SlideShare ist ein Scribd-Unternehmen logo
1 von 30
A Seminar on
Data Security, Privacy and Other
Applications in Emerging Body
Area Networks
                    Narayana Vinayak
                    B080015EC
Layout of the Seminar
   Goals
   Introduction
   Typical Applications
   Research Challenges
   Data Security and Privacy
   Models Proposed
Goals
 Understanding BANs
 Appreciating their „potency‟
 Being aware of their current applications
 Understanding the challenges on the horizon
 Understanding models proposed for data
  security in BANs
Introduction
Definition by IEEE: “A communication
standard optimized for low power devices for their
operation on, in or around the human body (but not
limited to humans) to serve a variety of
applications including medical, consumer
electronics or personal entertainment and other.”


Source: IEEE 802.15
Typical Applications




Source: M. Patel and J. Wang, “Applications, Challenges,
  And Prospective In Emerging Body Area Networking
Technologies,” IEEE Wireless Communications, Feb. 2010
Layout




Source: M. Li and W. Lou, “Data Security And Privacy In
     Wireless Body Area Networks,” IEEE Wireless
              Communications, Feb. 2010
Relevance

* Ageing population; sedentary lifestyle
* WHO stats:
      # Diabetics-360 million by 2030
      # >2.3 bn. people obese by 2015
      # rise in neuro-degenerative diseases
* Fragile healthcare system, rising medical costs
* Shortage of trained health staff in third world
Realisation
   Strategically placed wearable or implanted sensor nodes
   Job: sample, process and transmit vital signs
   What signs?
     Heart rate, blood pressure, temperature, pH, respiration etc.
   Where to?
     To a hospital, clinic or a central repository of medical data
   How?
    • A gateway device (e.g., a cell phone or a PDA) is used as a
      gateway device to connect to infrastructure networks like
      WLAN, WPAN etc.
Source: Mark A. Hanson et al., “Body Area Sensor Networks:
    Challenges and Opportunities,” Computer, Jan. 2009
Uses
   Alerting the patient via SMS, alarm or reminder messages
   Close-loop bio-feedback: if high sugar-level, a device
    triggers an insulin pump to inject a dose of insulin
    (artificial pancreas)
   Long-term medical trend analysis
   Reduction in hospital stays
   Regulation of treatment regimes
   Essence: Offering a paradigm shift from managing
    ILLNESS to managing WELLNESS by focusing on
    prevention and early detection (pre-emptive defence!)
Research Challenges
1.    Frequency Band Selection:
     1.   Most BAN devices need global operability
     2.   Facility for low-power usage (less crowded)
     3.   Less stringent rules for flexible usage and adaptability
     4.   Solutions proposed: Opening up the 2360-2400 MHz spectrum
          near ISM for medical BANs and allocating up to 24 MHz in the
          413-457 MHz range for medical micropower network
2.   Antenna Design:
     1.   Restrictions on size, material and shape of antenna
     2.   Hostile RF environment due to changes in wearer‟s age, weight
          changes and posture changes
     3.   During implants only non-corrosive and bio-compatible material
          can be used: Platinum or Titanium (both poor) against the usual
          copper
Source: M. Patel and J. Wang, “Applications, Challenges, And Prospective In
Emerging Body Area Networking Technologies,” IEEE Wireless Communications,
                                  Feb. 2010
3.   PHY Protocol Design:
     1.   Minimize power consumption
     2.   Solution: Quick turn-around from transmit to receive and fast
          wake-up from sleep mode
     3.   Seamless connectivity in dynamic environments
4.   Energy-Efficient Hardware:
     1.   Today‟s wireless technologies draw relatively high peak current
     2.   Also rely on duty cycling between sleep and active
     3.   Solution: Operation on low peak pulse-discharge current from
          thin-film (paper) batteries, idle listening, developing a crystal-
          less radio*
     * Reference: F. Sebastiano et al., “Impulse Based Scheme for crystal-
     less ULP Radios”, Proc. IEEE ISCAS, May 2008, pp. 1508-1511.
5.   Technical Requirements:
     1.   Wide variation in data rate, BER, delay tolerance, duty cycle and
          lifetime
     2.   Diverse application environments
Source: M. Patel and J. Wang, “Applications, Challenges, And Prospective In
      Emerging Body Area Networking Technologies,” IEEE Wireless
                        Communications, Feb. 2010
Source: M. Patel and J. Wang, IEEE Wireless Communications, Feb. 2010
Candidate Technologies




  Source: M. Patel and J. Wang, “Applications, Challenges, And Prospective In
Emerging Body Area Networking Technologies,” IEEE Wireless Communications,
                                  Feb. 2010
Entities Involved in Research
 The IEEE 802.15.6 Task Group is                application
  developing the first industrial standard for
  the Physical and MAC layers for BAN
  (done, Feb. 2011)                              transport
 Major competition: ZigBee and
  Bluetooth.                                      network
 Holistic standardization needed for plug-
  and-play interoperability
                                                    link
 ISO/IEEE 11073 Personal Health Data
  Working Group: Standardization of data
  exchange between peripheral area                physical
  network devices and gateway devices
Source: M. Patel and J. Wang, “Applications,
Challenges, And Prospective In Emerging Body Area
     Networking Technologies,” IEEE Wireless
            Communications, Feb. 2010
Data Security and Privacy
   Data Security: Data is securely stored and transferred
   Data Privacy: Data can be used only by authorized people
   Application scenario:
    ◦ Emergency; paramedic reads RFID* tag to get the patient‟s
      medical records and his profile.
    ◦ WBAN is set up with wearable sensors
    ◦ Nurse reads health data from WBAN and uploads data onto local
      network
    ◦ Patient‟s gateway device is configured with an Access Policy (AP)
      that grants access to records (also adapts automatically)
    ◦ Patient can adjust his AP to hide sensitive data
* Radio Frequency Identification is a standard technology
that uses Radio waves to sense the details of an object for
tracking. It uses RFID tags for this purpose.
   Threats Faced by Data within BAN:
    ◦ Threat from Device Compromise (encrypted data and key in same
      node)
    ◦ Threat from Network Dynamics (fake nodes masquerade real ones)
   Storage Security Requirements:
    ◦ Confidentiality
    ◦ Dynamic Integrity Assurance
    ◦ Dependability
   Access Security Requirements:
     ◦   Access Control (privacy; Fine-Grained)
     ◦   Accountability
     ◦   Revocability
     ◦   Non-Repudiation
   Other Requirements:
     ◦ Authentication
     ◦ Availability
     ◦ Security-Safety, Security-Efficiency and Security-Usability conflict
       resolution
Source: M. Li and W. Lou, “Data Security And Privacy In Wireless
 Body Area Networks,” IEEE Wireless Communications, Feb. 2010


