An Encryption Method for BAN Using the Channel Characteristics
The protection of information security is a very important technique requirement in Body area networks (BANs). According to the limitation of energy, the traditional encryption methods which adopt the complex algorithm and the large consumption are not suitable for BANs. This paper proposes a new encryption method based on the channel model of BANs, which adopts the path loss from the BAN systems to form the initial key, utilizes the LFSR (Linear Feedback Shift Register) circuit to generate the key stream, and then encrypts the data in the coordinator of the BAN system. This new encryption method has the advantages of low energy consumption, simple hardware implementation, and dynamic key updating.
KeywordsBody area network Channel model Path loss LFSR Encryption method
This work is supported by the National Science Foundation of China (Grant no. 61471075, 61671091), National Key Technology Research and Development Program of the Ministry of Science and Technology of China (2014BAI11B10), Key National Science Foundation of Chongqing (cstc2017jcyjB0203), Chongqing Integrated Demonstration Project (CSTC2013jcsf10029), Wenfeng Innovation Foundation of CQUPT, University Innovation Team Construction Plan Funding Project of Chongqing (Smart Medical System and Key Techniques, CXTDG201602009), Chongqing Key Laboratory Improvement Plan (Chongqing Key Laboratory of Photoelectronic Information Sensing and Transmitting Technology, cstc2014pt-sy40001), Chongqing Research Program of Basic Research and Frontier Technology (cstc2017jcyjA0982), Science and Technology research project of Chongqing Education Commission (KJ1704073), Research and Innovation Project of Graduate Students in Chongqing (CYS17239), the Scientific Research Foundation of CQUPT (A2016-73), the Priority Academic Program Development of Jiangsu Higer Education Institutions (PAPD) Fund, and Jiangsu Collaborative Innovation Center on Atmospheric Environment and Equipment Technology (CICAEET) Fund.
- 2.Barakah, D.M., Ammad-Uddin, M.: A survey of challenges and applications of wireless body area network (WBAN) and role of a virtual doctor server in existing architecture. In: International Conference on Intelligent Systems, pp. 214–219. IEEE (2012)Google Scholar
- 5.Lim, S., et al.: Security issues on wireless body area network for remote healthcare monitoring. In: IEEE International Conference on Sensor Networks, Ubiquitous, and Trustworthy Computing, pp. 327–332. IEEE Computer Society (2010)Google Scholar
- 6.Warren, S., et al.: Interoperability and security in wireless body area network infrastructures. In: International Conference of the Engineering in Medicine & Biology Society, p. 3837 (2005)Google Scholar
- 7.Mainanwal, V., Gupta, M., Upadhayay, S.K.: A survey on wireless body area network: security technology and its design methodology issue. In: International Conference on Innovations in Information, Embedded and Communication Systems, pp. 1–5. IEEE (2015)Google Scholar
- 8.Chan, H., Perrig, A., Song, D.: Random key predistribution schemes for sensor networks. In: Proceedings of 2003 Symposium on Security and Privacy. IEEE (2003)Google Scholar
- 9.Ali, A., Khan, F.A.: An improved EKG-based key agreement scheme for body area networks. In: Proceedings of the International Conference on Information Security and Assurance, ISA 2010, DBLP, Miyazaki, Japan, June 23–25 2010, pp. 298–308 (2010)Google Scholar
- 10.Mana, M., Feham, M., Bensaber, B.A.: SEKEBAN (Secure and efficient key exchange for wireless body area network). Int. J. Advanc. Sci. Technol. 12.12 (2009)Google Scholar
- 11.Yao, L., et al.: A biometric key establishment protocol for body area networks. Int. J. Distrib. Sens. Netw. 1550–1329, 1063–1067 (2011)Google Scholar
- 13.Al-Janabi, S., et al.: Survey of main challenges (security and privacy) in wireless body area networks for healthcare applications. Egyptian Informat. J. (2016)Google Scholar
- 14.Sharma, K., et al.: Use of LFSR for sensor network security: a new approach. In: International Conference on Information Security and Assurance, pp. 61–66. IEEE Computer Society (2008)Google Scholar
- 15.Sharaf, M., et al.: A complex linear feedback shift register design for the A5 keystream generator. National IEEE Xplore 395–402 (2005)Google Scholar