Skip to main content
Erschienen in: Wireless Personal Communications 4/2017

19.04.2017

Lightweight Security Protocol for ECG Bio-Sensors

verfasst von: Hussam Al-Hamadi, Amjad Gawanmeh, Joonsang Baek, Mahmoud Al-Qutayri

Erschienen in: Wireless Personal Communications | Ausgabe 4/2017

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Securing biomedical information is a critical issue in wireless body sensor networks (WBSNs). However, since sensors used in a WBSN tend to have limited processing capabilities and energy sources, minimizing the overhead imposed by security protocol is a challenging problem. This paper proposes a scheme that uses the electrocardiogram (ECG) features to provide a lightweight protocol that can be used to provide several security properties for biomedical sensors, in particular, those that have the ability to capture ECG waveforms. The security of the proposed scheme relies on the operation of the Pan Tompkins algorithm where certain information is extracted from ECG that cannot be reversed back. The implementation is based on the IEEE 802.15.4 standard, which specifies the physical layer for low-rate wireless personal area network. As a result, the proposed security protocol utilizes the effectiveness of several security techniques, such as nonce and hash at the biosensor side by relying on the characteristics of ECG. This reduces the overhead caused by providing security layer to the operation of the sensor. Formal analysis methods were used to demonstrate the suitability of the proposed protocol for WBSNs and prove its security.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Movassaghi, S., Abolhasan, M., Lipman, J., Smith, D., & Jamalipour, A. (2014). Wireless body area networks: A survey. IEEE Communications Surveys Tutorials, 16(3), 1658–1686.CrossRef Movassaghi, S., Abolhasan, M., Lipman, J., Smith, D., & Jamalipour, A. (2014). Wireless body area networks: A survey. IEEE Communications Surveys Tutorials, 16(3), 1658–1686.CrossRef
2.
Zurück zum Zitat Gawanmeh, A., Al-Hamadi, H. Al-Qutayri, M., Chin, S. -K., & Saleem, K. (2015). Reliability analysis of healthcare information systems:State of the art and future directions. In 2015 17th International conference on e-health networking, application andservices, HealthCom 2015 (pp. 68–74). Gawanmeh, A., Al-Hamadi, H. Al-Qutayri, M., Chin, S. -K., & Saleem, K. (2015). Reliability analysis of healthcare information systems:State of the art and future directions. In 2015 17th International conference on e-health networking, application andservices, HealthCom 2015 (pp. 68–74).
3.
Zurück zum Zitat Prasad, N. R., & Alam, M. (2006). Security framework for wireless sensor networks. Wireless Personal Communications, 37(3), 455–469.CrossRef Prasad, N. R., & Alam, M. (2006). Security framework for wireless sensor networks. Wireless Personal Communications, 37(3), 455–469.CrossRef
4.
Zurück zum Zitat Raja, K. S., & Kiruthika, U. (2015). An energy efficient method for secure and reliable data transmission in wireless body area networks using RelAODV. Wireless Personal Communications, 83(4), 2975–2997.CrossRef Raja, K. S., & Kiruthika, U. (2015). An energy efficient method for secure and reliable data transmission in wireless body area networks using RelAODV. Wireless Personal Communications, 83(4), 2975–2997.CrossRef
5.
Zurück zum Zitat Bouakkaz, F., Omar, M., Laib, S., Guermouz, L., Tari, A., & Bouabdallah, A. (2016). Lightweight sharing scheme for data integrity protection in WSNs. Wireless Personal Communications, 89(1), 1–16.CrossRef Bouakkaz, F., Omar, M., Laib, S., Guermouz, L., Tari, A., & Bouabdallah, A. (2016). Lightweight sharing scheme for data integrity protection in WSNs. Wireless Personal Communications, 89(1), 1–16.CrossRef
6.