The above Access Policy reads: “allow access by a doctor
from the surgery department but not Dr. X, or an analyst or
a paramedic, or a nurse who is not an intern.”
Models Proposed
Secure and Dependable Data Storage Schemes:
1. Based on Redundant Residue Number System (RRNS)
  1.   Proposed by Chessa et al.
  2.   Method: A number representable on a set of h moduli is
       represented by h + r moduli, where the extra r moduli are
       redundant
  3.   Source Node S distributes a single file F among n other nodes,
       where n=h + r is a random pick
  4.   S computes F‟s residue vector and distributes each file share to a
       different storage node
  5.   Pros.: Erasure tolerance is s<=r and corruption tolerance is
       ceil((r-s)/2)
  6.   Cons.: Set of moduli can be very large, data integrity not ensured
       when number of errors is more than r.
2.   Based on Erasure Coding
     1.   Proposed by Wang et al.
     2.   Original encrypted data is broken down into n data shares, with
          each of them made of a block generated from (n,k) erasure
          coding and a share of the secret key using (n,k) secret sharing
     3.   These data shares are then distributed among the n neighbouring
          nodes
     4.   Dynamic Integrity Check: Each storage node computes and
          broadcasts an algebraic signature on one data share; one node
          checks its signature against those by other nodes to detect
          alterations timely
     5.   Pros.: Data confidentiality, dependability and dynamic integrity
          achieved simultaneously
     6.   Cons.: No third party (say, the local server) can perform integrity
          checks.
3.   Based on Constant Data Motion method
     1.   Proposed by Pietro et al.
     2.   Idea: Move the data from one sensor node to the next so as to
          make it hard for the cracker to „track‟ and „catch‟ the data
     3.   Found to be very efficient (high data survival probability)
     4.   Cons.: High communication and storage overhead; less practical
          in energy-strained environments
4.   Attribute Based Encryption (ABE)
     1.   Proposed by Li et al.
     2.   Specifically called the Ciphertext Policy ABE (CP-ABE)
     3.   Perfectly matches the model of Role-Based Access Control
          (RBAC)
     4.   Each user has a set of roles; patient chooses which roles to grant
          access to.
     5.   When a node in WBAN generates data, the AP is built into the
          Ciphertext; splitting a secret among components belonging to
          different user attributes; randomized to prevent user-collusion
     6.   Effectively implements fine-grained access control
Physiological Signal-based Key Agreement (PSKA):
 Proposed by Ayan Banerjee et al.
 Requires no a priori deployment of keying material or
  initialization
 Inspiration: Dynamic and complex nature of human
  physiological signals
 Design goals met:
    ◦   Length and randomness
    ◦   Low latency
    ◦   Distinctiveness
    ◦   Temporal variance


   Signal used: Electrocardiogram (EKG) commonly
   Method used:




   Cons.: It may correct a few differences in feature vectors
    but can‟t handle the reordering of or presence of
    additional feature vectors; solution: fuzzy vault
Fuzzy Vault
 Generate a v-th order polynomial p over the variable x that
  encodes the secret S
 Compute the value of the polynomial at different x from
  the set A (at the transmitter) and create a set
                        R= {a, p(a)}
 Add randomly generated set of points called chaff to R,
  which don‟t lie on the polynomial; we call R as the vault
 To unlock the vault using set B (at the receiver), construct
  a set Q (see example given overleaf)
 Unlocking is possible only if Q has a significant number
  of legitimate (non-chaff) points that are on the polynomial
 Mapping to PSKA: Features at sender are set to A and
  those at the receiver, in set B
Example

Consider the polynomial: p(x) = x + 1; A = {1, 2, 3};
B = {1, 3, 4}
Now, vault R is created by computing the polynomial‟s value
at each point in A and adding chaff-points
So, R = { (1, 2)(2, 3)(3, 4)(4, 7)(6, 9)(7, 12)(8, 5) }
The last four points are chaff-points
To unlock the vault, the set Q is constructed,
       Q = { (1, 2)(3, 4)(4, 7) }
As the set Q has two points on the polynomial, we can use it
to reconstruct the first-order polynomial, and thus, unlock
the secret
Major References
   M. Patel and J. Wang, “Applications, Challenges, And
    Prospective In Emerging Body Area Networking
    Technologies,” IEEE Wireless Communications, Feb.
    2010, pp. 80-88
   A. Banerjee et al., “PSKA: Usable and Secure Key
    Agreement Scheme for Body Area Networks,” IEEE
    Transactions On Information Technology In
    Biomedicine, Jan. 2010, pp. 60-68
   M. Li and W. Lou, “Data Security And Privacy In
    Wireless Body Area Networks,” IEEE Wireless
    Communications, Feb. 2010, pp. 51-58
   Others: Cited in the Report
Thanks a lot!

Weitere ähnliche Inhalte

Was ist angesagt?

Wireless body area network
Wireless body area networkWireless body area network
Wireless body area networkPratik Gondaliya
 
Wireless Body Area Networks for healthcare (Wban)
Wireless Body Area Networks  for healthcare (Wban)Wireless Body Area Networks  for healthcare (Wban)
Wireless Body Area Networks for healthcare (Wban)no0orcom
 
Uwb interview presentatin
Uwb interview presentatinUwb interview presentatin
Uwb interview presentatinAJESWIN
 
ULTRA WIDE BAND TECHNOLOGY
ULTRA WIDE BAND TECHNOLOGYULTRA WIDE BAND TECHNOLOGY
ULTRA WIDE BAND TECHNOLOGYAJAL A J
 
Cognitive Radio, Introduction and Main Issues
Cognitive Radio, Introduction and Main IssuesCognitive Radio, Introduction and Main Issues
Cognitive Radio, Introduction and Main IssuesKuncoro Wastuwibowo
 
A Multi-band Slot Antenna for GPS
A Multi-band Slot Antenna for   GPSA Multi-band Slot Antenna for   GPS
A Multi-band Slot Antenna for GPSom prakash
 
wireless sensor network ppt
wireless sensor network pptwireless sensor network ppt
wireless sensor network pptPramod Kuruvatti
 
Basics of Wireless sensor networks
Basics of Wireless sensor networksBasics of Wireless sensor networks
Basics of Wireless sensor networksRushin Shah
 
paper presentation _ survey of wireless sensor netwrok
paper presentation _ survey of wireless sensor netwrokpaper presentation _ survey of wireless sensor netwrok
paper presentation _ survey of wireless sensor netwrokejbyun77
 
Flying ad hoc network
Flying ad hoc network Flying ad hoc network
Flying ad hoc network Binayakreddy
 
