Skip to main content
Top

2019 | OriginalPaper | Chapter

An Encryption Method for BAN Using the Channel Characteristics

Authors : Liangguang Peng, Jinzhao Lin, Tong Bai, Yu Pang, Guoquan Li, Huiquan Wang, Xiaoming Jiang, Junchao Wang, Zeljko Zilic

Published in: Advances in Body Area Networks I

Publisher: Springer International Publishing

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

The protection of information security is a very important technique requirement in Body area networks (BANs). According to the limitation of energy, the traditional encryption methods which adopt the complex algorithm and the large consumption are not suitable for BANs. This paper proposes a new encryption method based on the channel model of BANs, which adopts the path loss from the BAN systems to form the initial key, utilizes the LFSR (Linear Feedback Shift Register) circuit to generate the key stream, and then encrypts the data in the coordinator of the BAN system. This new encryption method has the advantages of low energy consumption, simple hardware implementation, and dynamic key updating.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
1.
go back to reference Seyedi, M, et al.: A survey on intrabody communications for body area network applications. IEEE Trans. Bio-Med. Eng. 60(8), 2067 (2013)CrossRef Seyedi, M, et al.: A survey on intrabody communications for body area network applications. IEEE Trans. Bio-Med. Eng. 60(8), 2067 (2013)CrossRef
2.
go back to reference Barakah, D.M., Ammad-Uddin, M.: A survey of challenges and applications of wireless body area network (WBAN) and role of a virtual doctor server in existing architecture. In: International Conference on Intelligent Systems, pp. 214–219. IEEE (2012) Barakah, D.M., Ammad-Uddin, M.: A survey of challenges and applications of wireless body area network (WBAN) and role of a virtual doctor server in existing architecture. In: International Conference on Intelligent Systems, pp. 214–219. IEEE (2012)
3.
go back to reference Monton, E., et al.: Body area network for wireless patient monitoring. IET Commun. 2(2), 215–222 (2008)CrossRef Monton, E., et al.: Body area network for wireless patient monitoring. IET Commun. 2(2), 215–222 (2008)CrossRef
4.
go back to reference Ullah, S., et al.: A comprehensive survey of wireless body area networks: on PHY, MAC, and Network layers solutions. J. Med. Syst. 36(3), 1065 (2012)CrossRef Ullah, S., et al.: A comprehensive survey of wireless body area networks: on PHY, MAC, and Network layers solutions. J. Med. Syst. 36(3), 1065 (2012)CrossRef
5.
go back to reference Lim, S., et al.: Security issues on wireless body area network for remote healthcare monitoring. In: IEEE International Conference on Sensor Networks, Ubiquitous, and Trustworthy Computing, pp. 327–332. IEEE Computer Society (2010) Lim, S., et al.: Security issues on wireless body area network for remote healthcare monitoring. In: IEEE International Conference on Sensor Networks, Ubiquitous, and Trustworthy Computing, pp. 327–332. IEEE Computer Society (2010)
6.
go back to reference Warren, S., et al.: Interoperability and security in wireless body area network infrastructures. In: International Conference of the Engineering in Medicine & Biology Society, p. 3837 (2005) Warren, S., et al.: Interoperability and security in wireless body area network infrastructures. In: International Conference of the Engineering in Medicine & Biology Society, p. 3837 (2005)
7.
go back to reference Mainanwal, V., Gupta, M., Upadhayay, S.K.: A survey on wireless body area network: security technology and its design methodology issue. In: International Conference on Innovations in Information, Embedded and Communication Systems, pp. 1–5. IEEE (2015) Mainanwal, V., Gupta, M., Upadhayay, S.K.: A survey on wireless body area network: security technology and its design methodology issue. In: International Conference on Innovations in Information, Embedded and Communication Systems, pp. 1–5. IEEE (2015)
8.
go back to reference Chan, H., Perrig, A., Song, D.: Random key predistribution schemes for sensor networks. In: Proceedings of 2003 Symposium on Security and Privacy. IEEE (2003) Chan, H., Perrig, A., Song, D.: Random key predistribution schemes for sensor networks. In: Proceedings of 2003 Symposium on Security and Privacy. IEEE (2003)
9.
go back to reference Ali, A., Khan, F.A.: An improved EKG-based key agreement scheme for body area networks. In: Proceedings of the International Conference on Information Security and Assurance, ISA 2010, DBLP, Miyazaki, Japan, June 23–25 2010, pp. 298–308 (2010) Ali, A., Khan, F.A.: An improved EKG-based key agreement scheme for body area networks. In: Proceedings of the International Conference on Information Security and Assurance, ISA 2010, DBLP, Miyazaki, Japan, June 23–25 2010, pp. 298–308 (2010)
10.
go back to reference Mana, M., Feham, M., Bensaber, B.A.: SEKEBAN (Secure and efficient key exchange for wireless body area network). Int. J. Advanc. Sci. Technol. 12.12 (2009) Mana, M., Feham, M., Bensaber, B.A.: SEKEBAN (Secure and efficient key exchange for wireless body area network). Int. J. Advanc. Sci. Technol. 12.12 (2009)
11.
go back to reference Yao, L., et al.: A biometric key establishment protocol for body area networks. Int. J. Distrib. Sens. Netw. 1550–1329, 1063–1067 (2011) Yao, L., et al.: A biometric key establishment protocol for body area networks. Int. J. Distrib. Sens. Netw. 1550–1329, 1063–1067 (2011)
12.
go back to reference Gangadari, Bhoopal Rao, Ahamed, Shaik Rafi: Design of cryptographically secure AES like S-Box using second-order reversible cellular automata for wireless body area network applications. Healthcare Technol. Lett. 3(3), 177–183 (2016)CrossRef Gangadari, Bhoopal Rao, Ahamed, Shaik Rafi: Design of cryptographically secure AES like S-Box using second-order reversible cellular automata for wireless body area network applications. Healthcare Technol. Lett. 3(3), 177–183 (2016)CrossRef
13.
go back to reference Al-Janabi, S., et al.: Survey of main challenges (security and privacy) in wireless body area networks for healthcare applications. Egyptian Informat. J. (2016) Al-Janabi, S., et al.: Survey of main challenges (security and privacy) in wireless body area networks for healthcare applications. Egyptian Informat. J. (2016)
14.
go back to reference Sharma, K., et al.: Use of LFSR for sensor network security: a new approach. In: International Conference on Information Security and Assurance, pp. 61–66. IEEE Computer Society (2008) Sharma, K., et al.: Use of LFSR for sensor network security: a new approach. In: International Conference on Information Security and Assurance, pp. 61–66. IEEE Computer Society (2008)
15.
go back to reference Sharaf, M., et al.: A complex linear feedback shift register design for the A5 keystream generator. National IEEE Xplore 395–402 (2005) Sharaf, M., et al.: A complex linear feedback shift register design for the A5 keystream generator. National IEEE Xplore 395–402 (2005)
Metadata
Title
An Encryption Method for BAN Using the Channel Characteristics
Authors
Liangguang Peng
Jinzhao Lin
Tong Bai
Yu Pang
Guoquan Li
Huiquan Wang
Xiaoming Jiang
Junchao Wang
Zeljko Zilic
Copyright Year
2019
DOI
https://doi.org/10.1007/978-3-030-02819-0_17