Skip to main content

2019 | OriginalPaper | Buchkapitel

An Encryption Method for BAN Using the Channel Characteristics

verfasst von : Liangguang Peng, Jinzhao Lin, Tong Bai, Yu Pang, Guoquan Li, Huiquan Wang, Xiaoming Jiang, Junchao Wang, Zeljko Zilic

Erschienen in: Advances in Body Area Networks I

Verlag: Springer International Publishing

Aktivieren Sie unsere intelligente Suche um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

The protection of information security is a very important technique requirement in Body area networks (BANs). According to the limitation of energy, the traditional encryption methods which adopt the complex algorithm and the large consumption are not suitable for BANs. This paper proposes a new encryption method based on the channel model of BANs, which adopts the path loss from the BAN systems to form the initial key, utilizes the LFSR (Linear Feedback Shift Register) circuit to generate the key stream, and then encrypts the data in the coordinator of the BAN system. This new encryption method has the advantages of low energy consumption, simple hardware implementation, and dynamic key updating.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Seyedi, M, et al.: A survey on intrabody communications for body area network applications. IEEE Trans. Bio-Med. Eng. 60(8), 2067 (2013)CrossRef Seyedi, M, et al.: A survey on intrabody communications for body area network applications. IEEE Trans. Bio-Med. Eng. 60(8), 2067 (2013)CrossRef
2.
Zurück zum Zitat Barakah, D.M., Ammad-Uddin, M.: A survey of challenges and applications of wireless body area network (WBAN) and role of a virtual doctor server in existing architecture. In: International Conference on Intelligent Systems, pp. 214–219. IEEE (2012) Barakah, D.M., Ammad-Uddin, M.: A survey of challenges and applications of wireless body area network (WBAN) and role of a virtual doctor server in existing architecture. In: International Conference on Intelligent Systems, pp. 214–219. IEEE (2012)
3.
Zurück zum Zitat Monton, E., et al.: Body area network for wireless patient monitoring. IET Commun. 2(2), 215–222 (2008)CrossRef Monton, E., et al.: Body area network for wireless patient monitoring. IET Commun. 2(2), 215–222 (2008)CrossRef
4.
Zurück zum Zitat Ullah, S., et al.: A comprehensive survey of wireless body area networks: on PHY, MAC, and Network layers solutions. J. Med. Syst. 36(3), 1065 (2012)CrossRef Ullah, S., et al.: A comprehensive survey of wireless body area networks: on PHY, MAC, and Network layers solutions. J. Med. Syst. 36(3), 1065 (2012)CrossRef
5.
Zurück zum Zitat Lim, S., et al.: Security issues on wireless body area network for remote healthcare monitoring. In: IEEE International Conference on Sensor Networks, Ubiquitous, and Trustworthy Computing, pp. 327–332. IEEE Computer Society (2010) Lim, S., et al.: Security issues on wireless body area network for remote healthcare monitoring. In: IEEE International Conference on Sensor Networks, Ubiquitous, and Trustworthy Computing, pp. 327–332. IEEE Computer Society (2010)
6.
Zurück zum Zitat Warren, S., et al.: Interoperability and security in wireless body area network infrastructures. In: International Conference of the Engineering in Medicine & Biology Society, p. 3837 (2005) Warren, S., et al.: Interoperability and security in wireless body area network infrastructures. In: International Conference of the Engineering in Medicine & Biology Society, p. 3837 (2005)
7.
Zurück zum Zitat Mainanwal, V., Gupta, M., Upadhayay, S.K.: A survey on wireless body area network: security technology and its design methodology issue. In: International Conference on Innovations in Information, Embedded and Communication Systems, pp. 1–5. IEEE (2015) Mainanwal, V., Gupta, M., Upadhayay, S.K.: A survey on wireless body area network: security technology and its design methodology issue. In: International Conference on Innovations in Information, Embedded and Communication Systems, pp. 1–5. IEEE (2015)
8.
Zurück zum Zitat Chan, H., Perrig, A., Song, D.: Random key predistribution schemes for sensor networks. In: Proceedings of 2003 Symposium on Security and Privacy. IEEE (2003) Chan, H., Perrig, A., Song, D.: Random key predistribution schemes for sensor networks. In: Proceedings of 2003 Symposium on Security and Privacy. IEEE (2003)
9.
Zurück zum Zitat Ali, A., Khan, F.A.: An improved EKG-based key agreement scheme for body area networks. In: Proceedings of the International Conference on Information Security and Assurance, ISA 2010, DBLP, Miyazaki, Japan, June 23–25 2010, pp. 298–308 (2010) Ali, A., Khan, F.A.: An improved EKG-based key agreement scheme for body area networks. In: Proceedings of the International Conference on Information Security and Assurance, ISA 2010, DBLP, Miyazaki, Japan, June 23–25 2010, pp. 298–308 (2010)
10.
Zurück zum Zitat Mana, M., Feham, M., Bensaber, B.A.: SEKEBAN (Secure and efficient key exchange for wireless body area network). Int. J. Advanc. Sci. Technol. 12.12 (2009) Mana, M., Feham, M., Bensaber, B.A.: SEKEBAN (Secure and efficient key exchange for wireless body area network). Int. J. Advanc. Sci. Technol. 12.12 (2009)
11.
Zurück zum Zitat Yao, L., et al.: A biometric key establishment protocol for body area networks. Int. J. Distrib. Sens. Netw. 1550–1329, 1063–1067 (2011) Yao, L., et al.: A biometric key establishment protocol for body area networks. Int. J. Distrib. Sens. Netw. 1550–1329, 1063–1067 (2011)
12.
Zurück zum Zitat Gangadari, Bhoopal Rao, Ahamed, Shaik Rafi: Design of cryptographically secure AES like S-Box using second-order reversible cellular automata for wireless body area network applications. Healthcare Technol. Lett. 3(3), 177–183 (2016)CrossRef Gangadari, Bhoopal Rao, Ahamed, Shaik Rafi: Design of cryptographically secure AES like S-Box using second-order reversible cellular automata for wireless body area network applications. Healthcare Technol. Lett. 3(3), 177–183 (2016)CrossRef
13.
Zurück zum Zitat Al-Janabi, S., et al.: Survey of main challenges (security and privacy) in wireless body area networks for healthcare applications. Egyptian Informat. J. (2016) Al-Janabi, S., et al.: Survey of main challenges (security and privacy) in wireless body area networks for healthcare applications. Egyptian Informat. J. (2016)
14.
Zurück zum Zitat Sharma, K., et al.: Use of LFSR for sensor network security: a new approach. In: International Conference on Information Security and Assurance, pp. 61–66. IEEE Computer Society (2008) Sharma, K., et al.: Use of LFSR for sensor network security: a new approach. In: International Conference on Information Security and Assurance, pp. 61–66. IEEE Computer Society (2008)
15.
Zurück zum Zitat Sharaf, M., et al.: A complex linear feedback shift register design for the A5 keystream generator. National IEEE Xplore 395–402 (2005) Sharaf, M., et al.: A complex linear feedback shift register design for the A5 keystream generator. National IEEE Xplore 395–402 (2005)
Metadaten
Titel
An Encryption Method for BAN Using the Channel Characteristics
verfasst von
Liangguang Peng
Jinzhao Lin
Tong Bai
Yu Pang
Guoquan Li
Huiquan Wang
Xiaoming Jiang
Junchao Wang
Zeljko Zilic
Copyright-Jahr
2019
DOI
https://doi.org/10.1007/978-3-030-02819-0_17

Neuer Inhalt