Skip to main content
Erschienen in: Journal of Medical Systems 10/2015

01.10.2015 | Patient Facing Systems

Key Agreement Schemes in Wireless Body Area Networks: Taxonomy and State-of-the-Art

verfasst von: Aftab Ali, Farrukh Aslam Khan

Erschienen in: Journal of Medical Systems | Ausgabe 10/2015

Einloggen, um Zugang zu erhalten

Abstract

Advances in wearable and implantable biosensors have enabled the applicability and usability of wireless body area networks (WBANs). A WBAN allows biosensors to collect and communicate human physiological data using wireless communication. The communication security of the collected data in WBAN is a major concern. Because of the dependability of cryptographic schemes for key management, these have become an important aspect of this security. However, the extremely constrained nature of biosensors has made designing key management schemes a challenging task. For this reason, many lightweight key management schemes have been proposed to overcome these constraints. In this article, we present a review of the state of the art of these solutions. We classify the WBAN schemes into three classes and evaluate them based on adequate metrics for key management in WBAN.
Literatur
1.
Zurück zum Zitat Paradiso, R., Loriga, G., and Taccini, N., A wearable health care system based on knitted integrated sensors. IEEE Trans. Info. Technol. Biomed 9(3):337–344, 2005.CrossRef Paradiso, R., Loriga, G., and Taccini, N., A wearable health care system based on knitted integrated sensors. IEEE Trans. Info. Technol. Biomed 9(3):337–344, 2005.CrossRef
2.
Zurück zum Zitat Djenouri, D., Khelladi, L., and Badache, N., A survey of security issues in mobile ad hoc and sensor networks. IEEE Commun. Surv. Tutorials 7(4):2–28, 2005.CrossRef Djenouri, D., Khelladi, L., and Badache, N., A survey of security issues in mobile ad hoc and sensor networks. IEEE Commun. Surv. Tutorials 7(4):2–28, 2005.CrossRef
3.
Zurück zum Zitat Wang, Y., Attebury, G., and Ramamurthy, B., A survey of security issues in wireless sensor networks. IEEE Commun. Surv. Tutorials 8(2):2–23, 2006.CrossRef Wang, Y., Attebury, G., and Ramamurthy, B., A survey of security issues in wireless sensor networks. IEEE Commun. Surv. Tutorials 8(2):2–23, 2006.CrossRef
4.
Zurück zum Zitat Perrig, A., Szewczyk, R., Tygar, J. D., Wen, V., and Culler, D., SPINS: Security protocol for sensor networks. Wirel. Netw 8(5):521–534, 2002.CrossRef Perrig, A., Szewczyk, R., Tygar, J. D., Wen, V., and Culler, D., SPINS: Security protocol for sensor networks. Wirel. Netw 8(5):521–534, 2002.CrossRef
5.
Zurück zum Zitat Eschenauer, L. and Gligor, V. D., A key-management scheme for distributed sensor networks. Proc. of the Ninth Conference on Computer and Communications Security (CCS’02). ACM, Washington DC, USA, 41–47, 2002. Eschenauer, L. and Gligor, V. D., A key-management scheme for distributed sensor networks. Proc. of the Ninth Conference on Computer and Communications Security (CCS’02). ACM, Washington DC, USA, 41–47, 2002.
6.
Zurück zum Zitat Zhu, S., Setia, S., and Jajodia, S., LEAP+: Efficient security mechanisms for large-scale distributed sensor networks. ACM Tran. Sens. Netw. 2(4):500–528, November 2006.CrossRef Zhu, S., Setia, S., and Jajodia, S., LEAP+: Efficient security mechanisms for large-scale distributed sensor networks. ACM Tran. Sens. Netw. 2(4):500–528, November 2006.CrossRef
7.
Zurück zum Zitat Kuo, C., Luk, M., Negi, R., Perrig, A., Message-in-a-bottle: user-friendly and secure key deployment for sensor nodes. Proc. of the Fifth International Conference on Embedded Networked Sensor Systems (SenSys’07), ACM. Sydney, Australia, 233–246, 2007. Kuo, C., Luk, M., Negi, R., Perrig, A., Message-in-a-bottle: user-friendly and secure key deployment for sensor nodes. Proc. of the Fifth International Conference on Embedded Networked Sensor Systems (SenSys’07), ACM. Sydney, Australia, 233–246, 2007.
8.
Zurück zum Zitat Simplício, M. A., Jr., Barreto, P. S. L. M., Margi, C. B., and Carvalho, T. C. M. B., A survey on key management mechanisms for distributed Wireless Sensor Networks. Comput. Netw. 54(15):2591–2612, 2010.CrossRef Simplício, M. A., Jr., Barreto, P. S. L. M., Margi, C. B., and Carvalho, T. C. M. B., A survey on key management mechanisms for distributed Wireless Sensor Networks. Comput. Netw. 54(15):2591–2612, 2010.CrossRef
9.
