In WBAN, data confidentiality is considered to be the most important issues. • Protect the data from disclosure. • Should not leak patient’s vital information to external or neighboring networks. • To solve this security risk public- key cryptography is too costly.
  • 7. Possible Solutions  Identity based encryption scheme is used to achieve Data confidentiality in Wireless Sensor Networks. Importance of using IBE: • Ideal for low energy sensor devices • Reduces cost  Elliptic Curve Cryptography  Bilinear Pairing Function
  • 8. Identity Based Encryption ALICE BOB PKG C M skIDbob Upon receiving IDbob M ID bob pkPKG Sender Receiver IBE has 4 steps :- 1) Setup 2) Private key Extraction 3) Encryption 4) Decryption ( A Survey of Identity-Based Cryptography by Joonsang Baek, Jan Newmarch, Reihaneh Safavi-Naini, and Willy Susilo)
  • 9. Elliptic Curve • Two families of elliptic curve E for use in pairing based cryptosystems: 1. The pairing takes values in the prime field Fp over which the curve is defined. 2. This family consists of super singular curves with embedding degree k=2 Let E be the elliptic curve Y2=x3+ax+b Defined over a finite field Fq, and let p be a base point having prime order n dividing #E(Fq), where we assume that n does not divide q. • Usefulness of Elliptic curve in IBE: Elliptic curve divide the keys (public key) one half or one forth then the power consume and energy loss decreases in case of key exchange
  • 10. Bilinear Pairing • Bilinearity : ȇ(aP , bQ)=ȇ(P , Q)ab, where P , Q Є G and a,b Є Zq * • Non-degenerate: ȇ does not send all pair of points in G * G to the identity in F(Hence if R is a generator of G then ȇ(R,R) is a generator of F) • Computable: For all P , Q Є G the map ȇ(P , Q) is efficiently computable • Type of Bilinear pairing: Diffie-Hellman problem: Given( G, q, ȇ, P, aP, cP) where a,b and c are chosen at random from Zq * compute ȇ(P,P)abc Other billnear pairing: 1) Boneh and Frankin’s IBE 2 ) Hierarchical IBE scheme 3) Cha and Cheon's IBE Scheme
  • 11. Selected IBE Schemes • Weil Pairing : In mathematics, the Weil pairing is a pairing on the points of order dividing n of an elliptic curve E, taking values in nth roots of unity. More generally there is a similar Weil pairing between points of order n of an abelian variety and its dual. • Tate Pairing : The Tate pairing was introduced by G. Fray and H.G. Ruck. Tate pairing was firstly used to construct FR attack. Tate pairing is now an alternative to Weil pairing due to its somewhat better computation efficiency.
  • 12. Weil Pairing Weil pairing have 4 stages:- 1. Setup 2. Extract 3. Encryption 4. Decryption (Identity-Based Encryption from the Weil Pairing by Dan Boneh Matthew Frankliny )
  • 13. Weil Pairing (Contd…) Setup : The PKG specifies • A group G generated by P Є G* and the bilinear pairing ȇ: G * G  F • Two hash functions H1 : {0,1}*  G* and H2 : F {0,1}l where l denotes the length of a plaintext • PKG then picks a master key s Є Zq * at random and computes a public key PPKG = sP Private key extraction: • Bob,the receiver ,then contacts the PKG to get his private key DID = sQID where QID= H1(ID)
  • 14. Encryption: Alice the sender, can now encrypt her message M {0,1}l using Bob’s identity ID by computing U=rP and V=H2 (ȇ(QID, PPKG)r) M, where r is chosen at random from Zq * and QID = H1(ID). Decryption: • The resulting cipher text C=(U,V) is send to Bob • Bob decrypts C by computing M=V H2 (ȇ(DID, U)) Weil Pairing (Contd…)
  • 15. Tate Pairing Definition: Tate pairing is essentially a bilinear map from G1 * G2  G3 where G1 = S[q], G2 =T[q] and G3 is the multiplicative group of GF(p2) Stages of ID based Tate pairing:- 1. Setup 2. Extract(Registration) 3. Encrypt 4. Decrypt (An Identity based Encryption using Elliptic Curve Cryptography for Secure M2M Communication by B S Adiga, Balamuralidhar P,Rajan M A, Ravishankara Shastry, Shivraj V L)
  • 16. 1. Setup :- • PKG generates a prime p, the elliptic curve E/GF(p) with order n= #E/GF(p) • Generate a torsion group of prime order q • PKG selects a random master secret key “s” in range 0<s<q 2. Extract(Registration):- • Alice submits her identity to PKG • PKG convert its to a string and maps it to an element of GF(p) • Find a point (Q_ida) on the torsion group • Computes a point S_ida belongs to that group • PKG sends the alice her public and private key along with the public parameters Tate Pairing (Contd…)