UWB patch antenna (HFSS)
UWB patch antenna (HFSS)UWB patch antenna (HFSS)
UWB patch antenna (HFSS)Soe Hein Kyaw
 

Was ist angesagt? (20)

Wireless body area network
Wireless body area networkWireless body area network
Wireless body area network
 
Multiple Access Techniques
Multiple Access TechniquesMultiple Access Techniques
Multiple Access Techniques
 
Wireless Body Area Networks for healthcare (Wban)
Wireless Body Area Networks  for healthcare (Wban)Wireless Body Area Networks  for healthcare (Wban)
Wireless Body Area Networks for healthcare (Wban)
 
Ultra Wide Band (UWB)
Ultra Wide Band (UWB)Ultra Wide Band (UWB)
Ultra Wide Band (UWB)
 
wireless sensor network
wireless sensor networkwireless sensor network
wireless sensor network
 
Uwb interview presentatin
Uwb interview presentatinUwb interview presentatin
Uwb interview presentatin
 
Smart Antenna
Smart AntennaSmart Antenna
Smart Antenna
 
ULTRA WIDE BAND TECHNOLOGY
ULTRA WIDE BAND TECHNOLOGYULTRA WIDE BAND TECHNOLOGY
ULTRA WIDE BAND TECHNOLOGY
 
Wireless Body Sensor Networks
Wireless Body Sensor Networks Wireless Body Sensor Networks
Wireless Body Sensor Networks
 
Cognitive Radio, Introduction and Main Issues
Cognitive Radio, Introduction and Main IssuesCognitive Radio, Introduction and Main Issues
Cognitive Radio, Introduction and Main Issues
 
A Multi-band Slot Antenna for GPS
A Multi-band Slot Antenna for   GPSA Multi-band Slot Antenna for   GPS
A Multi-band Slot Antenna for GPS
 
wireless sensor network ppt
wireless sensor network pptwireless sensor network ppt
wireless sensor network ppt
 
Basics of Wireless sensor networks
Basics of Wireless sensor networksBasics of Wireless sensor networks
Basics of Wireless sensor networks
 
UWB and applications
UWB and applicationsUWB and applications
UWB and applications
 
paper presentation _ survey of wireless sensor netwrok
paper presentation _ survey of wireless sensor netwrokpaper presentation _ survey of wireless sensor netwrok
paper presentation _ survey of wireless sensor netwrok
 
Flying ad hoc network
Flying ad hoc network Flying ad hoc network
Flying ad hoc network
 
WBAN
WBANWBAN
WBAN
 
UWB patch antenna (HFSS)
UWB patch antenna (HFSS)UWB patch antenna (HFSS)
UWB patch antenna (HFSS)
 
Wireless sensor networks
Wireless sensor networksWireless sensor networks
Wireless sensor networks
 
What is Cognitive Radio?
What is Cognitive Radio? What is Cognitive Radio?
What is Cognitive Radio?
 

Andere mochten auch

Wireless Body Area Network
Wireless Body Area NetworkWireless Body Area Network
Wireless Body Area NetworkFaheema Monica
 
Wireless Body Area Networking
Wireless Body Area NetworkingWireless Body Area Networking
Wireless Body Area Networkingsubhradeep mitra
 
Wireless Body Area network
Wireless Body Area networkWireless Body Area network
Wireless Body Area networkRajeev N
 
Wireless body area network
Wireless body area network Wireless body area network
Wireless body area network subhradeep mitra
 
Microcontroller based heart rate meter
Microcontroller based heart rate meterMicrocontroller based heart rate meter
Microcontroller based heart rate meterChetana Nair
 
Automatic Wireless Health Monitoring System In Hospitals For Patients
Automatic Wireless Health Monitoring System In Hospitals For PatientsAutomatic Wireless Health Monitoring System In Hospitals For Patients
Automatic Wireless Health Monitoring System In Hospitals For PatientsEdgefxkits & Solutions
 
Wireless human health Monitor
Wireless human health MonitorWireless human health Monitor
Wireless human health MonitorAmarendra K Yadav
 
Heart beat monitor system PPT
Heart beat monitor system PPT Heart beat monitor system PPT
Heart beat monitor system PPT Anand Dwivedi
 
Coexistence of zig bee based wban and wifi for health telemonitoring systems
Coexistence of zig bee based wban and wifi for health telemonitoring systemsCoexistence of zig bee based wban and wifi for health telemonitoring systems
Coexistence of zig bee based wban and wifi for health telemonitoring systemsI3E Technologies
 
Wireless health monitoring
Wireless health monitoringWireless health monitoring
Wireless health monitoringSanjoy Dutta
 
Energy-efficient cluster-based security mechanism for Wireless Body Area Netw...
Energy-efficient cluster-based security mechanism for Wireless Body Area Netw...Energy-efficient cluster-based security mechanism for Wireless Body Area Netw...
Energy-efficient cluster-based security mechanism for Wireless Body Area Netw...IJSRD
 
Biometric-based Security for Data Authentication in Wireless Body Area Networ...
Biometric-based Security for Data Authentication in Wireless Body Area Networ...Biometric-based Security for Data Authentication in Wireless Body Area Networ...
Biometric-based Security for Data Authentication in Wireless Body Area Networ...Shreyas Tote
 
Maintaining Data Confidentiality in Association Rule Mining in Distributed En...
Maintaining Data Confidentiality in Association Rule Mining in Distributed En...Maintaining Data Confidentiality in Association Rule Mining in Distributed En...
Maintaining Data Confidentiality in Association Rule Mining in Distributed En...IJSRD
 

Andere mochten auch (18)

Wireless Body Area Network
Wireless Body Area NetworkWireless Body Area Network
Wireless Body Area Network
 
Wban
WbanWban
Wban
 
Wireless Body Area Networking
Wireless Body Area NetworkingWireless Body Area Networking
Wireless Body Area Networking
 
Wireless Body Area network
Wireless Body Area networkWireless Body Area network
Wireless Body Area network
 
Wireless body area network
Wireless body area network Wireless body area network
Wireless body area network
 
Microcontroller based heart rate meter
Microcontroller based heart rate meterMicrocontroller based heart rate meter
Microcontroller based heart rate meter
 
Automatic Wireless Health Monitoring System In Hospitals For Patients
Automatic Wireless Health Monitoring System In Hospitals For PatientsAutomatic Wireless Health Monitoring System In Hospitals For Patients
Automatic Wireless Health Monitoring System In Hospitals For Patients
 
Wireless human health Monitor
Wireless human health MonitorWireless human health Monitor
Wireless human health Monitor
 
Heart beat monitor system PPT
Heart beat monitor system PPT Heart beat monitor system PPT
Heart beat monitor system PPT
 