Zurück zum Zitat Chen, M., Gonzalez, S., Vasilakos, A., Cao, H., and Leung, V. M., Body Area Networks: A survey. Mobile Netw. Appl. 16(2):171–193, 2011.CrossRef Chen, M., Gonzalez, S., Vasilakos, A., Cao, H., and Leung, V. M., Body Area Networks: A survey. Mobile Netw. Appl. 16(2):171–193, 2011.CrossRef
10.
Zurück zum Zitat Ullah, S., Higgins, H., Braem, B., Latre, B., Blondia, C., Moerman, I., Saleem, S., Rahman, Z., and Kwak, K., A comprehensive survey of Wireless Body Area Networks. J. Med. Syst. 36(3):1065–1094, 2012.CrossRefPubMed Ullah, S., Higgins, H., Braem, B., Latre, B., Blondia, C., Moerman, I., Saleem, S., Rahman, Z., and Kwak, K., A comprehensive survey of Wireless Body Area Networks. J. Med. Syst. 36(3):1065–1094, 2012.CrossRefPubMed
11.
Zurück zum Zitat Latré, B., Braem, B., Moerman, I., Blondia, C., and Demeester, P., A survey on wireless body area networks. Wirel. Netw 17(1):1–18, 2011.CrossRef Latré, B., Braem, B., Moerman, I., Blondia, C., and Demeester, P., A survey on wireless body area networks. Wirel. Netw 17(1):1–18, 2011.CrossRef
12.
Zurück zum Zitat Li, M., Wenjing, L., and Kui, R., Data security and privacy in wireless body area networks. IEEE Wirel. Commun. 17(1):51–58, 2010.CrossRef Li, M., Wenjing, L., and Kui, R., Data security and privacy in wireless body area networks. IEEE Wirel. Commun. 17(1):51–58, 2010.CrossRef
13.
Zurück zum Zitat Ameen, M., Liu, J., and Kwak, K., Security and privacy issues in wireless sensor networks for healthcare applications. J. Med. Syst. 36(1):93–101, 2012.PubMedCentralCrossRefPubMed Ameen, M., Liu, J., and Kwak, K., Security and privacy issues in wireless sensor networks for healthcare applications. J. Med. Syst. 36(1):93–101, 2012.PubMedCentralCrossRefPubMed
14.
Zurück zum Zitat Irum, S., Ali, A., Khan, F. A., and Abbas, H., A hybrid security mechanism for intra-WBAN and inter-WBAN communications. Int. J. Distrib. Sens. Netw 2013:11, 2013. Article ID 842608.CrossRef Irum, S., Ali, A., Khan, F. A., and Abbas, H., A hybrid security mechanism for intra-WBAN and inter-WBAN communications. Int. J. Distrib. Sens. Netw 2013:11, 2013. Article ID 842608.CrossRef
15.
Zurück zum Zitat Ali, A., and Khan, F. A., Energy-efficient cluster-based security mechanism for intra-WBAN and inter-WBAN communications for healthcare applications. EURASIP J. Wirel. Commun. Netw. 2013:216, 2013. doi:10.1186/1687-1499-2013-216.CrossRef Ali, A., and Khan, F. A., Energy-efficient cluster-based security mechanism for intra-WBAN and inter-WBAN communications for healthcare applications. EURASIP J. Wirel. Commun. Netw. 2013:216, 2013. doi:10.​1186/​1687-1499-2013-216.CrossRef
16.
Zurück zum Zitat Juels, A., and Wattenberg, M., A fuzzy commitment scheme. Proc. of the 6th ACM Conference on Computer and Communications Security (CCS’99), ACM, Singapore, 28–36, 1999. Juels, A., and Wattenberg, M., A fuzzy commitment scheme. Proc. of the 6th ACM Conference on Computer and Communications Security (CCS’99), ACM, Singapore, 28–36, 1999.
17.
Zurück zum Zitat Chunqiang, H., Xiuzhen, C., Fan, Z., Dengyuan, W., Xiaofeng, L., and Dechang, C., OPFKA: Secure and efficient ordered-physiological feature-based key agreement for wireless body area networks. Proc. of IEEE INFOCOM’13, Turin, Italy, pp. 2274–2282, 2013. Chunqiang, H., Xiuzhen, C., Fan, Z., Dengyuan, W., Xiaofeng, L., and Dechang, C., OPFKA: Secure and efficient ordered-physiological feature-based key agreement for wireless body area networks. Proc. of IEEE INFOCOM’13, Turin, Italy, pp. 2274–2282, 2013.