Zurück zum Zitat Ma, L., Ge, Y., & Zhu, Y. (2013). Tinyzkp: A lightweight authentication scheme based on zero-knowledge proof for wireless body area networks. Wireless Personal Communications, 77(2), 1077–1090.CrossRef Ma, L., Ge, Y., & Zhu, Y. (2013). Tinyzkp: A lightweight authentication scheme based on zero-knowledge proof for wireless body area networks. Wireless Personal Communications, 77(2), 1077–1090.CrossRef
7.
Zurück zum Zitat Lu, H., Li, J., & Guizani, M. (2014). Secure and efficient data transmission for cluster-based wireless sensor networks. IEEE Transactions on Parallel and Distributed Systems, 25(3), 750–761.CrossRef Lu, H., Li, J., & Guizani, M. (2014). Secure and efficient data transmission for cluster-based wireless sensor networks. IEEE Transactions on Parallel and Distributed Systems, 25(3), 750–761.CrossRef
8.
Zurück zum Zitat He, D., Chan, S., Guizani, M., Yang, H., & Zhou, B. (2015). Secure and distributed data discovery and dissemination in wireless sensor networks. IEEE Transactions on Parallel and Distributed Systems, 26(4), 1129–1139.CrossRef He, D., Chan, S., Guizani, M., Yang, H., & Zhou, B. (2015). Secure and distributed data discovery and dissemination in wireless sensor networks. IEEE Transactions on Parallel and Distributed Systems, 26(4), 1129–1139.CrossRef
9.
Zurück zum Zitat Hsueh, C.-T., Wen, C.-Y., & Ouyang, Y.-C. (2015). A secure scheme against power exhausting attacks in hierarchical wireless sensor networks. IEEE Sensors Journal, 15(6), 3590–3602.CrossRef Hsueh, C.-T., Wen, C.-Y., & Ouyang, Y.-C. (2015). A secure scheme against power exhausting attacks in hierarchical wireless sensor networks. IEEE Sensors Journal, 15(6), 3590–3602.CrossRef
10.
Zurück zum Zitat Kafle, V., Fukushima, Y., & Harai, H. (2015). Design and implementation of dynamic mobile sensor network platform. IEEE Communications Magazine, 53(3), 48–57.CrossRef Kafle, V., Fukushima, Y., & Harai, H. (2015). Design and implementation of dynamic mobile sensor network platform. IEEE Communications Magazine, 53(3), 48–57.CrossRef
11.
Zurück zum Zitat He, D., Chan, S., & Guizani, M. (2014). Small data dissemination for wireless sensor networks: The security aspect. IEEE Wireless Communications, 21(3), 110–116.CrossRef He, D., Chan, S., & Guizani, M. (2014). Small data dissemination for wireless sensor networks: The security aspect. IEEE Wireless Communications, 21(3), 110–116.CrossRef
12.
Zurück zum Zitat Gandino, F., Montrucchio, B., & Rebaudengo, M. (2014). Key management for static wireless sensor networks with node adding. IEEE Transactions on Industrial Informatics, 10(2), 1133–1143.CrossRef Gandino, F., Montrucchio, B., & Rebaudengo, M. (2014). Key management for static wireless sensor networks with node adding. IEEE Transactions on Industrial Informatics, 10(2), 1133–1143.CrossRef
13.
Zurück zum Zitat Guo, L., Wu, J., Xia, Z., & Li, J. (2015). Proposed security mechanism for XMPP-based communications of ISO/IEC/IEEE 21451 sensor networks. IEEE Sensors Journal, 15(5), 2577–2586.CrossRef Guo, L., Wu, J., Xia, Z., & Li, J. (2015). Proposed security mechanism for XMPP-based communications of ISO/IEC/IEEE 21451 sensor networks. IEEE Sensors Journal, 15(5), 2577–2586.CrossRef
14.
Zurück zum Zitat Balasubramanian, V., Hoang, D., & Zia, T. (2011). Addressing the confidentiality and integrity of assistive care loop framework using wireless sensor networks. In International conference on systems engineering (pp. 416–421). Balasubramanian, V., Hoang, D., & Zia, T. (2011). Addressing the confidentiality and integrity of assistive care loop framework using wireless sensor networks. In International conference on systems engineering (pp. 416–421).
