Abstract
Body area networks (BANs) play an important role in mobile health monitoring such as, monitoring the health of patients in a hospital or physical status of soldiers in a battlefield. By securing the BAN, we actually secure the lives of soldiers or patients. This work presents an electrocardiogram (EKG) based key agreement scheme using discrete wavelet transform (DWT) for the sake of generating a common key in a body area network. The use of EKG brings plug-and-play capability in BANs; i.e., the sensors are just placed on the human body and a secure communication is started among these sensors. The process is made secure by using the iris or fingerprints to lock and then unlock the blocks during exchange between the communicating sensors. The locking and unlocking is done through watermarking. When a watermark is added at the sender side, the block is locked and when it is removed at the receiver side, the block is unlocked. By using iris or fingerprints, the security of the technique improves and its plug-and-play capability is not affected. The analysis is done by using real 2-lead EKG data sampled at a rate of 125 Hz taken from MIT PhysioBank database.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Venkatasubramanian, K., Deng, G., Mukherjee, T., Quintero, J., Annamalai, V., Gupta, S.K.S., Ayushman: A Wireless Sensor Network Based Health Monitoring Infrastructure and Testbed. In: Prasanna, V.K., Iyengar, S.S., Spirakis, P.G., Welsh, M. (eds.) DCOSS 2005. LNCS, vol. 3560, pp. 406–407. Springer, Heidelberg (2005)
Cherukuri, S., Venkatasubramanian, K., Gupta, S.K.S.: BioSec: A Biometric Based Approach for Securing Communication in Wireless Networks of Biosensors Implanted in the Human Body. In: Proc. of Wireless Security & Privacy Workshop 2003, October 2003, pp. 432–439 (2003)
Singel, D., Latr, B., Braem, B., Peeters, M., Soete, M.D., Cleyn, P.D., Preneel, B., Moerman, I., Blondia, C.: A secure cross-layer protocol for multi-hop wireless body area networks. In: 7th International Conf. on Ad-hoc Networks and Wireless (2008)
Perrig, A., Szewczyk, R., Wen, V., Culler, D., Tygar, D.: SPINS: Security Protocol for Sensor Networks. Wireless Networks 8(5), 521–534 (2002)
Poon, C.C.Y., Zhang, Y.-T., Bao, S.-D.: A Novel Biometrics Method To Secure Wireless Body Area Sensor Networks for Telemedicine and M-Health. IEEE Communications Magazine 44(4), 73–81 (2006)
Bao, S.D., Zhang, Y.T., Zhang, Y.-T.: Physiological Signal Based Entity Authentication for Body Area Sensor Networks and Mobile Healthcare Systems. In: Proc. of the IEEE 27th Conference on Engineering in Medicine and Biology, pp. 2455–2458 (2005)
Ouchi, K., Suzuki, T., Doi, M.: LifeMinder: A Wearable Healthcare Support System Using User’s Context. In: Proc. of 22th International Conference on Distributed Computing Systems Workshops, pp. 791–792 (2002)
Venkatasubramanian, K., Banerjee, A., Gupta, S.K.S.: EKG-based Key Agreement in Body Sensor Networks. In: Proc. of the 2nd Workshop on Mission Critical Networks. INFOCOM Workshops, Pheonix AZ, USA (2008)
Wu, Y.-l., Agrawal, D., Abbadi, A.E.: A Comparison of DFT and DWT Based Similarity Search in Time-Series Databases. In: Proceedings of the 9th International Conference on Information and Knowledge Management, pp. 488–495 (2000)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2010 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Ali, A., Khan, F.A. (2010). An Improved EKG-Based Key Agreement Scheme for Body Area Networks. In: Bandyopadhyay, S.K., Adi, W., Kim, Th., Xiao, Y. (eds) Information Security and Assurance. ISA 2010. Communications in Computer and Information Science, vol 76. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-13365-7_29
Download citation
DOI: https://doi.org/10.1007/978-3-642-13365-7_29
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-13364-0
Online ISBN: 978-3-642-13365-7
eBook Packages: Computer ScienceComputer Science (R0)