18.
Zurück zum Zitat Venkatasubramanian, K. K., Banerjee, A., and Gupta, S. K. S., Plethysmogram-based secure inter-sensor communication in body area networks. Proc. of Military Communications Conference (MILCOM’08), IEEE, San Diego, CA, USA, 1–7, 2008. Venkatasubramanian, K. K., Banerjee, A., and Gupta, S. K. S., Plethysmogram-based secure inter-sensor communication in body area networks. Proc. of Military Communications Conference (MILCOM’08), IEEE, San Diego, CA, USA, 1–7, 2008.
19.
Zurück zum Zitat Venkatasubramanian, K. K., Banerjee, A., and Gupta, S. K. S., PSKA: Usable and secure key agreement scheme for body area networks. IEEE Trans. Inf. Technol. Biomed. 14(1):60–68, 2010.CrossRefPubMed Venkatasubramanian, K. K., Banerjee, A., and Gupta, S. K. S., PSKA: Usable and secure key agreement scheme for body area networks. IEEE Trans. Inf. Technol. Biomed. 14(1):60–68, 2010.CrossRefPubMed
20.
Zurück zum Zitat Venkatasubramanian, K. K., Banerjee, A., and Gupta, S. K. S., Green and sustainable cyber-physical security solutions for body area networks. Proc. of Sixth International Workshop on Wearable and Implantable Body Sensor Networks, IEEE, Berkeley, CA, USA, 240–245, 2009. Venkatasubramanian, K. K., Banerjee, A., and Gupta, S. K. S., Green and sustainable cyber-physical security solutions for body area networks. Proc. of Sixth International Workshop on Wearable and Implantable Body Sensor Networks, IEEE, Berkeley, CA, USA, 240–245, 2009.
21.
Zurück zum Zitat Juels, A. and Sudan, M., A fuzzy vault scheme. Proc. Of International Symposium on Information Theory (ISIT’02), IEEE, Lausanne, Switzerland, 2002. Juels, A. and Sudan, M., A fuzzy vault scheme. Proc. Of International Symposium on Information Theory (ISIT’02), IEEE, Lausanne, Switzerland, 2002.
22.
Zurück zum Zitat Zhang, G.H., Poon, C.C.Y. and Zhang, Y.T., A fast key generation method based on dynamic biometrics to secure wireless body sensor networks for p-health. Proc. Annual International Conference of the Engineering in Medicine and Biology Society (EMBC), IEEE, Buenos Aires, Argentina, 2034–2036, 2010. Zhang, G.H., Poon, C.C.Y. and Zhang, Y.T., A fast key generation method based on dynamic biometrics to secure wireless body sensor networks for p-health. Proc. Annual International Conference of the Engineering in Medicine and Biology Society (EMBC), IEEE, Buenos Aires, Argentina, 2034–2036, 2010.
23.
Zurück zum Zitat Fen, M., Lei, J.,Ye, L., and Yuan-Ting, Z., Biometrics based novel key distribution solution for body sensor networks. Proc. of Annual International Conference of the Engineering in Medicine and Biology Society (EMBC), IEEE, Minneapolis, MN, 2458–2461, 2009. Fen, M., Lei, J.,Ye, L., and Yuan-Ting, Z., Biometrics based novel key distribution solution for body sensor networks. Proc. of Annual International Conference of the Engineering in Medicine and Biology Society (EMBC), IEEE, Minneapolis, MN, 2458–2461, 2009.
24.
Zurück zum Zitat Shu-Di, B., Poon, C. C. Y., Yuan-Ting, Z., and Lian-feng, S., Using the timing information of heartbeats as an entity identifier to secure body sensor network. IEEE Trans. Inf. Technol. Biomed. 12(6):772–779, 2008.CrossRef Shu-Di, B., Poon, C. C. Y., Yuan-Ting, Z., and Lian-feng, S., Using the timing information of heartbeats as an entity identifier to secure body sensor network. IEEE Trans. Inf. Technol. Biomed. 12(6):772–779, 2008.CrossRef
25.
Zurück zum Zitat Shu-Di, B., Lian-Feng, S., and Yuan-Ting, Z., A novel key distribution of body area networks for telemedicine. International Workshop on Biomedical Circuits and Systems, IEEE, Singapore, 1–17–20a, 2004. Shu-Di, B., Lian-Feng, S., and Yuan-Ting, Z., A novel key distribution of body area networks for telemedicine. International Workshop on Biomedical Circuits and Systems, IEEE, Singapore, 1–17–20a, 2004.
26.