15.
Zurück zum Zitat Majidi, M., Mobarhan, R., Hardoroudi, A., H-Ismail, A., & Parchinaki, A. (2011). Energy cost analyses of key management techniques for secure patient monitoring in WSN. In IEEE open systems (pp. 111–115). Majidi, M., Mobarhan, R., Hardoroudi, A., H-Ismail, A., & Parchinaki, A. (2011). Energy cost analyses of key management techniques for secure patient monitoring in WSN. In IEEE open systems (pp. 111–115).
16.
Zurück zum Zitat Saleem, K., Derhab, A., Al-Muhtadi, J., & Shahzad, B. (2014). Human-oriented design of secure machine-to-machine communication system for e-healthcare society. Computers in Human Behavior, 51, 977–985.CrossRef Saleem, K., Derhab, A., Al-Muhtadi, J., & Shahzad, B. (2014). Human-oriented design of secure machine-to-machine communication system for e-healthcare society. Computers in Human Behavior, 51, 977–985.CrossRef
17.
Zurück zum Zitat Saleem, K., Derhab, A., & Al-Muhtadi, J. (2014). Low delay and secure M2M communication mechanism for ehealthcare. In IEEE 16th international conference on e-health networking, applications and services (pp. 105–110). Saleem, K., Derhab, A., & Al-Muhtadi, J. (2014). Low delay and secure M2M communication mechanism for ehealthcare. In IEEE 16th international conference on e-health networking, applications and services (pp. 105–110).
18.
Zurück zum Zitat Chen, L., Cao, Z., Lu, R., Liang, X., & Shen, X. (2011). EPF: an eventaided packet forwarding protocol for privacy preserving mobile healthcare social networks. In Global communications conference (pp. 1–5). Chen, L., Cao, Z., Lu, R., Liang, X., & Shen, X. (2011). EPF: an eventaided packet forwarding protocol for privacy preserving mobile healthcare social networks. In Global communications conference (pp. 1–5).
19.
Zurück zum Zitat Liang, X., Lu, R., Chen, L., Lin, X., & Shen, X. (2011). PEC: A privacy-preserving emergency call scheme for mobile healthcare social networks. Journal of Communications and Networks, 13(2), 102–112.CrossRef Liang, X., Lu, R., Chen, L., Lin, X., & Shen, X. (2011). PEC: A privacy-preserving emergency call scheme for mobile healthcare social networks. Journal of Communications and Networks, 13(2), 102–112.CrossRef
20.
Zurück zum Zitat Lu, R., Lin, X., & Shen, X. (2013). SPOC: A secure and privacy-preserving opportunistic computing framework for mobile-healthcare emergency. IEEE Transactions on Parallel and Distributed Systems, 24(3), 614–624.CrossRef Lu, R., Lin, X., & Shen, X. (2013). SPOC: A secure and privacy-preserving opportunistic computing framework for mobile-healthcare emergency. IEEE Transactions on Parallel and Distributed Systems, 24(3), 614–624.CrossRef
21.
Zurück zum Zitat Avancha, S., Baxi, A., & Kotz, D. (2009). Privacy in mobile technology for personal healthcare. ACM Computing Surveys, 45(1), 3. Avancha, S., Baxi, A., & Kotz, D. (2009). Privacy in mobile technology for personal healthcare. ACM Computing Surveys, 45(1), 3.
22.
Zurück zum Zitat Rushanan, M., Rubin, A., Kune, D., & Swanson, C. (2014). SoK: Security and privacy in implantable medical devices and body area networks. In IEEE symposium on security and privacy (pp. 524–539). Rushanan, M., Rubin, A., Kune, D., & Swanson, C. (2014). SoK: Security and privacy in implantable medical devices and body area networks. In IEEE symposium on security and privacy (pp. 524–539).
