Skip to main content
Top

2018 | OriginalPaper | Chapter

The Dynamic Encryption Method Based on ECG Characteristic Value

Authors : Huiqian Wang, Tong Bai, Yu Pang, Wei Wang, Jinzhao Lin, Guoquan Li, Qianneng Zhou, Zhangyong Li, Xiaoming Jiang

Published in: Communications, Signal Processing, and Systems

Publisher: Springer Singapore

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

Body area network (BAN) is a key technology of solving remote medical, where protecting security of vital signs information is a very important technique requirement. This paper presents a data security scheme based on ECG characteristics, investigating methods of the circuit-level data encryption and dynamic key refreshment due to the obtained ECG signal characteristic value. The proposed scheme is constructed from the inherent features of the BAN system, adopting vital information from security protection, which has advantages of high strength, low cost, and easy implementation. Therefore, the scheme helps to design low-power sensor nodes and provides theoretical support and engineering implementation.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Literature
1.
go back to reference H. Chan, A. Perrig, D. Song, Random key predistribution schemes for sensor networks, in Symposium on Security and Privacy (2003), pp. 197–213 H. Chan, A. Perrig, D. Song, Random key predistribution schemes for sensor networks, in Symposium on Security and Privacy (2003), pp. 197–213
2.
go back to reference L. Shi, M. Li, S. Yu, J. Yuan, BANA: body area network authentication exploiting channel characteristics. IEEE J. Sel. Areas Commun. 31(9), 1803–1816 (2013)CrossRef L. Shi, M. Li, S. Yu, J. Yuan, BANA: body area network authentication exploiting channel characteristics. IEEE J. Sel. Areas Commun. 31(9), 1803–1816 (2013)CrossRef
3.
go back to reference S. Bao, Y. Zhang, L. Shen, Physiological signal based entity authentication for body area sensor networks and mobile healthcare systems, in Proceedings of the 27th Annual International Conference of the IEEE Engineering in Medicine and Biology Society (2005), pp. 2455–2458 S. Bao, Y. Zhang, L. Shen, Physiological signal based entity authentication for body area sensor networks and mobile healthcare systems, in Proceedings of the 27th Annual International Conference of the IEEE Engineering in Medicine and Biology Society (2005), pp. 2455–2458
4.
go back to reference Z. Zhang, H. Wang, A.V. Vasilakos, H. Fang, ECG-cryptography and authentication in body area networks. IEEE Trans. Inf. Technol. Biomed. 16(6), 1070–1078 (2012)CrossRef Z. Zhang, H. Wang, A.V. Vasilakos, H. Fang, ECG-cryptography and authentication in body area networks. IEEE Trans. Inf. Technol. Biomed. 16(6), 1070–1078 (2012)CrossRef
5.
go back to reference K. Venkatasubramanian, A. Banerjee, S.K.S. Gupta, Plethysmogram-based secure inter-sensor communication in body area networks, in Proceedings of the IEEE Military Communications Conference (2008), pp. 1–7 K. Venkatasubramanian, A. Banerjee, S.K.S. Gupta, Plethysmogram-based secure inter-sensor communication in body area networks, in Proceedings of the IEEE Military Communications Conference (2008), pp. 1–7
6.
go back to reference K. Venkatasubramanian, A. Banerjee, S.K.S. Gupta, EKG-based key agreement in body sensor networks, in Proceedings of the 2nd Workshop Mission Critical Networks (2008), pp. 1–6 K. Venkatasubramanian, A. Banerjee, S.K.S. Gupta, EKG-based key agreement in body sensor networks, in Proceedings of the 2nd Workshop Mission Critical Networks (2008), pp. 1–6
7.
go back to reference K. Venkatasubramanian, A. Banerjee, S. Gupta, PSKA: usable and secure key agreement scheme for body area networks. IEEE Trans. Inf. Technol. Biomed. 14(1), 60–68 (2010)CrossRef K. Venkatasubramanian, A. Banerjee, S. Gupta, PSKA: usable and secure key agreement scheme for body area networks. IEEE Trans. Inf. Technol. Biomed. 14(1), 60–68 (2010)CrossRef
8.
go back to reference S. Cherukuri, K. Venkatasubramanian, S. Gupta, Biosec: a biometric based approach for securing communication in wireless networks of biosensors implanted in the human body, in International Conference on Parallel Processing Workshops (2003), pp. 432–439 S. Cherukuri, K. Venkatasubramanian, S. Gupta, Biosec: a biometric based approach for securing communication in wireless networks of biosensors implanted in the human body, in International Conference on Parallel Processing Workshops (2003), pp. 432–439
9.
go back to reference H. Wang, H. Fang, L. Xing, M. Chen, An integrated biometric-based security framework using wavelet-domain HMM in wireless body area networks, in IEEE International Conference on Communications (2011), pp. 1–5 H. Wang, H. Fang, L. Xing, M. Chen, An integrated biometric-based security framework using wavelet-domain HMM in wireless body area networks, in IEEE International Conference on Communications (2011), pp. 1–5
10.
go back to reference S. Ali, V. Sivaraman, D. Ostry, Secret key generation rate vs. reconciliation cost using wireless channel characteristics in body area networks, in IEEE/IFIP International Conference on Embedded and Ubiquitous Computing (2010), pp. 644–650 S. Ali, V. Sivaraman, D. Ostry, Secret key generation rate vs. reconciliation cost using wireless channel characteristics in body area networks, in IEEE/IFIP International Conference on Embedded and Ubiquitous Computing (2010), pp. 644–650
11.
go back to reference S. Jana, S.N. Premnath, M. Clark, S. Kasera, N. Patwari, S. Krishnamurthy, On the effectiveness of secret key extraction using wireless signal strength in real environments, in International Conference on Mobile Computing and Networking (2009), pp. 321–332 S. Jana, S.N. Premnath, M. Clark, S. Kasera, N. Patwari, S. Krishnamurthy, On the effectiveness of secret key extraction using wireless signal strength in real environments, in International Conference on Mobile Computing and Networking (2009), pp. 321–332
Metadata
Title
The Dynamic Encryption Method Based on ECG Characteristic Value
Authors
Huiqian Wang
Tong Bai
Yu Pang
Wei Wang
Jinzhao Lin
Guoquan Li
Qianneng Zhou
Zhangyong Li
Xiaoming Jiang
Copyright Year
2018
Publisher
Springer Singapore
DOI
https://doi.org/10.1007/978-981-10-3229-5_46