Zurück zum Zitat Cherukuri, S., Venkatasubramanian, K.K., and Gupta, S.K.S., Biosec: A biometric based approach for securing communication in wireless networks of biosensors implanted in the human body. Proc. of International Conference on Parallel Processing Workshops, IEEE, Kaohsiung, Taiwan, 432–439, 2003. Cherukuri, S., Venkatasubramanian, K.K., and Gupta, S.K.S., Biosec: A biometric based approach for securing communication in wireless networks of biosensors implanted in the human body. Proc. of International Conference on Parallel Processing Workshops, IEEE, Kaohsiung, Taiwan, 432–439, 2003.
27.
Zurück zum Zitat Miao, F., Bao, S. D., and Li, Y., Biometric key distribution solution with energy distribution information of physiological signals for body sensor network security. IET Inf. Secur. 7(2):87–96, 2013.CrossRef Miao, F., Bao, S. D., and Li, Y., Biometric key distribution solution with energy distribution information of physiological signals for body sensor network security. IET Inf. Secur. 7(2):87–96, 2013.CrossRef
28.
Zurück zum Zitat Cun-Zhang, C., Chen-Guang, H., Shu-Di, B., and Ye, L., Improvement of fuzzy vault scheme for securing key distribution in body sensor network. Annual International Conference of the Engineering in Medicine and Biology Society (EMBC), IEEE, Boston, MA, USA, 3563–3567, 2011. Cun-Zhang, C., Chen-Guang, H., Shu-Di, B., and Ye, L., Improvement of fuzzy vault scheme for securing key distribution in body sensor network. Annual International Conference of the Engineering in Medicine and Biology Society (EMBC), IEEE, Boston, MA, USA, 3563–3567, 2011.
29.
Zurück zum Zitat Fen, M., Shu-Di, B. and Ye, L., A modified fuzzy vault scheme for biometrics-based body sensor networks security. Proc. of Global Telecommunications Conference (GLOBECOM’10), IEEE, Miami, FL, USA, 1–5, 2010. Fen, M., Shu-Di, B. and Ye, L., A modified fuzzy vault scheme for biometrics-based body sensor networks security. Proc. of Global Telecommunications Conference (GLOBECOM’10), IEEE, Miami, FL, USA, 1–5, 2010.
30.
Zurück zum Zitat Jinyang, S., Kwok-Yan, L., Ming, G., Mingze, L., and Siu-Leung, C., Towards energy-efficient secure communications using biometric key distribution in wireless biomedical healthcare networks. Proc. of 2nd International Conference on Biomedical Engineering and Informatics (BMEI’09), IEEE, Tianjin, China, 1–5, 2009. Jinyang, S., Kwok-Yan, L., Ming, G., Mingze, L., and Siu-Leung, C., Towards energy-efficient secure communications using biometric key distribution in wireless biomedical healthcare networks. Proc. of 2nd International Conference on Biomedical Engineering and Informatics (BMEI’09), IEEE, Tianjin, China, 1–5, 2009.
31.
Zurück zum Zitat Bui, F.M., and Hatzinakos, D., Resource allocation strategies for secure and efficient communications in biometrics-based body sensor networks. Proc. Of Biometrics Symposium, IEEE, Baltimore, MD, USA, 1–6, 2007. Bui, F.M., and Hatzinakos, D., Resource allocation strategies for secure and efficient communications in biometrics-based body sensor networks. Proc. Of Biometrics Symposium, IEEE, Baltimore, MD, USA, 1–6, 2007.
32.
Zurück zum Zitat Zhaoyang, Z., Honggang, W., Vasilakos, A. V., and Hua, F., ECG-cryptography and authentication in body area networks. IEEE Trans. Inf. Technol. Biomed. 16(6):1070–1078, 2012.CrossRef Zhaoyang, Z., Honggang, W., Vasilakos, A. V., and Hua, F., ECG-cryptography and authentication in body area networks. IEEE Trans. Inf. Technol. Biomed. 16(6):1070–1078, 2012.CrossRef
33.
Zurück zum Zitat Dodis, Y., Reyzin, L., and. Smith, A., Fuzzy extractors: How to generate strong keys from biometrics and other noisy data. Advances in Cryptology—EUROCRYPT’04 Lecture Notes in Computer Science, 3027:523–540, 2004. Dodis, Y., Reyzin, L., and. Smith, A., Fuzzy extractors: How to generate strong keys from biometrics and other noisy data. Advances in Cryptology—EUROCRYPT’04 Lecture Notes in Computer Science, 3027:523–540, 2004.
34.
Zurück zum Zitat Honggang, W., Hua, F., Liudong, X., and Min, C., An integrated biometric-based security framework using wavelet-domain HMM in wireless body area networks (WBAN). Proc. of International Conference on Communications (ICC), IEEE, Kyoto, Japan, 1–5, 2011. Honggang, W., Hua, F., Liudong, X., and Min, C., An integrated biometric-based security framework using wavelet-domain HMM in wireless body area networks (WBAN). Proc. of International Conference on Communications (ICC), IEEE, Kyoto, Japan, 1–5, 2011.
