Skip to main content

01.10.2011 | ORIGINAL PAPER

A Lightweight Security Scheme for Wireless Body Area Networks: Design, Energy Evaluation and Proposed Microprocessor Design

Erschienen in: Journal of Medical Systems | Ausgabe 5/2011

Einloggen, um Zugang zu erhalten

Abstract

In order for wireless body area networks to meet widespread adoption, a number of security implications must be explored to promote and maintain fundamental medical ethical principles and social expectations. As a result, integration of security functionality to sensor nodes is required. Integrating security functionality to a wireless sensor node increases the size of the stored software program in program memory, the required time that the sensor’s microprocessor needs to process the data and the wireless network traffic which is exchanged among sensors. This security overhead has dominant impact on the energy dissipation which is strongly related to the lifetime of the sensor, a critical aspect in wireless sensor network (WSN) technology. Strict definition of the security functionality, complete hardware model (microprocessor and radio), WBAN topology and the structure of the medium access control (MAC) frame are required for an accurate estimation of the energy that security introduces into the WBAN. In this work, we define a lightweight security scheme for WBAN, we estimate the additional energy consumption that the security scheme introduces to WBAN based on commercial available off-the-shelf hardware components (microprocessor and radio), the network topology and the MAC frame. Furthermore, we propose a new microcontroller design in order to reduce the energy consumption of the system. Experimental results and comparisons with other works are given.
Literatur
1.
Zurück zum Zitat Sana Ullah, Henry Higgins, Bart Braem, Benoit Latre, Chris Blondia, Ingrid Moerman, Shahnaz Saleem, Ziaur Rahman, Kyung Kwak, “A Comprehensive Survey of Wireless Body Area Networks”, Journal of Medical Systems, pp. 1–30, (2010). Sana Ullah, Henry Higgins, Bart Braem, Benoit Latre, Chris Blondia, Ingrid Moerman, Shahnaz Saleem, Ziaur Rahman, Kyung Kwak, “A Comprehensive Survey of Wireless Body Area Networks”, Journal of Medical Systems, pp. 1–30, (2010).
4.
Zurück zum Zitat L. Buttyan and J. P. Hubaux, “Security and Cooperation in Wireless Networks: Thwarting Malicious and Selfish Behavior in the Age of Ubiquitous Computing”, Cambridge University Press, (2007). L. Buttyan and J. P. Hubaux, “Security and Cooperation in Wireless Networks: Thwarting Malicious and Selfish Behavior in the Age of Ubiquitous Computing”, Cambridge University Press, (2007).
5.
Zurück zum Zitat A. Perrig, R. Szewczyk, V. Wen, D. Culler, and D. Tygar, “SPINS: Security Protocols for Sensor Networks, in Wireless Networks”, Mobicom, pp. 189–199, (2001). A. Perrig, R. Szewczyk, V. Wen, D. Culler, and D. Tygar, “SPINS: Security Protocols for Sensor Networks, in Wireless Networks”, Mobicom, pp. 189–199, (2001).
6.
Zurück zum Zitat A. Hodjat and I. Verbauwhede, “The energy cost of secrets in ad-hoc networks”, Proc. IEEE CAS Workshop on Wireless Communication and Networking, (2002). A. Hodjat and I. Verbauwhede, “The energy cost of secrets in ad-hoc networks”, Proc. IEEE CAS Workshop on Wireless Communication and Networking, (2002).
7.
Zurück zum Zitat Ng, H. S., Sim, M. L., and Tan, C. M., Security issues of wireless sensor networks in healthcare applications. BT Technology Journal 24(2):138–144, 2006.CrossRef Ng, H. S., Sim, M. L., and Tan, C. M., Security issues of wireless sensor networks in healthcare applications. BT Technology Journal 24(2):138–144, 2006.CrossRef
8.
Zurück zum Zitat D. Singelée, B. Latré, B. Braem, M. Peeters, M. De Soete, P. De Cleyn, B. Preneel, I. Moerman, C. Blondia, “A Secure Cross-Layer Protocol for Multi-hop Wireless Body Area Networks”, ADHOC-NOW, pp. 94–107, (2008). D. Singelée, B. Latré, B. Braem, M. Peeters, M. De Soete, P. De Cleyn, B. Preneel, I. Moerman, C. Blondia, “A Secure Cross-Layer Protocol for Multi-hop Wireless Body Area Networks”, ADHOC-NOW, pp. 94–107, (2008).
9.