Ban Smart Card Mahasweta
Ban Smart Card MahaswetaBan Smart Card Mahasweta
Ban Smart Card Mahasweta
 
Coexistence of zig bee based wban and wifi for health telemonitoring systems
Coexistence of zig bee based wban and wifi for health telemonitoring systemsCoexistence of zig bee based wban and wifi for health telemonitoring systems
Coexistence of zig bee based wban and wifi for health telemonitoring systems
 
A Cloud-Based WBAN System for Health Management
A Cloud-Based WBAN System for Health ManagementA Cloud-Based WBAN System for Health Management
A Cloud-Based WBAN System for Health Management
 
Wireless health monitoring
Wireless health monitoringWireless health monitoring
Wireless health monitoring
 
Energy-efficient cluster-based security mechanism for Wireless Body Area Netw...
Energy-efficient cluster-based security mechanism for Wireless Body Area Netw...Energy-efficient cluster-based security mechanism for Wireless Body Area Netw...
Energy-efficient cluster-based security mechanism for Wireless Body Area Netw...
 
Biometric-based Security for Data Authentication in Wireless Body Area Networ...
Biometric-based Security for Data Authentication in Wireless Body Area Networ...Biometric-based Security for Data Authentication in Wireless Body Area Networ...
Biometric-based Security for Data Authentication in Wireless Body Area Networ...
 
Maintaining Data Confidentiality in Association Rule Mining in Distributed En...
Maintaining Data Confidentiality in Association Rule Mining in Distributed En...Maintaining Data Confidentiality in Association Rule Mining in Distributed En...
Maintaining Data Confidentiality in Association Rule Mining in Distributed En...
 
Go Programming Language
Go Programming LanguageGo Programming Language
Go Programming Language
 
Calculator
CalculatorCalculator
Calculator
 

Ähnlich wie Seminar on Body Area Networks

Security Method in Data Acquisition Wireless Sensor Network
Security Method in Data Acquisition Wireless Sensor Network Security Method in Data Acquisition Wireless Sensor Network
Security Method in Data Acquisition Wireless Sensor Network Dharmendrasingh417
 
A Secure and Efficient Cloud centric Internet of Medical Things-Enabled Smart...
A Secure and Efficient Cloud centric Internet of Medical Things-Enabled Smart...A Secure and Efficient Cloud centric Internet of Medical Things-Enabled Smart...
A Secure and Efficient Cloud centric Internet of Medical Things-Enabled Smart...suherashaik2003
 
Security protocols & platform for wsn based medical applications
Security protocols & platform for wsn based medical applicationsSecurity protocols & platform for wsn based medical applications
Security protocols & platform for wsn based medical applicationsaviiandevil
 
Security protocols & platform for wsn based medical applications
Security protocols & platform for wsn based medical applicationsSecurity protocols & platform for wsn based medical applications
Security protocols & platform for wsn based medical applicationsaviiandevil7
 
SECURITY ARCHITECTURE FOR AT-HOME MEDICAL CARE USING BODY SENSOR NETWORK
SECURITY ARCHITECTURE FOR AT-HOME MEDICAL CARE USING BODY SENSOR NETWORKSECURITY ARCHITECTURE FOR AT-HOME MEDICAL CARE USING BODY SENSOR NETWORK
SECURITY ARCHITECTURE FOR AT-HOME MEDICAL CARE USING BODY SENSOR NETWORKijasuc
 
Private & Secure.pptx
Private & Secure.pptxPrivate & Secure.pptx
Private & Secure.pptxPoojaG86
 
Some aspects of wireless sensor networks
Some aspects of wireless sensor networksSome aspects of wireless sensor networks
Some aspects of wireless sensor networkspijans
 
Final ppt
Final pptFinal ppt
Final pptW3Edify
 
Efficient Data Aggregation in Wireless Sensor Networks
Efficient Data Aggregation in Wireless Sensor NetworksEfficient Data Aggregation in Wireless Sensor Networks
Efficient Data Aggregation in Wireless Sensor NetworksIJAEMSJORNAL
 
A 128 bit secret key generation using unique ecg bio-signal for medical data ...
A 128 bit secret key generation using unique ecg bio-signal for medical data ...A 128 bit secret key generation using unique ecg bio-signal for medical data ...
A 128 bit secret key generation using unique ecg bio-signal for medical data ...Karthikeyan Ece venkatesan
 
IRJET- Secured Mind Uploading Method in Wireless Body Area Network
IRJET-  	  Secured Mind Uploading Method in Wireless Body Area NetworkIRJET-  	  Secured Mind Uploading Method in Wireless Body Area Network
IRJET- Secured Mind Uploading Method in Wireless Body Area NetworkIRJET Journal
 
Routing protocolsin Wireless sensor network
Routing protocolsin Wireless sensor network Routing protocolsin Wireless sensor network
Routing protocolsin Wireless sensor network dilip pareek
 
wireless convert communications.pdf
wireless convert communications.pdfwireless convert communications.pdf
wireless convert communications.pdfN171013MEDICHARLAABH
 
Wireless Sensor Network Simulators: A Survey and Comparisons
Wireless Sensor Network Simulators: A Survey and ComparisonsWireless Sensor Network Simulators: A Survey and Comparisons
Wireless Sensor Network Simulators: A Survey and ComparisonsCSCJournals
 
International Journal of Advanced Smart Sensor Network Systems ( IJASSN )
International Journal of Advanced Smart Sensor Network Systems  ( IJASSN )International Journal of Advanced Smart Sensor Network Systems  ( IJASSN )
International Journal of Advanced Smart Sensor Network Systems ( IJASSN )ijassn
 
NO PUBLICATION CHARGES - International Journal of Advanced Smart Sensor Netwo...
NO PUBLICATION CHARGES - International Journal of Advanced Smart Sensor Netwo...NO PUBLICATION CHARGES - International Journal of Advanced Smart Sensor Netwo...
NO PUBLICATION CHARGES - International Journal of Advanced Smart Sensor Netwo...ijassn
 
ANALYSIS OF VARIOUS PROTOCOLS IN WIRELESS BODY AREA NETWORKS (WBAN)
ANALYSIS OF VARIOUS PROTOCOLS IN WIRELESS BODY AREA NETWORKS (WBAN) ANALYSIS OF VARIOUS PROTOCOLS IN WIRELESS BODY AREA NETWORKS (WBAN)
ANALYSIS OF VARIOUS PROTOCOLS IN WIRELESS BODY AREA NETWORKS (WBAN) IAEME Publication
 
Wireless Micro-Sensor Network Models
Wireless Micro-Sensor Network ModelsWireless Micro-Sensor Network Models
Wireless Micro-Sensor Network ModelsIOSR Journals
 
