Authentication of lossy data in body-sensor networks for cloud-based healthcare monitoring

https://doi.org/10.1016/j.future.2013.09.007Get rights and content

Highlights

  • Bodyworn medical devices are resource-constrained and operate in lossy environments.

  • Data authentication is necessary for stakeholders to trust this technology.

  • We propose a solution using the Merkle tree augmented with network coding.

  • Experiments indicate over 99% items are authenticated with very low overhead.

Abstract

Growing pressure on healthcare costs is spurring development of lightweight bodyworn sensors for real-time and continuous physiological monitoring. Data from these sensors is streamed wirelessly to a handheld device such as a smartphone or tablet, and then archived in the cloud by personal health record services. Authenticating the data these devices generate is vital to ensure proper diagnosis, traceability, and validation of claims. Digital signatures at the packet-level are too resource-intensive for bodyworn devices, while block-level signatures are not robust to loss. In this paper we propose, analyse, and validate a practical, lightweight robust authentication scheme suitable for health-monitoring. We make three specific contributions: (a) we develop an authentication scheme that is both low-cost (using a Merkle hash tree to amortise digital signature costs), and loss-resilient (using network coding to recover strategic nodes within the tree). (b) We design a framework for optimizing placement of network coding within the tree to maximise data verifiability for a given overhead and loss environment. (c) We validate our scheme using experimental traces of typical operating conditions to show that it achieves high success (over 99% of the medical data can be authenticated) at very low overheads (as low as 5% extra transmissions) and at very low cost (the bodyworn device has to perform a digital signature operation no more than once per hour). We believe our novel authentication scheme can be a key step in the integration of wearable medical monitoring devices into current cloud-based healthcare systems.

Introduction

Increase in age-related disabilities and chronic medical conditions is putting huge pressure on national health expenditures worldwide. The US spends $2.3 trillion, or 16% of its GDP, on healthcare, and these costs are projected to rise steeply in coming years. A promising approach to dramatically cut costs is the emerging paradigm of mobile-health, which consists of bodyworn wireless sensor nodes that interface with handheld devices (such as smartphones and tablets), enabling cloud-based continuous monitoring (and possible treatment) of patients in their homes. Wearable platforms have recently begun to appear for personalised healthcare: the Sensium Digital Plaster  [1] is a bodyworn wireless solution that monitors a subject’s ECG, temperature, and movement. Efforts are underway to develop sensor devices that interact with the iPhone and iPad  [2] and Android devices  [3]. ABI research predicts 59 million wearable home health devices will be in use by 2014  [4].

However, for wearable medical monitoring devices to be integrated into the current healthcare system, doctors need to be able to trust the data these devices generate, as do insurance companies and government agencies that provide benefits. Given the critical importance of medical data and the huge associated liabilities, there have to be iron-clad guarantees as to source and data integrity. Specifically, the data stored in the cloud should be traceable back to the originating device; it should be non-repudiable, and should not be forgeable by anyone, including authorised parties such as the patient or doctor or caregiver, etc.

Wearable devices are by definition small and light (the Sensium weighs under 10 g), and hence severely constrained in computation, memory, communication, and battery resources. It is therefore tempting to offload the task of guaranteeing authenticity of the sensed data to the (more powerful) first-hop base-station, which may be a specialised unit, or an attachment to a multipurpose handheld device such as a smartphone. However, software on the base-station can easily be tampered with and secret keys extracted, rendering the data reported by the base-station (to a local or central database in the cloud) untrustworthy. Moreover, traceability of the medical data would only extend back to the base-station, and not to the bodyworn device, which is problematic when errors and malfunctions (which may carry heavy liabilities) need to be isolated. The data may be subject to tampering in the cloud itself by hackers and even parties authorised to legitimately access it. These requirements necessitate data authenticity be guaranteed by the source, namely the bodyworn device, rather than an intermediate transit point or destination.

Public-key cryptography is ideal for delivering conceptually simple and highly scalable at-source authentication of medical data without requiring complex key management. Data generated by the bodyworn device can be “digitally signed” by hashing the data content and encrypting with the device’s private key. Any entity can authenticate the data by verifying the signature using the device’s public key (which may be made publicly accessible). However, digital signatures are computationally expensive, typically two to three orders of magnitude more costly than symmetric-key operations.

In this paper we design, analyse, optimise and evaluate a novel authentication scheme whereby the bodyworn device need only perform digital signatures infrequently (e.g. once an hour, over a large block of data), thereby reducing energy costs, and the receiver can verify most of the data even in the presence of losses. We clarify here that our objective is not to recover lost data packets (that is deemed too complex and costly), but to be able to authenticate received data packets even if other packets in the data set are lost. Our scheme leverages the idea of a Merkle hash tree together with network coding. The sender combines hashes of the data items to form a tree and digitally signs only the root. The receiver validates the data by repeated hashing along the “authentication path” till the root is reached. Due to packet loss, nodes along the authentication path may not be available to the receiver. The sender therefore applies network coding to strategically insert “recovery packets” to help the receiver reconstruct the authentication path. We show that, if configured properly, recovery packets dramatically improve authentication of the data with very low computation and transmission overheads, even in the presence of loss.