  • 17. 3. Encrypt:- • Alice computes Q_idb of Bob knowing public parameters p,q,P,Q and Bob’s identity. • Alice selects a random no “r” in range 0<r<q • Computes C1=[r]P and C2 = m.e(Q_idb, φ(q))r 4. Decrypt:- • Bob receives the ciphertext (C1, C2 ) • Computes m`= C2 * e(S_ida, φ(C1 )-1 • Check if m=m` or not Tate Pairing (Contd…)
  • 18. Why these two Schemes are selected? • Weil pairing and Tate pairing both provide good functionality for use in cryptosystems • Fast implementations of these pairings • Uses Elliptic Curve Cryptography and a very small number of bits • Irrelevant factors and denominators are eliminated • Super singular curves are used • Uses random number generation to provide better security
  • 19. Weil Pairing Vs. Tate Pairing • Tate pairing is faster than Weil pairing.. Weil pairing is er (p , p) = thus two application of Tate pairing. According to computation facts, Weil pairing takes twice the computational time than that of the Tate pairing. However Weil pairing usually takes more than twice the time to compute than that of the Tate pairing
  • 20. • Tate pairing is used to reduce the discrete logarithm problem on certain elliptic curves to the discrete logarithm problem over finite field. Weil pairing of a point with itself is trivial as er (p , p) = 1 however, Tate pairing of a point with itself is not trivial as t (p , p) ≠ 1 • Tate pairing consumes less power and useful for Low-energy devices. For example : the TinyTate implemented for sensor networks require the system configuration :– 8-bit/7.3828-MHz ATmega128L microcontroller. However for Weil pairing the computation requires two Hash function evaluation, two Tate pairing computation which will gradually require higher system configuration. ( Weil Pairing vs. Tate Pairing in IBE systems by Ezra Brown, Eric Errthum, David Fu ) Weil Pairing Vs. Tate Pairing (Contd…)
  • 21. Implementation Tools  Java  JPBC Library (Java Pairing Based Cryptography  PBC Library  GMP Library  MinGW (MSYS base system)  Netbeans Profiler
  • 22. Performance Analysis Performance Analysis can be done in the following ways :  Memory Analysis  Runtime Analysis  Power Consumption, requirement of resources and cost of implementation  Security Parameters Among the above mentioned we will measure the performance on the basis of Memory and Runtime analysis.
  • 25. Future Scope Wireless Body Area Network comprised of low energy devices such as sensor nodes. Smart Phones are used to store the medical data gathered by the sensor nodes. In future these features can be implemented in android platform and then can be deployed in a small network of low energy sensor nodes.
  • 26. Conclusions Through this presentation we have given an overview of the various Security issues in Wireless Body Area Networking and the possible solutions to overcome these issues. The solutions should be efficient in such a way that the low-energy sensor devices can be able for functioning the entire implementation. As well as Data security and Data confidentiality must be maintained and unauthorized accesses should be prohibited. For these the optimistic cryptographic and IBE schemes are invented such that Weil pairing and Tate pairing. And then to find the best scheme among the chosen options that is the Tate pairing depending upon various measurements.
  • 27. References [1] A. Shamir, “Identity-based cryptosystems and signature schemes, “in Proc. Crypto ’84, Santa Barbara, CA, Aug, 1984, pages 47-53. [2] Dan Boneh, Matthew Franklin, “Identity-Based Encryption from the Weil pairing”, in SIAM J. of Computing, Vol. 32, No. 3, pages 586-615, 2003. [3] B S Adiga, Balamuralidhar P, Rajan M A, Ravishankara Shastry, Shivraj V L, "An Identity based Encryption using Elliptic Curve Cryptography for Secure M2M Communication", in TCS Innovation Labs, Bangalore, Karnataka, India, pp 68-75. [4] IEEE 5931464, Moncef Amara, Amar Siad, "ELLIPTIC CURVE CRYPTOGRAPHY AND ITS APPLICATIONS", in 7th International Workshop on Systems, Signal Processing and their Applications (WOSSPA), pages 247-250, 2011.