35.
Zurück zum Zitat Venkatasubramanian, K.K., Banerjee, A., and Gupta, S.K.S., EKGbased key agreement in body sensor networks. Proc. of IEEE INFOCOM Workshops, IEEE, Phoenix, AZ, USA, 1–6, 2008. Venkatasubramanian, K.K., Banerjee, A., and Gupta, S.K.S., EKGbased key agreement in body sensor networks. Proc. of IEEE INFOCOM Workshops, IEEE, Phoenix, AZ, USA, 1–6, 2008.
36.
Zurück zum Zitat Ali, A., Irum, S., Kausar, F., and Khan, F. A., A cluster-based key agreement scheme using keyed hashing for body area networks. Multimed, Tools Appl. 66(2):201–214, 2013.CrossRef Ali, A., Irum, S., Kausar, F., and Khan, F. A., A cluster-based key agreement scheme using keyed hashing for body area networks. Multimed, Tools Appl. 66(2):201–214, 2013.CrossRef
37.
Zurück zum Zitat Venkatasubramaniam, K. K., and Gupta, S. K. S., Physiological valuebased efficient usable security solutions for body sensor networks. ACM Trans. Sens. Netw. (TOSN) 6(4):60–68, 2010. Venkatasubramaniam, K. K., and Gupta, S. K. S., Physiological valuebased efficient usable security solutions for body sensor networks. ACM Trans. Sens. Netw. (TOSN) 6(4):60–68, 2010.
38.
Zurück zum Zitat Ali, A., and Khan, F. A., An improved EKG-based key agreement scheme for body area networks. Proc. of 4th International Conference on Information Security and Assurance (ISA’10), Miyazaki, Japan. Commun. Comput. Inf. Sci. 76:298–308, June 2010.CrossRef Ali, A., and Khan, F. A., An improved EKG-based key agreement scheme for body area networks. Proc. of 4th International Conference on Information Security and Assurance (ISA’10), Miyazaki, Japan. Commun. Comput. Inf. Sci. 76:298–308, June 2010.CrossRef
39.
Zurück zum Zitat Wei, W., Kun, H., Hempel, M., Dongming, P., Sharif, H., and Hsiao-Hwa, C., A stochastic biometric authentication scheme using uniformed GMM in wireless body area sensor networks. Proc. of 21st International Symposium on Personal Indoor and Mobile Radio Communications (PIMRC’10), IEEE, Instanbul, Turkey, 1620–1624, 2010. Wei, W., Kun, H., Hempel, M., Dongming, P., Sharif, H., and Hsiao-Hwa, C., A stochastic biometric authentication scheme using uniformed GMM in wireless body area sensor networks. Proc. of 21st International Symposium on Personal Indoor and Mobile Radio Communications (PIMRC’10), IEEE, Instanbul, Turkey, 1620–1624, 2010.
40.
Zurück zum Zitat Ali, A., and Khan, F. A., A broadcast-based key agreement scheme using set reconciliation for wireless body area networks. J. Med. Syst. 38(5):1–12, 2014.CrossRef Ali, A., and Khan, F. A., A broadcast-based key agreement scheme using set reconciliation for wireless body area networks. J. Med. Syst. 38(5):1–12, 2014.CrossRef
41.
Zurück zum Zitat Wu, Y., Sun, Y., Zhan, L., and Ji, Y., Low mismatch key agreement based on wavelet-transform trend and fuzzy vault in body area network. Int. J. Distrib. Sens. Netw. 2013:16, 2013. Article ID 912873. Wu, Y., Sun, Y., Zhan, L., and Ji, Y., Low mismatch key agreement based on wavelet-transform trend and fuzzy vault in body area network. Int. J. Distrib. Sens. Netw. 2013:16, 2013. Article ID 912873.
42.
Zurück zum Zitat Xin, H., Bangdao, C., Markham, A., Qinghua, W., Zheng, Y., and Roscoe, A. W., Human interactive secure key and identity exchange protocols in body sensor networks. Inf. Secur. IET 7(1):30–38, 2013.CrossRef Xin, H., Bangdao, C., Markham, A., Qinghua, W., Zheng, Y., and Roscoe, A. W., Human interactive secure key and identity exchange protocols in body sensor networks. Inf. Secur. IET 7(1):30–38, 2013.CrossRef
43.