Zurück zum Zitat S. Cherukuri, K. Venkatasubramanian, and S. K. S. Gupta, “BioSec: A Biometric Based Approach for Securing Communication in Wireless Networks of Biosensors Implanted in the Human Body”, in Proc. of Wireless Security and Privacy Workshop, pp. 432 – 439, (2003). S. Cherukuri, K. Venkatasubramanian, and S. K. S. Gupta, “BioSec: A Biometric Based Approach for Securing Communication in Wireless Networks of Biosensors Implanted in the Human Body”, in Proc. of Wireless Security and Privacy Workshop, pp. 432 – 439, (2003).
11.
Zurück zum Zitat National Institute of Standards and Technology (NIST), “NIST Special Publication 800–38 C, Recommendation for Block Cipher Modes of Operation: the CCM Mode for Authentication and Confidentiality”, (2004). National Institute of Standards and Technology (NIST), “NIST Special Publication 800–38 C, Recommendation for Block Cipher Modes of Operation: the CCM Mode for Authentication and Confidentiality”, (2004).
13.
Zurück zum Zitat Nordic Semiconductor, nRF24L01, single chip 2.4 GHz Tranceiver, (2007). Nordic Semiconductor, nRF24L01, single chip 2.4 GHz Tranceiver, (2007).
14.
Zurück zum Zitat J. Jonsson, “On the Security of CTR + CBC-MAC”, selected Areas in Cryptography, (2002). J. Jonsson, “On the Security of CTR + CBC-MAC”, selected Areas in Cryptography, (2002).
15.
Zurück zum Zitat Georgios Selimis, Mario Konijnenburg, Maryam Ashouei, Jos Huisken, Harmke de Groot, Vincent van der Leest, Geert-Jan Schrijen, Marten van Hulst and Pim Tuyls, “Evaluation of 90 nm 6 T-SRAM as Physical Unclonable Function for Secure Key Generation in Wireless Sensor Nodes”, in proceedings of IEEE ISCAS Brazil, (2011). Georgios Selimis, Mario Konijnenburg, Maryam Ashouei, Jos Huisken, Harmke de Groot, Vincent van der Leest, Geert-Jan Schrijen, Marten van Hulst and Pim Tuyls, “Evaluation of 90 nm 6 T-SRAM as Physical Unclonable Function for Secure Key Generation in Wireless Sensor Nodes”, in proceedings of IEEE ISCAS Brazil, (2011).
16.
Zurück zum Zitat R. Min and A. Chandrakasan, “Top Five Myths about the Energy Consumption of Wireless Communication”, in ACM Sigmobile Mobile Communication and Communications Review, pp. 65–67, (2002). R. Min and A. Chandrakasan, “Top Five Myths about the Energy Consumption of Wireless Communication”, in ACM Sigmobile Mobile Communication and Communications Review, pp. 65–67, (2002).
18.
Zurück zum Zitat Feldhofer, M., Wolkerstorfer, J., and Rijmen, V., “AES Implementation on a Grain of Sand”, IEE Proceedings on Information Security. Volume 152:13–20, 2005. Feldhofer, M., Wolkerstorfer, J., and Rijmen, V., “AES Implementation on a Grain of Sand”, IEE Proceedings on Information Security. Volume 152:13–20, 2005.
19.
Zurück zum Zitat J.-P. Kaps, and B. Sunar, “Energy Comparison of AES and SHA-1for Ubiquitous Computing”, in Proceedings of Emerging directions in embedded and ubiquitous computing (EUC 2006 Workshops), pp. 372–381, (2006). J.-P. Kaps, and B. Sunar, “Energy Comparison of AES and SHA-1for Ubiquitous Computing”, in Proceedings of Emerging directions in embedded and ubiquitous computing (EUC 2006 Workshops), pp. 372–381, (2006).
20.
Zurück zum Zitat N. Suarez, G. M. Callico, R. Sarmiento, O. Santana, and A. A. Abbo, “Processor Customization for Software Implementation of the AES algorithm for Wireless Sensor Networks”, pp. 326–335, Patmos, (2009). N. Suarez, G. M. Callico, R. Sarmiento, O. Santana, and A. A. Abbo, “Processor Customization for Software Implementation of the AES algorithm for Wireless Sensor Networks”, pp. 326–335, Patmos, (2009).
23.
Zurück zum Zitat A. Becher, Z. Benenson, and M. Dornseif, “Tampering with motes: Real-world physical attacks on wireless sensor networks”, in Proceedings of SPC, pp.114-118, (2006). A. Becher, Z. Benenson, and M. Dornseif, “Tampering with motes: Real-world physical attacks on wireless sensor networks”, in Proceedings of SPC, pp.114-118, (2006).
Metadaten
Titel
A Lightweight Security Scheme for Wireless Body Area Networks: Design, Energy Evaluation and Proposed Microprocessor Design
Publikationsdatum
01.10.2011
Erschienen in
Journal of Medical Systems / Ausgabe 5/2011
Print ISSN: 0148-5598
Elektronische ISSN: 1573-689X
DOI
https://doi.org/10.1007/s10916-011-9669-2