A SECURITY SUITE FOR WIRELESS BODY AREA NETWORKS
A SECURITY SUITE FOR WIRELESS BODY AREA NETWORKSA SECURITY SUITE FOR WIRELESS BODY AREA NETWORKS
A SECURITY SUITE FOR WIRELESS BODY AREA NETWORKSIJNSA Journal
 
Wireless Body Area Network A Review on Issues, Routing Techniques and Various...
Wireless Body Area Network A Review on Issues, Routing Techniques and Various...Wireless Body Area Network A Review on Issues, Routing Techniques and Various...
Wireless Body Area Network A Review on Issues, Routing Techniques and Various...ijtsrd
 

Ähnlich wie Seminar on Body Area Networks (20)

Security Method in Data Acquisition Wireless Sensor Network
Security Method in Data Acquisition Wireless Sensor Network Security Method in Data Acquisition Wireless Sensor Network
Security Method in Data Acquisition Wireless Sensor Network
 
A Secure and Efficient Cloud centric Internet of Medical Things-Enabled Smart...
A Secure and Efficient Cloud centric Internet of Medical Things-Enabled Smart...A Secure and Efficient Cloud centric Internet of Medical Things-Enabled Smart...
A Secure and Efficient Cloud centric Internet of Medical Things-Enabled Smart...
 
Security protocols & platform for wsn based medical applications
Security protocols & platform for wsn based medical applicationsSecurity protocols & platform for wsn based medical applications
Security protocols & platform for wsn based medical applications
 
Security protocols & platform for wsn based medical applications
Security protocols & platform for wsn based medical applicationsSecurity protocols & platform for wsn based medical applications
Security protocols & platform for wsn based medical applications
 
SECURITY ARCHITECTURE FOR AT-HOME MEDICAL CARE USING BODY SENSOR NETWORK
SECURITY ARCHITECTURE FOR AT-HOME MEDICAL CARE USING BODY SENSOR NETWORKSECURITY ARCHITECTURE FOR AT-HOME MEDICAL CARE USING BODY SENSOR NETWORK
SECURITY ARCHITECTURE FOR AT-HOME MEDICAL CARE USING BODY SENSOR NETWORK
 
Private & Secure.pptx
Private & Secure.pptxPrivate & Secure.pptx
Private & Secure.pptx
 
Some aspects of wireless sensor networks
Some aspects of wireless sensor networksSome aspects of wireless sensor networks
Some aspects of wireless sensor networks
 
Final ppt
Final pptFinal ppt
Final ppt
 
Efficient Data Aggregation in Wireless Sensor Networks
Efficient Data Aggregation in Wireless Sensor NetworksEfficient Data Aggregation in Wireless Sensor Networks
Efficient Data Aggregation in Wireless Sensor Networks
 
A 128 bit secret key generation using unique ecg bio-signal for medical data ...
A 128 bit secret key generation using unique ecg bio-signal for medical data ...A 128 bit secret key generation using unique ecg bio-signal for medical data ...
A 128 bit secret key generation using unique ecg bio-signal for medical data ...
 
IRJET- Secured Mind Uploading Method in Wireless Body Area Network
IRJET-  	  Secured Mind Uploading Method in Wireless Body Area NetworkIRJET-  	  Secured Mind Uploading Method in Wireless Body Area Network
IRJET- Secured Mind Uploading Method in Wireless Body Area Network
 
Routing protocolsin Wireless sensor network
Routing protocolsin Wireless sensor network Routing protocolsin Wireless sensor network
Routing protocolsin Wireless sensor network
 
wireless convert communications.pdf
wireless convert communications.pdfwireless convert communications.pdf
wireless convert communications.pdf
 
Wireless Sensor Network Simulators: A Survey and Comparisons
Wireless Sensor Network Simulators: A Survey and ComparisonsWireless Sensor Network Simulators: A Survey and Comparisons
Wireless Sensor Network Simulators: A Survey and Comparisons
 
International Journal of Advanced Smart Sensor Network Systems ( IJASSN )
International Journal of Advanced Smart Sensor Network Systems  ( IJASSN )International Journal of Advanced Smart Sensor Network Systems  ( IJASSN )
International Journal of Advanced Smart Sensor Network Systems ( IJASSN )
 
NO PUBLICATION CHARGES - International Journal of Advanced Smart Sensor Netwo...
NO PUBLICATION CHARGES - International Journal of Advanced Smart Sensor Netwo...NO PUBLICATION CHARGES - International Journal of Advanced Smart Sensor Netwo...
NO PUBLICATION CHARGES - International Journal of Advanced Smart Sensor Netwo...
 
ANALYSIS OF VARIOUS PROTOCOLS IN WIRELESS BODY AREA NETWORKS (WBAN)
ANALYSIS OF VARIOUS PROTOCOLS IN WIRELESS BODY AREA NETWORKS (WBAN) ANALYSIS OF VARIOUS PROTOCOLS IN WIRELESS BODY AREA NETWORKS (WBAN)
ANALYSIS OF VARIOUS PROTOCOLS IN WIRELESS BODY AREA NETWORKS (WBAN)
 
Wireless Micro-Sensor Network Models
Wireless Micro-Sensor Network ModelsWireless Micro-Sensor Network Models
Wireless Micro-Sensor Network Models
 
A SECURITY SUITE FOR WIRELESS BODY AREA NETWORKS
A SECURITY SUITE FOR WIRELESS BODY AREA NETWORKSA SECURITY SUITE FOR WIRELESS BODY AREA NETWORKS
A SECURITY SUITE FOR WIRELESS BODY AREA NETWORKS
 
Wireless Body Area Network A Review on Issues, Routing Techniques and Various...
Wireless Body Area Network A Review on Issues, Routing Techniques and Various...Wireless Body Area Network A Review on Issues, Routing Techniques and Various...
Wireless Body Area Network A Review on Issues, Routing Techniques and Various...
 