Zurück zum Zitat Yi, R., Oleshchuk, V., Li, F.Y., and Sulistyo, S., FoSBaS: A bi-directional secrecy and collusion resilience key management scheme for BANs. Proc. of Wireless Communications and Networking Conference (WCNC’12), IEEE, Shanghai, China, 2841–2846, 2012. Yi, R., Oleshchuk, V., Li, F.Y., and Sulistyo, S., FoSBaS: A bi-directional secrecy and collusion resilience key management scheme for BANs. Proc. of Wireless Communications and Networking Conference (WCNC’12), IEEE, Shanghai, China, 2841–2846, 2012.
44.
Zurück zum Zitat Jingwei, L., Zonghua, Z., Rong, S., and Kyung Sup, K., An efficient certificateless remote anonymous authentication scheme for wireless body area networks. Proc. International Conference on Communications (ICC), IEEE, Ottawa, ON, Canada, 3404–3408, 2012. Jingwei, L., Zonghua, Z., Rong, S., and Kyung Sup, K., An efficient certificateless remote anonymous authentication scheme for wireless body area networks. Proc. International Conference on Communications (ICC), IEEE, Ottawa, ON, Canada, 3404–3408, 2012.
45.
Zurück zum Zitat Jin-Meng, H., A versatile suite of strong authenticated key agreement protocols for body area networks. Proc. of 8 th International Wireless Communications and Mobile Computing Conference (IWCMC’12), IEEE, Limassol, Cyprus, 683–688, 2012. Jin-Meng, H., A versatile suite of strong authenticated key agreement protocols for body area networks. Proc. of 8 th International Wireless Communications and Mobile Computing Conference (IWCMC’12), IEEE, Limassol, Cyprus, 683–688, 2012.
46.
Zurück zum Zitat Drira, W., Renault, E., and Zeghlache, D., A hybrid authentication and key establishment scheme for WBAN. Proc. of 11th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom’12), IEEE, Liverpool, England, 78–83, 2012. Drira, W., Renault, E., and Zeghlache, D., A hybrid authentication and key establishment scheme for WBAN. Proc. of 11th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom’12), IEEE, Liverpool, England, 78–83, 2012.
47.
Zurück zum Zitat Hu, C., Zhang, N., Li, H., Cheng, X., and Liao, X., Body area network security: A fuzzy attribute-based signcryption scheme. J. Sel. Areas Commun. 31(9):37–46, 2013.CrossRef Hu, C., Zhang, N., Li, H., Cheng, X., and Liao, X., Body area network security: A fuzzy attribute-based signcryption scheme. J. Sel. Areas Commun. 31(9):37–46, 2013.CrossRef
48.
Zurück zum Zitat Barua, M., Alam, M.S., Xiaohui L., and Xuemin, S., Secure and quality of service assurance scheduling scheme for WBAN with application to eHealth. Proc. of Wireless Communications and Networking Conference (WCNC’11), IEEE, Cancun, Mexico, 1102–1106, 2011. Barua, M., Alam, M.S., Xiaohui L., and Xuemin, S., Secure and quality of service assurance scheduling scheme for WBAN with application to eHealth. Proc. of Wireless Communications and Networking Conference (WCNC’11), IEEE, Cancun, Mexico, 1102–1106, 2011.
49.
Zurück zum Zitat Möller, S., Newe, T., and Lochmann, S., Prototype of a secure wireless patient monitoring system for the medical community. Sensors Actuators A Phys. 173(1):55–65, 2012.CrossRef Möller, S., Newe, T., and Lochmann, S., Prototype of a secure wireless patient monitoring system for the medical community. Sensors Actuators A Phys. 173(1):55–65, 2012.CrossRef
50.
Zurück zum Zitat Yao, L., Ali, S.T., Sivaraman, V., and Ostry, D., Improving secret key generation performance for on-body devices. Proc. of 6th International Conference on Body Area Networks (BodyNets '11), ICST, Beijing, China, 19–22, 2011. Yao, L., Ali, S.T., Sivaraman, V., and Ostry, D., Improving secret key generation performance for on-body devices. Proc. of 6th International Conference on Body Area Networks (BodyNets '11), ICST, Beijing, China, 19–22, 2011.
51.
Zurück zum Zitat Shen, J., Moh, S., and Chung, I., A novel key management protocol in body area networks. Proc. of the Seventh International Conference on Networking and Services (ICNS’11), IARIA, Venice, Italy, 246–251, 2011. Shen, J., Moh, S., and Chung, I., A novel key management protocol in body area networks. Proc. of the Seventh International Conference on Networking and Services (ICNS’11), IARIA, Venice, Italy, 246–251, 2011.
52.
