Skip to main content

2018 | OriginalPaper | Buchkapitel

The Dynamic Encryption Method Based on ECG Characteristic Value

verfasst von : Huiqian Wang, Tong Bai, Yu Pang, Wei Wang, Jinzhao Lin, Guoquan Li, Qianneng Zhou, Zhangyong Li, Xiaoming Jiang

Erschienen in: Communications, Signal Processing, and Systems

Verlag: Springer Singapore

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Body area network (BAN) is a key technology of solving remote medical, where protecting security of vital signs information is a very important technique requirement. This paper presents a data security scheme based on ECG characteristics, investigating methods of the circuit-level data encryption and dynamic key refreshment due to the obtained ECG signal characteristic value. The proposed scheme is constructed from the inherent features of the BAN system, adopting vital information from security protection, which has advantages of high strength, low cost, and easy implementation. Therefore, the scheme helps to design low-power sensor nodes and provides theoretical support and engineering implementation.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat H. Chan, A. Perrig, D. Song, Random key predistribution schemes for sensor networks, in Symposium on Security and Privacy (2003), pp. 197–213 H. Chan, A. Perrig, D. Song, Random key predistribution schemes for sensor networks, in Symposium on Security and Privacy (2003), pp. 197–213
2.
Zurück zum Zitat L. Shi, M. Li, S. Yu, J. Yuan, BANA: body area network authentication exploiting channel characteristics. IEEE J. Sel. Areas Commun. 31(9), 1803–1816 (2013)CrossRef L. Shi, M. Li, S. Yu, J. Yuan, BANA: body area network authentication exploiting channel characteristics. IEEE J. Sel. Areas Commun. 31(9), 1803–1816 (2013)CrossRef
3.
Zurück zum Zitat S. Bao, Y. Zhang, L. Shen, Physiological signal based entity authentication for body area sensor networks and mobile healthcare systems, in Proceedings of the 27th Annual International Conference of the IEEE Engineering in Medicine and Biology Society (2005), pp. 2455–2458 S. Bao, Y. Zhang, L. Shen, Physiological signal based entity authentication for body area sensor networks and mobile healthcare systems, in Proceedings of the 27th Annual International Conference of the IEEE Engineering in Medicine and Biology Society (2005), pp. 2455–2458
4.
Zurück zum Zitat Z. Zhang, H. Wang, A.V. Vasilakos, H. Fang, ECG-cryptography and authentication in body area networks. IEEE Trans. Inf. Technol. Biomed. 16(6), 1070–1078 (2012)CrossRef Z. Zhang, H. Wang, A.V. Vasilakos, H. Fang, ECG-cryptography and authentication in body area networks. IEEE Trans. Inf. Technol. Biomed. 16(6), 1070–1078 (2012)CrossRef
5.
Zurück zum Zitat K. Venkatasubramanian, A. Banerjee, S.K.S. Gupta, Plethysmogram-based secure inter-sensor communication in body area networks, in Proceedings of the IEEE Military Communications Conference (2008), pp. 1–7 K. Venkatasubramanian, A. Banerjee, S.K.S. Gupta, Plethysmogram-based secure inter-sensor communication in body area networks, in Proceedings of the IEEE Military Communications Conference (2008), pp. 1–7
6.
Zurück zum Zitat K. Venkatasubramanian, A. Banerjee, S.K.S. Gupta, EKG-based key agreement in body sensor networks, in Proceedings of the 2nd Workshop Mission Critical Networks (2008), pp. 1–6 K. Venkatasubramanian, A. Banerjee, S.K.S. Gupta, EKG-based key agreement in body sensor networks, in Proceedings of the 2nd Workshop Mission Critical Networks (2008), pp. 1–6
7.
Zurück zum Zitat K. Venkatasubramanian, A. Banerjee, S. Gupta, PSKA: usable and secure key agreement scheme for body area networks. IEEE Trans. Inf. Technol. Biomed. 14(1), 60–68 (2010)CrossRef K. Venkatasubramanian, A. Banerjee, S. Gupta, PSKA: usable and secure key agreement scheme for body area networks. IEEE Trans. Inf. Technol. Biomed. 14(1), 60–68 (2010)CrossRef
8.
Zurück zum Zitat S. Cherukuri, K. Venkatasubramanian, S. Gupta, Biosec: a biometric based approach for securing communication in wireless networks of biosensors implanted in the human body, in International Conference on Parallel Processing Workshops (2003), pp. 432–439 S. Cherukuri, K. Venkatasubramanian, S. Gupta, Biosec: a biometric based approach for securing communication in wireless networks of biosensors implanted in the human body, in International Conference on Parallel Processing Workshops (2003), pp. 432–439
9.
Zurück zum Zitat H. Wang, H. Fang, L. Xing, M. Chen, An integrated biometric-based security framework using wavelet-domain HMM in wireless body area networks, in IEEE International Conference on Communications (2011), pp. 1–5 H. Wang, H. Fang, L. Xing, M. Chen, An integrated biometric-based security framework using wavelet-domain HMM in wireless body area networks, in IEEE International Conference on Communications (2011), pp. 1–5
10.
Zurück zum Zitat S. Ali, V. Sivaraman, D. Ostry, Secret key generation rate vs. reconciliation cost using wireless channel characteristics in body area networks, in IEEE/IFIP International Conference on Embedded and Ubiquitous Computing (2010), pp. 644–650 S. Ali, V. Sivaraman, D. Ostry, Secret key generation rate vs. reconciliation cost using wireless channel characteristics in body area networks, in IEEE/IFIP International Conference on Embedded and Ubiquitous Computing (2010), pp. 644–650
11.
Zurück zum Zitat S. Jana, S.N. Premnath, M. Clark, S. Kasera, N. Patwari, S. Krishnamurthy, On the effectiveness of secret key extraction using wireless signal strength in real environments, in International Conference on Mobile Computing and Networking (2009), pp. 321–332 S. Jana, S.N. Premnath, M. Clark, S. Kasera, N. Patwari, S. Krishnamurthy, On the effectiveness of secret key extraction using wireless signal strength in real environments, in International Conference on Mobile Computing and Networking (2009), pp. 321–332
Metadaten
Titel
The Dynamic Encryption Method Based on ECG Characteristic Value
verfasst von
Huiqian Wang
Tong Bai
Yu Pang
Wei Wang
Jinzhao Lin
Guoquan Li
Qianneng Zhou
Zhangyong Li
Xiaoming Jiang
Copyright-Jahr
2018
Verlag
Springer Singapore
DOI
https://doi.org/10.1007/978-981-10-3229-5_46

Neuer Inhalt