Kürzlich hochgeladen

Mental Health Awareness - a toolkit for supporting young minds
Mental Health Awareness - a toolkit for supporting young mindsMental Health Awareness - a toolkit for supporting young minds
Mental Health Awareness - a toolkit for supporting young mindsPooky Knightsmith
 
31 ĐỀ THI THỬ VÀO LỚP 10 - TIẾNG ANH - FORM MỚI 2025 - 40 CÂU HỎI - BÙI VĂN V...
31 ĐỀ THI THỬ VÀO LỚP 10 - TIẾNG ANH - FORM MỚI 2025 - 40 CÂU HỎI - BÙI VĂN V...31 ĐỀ THI THỬ VÀO LỚP 10 - TIẾNG ANH - FORM MỚI 2025 - 40 CÂU HỎI - BÙI VĂN V...
31 ĐỀ THI THỬ VÀO LỚP 10 - TIẾNG ANH - FORM MỚI 2025 - 40 CÂU HỎI - BÙI VĂN V...Nguyen Thanh Tu Collection
 
Q-Factor General Quiz-7th April 2024, Quiz Club NITW
Q-Factor General Quiz-7th April 2024, Quiz Club NITWQ-Factor General Quiz-7th April 2024, Quiz Club NITW
Q-Factor General Quiz-7th April 2024, Quiz Club NITWQuiz Club NITW
 
ROLES IN A STAGE PRODUCTION in arts.pptx
ROLES IN A STAGE PRODUCTION in arts.pptxROLES IN A STAGE PRODUCTION in arts.pptx
ROLES IN A STAGE PRODUCTION in arts.pptxVanesaIglesias10
 
Team Lead Succeed – Helping you and your team achieve high-performance teamwo...
Team Lead Succeed – Helping you and your team achieve high-performance teamwo...Team Lead Succeed – Helping you and your team achieve high-performance teamwo...
Team Lead Succeed – Helping you and your team achieve high-performance teamwo...Association for Project Management
 
Oppenheimer Film Discussion for Philosophy and Film
Oppenheimer Film Discussion for Philosophy and FilmOppenheimer Film Discussion for Philosophy and Film
Oppenheimer Film Discussion for Philosophy and FilmStan Meyer
 
How to Fix XML SyntaxError in Odoo the 17
How to Fix XML SyntaxError in Odoo the 17How to Fix XML SyntaxError in Odoo the 17
How to Fix XML SyntaxError in Odoo the 17Celine George
 
Textual Evidence in Reading and Writing of SHS
Textual Evidence in Reading and Writing of SHSTextual Evidence in Reading and Writing of SHS
Textual Evidence in Reading and Writing of SHSMae Pangan
 
Congestive Cardiac Failure..presentation
Congestive Cardiac Failure..presentationCongestive Cardiac Failure..presentation
Congestive Cardiac Failure..presentationdeepaannamalai16
 
Narcotic and Non Narcotic Analgesic..pdf
Narcotic and Non Narcotic Analgesic..pdfNarcotic and Non Narcotic Analgesic..pdf
Narcotic and Non Narcotic Analgesic..pdfPrerana Jadhav
 
Grade Three -ELLNA-REVIEWER-ENGLISH.pptx
Grade Three -ELLNA-REVIEWER-ENGLISH.pptxGrade Three -ELLNA-REVIEWER-ENGLISH.pptx
Grade Three -ELLNA-REVIEWER-ENGLISH.pptxkarenfajardo43
 
Measures of Position DECILES for ungrouped data
Measures of Position DECILES for ungrouped dataMeasures of Position DECILES for ungrouped data
Measures of Position DECILES for ungrouped dataBabyAnnMotar
 
Daily Lesson Plan in Mathematics Quarter 4
Daily Lesson Plan in Mathematics Quarter 4Daily Lesson Plan in Mathematics Quarter 4
Daily Lesson Plan in Mathematics Quarter 4JOYLYNSAMANIEGO
 
Concurrency Control in Database Management system
Concurrency Control in Database Management systemConcurrency Control in Database Management system
Concurrency Control in Database Management systemChristalin Nelson
 
MS4 level being good citizen -imperative- (1) (1).pdf
MS4 level   being good citizen -imperative- (1) (1).pdfMS4 level   being good citizen -imperative- (1) (1).pdf
MS4 level being good citizen -imperative- (1) (1).pdfMr Bounab Samir
 
Mythology Quiz-4th April 2024, Quiz Club NITW
Mythology Quiz-4th April 2024, Quiz Club NITWMythology Quiz-4th April 2024, Quiz Club NITW
Mythology Quiz-4th April 2024, Quiz Club NITWQuiz Club NITW
 
ClimART Action | eTwinning Project
ClimART Action    |    eTwinning ProjectClimART Action    |    eTwinning Project
ClimART Action | eTwinning Projectjordimapav
 
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)lakshayb543
 
Multi Domain Alias In the Odoo 17 ERP Module
Multi Domain Alias In the Odoo 17 ERP ModuleMulti Domain Alias In the Odoo 17 ERP Module
Multi Domain Alias In the Odoo 17 ERP ModuleCeline George
 

Kürzlich hochgeladen (20)

Mental Health Awareness - a toolkit for supporting young minds
Mental Health Awareness - a toolkit for supporting young mindsMental Health Awareness - a toolkit for supporting young minds
Mental Health Awareness - a toolkit for supporting young minds
 
31 ĐỀ THI THỬ VÀO LỚP 10 - TIẾNG ANH - FORM MỚI 2025 - 40 CÂU HỎI - BÙI VĂN V...
31 ĐỀ THI THỬ VÀO LỚP 10 - TIẾNG ANH - FORM MỚI 2025 - 40 CÂU HỎI - BÙI VĂN V...31 ĐỀ THI THỬ VÀO LỚP 10 - TIẾNG ANH - FORM MỚI 2025 - 40 CÂU HỎI - BÙI VĂN V...
31 ĐỀ THI THỬ VÀO LỚP 10 - TIẾNG ANH - FORM MỚI 2025 - 40 CÂU HỎI - BÙI VĂN V...
 
Q-Factor General Quiz-7th April 2024, Quiz Club NITW
Q-Factor General Quiz-7th April 2024, Quiz Club NITWQ-Factor General Quiz-7th April 2024, Quiz Club NITW
Q-Factor General Quiz-7th April 2024, Quiz Club NITW
 
ROLES IN A STAGE PRODUCTION in arts.pptx
ROLES IN A STAGE PRODUCTION in arts.pptxROLES IN A STAGE PRODUCTION in arts.pptx
ROLES IN A STAGE PRODUCTION in arts.pptx
 
Team Lead Succeed – Helping you and your team achieve high-performance teamwo...
Team Lead Succeed – Helping you and your team achieve high-performance teamwo...Team Lead Succeed – Helping you and your team achieve high-performance teamwo...
Team Lead Succeed – Helping you and your team achieve high-performance teamwo...
 