23.
Zurück zum Zitat Poon, C., Zhang, Y.-T., & Bao, S.-D. (2006). A novel biometrics method to secure wireless body area sensor networks for telemedicine and m-health. IEEE Communications Magazine, 44(4), 73–81.CrossRef Poon, C., Zhang, Y.-T., & Bao, S.-D. (2006). A novel biometrics method to secure wireless body area sensor networks for telemedicine and m-health. IEEE Communications Magazine, 44(4), 73–81.CrossRef
24.
Zurück zum Zitat Bao, S. -D., Zhang, Y. -T., & Feng Shen, L. (2005). Physiological signal based entity authentication for body area sensor networks and mobile healthcare systems. In 27th Annual international conference of the engineering in medicine and biology society (pp. 2455–2458). Bao, S. -D., Zhang, Y. -T., & Feng Shen, L. (2005). Physiological signal based entity authentication for body area sensor networks and mobile healthcare systems. In 27th Annual international conference of the engineering in medicine and biology society (pp. 2455–2458).
25.
Zurück zum Zitat Cherukuri, S., Venkatasubramanian, K., & Gupta, S. (2003). Biosec: A biometric based approach for securing communication in wireless networks of biosensors implanted in the human body. In International conference on parallel processing workshops (pp. 432–439). Cherukuri, S., Venkatasubramanian, K., & Gupta, S. (2003). Biosec: A biometric based approach for securing communication in wireless networks of biosensors implanted in the human body. In International conference on parallel processing workshops (pp. 432–439).
26.
Zurück zum Zitat Venkatasubramanian, K., Venkatasubramanian, Banerjee, A., & Gupta, S. (2008). EKG-based key agreement in body sensor networks. In IEEE INFOCOM workshops (pp. 1–6). Venkatasubramanian, K., Venkatasubramanian, Banerjee, A., & Gupta, S. (2008). EKG-based key agreement in body sensor networks. In IEEE INFOCOM workshops (pp. 1–6).
27.
Zurück zum Zitat Zhang, Z., Wang, H., Vasilakos, A., & Fang, H. (2012). ECG-cryptography and authentication in body area networks. IEEE Transactions on Information Technology in Biomedicine, 16(6), 1070–1078.CrossRef Zhang, Z., Wang, H., Vasilakos, A., & Fang, H. (2012). ECG-cryptography and authentication in body area networks. IEEE Transactions on Information Technology in Biomedicine, 16(6), 1070–1078.CrossRef
28.
Zurück zum Zitat Chen, X., Zhang, Y., Zhang, G., & Zhang, Y. (2012). Evaluation of ECG random number generator for wireless body sensor networks security. In Biomedical engineering and informatics (pp. 1308–1311). Chen, X., Zhang, Y., Zhang, G., & Zhang, Y. (2012). Evaluation of ECG random number generator for wireless body sensor networks security. In Biomedical engineering and informatics (pp. 1308–1311).
29.
Zurück zum Zitat Al Hamadi, H., Gawanmeh, A., & Al-Qutayri, M. (2014). A verification methodology for a wireless body sensor network functionality. In 2014 IEEE-EMBS international conference on biomedical and health informatics, BHI 2014 (pp. 635–639). IEEE. Al Hamadi, H., Gawanmeh, A., & Al-Qutayri, M. (2014). A verification methodology for a wireless body sensor network functionality. In 2014 IEEE-EMBS international conference on biomedical and health informatics, BHI 2014 (pp. 635–639). IEEE.
30.
Zurück zum Zitat Al-Hamadi, H., Gawanmeh, A., & Al-Qutayri, M. (2015). Formalizing electrocardiogram (ecg) signal behavior in event-b. In 2014 IEEE 16th international conference on e-health networking, applications and services, Healthcom 2014 (pp. 55–60). IEEE. Al-Hamadi, H., Gawanmeh, A., & Al-Qutayri, M. (2015). Formalizing electrocardiogram (ecg) signal behavior in event-b. In 2014 IEEE 16th international conference on e-health networking, applications and services, Healthcom 2014 (pp. 55–60). IEEE.
