The Research of Secure Transport Protocol Based on Node's Clock Characteristics for Body Area Networks

被引:2
|
作者
Tan Jin [1 ]
Wang Yijing [1 ]
机构
[1] China Ji Liang Univ, Informat Coll, Hangzhou 310018, Peoples R China
关键词
Body Area Networks; Clock Skew; Symmetric Key; Secure Protocol;
D O I
10.14257/ijsia.2014.8.5.39
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The data security and privacy are key issues, as well as the security measures of clinical application are desired to be simple operations of "plug and play" for wireless body area networks (BAN). In this paper; a secure multi-hop data transmission protocol based on combination of node's clock characteristics and properties of the BAN/BSN is presented without relying on any pre-distributed secret information. First, through exchanging clock frequency (CF) among node x, its neighbor i and sink in a safe environment, the pair-wise K-x between node x and sink is generated with CF of x and is used to encrypt data sensed by x; the pair-wise K-xi, or K-ix between x and i is generated with clock skew of two nodes is used to encrypt route information; Second, the RREQ and RREP messages of AODV protocol is improved, and creates a secure route only composed of legal nodes through authenticating nodes with CFs of two adjacent nodes; Finally, the data packet produced by source x is divided into Datal and Data2, Data2 is the being sensed data encrypted with K-x, and Datal encrypted with K-xi, or K-ix includes source, destination, generated time of data and other information, the intermediate node needs to encrypt Datal again after decrypting Datal to obtain route information, and transmits this data packet to sink with hop-by-hop. This protocol has good security in dynamics and accuracy of keys, avoiding passive and active attacks, preventing node capture and supporting new node joining through security analysis, and has accepted overheads of memory, computation and energy consumption by means of performance analysis; it satisfies the requirements of "plug and play" without added node's hardware and pre-load any keys, makes the complicated data security and privacy in the BAN/BSN become operable easily and practicable strongly.
引用
收藏
页码:457 / 469
页数:13
相关论文
共 50 条
  • [1] Secure Precise Clock Synchronization for Interconnected Body Area Networks
    DavidSanchez Sanchez
    Luis Alonso
    Pantelis Angelidis
    Christos Verikoukis
    EURASIP Journal on Wireless Communications and Networking, 2011
  • [2] Secure Precise Clock Synchronization for Interconnected Body Area Networks
    Sanchez Sanchez, David
    Alonso, Luis
    Angelidis, Pantelis
    Verikoukis, Christos
    EURASIP JOURNAL ON WIRELESS COMMUNICATIONS AND NETWORKING, 2011,
  • [3] A secure protocol for patient monitoring in wireless body area networks
    Tyagi, Pooja
    Kumari, Saru
    Gupta, Mridul Kumar
    Chen, Chien-Ming
    Wu, Tsu-Yang
    Kumar, Sachin
    CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2023, 35 (10):
  • [4] A Secure Low-Delay Protocol for Wireless Body Area Networks
    Singelee, Dave
    Latre, Benoit
    Braem, Bart
    Peeters, Michael
    De Soete, Marijke
    De Cleyn, Peter
    Preneel, Bart
    Moerman, Ingrid
    Blondia, Chris
    AD HOC & SENSOR WIRELESS NETWORKS, 2010, 9 (1-2) : 53 - 72
  • [5] Secure and Efficient Data Communication Protocol for Wireless Body Area Networks
    Hu, Chunqiang
    Li, Hongjuan
    Huo, Yan
    Xiang, Tao
    Liao, Xiaofeng
    IEEE TRANSACTIONS ON MULTI-SCALE COMPUTING SYSTEMS, 2016, 2 (02): : 94 - 107
  • [6] A Lightweight and Secure Anonymous User Authentication Protocol for Wireless Body Area Networks
    Zhang, Junsong
    Zhang, Qikun
    Li, Zhigang
    Lu, Xianling
    Gan, Yong
    SECURITY AND COMMUNICATION NETWORKS, 2021, 2021
  • [7] A Secure Three-Party Authentication Protocol for Wireless Body Area Networks
    Vishwakarma, Rahul
    Mohapatra, Ramesh Kumar
    2017 IEEE 3RD INTERNATIONAL CONFERENCE ON SENSING, SIGNAL PROCESSING AND SECURITY (ICSSS), 2017, : 99 - 103
  • [8] LSNCP: Lightweight and Secure Numeric Comparison Protocol for Wireless Body Area Networks
    Yin, Haotian
    Huang, Xin
    Xing, Bin
    Huang, Jiajia
    Sun, Xiaoxin
    Li, Jianshuang
    Chai, Sheng
    Zhang, Di
    Bakar, Rana Abu
    Wang, Wei
    IEEE INTERNET OF THINGS JOURNAL, 2023, 10 (15) : 13247 - 13263
  • [9] SeAK: Secure Authentication and Key Generation Protocol Based on Dual Antennas for Wireless Body Area Networks
    Javali, Chitra
    Revadigar, Girish
    Libman, Lavy
    Jha, Sanjay
    RADIO FREQUENCY IDENTIFICATION: SECURITY AND PRIVACY ISSUES, RFIDSEC 2014, 2014, 8651 : 74 - 89
  • [10] A biometric-based secure, energy efficient, lightweight authentication protocol for wireless body area networks
    Vandana, T. Santhi
    Venkateswarlu, S.
    Vandana, T. Santhi (chary60@gmail.com), 1600, Inderscience Publishers (10): : 319 - 330