Oppenheimer Film Discussion for Philosophy and Film
Oppenheimer Film Discussion for Philosophy and FilmOppenheimer Film Discussion for Philosophy and Film
Oppenheimer Film Discussion for Philosophy and Film
 
How to Fix XML SyntaxError in Odoo the 17
How to Fix XML SyntaxError in Odoo the 17How to Fix XML SyntaxError in Odoo the 17
How to Fix XML SyntaxError in Odoo the 17
 
Textual Evidence in Reading and Writing of SHS
Textual Evidence in Reading and Writing of SHSTextual Evidence in Reading and Writing of SHS
Textual Evidence in Reading and Writing of SHS
 
Congestive Cardiac Failure..presentation
Congestive Cardiac Failure..presentationCongestive Cardiac Failure..presentation
Congestive Cardiac Failure..presentation
 
Narcotic and Non Narcotic Analgesic..pdf
Narcotic and Non Narcotic Analgesic..pdfNarcotic and Non Narcotic Analgesic..pdf
Narcotic and Non Narcotic Analgesic..pdf
 
Grade Three -ELLNA-REVIEWER-ENGLISH.pptx
Grade Three -ELLNA-REVIEWER-ENGLISH.pptxGrade Three -ELLNA-REVIEWER-ENGLISH.pptx
Grade Three -ELLNA-REVIEWER-ENGLISH.pptx
 
Measures of Position DECILES for ungrouped data
Measures of Position DECILES for ungrouped dataMeasures of Position DECILES for ungrouped data
Measures of Position DECILES for ungrouped data
 
Daily Lesson Plan in Mathematics Quarter 4
Daily Lesson Plan in Mathematics Quarter 4Daily Lesson Plan in Mathematics Quarter 4
Daily Lesson Plan in Mathematics Quarter 4
 
Concurrency Control in Database Management system
Concurrency Control in Database Management systemConcurrency Control in Database Management system
Concurrency Control in Database Management system
 
MS4 level being good citizen -imperative- (1) (1).pdf
MS4 level   being good citizen -imperative- (1) (1).pdfMS4 level   being good citizen -imperative- (1) (1).pdf
MS4 level being good citizen -imperative- (1) (1).pdf
 
Paradigm shift in nursing research by RS MEHTA
Paradigm shift in nursing research by RS MEHTAParadigm shift in nursing research by RS MEHTA
Paradigm shift in nursing research by RS MEHTA
 
Mythology Quiz-4th April 2024, Quiz Club NITW
Mythology Quiz-4th April 2024, Quiz Club NITWMythology Quiz-4th April 2024, Quiz Club NITW
Mythology Quiz-4th April 2024, Quiz Club NITW
 
ClimART Action | eTwinning Project
ClimART Action    |    eTwinning ProjectClimART Action    |    eTwinning Project
ClimART Action | eTwinning Project
 
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
 
Multi Domain Alias In the Odoo 17 ERP Module
Multi Domain Alias In the Odoo 17 ERP ModuleMulti Domain Alias In the Odoo 17 ERP Module
Multi Domain Alias In the Odoo 17 ERP Module
 