Zurück zum Zitat Li, M., Shucheng, Y., Wenjing, L., and Kui, R., Group device pairing based secure sensor association and key management for body area networks. Proc. of INFOCOM’10, IEEE, San Diego, CA, USA, 1–9, 2010. Li, M., Shucheng, Y., Wenjing, L., and Kui, R., Group device pairing based secure sensor association and key management for body area networks. Proc. of INFOCOM’10, IEEE, San Diego, CA, USA, 1–9, 2010.
53.
Zurück zum Zitat Kanjee, M.R., Divi, K., and Hong, L., A two-tiered authentication and encryption scheme in secure healthcare sensor networks. Proc. of Sixth International Conference on Information Assurance and Security (IAS), IEEE, Atlanta, GA, USA, 271–276, 2010. Kanjee, M.R., Divi, K., and Hong, L., A two-tiered authentication and encryption scheme in secure healthcare sensor networks. Proc. of Sixth International Conference on Information Assurance and Security (IAS), IEEE, Atlanta, GA, USA, 271–276, 2010.
54.
Zurück zum Zitat Morchon, O.G., and Baldus, H., Efficient distributed security for wireless medical sensor networks. Proc. of International Conference on Intelligent Sensors, Sensor Networks and Information Processing (ISSNIP), IEEE, Sydney, Australia, 249–254, 2008. Morchon, O.G., and Baldus, H., Efficient distributed security for wireless medical sensor networks. Proc. of International Conference on Intelligent Sensors, Sensor Networks and Information Processing (ISSNIP), IEEE, Sydney, Australia, 249–254, 2008.
55.
Zurück zum Zitat Morchon, O.G., Baldus, H., and Sanchez, D.S., Resource-efficient security for medical body sensor networks. Proc. of International Workshop on Wearable and Implantable Body Sensor Networks (BSN’06), IEEE, Cambridge, MA, USA, 80–83, 2006. Morchon, O.G., Baldus, H., and Sanchez, D.S., Resource-efficient security for medical body sensor networks. Proc. of International Workshop on Wearable and Implantable Body Sensor Networks (BSN’06), IEEE, Cambridge, MA, USA, 80–83, 2006.
56.
Zurück zum Zitat Sanchez, D.S., and Baldus, H., A deterministic pairwise key pre-distribution scheme for mobile sensor networks. Proc. of First International Conference on Security and Privacy for Emerging Areas in Communications Networks (SecureComm), IEEE, Athens, Greece, 277–288, 2005. Sanchez, D.S., and Baldus, H., A deterministic pairwise key pre-distribution scheme for mobile sensor networks. Proc. of First International Conference on Security and Privacy for Emerging Areas in Communications Networks (SecureComm), IEEE, Athens, Greece, 277–288, 2005.
57.
Zurück zum Zitat Huang, C., Lee, H., and Lee, D., A privacy-strengthened scheme for E-Healthcare monitoring system. J. Med. Syst. 36(5):2959–2971, 2012.CrossRefPubMed Huang, C., Lee, H., and Lee, D., A privacy-strengthened scheme for E-Healthcare monitoring system. J. Med. Syst. 36(5):2959–2971, 2012.CrossRefPubMed
58.
Zurück zum Zitat Selimis, G., Huang, L., Massé, F., Tsekoura, I., Ashouei, M., Catthoor, F., Huisken, J., Stuyt, J., Dolmans, G., Penders, J., and De Groot, H., A lightweight security scheme for wireless body area networks: design, energy evaluation and proposed microprocessor design. J. Med. Syst. 35(5):1289–1298, 2011.CrossRefPubMed Selimis, G., Huang, L., Massé, F., Tsekoura, I., Ashouei, M., Catthoor, F., Huisken, J., Stuyt, J., Dolmans, G., Penders, J., and De Groot, H., A lightweight security scheme for wireless body area networks: design, energy evaluation and proposed microprocessor design. J. Med. Syst. 35(5):1289–1298, 2011.CrossRefPubMed
59.
Zurück zum Zitat Zhao, Z., An efficient anonymous authentication scheme for wireless body area networks using elliptic curve cryptosystem. J. Med. Syst. 38(2):1–7, 2014.CrossRef Zhao, Z., An efficient anonymous authentication scheme for wireless body area networks using elliptic curve cryptosystem. J. Med. Syst. 38(2):1–7, 2014.CrossRef
60.
Zurück zum Zitat Daojing, H., Chun, C., Chan, S., Jiajun, B., and Pingxin, Z., Secure and lightweight network admission and transmission protocol for body sensor networks. IEEE J. Biomed. Health Inf. 17(3):664–674, 2013.CrossRef Daojing, H., Chun, C., Chan, S., Jiajun, B., and Pingxin, Z., Secure and lightweight network admission and transmission protocol for body sensor networks. IEEE J. Biomed. Health Inf. 17(3):664–674, 2013.CrossRef
61.
