Evaluation of Fuzzy-Vault-based Key Agreement Schemes in Wireless Body Area Networks Using the Fuzzy Analytical Hierarchy Process
Subject Areas : electrical and computer engineeringM. Ebrahimi 1 , H. R. Ahmadi 2 * , M. Abbasnejad Ara 3
1 - University of Tehran
2 - University of Tehran
3 - University of Tehran
Abstract :
Wireless body area networks (WBAN) may be deployed on each person’s body for pervasive and real time health monitoring. As WBANs deal with personal health data, securing the data during communication is essential. Therefore, enabling secure communication in this area has been considered as an important challenge. Due to the WBAN characteristics and constraints caused by the small size of the nodes, selection of the best key agreement scheme is very important. This paper intends to evaluate different key agreement schemes in WBANs and find the best one. To achieve this goal, three schemes from existing research named OPFKA, PSKA and ECG-IJS are considered and a fuzzy analytical hierarchy process (FAHP) method is employed to find the best scheme.
[1] B. Latre, B. Braem, I. Moerman, C. Blondia, and P. Demeester, "A survey on wireless body area networks," Wireless. Network, vol. 17, no. 1, pp. 1-18, Jan. 2011.
[2] L. Schwiebert, S. K. S. Gupta, and J. Weinmann, "Research challenges in wireless networks of biomedical sensors," in Proc. of the 7th Annual Int. Conf. on Mobile Computing and Networking, MobiCom'01, pp. 151-165, Rome, Italy, Jul. 2001.
[3] L. Eschenauer and V. D. Gligor, "A key-management scheme for distributed sensor networks," in Proc. of the 9th ACM Conf. on Computer and Communications Security, CCS'02, Washington DC, US, pp. 41-47, Nov. 2002.
[4] S. Cherukuri, K. K. Venkatasubramanian, and S. K. S. Gupta, "BioSec: a biometric based approach for securing communication in wireless networks of biosensors implanted in the human body," in Proc. of the 2003 Int. Conf. on Parallel Processing Workshops, ICPPW'03, pp. 432-439, Kaohsiung, Taiwan, Oct. 2003.
[5] C. C. Y. Poon, Y. T. Zhang, and S. D. Bao, "A novel biometrics method to secure wireless body area sensor networks for telemedicine and m-health," IEEE Commun. Mag., vol. 44, no. 4, pp. 73-81, Apr. 2006.
[6] A. Juels and M. Sudan, "A fuzzy vault scheme," Des. Codes Cryptogr., vol. 38, no. 2, pp. 237-257, Feb. 2006.
[7] Z. Zhang, H. Wang, A. V. Vasilakos, and H. Fang, "ECG-cryptography and authentication in body area networks," IEEE Trans. Inf. Technol. Biomed., vol. 16, no. 6, pp. 1070-1078, Nov. 2012.
[8] K. K. Venkatasubramanian, A. Banerjee, and S. K. S. Gupta, "PSKA: usable and secure key agreement scheme for body area networks," IEEE Trans. Inf. Technol. Biomed., vol. 14, no. 1, pp. 60-68, Jan. 2010.
[9] C. Hu, X. Cheng, F. Zhang, D. Wu, X. Liao, and D. Chen, "OPFKA: secure and efficient ordered-physiological-feature-based key agreement for wireless body area networks," in Proc. of the IEEE INFOCOM INFOCOM Workshops 2013, pp. 2274-2282, Turin, Italy, 14-19 Apr. 2013.
[10] A. Juels and M. Wattenberg, "A fuzzy commitment scheme," in Proc. of the 6th ACM Conf. on Computer and Communications Security, CCS'99, pp. 28-36, Singapore, Nov. 1999.
[11] G. H. Zhang, C. C. Y. Poon, and Y. T. Zhang, "Analysis of using interpulse intervals to generate 128-bit biometric random binary sequences for securing wireless body sensor networks," IEEE Trans. Inf. Technol. Biomed., vol. 16, no. 1, pp. 176-182, Jan. 2012.
[12] K. K. Venkatasubramanian, A. Banerjee, and S. K. S. Gupta, "EKG-based key agreement in body sensor networks," in Proc. of the IEEE INFOCOM Workshops 2008, 6 pp., Phoenix, AZ, USA, Apr. 2008.
[13] K. K. Venkatasubramanian, A. Banerjee, and S. K. S. Gupta, "Plethysmogram-based secure inter-sensor communication in body area networks," in Proc. of the IEEE Military Communications Conf., MILCOM'08, 7 pp., San Diego, CA, USA, Nov. 2008.
[14] F. Miao, L. Jiang, Y. Li, and Y. T. Zhang, "Biometrics based novel key distribution solution for body sensor networks," in Proc. of the 2009 IEEE Annual Int. Conf. on Engineering in Medicine and Biology Society, EMBC'09, pp. 2458-2461, Minneapolis, MN, USA, Sep. 2009.
[15] F. Miao, S. D. Bao, and Y. Li, "A modified fuzzy vault scheme for biometrics-based body sensor networks security," in Proc. of the 2010 IEEE Global Telecommunications Conf., GLOBECOM'10, 5 pp., Miami, FL, USA, Dec. 2010.
[16] C. Z. Cao, C. G. He, S. D. Bao, and Y. Li, "Improvement of fuzzy vault scheme for securing key distribution in body sensor network," in Proc. of the 2011 IEEE Annual Int. Conf. on Engineering in Medicine and Biology Society, EMBC'11, pp. 3563-3567, Boston, MA, USA,, Aug./Sep. 2011.
[17] J. Lu, G. Zhang, and D. Ruan, Multi-Objective Group Decision Making: Methods, Software, and Applications with Fuzzy Set Techniques, London, UK: Imperial College Press, 2007.
[18] L. Mikhailov and P. Tsvetinov, "Evaluation of services using a fuzzy analytic hierarchy process," Appl. Soft Comput., vol. 5, no. 1, pp. 23-33, Dec. 2004.
[19] K. Asai, Fuzzy Systems for Management, Burke, VA, USA: IOS Press, 1995.
[20] A. Kaufmann and M. M. Gupta, Fuzzy Mathematical Models in Engineering and Management Science, New York, NY, USA: Elsevier Science Inc, 1988.
[21] G. J. Klir and B. Yuan, Fuzzy Sets and Fuzzy Logic: Theory and Applications, New Jersey, USA: Prentice Hall PTR, 1995.
[22] G. H. Zhang, C. C. Y. Poon, and Y. T. Zhang, "A review on body area networks security for healthcare," ISRN Communications and Networking, vol. 2011, Jan. 2011.