Seminar on Body Area Networks

  • 1. A Seminar on Data Security, Privacy and Other Applications in Emerging Body Area Networks Narayana Vinayak B080015EC
  • 2. Layout of the Seminar  Goals  Introduction  Typical Applications  Research Challenges  Data Security and Privacy  Models Proposed
  • 3. Goals  Understanding BANs  Appreciating their „potency‟  Being aware of their current applications  Understanding the challenges on the horizon  Understanding models proposed for data security in BANs
  • 4. Introduction Definition by IEEE: “A communication standard optimized for low power devices for their operation on, in or around the human body (but not limited to humans) to serve a variety of applications including medical, consumer electronics or personal entertainment and other.” Source: IEEE 802.15
  • 5. Typical Applications Source: M. Patel and J. Wang, “Applications, Challenges, And Prospective In Emerging Body Area Networking Technologies,” IEEE Wireless Communications, Feb. 2010
  • 6. Layout Source: M. Li and W. Lou, “Data Security And Privacy In Wireless Body Area Networks,” IEEE Wireless Communications, Feb. 2010
  • 7. Relevance * Ageing population; sedentary lifestyle * WHO stats: # Diabetics-360 million by 2030 # >2.3 bn. people obese by 2015 # rise in neuro-degenerative diseases * Fragile healthcare system, rising medical costs * Shortage of trained health staff in third world
  • 8. Realisation  Strategically placed wearable or implanted sensor nodes  Job: sample, process and transmit vital signs  What signs?  Heart rate, blood pressure, temperature, pH, respiration etc.  Where to?  To a hospital, clinic or a central repository of medical data  How? • A gateway device (e.g., a cell phone or a PDA) is used as a gateway device to connect to infrastructure networks like WLAN, WPAN etc.
  • 9. Source: Mark A. Hanson et al., “Body Area Sensor Networks: Challenges and Opportunities,” Computer, Jan. 2009
  • 10. Uses  Alerting the patient via SMS, alarm or reminder messages  Close-loop bio-feedback: if high sugar-level, a device triggers an insulin pump to inject a dose of insulin (artificial pancreas)  Long-term medical trend analysis  Reduction in hospital stays  Regulation of treatment regimes  Essence: Offering a paradigm shift from managing ILLNESS to managing WELLNESS by focusing on prevention and early detection (pre-emptive defence!)
  • 11. Research Challenges 1. Frequency Band Selection: 1. Most BAN devices need global operability 2. Facility for low-power usage (less crowded) 3. Less stringent rules for flexible usage and adaptability 4. Solutions proposed: Opening up the 2360-2400 MHz spectrum near ISM for medical BANs and allocating up to 24 MHz in the 413-457 MHz range for medical micropower network 2. Antenna Design: 1. Restrictions on size, material and shape of antenna 2. Hostile RF environment due to changes in wearer‟s age, weight changes and posture changes 3. During implants only non-corrosive and bio-compatible material can be used: Platinum or Titanium (both poor) against the usual copper
  • 12. Source: M. Patel and J. Wang, “Applications, Challenges, And Prospective In Emerging Body Area Networking Technologies,” IEEE Wireless Communications, Feb. 2010
  • 13. 3. PHY Protocol Design: 1. Minimize power consumption 2. Solution: Quick turn-around from transmit to receive and fast wake-up from sleep mode 3. Seamless connectivity in dynamic environments 4. Energy-Efficient Hardware: 1. Today‟s wireless technologies draw relatively high peak current 2. Also rely on duty cycling between sleep and active 3. Solution: Operation on low peak pulse-discharge current from thin-film (paper) batteries, idle listening, developing a crystal- less radio* * Reference: F. Sebastiano et al., “Impulse Based Scheme for crystal- less ULP Radios”, Proc. IEEE ISCAS, May 2008, pp. 1508-1511. 5. Technical Requirements: 1. Wide variation in data rate, BER, delay tolerance, duty cycle and lifetime 2. Diverse application environments
  • 14. Source: M. Patel and J. Wang, “Applications, Challenges, And Prospective In Emerging Body Area Networking Technologies,” IEEE Wireless Communications, Feb. 2010
  • 15. Source: M. Patel and J. Wang, IEEE Wireless Communications, Feb. 2010
  • 16. Candidate Technologies Source: M. Patel and J. Wang, “Applications, Challenges, And Prospective In Emerging Body Area Networking Technologies,” IEEE Wireless Communications, Feb. 2010
  • 17. Entities Involved in Research  The IEEE 802.15.6 Task Group is application developing the first industrial standard for the Physical and MAC layers for BAN (done, Feb. 2011) transport  Major competition: ZigBee and Bluetooth. network  Holistic standardization needed for plug- and-play interoperability link  ISO/IEEE 11073 Personal Health Data Working Group: Standardization of data exchange between peripheral area physical network devices and gateway devices
  • 18. Source: M. Patel and J. Wang, “Applications, Challenges, And Prospective In Emerging Body Area Networking Technologies,” IEEE Wireless Communications, Feb. 2010
  • 19. Data Security and Privacy  Data Security: Data is securely stored and transferred  Data Privacy: Data can be used only by authorized people  Application scenario: ◦ Emergency; paramedic reads RFID* tag to get the patient‟s medical records and his profile. ◦ WBAN is set up with wearable sensors ◦ Nurse reads health data from WBAN and uploads data onto local network ◦ Patient‟s gateway device is configured with an Access Policy (AP) that grants access to records (also adapts automatically) ◦ Patient can adjust his AP to hide sensitive data * Radio Frequency Identification is a standard technology that uses Radio waves to sense the details of an object for tracking. It uses RFID tags for this purpose.
  • 20. Threats Faced by Data within BAN: ◦ Threat from Device Compromise (encrypted data and key in same node) ◦ Threat from Network Dynamics (fake nodes masquerade real ones)  Storage Security Requirements: ◦ Confidentiality ◦ Dynamic Integrity Assurance ◦ Dependability  Access Security Requirements: ◦ Access Control (privacy; Fine-Grained) ◦ Accountability ◦ Revocability ◦ Non-Repudiation  Other Requirements: ◦ Authentication ◦ Availability ◦ Security-Safety, Security-Efficiency and Security-Usability conflict resolution
  • 21. Source: M. Li and W. Lou, “Data Security And Privacy In Wireless Body Area Networks,” IEEE Wireless Communications, Feb. 2010 The above Access Policy reads: “allow access by a doctor from the surgery department but not Dr. X, or an analyst or a paramedic, or a nurse who is not an intern.”
  • 22. Models Proposed Secure and Dependable Data Storage Schemes: 1. Based on Redundant Residue Number System (RRNS) 1. Proposed by Chessa et al. 2. Method: A number representable on a set of h moduli is represented by h + r moduli, where the extra r moduli are redundant 3. Source Node S distributes a single file F among n other nodes, where n=h + r is a random pick 4. S computes F‟s residue vector and distributes each file share to a different storage node 5. Pros.: Erasure tolerance is s<=r and corruption tolerance is ceil((r-s)/2) 6. Cons.: Set of moduli can be very large, data integrity not ensured when number of errors is more than r.
  • 23. 2. Based on Erasure Coding 1. Proposed by Wang et al. 2. Original encrypted data is broken down into n data shares, with each of them made of a block generated from (n,k) erasure coding and a share of the secret key using (n,k) secret sharing 3. These data shares are then distributed among the n neighbouring nodes 4. Dynamic Integrity Check: Each storage node computes and broadcasts an algebraic signature on one data share; one node checks its signature against those by other nodes to detect alterations timely 5. Pros.: Data confidentiality, dependability and dynamic integrity achieved simultaneously 6. Cons.: No third party (say, the local server) can perform integrity checks.
  • 24. 3. Based on Constant Data Motion method 1. Proposed by Pietro et al. 2. Idea: Move the data from one sensor node to the next so as to make it hard for the cracker to „track‟ and „catch‟ the data 3. Found to be very efficient (high data survival probability) 4. Cons.: High communication and storage overhead; less practical in energy-strained environments 4. Attribute Based Encryption (ABE) 1. Proposed by Li et al. 2. Specifically called the Ciphertext Policy ABE (CP-ABE) 3. Perfectly matches the model of Role-Based Access Control (RBAC) 4. Each user has a set of roles; patient chooses which roles to grant access to. 5. When a node in WBAN generates data, the AP is built into the Ciphertext; splitting a secret among components belonging to different user attributes; randomized to prevent user-collusion 6. Effectively implements fine-grained access control
  • 25. Physiological Signal-based Key Agreement (PSKA):  Proposed by Ayan Banerjee et al.  Requires no a priori deployment of keying material or initialization  Inspiration: Dynamic and complex nature of human physiological signals  Design goals met: ◦ Length and randomness ◦ Low latency ◦ Distinctiveness ◦ Temporal variance  Signal used: Electrocardiogram (EKG) commonly
  • 26. Method used:  Cons.: It may correct a few differences in feature vectors but can‟t handle the reordering of or presence of additional feature vectors; solution: fuzzy vault
  • 27. Fuzzy Vault  Generate a v-th order polynomial p over the variable x that encodes the secret S  Compute the value of the polynomial at different x from the set A (at the transmitter) and create a set R= {a, p(a)}  Add randomly generated set of points called chaff to R, which don‟t lie on the polynomial; we call R as the vault  To unlock the vault using set B (at the receiver), construct a set Q (see example given overleaf)  Unlocking is possible only if Q has a significant number of legitimate (non-chaff) points that are on the polynomial  Mapping to PSKA: Features at sender are set to A and those at the receiver, in set B
  • 28. Example Consider the polynomial: p(x) = x + 1; A = {1, 2, 3}; B = {1, 3, 4} Now, vault R is created by computing the polynomial‟s value at each point in A and adding chaff-points So, R = { (1, 2)(2, 3)(3, 4)(4, 7)(6, 9)(7, 12)(8, 5) } The last four points are chaff-points To unlock the vault, the set Q is constructed, Q = { (1, 2)(3, 4)(4, 7) } As the set Q has two points on the polynomial, we can use it to reconstruct the first-order polynomial, and thus, unlock the secret
  • 29. Major References  M. Patel and J. Wang, “Applications, Challenges, And Prospective In Emerging Body Area Networking Technologies,” IEEE Wireless Communications, Feb. 2010, pp. 80-88  A. Banerjee et al., “PSKA: Usable and Secure Key Agreement Scheme for Body Area Networks,” IEEE Transactions On Information Technology In Biomedicine, Jan. 2010, pp. 60-68  M. Li and W. Lou, “Data Security And Privacy In Wireless Body Area Networks,” IEEE Wireless Communications, Feb. 2010, pp. 51-58  Others: Cited in the Report