Our specific contributions are: first, we develop a novel low-cost scheme for authenticating lossy data by combining a Merkle hash tree (to amortise authentication cost) with strategic use of network coding (to recover lost hash nodes in the tree). Second, we develop an optimisation framework that, for given loss conditions and specified overhead, determines a baseline for use of coding to maximise the fraction of data items that can be successfully verified. We then improve significantly upon this estimate using the Gilbert model to simulate packet loss in a bodyworn environment. Third, we validate our findings using experimental traces of typical operating scenarios (∼2% packet loss) to show that it allows nearly all (over 99%) of the medical data to be verified in a dynamic online setting for very low cost in transmission overheads (less than 4%) and computation (a digital signature operation once per hour). To the best of our knowledge our scheme is the first to provide a practical way of ensuring authenticity of lossy data at very low energy costs, suitable to the emerging paradigm of continuous cloud-based healthcare monitoring.

The rest of this paper is organised as follows: in Section  2, we discuss the system model, prior work, and briefly introduce hash trees and network coding. We describe our solution in detail in Section  3 and formulate the optimisation in Section  4. We support our findings in Section  5 with results from simulations and experiments in real settings using bodyworn devices. We conclude in Section  6.

Section snippets

System model and background

In this section we detail the system architecture, operating assumptions and threat model; we discuss prior work in this domain and introduce hash trees and network coding.

Our scheme for authenticating lossy data

We first describe the operation of our scheme and then discuss its properties.

A framework for optimal placement of network coding

In this section, we develop a framework to determine the ideal placement of network coding within the tree to maximise the fraction of successfully authenticated data items, given loss conditions and coding overhead allowance.

We first argue (without formal proof) that for a given loss environment and given limit on (network coding based) recovery packets, it is best to apply all recovery efforts to a single level of the hash tree rather than splitting it across levels. To see why, consider a

Simulation and experimental results

We note here a limitation of our optimisation framework, namely that it operates on the simplifying assumption of point losses, each packet being independent and identically distributed (i.i.d.) with probability p. In practice, losses in wireless sensor networks tend to be bursty  [28] and researchers have recently attempted to use Markov modelling to characterise the state of the wireless channel for body area networks  [29], [30].

Conclusion

In this paper, we proposed a low-cost practical solution to authenticate medical data generated by wireless bodyworn sensor devices and stored in the cloud. We employ a Merkle hash tree to amortise digital signature costs and leverage network coding to make the authentication scheme robust to packet loss. We provide an optimisation framework so that network coding is best used to maximise data verification probability for a given loss environment and constraint on overhead. Furthermore, we

Syed Taha Ali did his B.Sc. (Eng) from the GIK Institute of Engineering Sciences and Technology, Pakistan, in 2002 and his M.S. from the University of New South Wales, Australia, in 2006. He has recently concluded a Ph.D. in Electrical Engineering at the same institution, working on developing novel security mechanisms for body sensor networks. Research interests include wireless sensor networks, network mobility and security.

References (31)

  • Toumaz Technology Ltd., Sensium Life Platform, Retrieved 19 November, 2010....
  • Apple Inc., Sensor Strip, Retrieved 19 November,...
  • D. Graham-Rowe

    Body organs can send status updates to your cellphone

    New Scientist

    (2010)
  • A.R. Service, Market for wearable wireless sensors to grow to more than 400 million devices by 2014, online,...
  • CEA-Leti Institute, CORMORAN project exploring ways to improve cooperation in and between wireless body area networks,...
  • D. Konstantas, V. Jones, R. Herzog, MobiHealth—innovative 2.5 / 3G mobile services and applications for healthcare, in:...
  • C. Buratti, R. D’Errico, M. Maman, F. Martelli, R. Rosini, R. Verdone, Design of a body area network for medical...
  • COLLAGE: collaboration on ageing, Body area networks for continuous monitoring of critical parameters, Retrieved 13...
  • University of Bologna, CuPiD: closed-loop system for personalized and at-home rehabilitation of people with Parkinson’s...
  • EPSRC funded project (EP/D076943), SESAME: SEnsing for sport and managed exercise, Retrieved April, 2010....
  • S. Xiao et al.

    Transmission power control in body area sensor networks for healthcare monitoring

    IEEE Journal on Selected Areas in Communications (JSAC)

    (2009)
  • A. Natarajan et al.

    Link layer behavior of body area networks at 2.4 GHz

  • K. Piotrowski, P. Langendoerfer, S. Peter, How public key cryptography influences wireless sensor node lifetime, in:...
  • R. Gennaro, P. Rohatgi, How to sign digital streams, in: CRYPTO’97, 1997, pp....
  • A. Perrig, R. Canetti, J.D. Tygar, D. Song, Efficient authentication and signing of multicast streams over lossy...
  • Cited by (0)

    Syed Taha Ali did his B.Sc. (Eng) from the GIK Institute of Engineering Sciences and Technology, Pakistan, in 2002 and his M.S. from the University of New South Wales, Australia, in 2006. He has recently concluded a Ph.D. in Electrical Engineering at the same institution, working on developing novel security mechanisms for body sensor networks. Research interests include wireless sensor networks, network mobility and security.

    Vijay Sivaraman (M ’94) received his B.Tech. from the Indian Institute of Technology in Delhi, India, in 1994, his M.S. from North Carolina State University in 1996, and his Ph.D. from the University of California at Los Angeles in 2000. He has worked at Bell-Labs and a Silicon Valley start-up manufacturing optical switch-routers. He is now an Associate Professor at the University of New South Wales in Sydney, Australia, and works part-time at the CSIRO. His research interests include Optical Networking, packet switching and routing, and software defined networking.

    Diethelm Ostry is a Research Scientist in the Network Technologies Laboratory, Information and Communication Technology Centre, CSIRO Australia. His recent research interests have been in the areas of network traffic characterization, optical packet networks and security in body sensor networks.

    This submission is an extended version of a paper presented at the IEEE International Conference on Sensing, Communication, and Networking (SECON), Seoul, June, 2012.

    View full text