31.
Zurück zum Zitat Al-Hamadi, H., Gawanmeh, A., Al-Qutayri, M., & Ismail, M. (2017). A framework for the verification of an ecg biosensor algorithm. Analog Integrated Circuits and Signal Processing, 90(3), 523–538.CrossRef Al-Hamadi, H., Gawanmeh, A., Al-Qutayri, M., & Ismail, M. (2017). A framework for the verification of an ecg biosensor algorithm. Analog Integrated Circuits and Signal Processing, 90(3), 523–538.CrossRef
32.
Zurück zum Zitat Gawanmeh, A. (2013). An axiomatic model for formal specification requirements of ubiquitous healthcare systems. In 2013 IEEE 10th consumer communications and networking conference. CCNC 2013 (pp. 898–902). Gawanmeh, A. (2013). An axiomatic model for formal specification requirements of ubiquitous healthcare systems. In 2013 IEEE 10th consumer communications and networking conference. CCNC 2013 (pp. 898–902).
33.
Zurück zum Zitat Lugovaya, T. (2005). Biometric human identification based on electrocardiogram. Master’s thesis, Faculty of Computing Technologies and Informatics, Electrotechnical University, Saint-Petersburg, Russian Federation. Lugovaya, T. (2005). Biometric human identification based on electrocardiogram. Master’s thesis, Faculty of Computing Technologies and Informatics, Electrotechnical University, Saint-Petersburg, Russian Federation.
34.
Zurück zum Zitat Biel, L., Pettersson, O., Philipson, L., & Wide, P. (1999). ECG analysis: A new approach in human identification. In Proceedings of the 16th IEEE instrumentation and measurement technology conference (vol. 1, pp. 557–561). Biel, L., Pettersson, O., Philipson, L., & Wide, P. (1999). ECG analysis: A new approach in human identification. In Proceedings of the 16th IEEE instrumentation and measurement technology conference (vol. 1, pp. 557–561).
35.
Zurück zum Zitat Irvine, J. M., Israel, S. A., Scruggs, W. T., & Worek, W. J. (2008). eigenPulse: Robust human identification from cardiovascular function. Pattern Recognition, 41(11), 3427–3435.CrossRef Irvine, J. M., Israel, S. A., Scruggs, W. T., & Worek, W. J. (2008). eigenPulse: Robust human identification from cardiovascular function. Pattern Recognition, 41(11), 3427–3435.CrossRef
36.
Zurück zum Zitat Wang, Y., Agrafioti, F., Hatzinakos, D., & Plataniotis, K. N. (2008). Analysis of human electrocardiogram for biometric recognition. EURASIP Journal on Advance Signal Process, 2008, 148658.CrossRefMATH Wang, Y., Agrafioti, F., Hatzinakos, D., & Plataniotis, K. N. (2008). Analysis of human electrocardiogram for biometric recognition. EURASIP Journal on Advance Signal Process, 2008, 148658.CrossRefMATH
37.
Zurück zum Zitat Fang, S.-C., & Chan, H.-L. (2009). Human identification by quantifying similarity and dissimilarity in electrocardiogram phase space. Pattern Recognition, 42(9), 1824–1831.CrossRef Fang, S.-C., & Chan, H.-L. (2009). Human identification by quantifying similarity and dissimilarity in electrocardiogram phase space. Pattern Recognition, 42(9), 1824–1831.CrossRef
38.
Zurück zum Zitat Plataniotis, K. N., Hatzinakos, D., & Lee, J. K. M. (2006). ECG biometric recognition without fiducial detection. In Biometric consortium conference (2006). Biometrics symposium: Special session on research at the (pp. 1–6). Plataniotis, K. N., Hatzinakos, D., & Lee, J. K. M. (2006). ECG biometric recognition without fiducial detection. In Biometric consortium conference (2006). Biometrics symposium: Special session on research at the (pp. 1–6).