Zurück zum Zitat Mana, M., Feham, M., and Bensaber, B. A., Trust key management scheme for wireless body area networks. Int. J. Netw. Secur. 12(2):75–83, 2011. Mana, M., Feham, M., and Bensaber, B. A., Trust key management scheme for wireless body area networks. Int. J. Netw. Secur. 12(2):75–83, 2011.
62.
Zurück zum Zitat Fengyuan, X., Zhengrui, Q., Tan, C.C., Baosheng, W., and Qun, L., IMDGuard: Securing implantable medical devices with the external wearable guardian. Proc. of INFOCOM’11, IEEE, Shanghai, China, 1862–1870, 2011. Fengyuan, X., Zhengrui, Q., Tan, C.C., Baosheng, W., and Qun, L., IMDGuard: Securing implantable medical devices with the external wearable guardian. Proc. of INFOCOM’11, IEEE, Shanghai, China, 1862–1870, 2011.
63.
Zurück zum Zitat Yao, L., Liu, B., Wu, G., Yao, K., and Wang, J., A biometric key establishment protocol for body area networks. Int. J. Distrib. Sens. Netw. 2011:10, 2011. Article ID 282986.CrossRef Yao, L., Liu, B., Wu, G., Yao, K., and Wang, J., A biometric key establishment protocol for body area networks. Int. J. Distrib. Sens. Netw. 2011:10, 2011. Article ID 282986.CrossRef
64.
Zurück zum Zitat Raazi, S.M.K.R., Sungyoung, L., Young-Koo, L., and Heejo, L., BARI: A distributed key management approach for wireless body area networks. Proc. of International Conference on Computational Intelligence and Security (CIS ’09), IEEE, Beijing, China, 324–329, 2009. Raazi, S.M.K.R., Sungyoung, L., Young-Koo, L., and Heejo, L., BARI: A distributed key management approach for wireless body area networks. Proc. of International Conference on Computational Intelligence and Security (CIS ’09), IEEE, Beijing, China, 324–329, 2009.
65.
Zurück zum Zitat Raazi, S. M. K. R., Heejo, L., Sungyoung, L., and Young-Koo, L., BARI+: A biometric based distributed key management approach for wireless body area networks. Sensors 10(4):3911–3933, 2010.CrossRef Raazi, S. M. K. R., Heejo, L., Sungyoung, L., and Young-Koo, L., BARI+: A biometric based distributed key management approach for wireless body area networks. Sensors 10(4):3911–3933, 2010.CrossRef
66.
Zurück zum Zitat Mana, M., Feham, M., and Bensaber, B. A., SEKEBAN (Secure and efficient key exchange for wireless body area network). Int. J. Adv. Sci. Technol. 12:45–60, 2009. Mana, M., Feham, M., and Bensaber, B. A., SEKEBAN (Secure and efficient key exchange for wireless body area network). Int. J. Adv. Sci. Technol. 12:45–60, 2009.
67.
Zurück zum Zitat Zhang, G.H., Poon, C.C.Y., Ye, L. and Zhang, Y.T. A biometric method to secure telemedicine systems. Proc. of Annual International Conference of the Engineering in Medicine and Biology Society (EMBC), Minneapolis, MN, USA, IEEE, 701–704, 2009. Zhang, G.H., Poon, C.C.Y., Ye, L. and Zhang, Y.T. A biometric method to secure telemedicine systems. Proc. of Annual International Conference of the Engineering in Medicine and Biology Society (EMBC), Minneapolis, MN, USA, IEEE, 701–704, 2009.
68.
Zurück zum Zitat Shu-Di, B., and Yuan-Ting, Z., A design proposal of security architecture for medical body sensor networks. Proc. of International Workshop on Wearable and Implantable Body Sensor Networks (BSN’06), IEEE, Cambridge, MA, USA, 67–90, 2006. Shu-Di, B., and Yuan-Ting, Z., A design proposal of security architecture for medical body sensor networks. Proc. of International Workshop on Wearable and Implantable Body Sensor Networks (BSN’06), IEEE, Cambridge, MA, USA, 67–90, 2006.
Metadaten
Titel
Key Agreement Schemes in Wireless Body Area Networks: Taxonomy and State-of-the-Art
verfasst von
Aftab Ali
Farrukh Aslam Khan
Publikationsdatum
01.10.2015
Verlag
Springer US
Erschienen in
Journal of Medical Systems / Ausgabe 10/2015
Print ISSN: 0148-5598
Elektronische ISSN: 1573-689X
DOI
https://doi.org/10.1007/s10916-015-0272-9

Weitere Artikel der Ausgabe 10/2015

Journal of Medical Systems 10/2015 Zur Ausgabe