skip to main content
10.1145/1352533.1352557acmconferencesArticle/Chapter ViewAbstractPublication PageswisecConference Proceedingsconference-collections
research-article

Body sensor network security: an identity-based cryptography approach

Published: 31 March 2008 Publication History

Abstract

A body sensor network (BSN), is a network of sensors deployed on a person's body, usually for health care monitoring. Since the sensors collect personal medical data, security and privacy are important components in a body sensor network. At the same time, the collected data has to readily available in the event of an emergency. In this paper, we present IBE-Lite, a lightweight identity-based encryption suitable for sensors, and developed protocols based on IBE-Lite for a BSN.

References

[1]
N. Asokan, K. Kostiainen, P. Ginzboorg, J. Ott, and C. Luo. Applicability of identity-based cryptography for disruption-tolerant networking. In MobiOpp 2007.
[2]
D. Boneh and M. Franklin. Identity-based encryption from the Weil pairing. In CRYPTO 2001.
[3]
S. Capkun, L. Buttyán, and J.-P. Hubaux. Self-organized public-key management for mobile adhoc networks. IEEE TMC 2003.
[4]
H. Chan, A. Perrig, and D. Song. Random key predistribution schemes for sensor networks. In IEEESP 2003.
[5]
C. Cocks. An identity based encryption scheme based on quadratic residues. In LNCS 2260 (2001).
[6]
W. Du, R. Wang, and P. Ning. An efficient scheme for authenticating public keys in sensor networks. In MobiHoc 2005.
[7]
L. Eschenauer and V. D. Gligor. A key-management scheme for distributed sensor networks. In CCS 2002.
[8]
R. Ganti, P. Jayachandran, and T. Abdelzaher. Satire: A software architecture for smart attire. In Mobisys 2006.
[9]
J. Girao, D. Westhoff, E. Mykletun, and T. Araki. Tinypeds: Tiny persistent encrypted data storage in asynchronous wireless sensor networks. Ad Hoc Networks 2007.
[10]
V. Gupta, M. Wurm, Y. Zhu, M. Millard, S. Fung, N. Gura, H. Eberle, and S. C. Shantz. Sizzle: A standards-based end-to-end security architecture for the embedded internet. In PerCom 2005.
[11]
U. Hengartner and P. Steenkiste. Exploiting hierarchical identity-based encryption for access control to pervasive computing information. In SecureComm 2005.
[12]
C. Karlof, N. Sastry, and D. Wagner. Tinysec: a link layer security architecture for wireless sensor networks. In SenSys 2004.
[13]
A. Kate, G. Zaverucha, and U. Hengartner. Anonymity and security in delay tolerant networks. In SecureComm 2007.
[14]
L. Lazos and R. Poovendran. Serloc: Secure range-independent localization for wireless sensor networks. ACM TOSN 2005.
[15]
A. Liu, P. Kampanakis, and P. Ning. Tinyecc: Elliptic curve cryptography for sensor networks (version 0.3). 2007.
[16]
D. Liu and P. Ning. Establishing pairwise keys in distributed sensor networks. In CCS 2003.
[17]
B. Lo and G. Z. Yang. Key technical challenges and current implementations of body sensor networks. In BSN 2005.
[18]
D. Malan, T. Fulford-Jones, M. Welsh, and S. Moulton. Codeblue: An ad hoc sensor network infrastructure for emergency medical care. In BSN 2004.
[19]
D. J. Malan, M. Welsh, and M. D. Smith. A public-key infrastructure for key distribution in tinyos based on elliptic curve cryptography. In SECON 2004.
[20]
K. Malasri and L. Wang. Addressing security in medical sensor networks. In HealthNet 2007.
[21]
M. Mont, P. Bramhall, and K. Harrison. A flexible role-based secure messaging service: exploiting IBE technology for privacy in health care. In International Workshop on Database and Expert Systems Applications 2003.
[22]
E. Mykletun, J. Girao, and D. Westhoff. Public key based cryptoschemes for data concealment in wireless sensor networks. In ICC 2006.
[23]
A. Perrig, R. Szewczyk, V. Wen, D. Culler, and J. D. Tygar. SPINS: Security protocols for sensor networks. In Mobicom 2001.
[24]
A. Shamir. Identity-based cryptosystems and signature schemes. In CRYPTO 1984.
[25]
H. Wang and Q. Li. Efficient Implementation of Public Key Cryptosystems on Mote Sensors (Short Paper). In International Conference on Information and Communication Security (ICICS 2006), LNCS 4307.
[26]
H. Wang, B. Sheng, C. C. Tan, and Q. Li. WM-ECC: an Elliptic Curve Cryptography Suite on Sensor Motes. In Technical Report WM-CS-2007-11, 2007.
[27]
L. Zhong, M. Sinclair, and R. Bittner. A phone-centered body sensor network platform: cost, energy efficiency and user interface. In BSN 2006.