39.
Zurück zum Zitat Wang, J., She, M., Nahavandi, S., & Kouzani, A. (2013). Human identification from ECG signals via sparse representation of local segments. IEEE Signal Processing Letters, 20(10), 937–940.CrossRef Wang, J., She, M., Nahavandi, S., & Kouzani, A. (2013). Human identification from ECG signals via sparse representation of local segments. IEEE Signal Processing Letters, 20(10), 937–940.CrossRef
40.
Zurück zum Zitat Israel, S. A., Irvine, J. M., Cheng, A., Wiederhold, M. D., & Wiederhold, B. K. (2005). {ECG} to identify individuals. Pattern Recognition, 38(1), 133–142.CrossRef Israel, S. A., Irvine, J. M., Cheng, A., Wiederhold, M. D., & Wiederhold, B. K. (2005). {ECG} to identify individuals. Pattern Recognition, 38(1), 133–142.CrossRef
41.
Zurück zum Zitat Singh, Y., & Singh, S. (2012). Evaluation of electrocardiogram for biometric authentication. Journal of Information Security, 3(1), 39–48.CrossRef Singh, Y., & Singh, S. (2012). Evaluation of electrocardiogram for biometric authentication. Journal of Information Security, 3(1), 39–48.CrossRef
42.
Zurück zum Zitat Callaway, E., Gorday, P., Hester, L., Gutierrez, J., Naeve, M., Heile, B., et al. (2002). Home networking with IEEE 802.15.4: A developing standard for low-rate wireless personal area networks. IEEE Communications Magazine, 40(8), 70–77.CrossRef Callaway, E., Gorday, P., Hester, L., Gutierrez, J., Naeve, M., Heile, B., et al. (2002). Home networking with IEEE 802.15.4: A developing standard for low-rate wireless personal area networks. IEEE Communications Magazine, 40(8), 70–77.CrossRef
43.
Zurück zum Zitat Peters, P. R. M. A review of ProVerif as an automatic securityprotocol verifier. Http://agoraproject.eu/papers/A review ofProVerif as an automatic security protocol verifier.pdf, Access in November 14, 2015. Peters, P. R. M. A review of ProVerif as an automatic securityprotocol verifier. Http://agoraproject.eu/papers/A review ofProVerif as an automatic security protocol verifier.pdf, Access in November 14, 2015.
44.
Zurück zum Zitat Blanchet, B. & Chaudhuri, A. (2008). Automated formal analysis of a protocol for secure file sharing on untrusted storage. In Proceedings of the 29th IEEE symposium on security and privacy (pp. 417–431). Blanchet, B. & Chaudhuri, A. (2008). Automated formal analysis of a protocol for secure file sharing on untrusted storage. In Proceedings of the 29th IEEE symposium on security and privacy (pp. 417–431).
45.
Zurück zum Zitat Kusters, R., & Truderung, T. (2009). Using proverif to analyze protocols with diffie-hellman exponentiation. In 22nd IEEE computer security foundations symposium (pp. 157–171). Kusters, R., & Truderung, T. (2009). Using proverif to analyze protocols with diffie-hellman exponentiation. In 22nd IEEE computer security foundations symposium (pp. 157–171).
Metadaten
Titel
Lightweight Security Protocol for ECG Bio-Sensors
verfasst von
Hussam Al-Hamadi
Amjad Gawanmeh
Joonsang Baek
Mahmoud Al-Qutayri
Publikationsdatum
19.04.2017
Verlag
Springer US
Erschienen in
Wireless Personal Communications / Ausgabe 4/2017
Print ISSN: 0929-6212
Elektronische ISSN: 1572-834X
DOI
https://doi.org/10.1007/s11277-017-4147-x

Weitere Artikel der Ausgabe 4/2017

Wireless Personal Communications 4/2017 Zur Ausgabe

Neuer Inhalt