Cited By

View all
  • (2024)Applications of Triboelectric Nanogenerators in Medical Recovery: A ReviewACS Applied Electronic Materials10.1021/acsaelm.4c01055Online publication date: 16-Aug-2024
  • (2024)ECC based certificateless aggregate signature scheme for healthcare wireless sensor networksJournal of Reliable Intelligent Environments10.1007/s40860-024-00236-w10:4(489-500)Online publication date: 3-Sep-2024
  • (2024)Efficient Identity-Based Encryption with Tight Adaptive Anonymity from RLWEPost-Quantum Cryptography10.1007/978-3-031-62743-9_10(300-321)Online publication date: 11-Jun-2024
  • Show More Cited By

Index Terms

  1. Body sensor network security: an identity-based cryptography approach

    Recommendations

    Comments

    Information & Contributors

    Information

    Published In

    cover image ACM Conferences
    WiSec '08: Proceedings of the first ACM conference on Wireless network security
    March 2008
    234 pages
    ISBN:9781595938145
    DOI:10.1145/1352533
    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

    Sponsors

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 31 March 2008

    Permissions

    Request permissions for this article.

    Check for updates

    Author Tags

    1. body sensor networks
    2. identity-based cryptography
    3. security

    Qualifiers

    • Research-article

    Conference

    WISEC '08
    Sponsor:
    WISEC '08: First ACM Conference on Wireless Network Security
    March 31 - April 2, 2008
    VA, Alexandria, USA

    Acceptance Rates

    Overall Acceptance Rate 98 of 338 submissions, 29%

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)17
    • Downloads (Last 6 weeks)1
    Reflects downloads up to 02 Mar 2025

    Other Metrics

    Citations

    Cited By

    View all
    • (2024)Applications of Triboelectric Nanogenerators in Medical Recovery: A ReviewACS Applied Electronic Materials10.1021/acsaelm.4c01055Online publication date: 16-Aug-2024
    • (2024)ECC based certificateless aggregate signature scheme for healthcare wireless sensor networksJournal of Reliable Intelligent Environments10.1007/s40860-024-00236-w10:4(489-500)Online publication date: 3-Sep-2024
    • (2024)Efficient Identity-Based Encryption with Tight Adaptive Anonymity from RLWEPost-Quantum Cryptography10.1007/978-3-031-62743-9_10(300-321)Online publication date: 11-Jun-2024
    • (2023)Wearable Computing Systems: State‐of‐the‐Art and Research ChallengesHandbook of Human‐Machine Systems10.1002/9781119863663.ch29(349-371)Online publication date: 7-Jul-2023
    • (2022)Dynamic Performance Estimation Routing Model in VANETInternational Journal of Advanced Research in Science, Communication and Technology10.48175/IJARSCT-5826(316-322)Online publication date: 20-Jul-2022
    • (2022)Security in Wireless Body Sensor Network: A Multivocal Literature StudyApplied System Innovation10.3390/asi50400795:4(79)Online publication date: 15-Aug-2022
    • (2022)Cancelable HD-SEMG Biometric Identification via Deep Feature LearningIEEE Journal of Biomedical and Health Informatics10.1109/JBHI.2021.311578426:4(1782-1793)Online publication date: Apr-2022
    • (2022)Key Wearable Device Technologies Parameters for Innovative Healthcare Delivery in B5G Network: A ReviewIEEE Access10.1109/ACCESS.2022.317364310(49956-49974)Online publication date: 2022
    • (2022)SOK: Evaluating Privacy and Security Vulnerabilities of Patients’ Data in HealthcareSocio-Technical Aspects in Security10.1007/978-3-031-10183-0_8(153-181)Online publication date: 14-Jul-2022
    • (2021)Curve-Based Security Schemes for Automating the Encryption and Signing of Digital Documents in Organizational EnvironmentsProgramming and Computer Software10.1134/S036176882108018147:8(849-857)Online publication date: 28-Dec-2021
    • Show More Cited By

    View Options

    Login options

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    Figures

    Tables

    Media

    Share

    Share

    Share this Publication link

    Share on social media