Abstract
The development of Wireless Body Area Networks (WBANs) for wireless sensing and monitoring of a person’s vital functions, is an enabler in providing better personal health care whilst enhancing the quality of life. A critical factor in the acceptance of WBANs is providing appropriate security and privacy protection of the wireless communication. This paper first describes a general health care platform and pinpoints the security challenges and requirements. Further it proposes and analyzes the CICADA-S protocol, a secure cross-layer protocol for WBANs. It is an extension of CICADA, which is a cross-layer protocol that handles both medium access and the routing of data in WBANs. The CICADA-S protocol is the first integrated solution that copes with threats that occur in this mobile medical monitoring scenario. It is shown that the integration of key management and secure, privacy preserving communication techniques within the CICADA-S protocol has low impact on the power consumption and throughput.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsPreview
Unable to display preview. Download preview PDF.
References
Takahashi, D., Xiao, Y., Hu, F.: LTRT: Least total-route temperature routing for embedded biomedical sensor networks. In: Proceedings of the 50th IEEE Global Telecommunications Conference, GLOBECOM 2007 (November 2007)
Moh, M., Culpepper, B.J., Lan, D., Teng-Sheng, M., Hamada, T., Ching-Fong, S.: On data gathering protocols for in-body biomedical sensor networks. In: Proceedings of the 48th IEEE Global Telecommunications Conference, GLOBECOM 2005 (November/December 2005)
Ruzzelli, A.G., Jurdak, R., O’Hare, G.M.P., Van Der Stok, P.: Energy-efficient multi-hop medical sensor networking. In: Proceedings of the 1st ACM SIGMOBILE international workshop on Systems and networking support for healthcare and assisted living environments, HealthNet 2007, New York, NY, USA, pp. 37–42 (2007)
Latré, B., Braem, B., Moerman, I., Blondia, C., Reusens, E., Joseph, W., Demeester, P.: A low-delay protocol for multihop wireless body area networks. In: Proceedings of the 4th Annual International Conference on Mobile and Ubiquitous Systems: Networking & Services, Philadelphia, PA, USA (August 2007)
Otto, C., Milenkovic, A., Sanders, C., Jovanov, E.: System architecture of a wireless body area sensor network for ubiquitous health monitoring. Journal of Mobile Multimedia 1(4), 307–326 (2006)
IBBT IM3-project, http://projects.ibbt.be/im3
Perrig, A., Stankovic, J., Wagner, D.: Security in wireless sensor networks. Communications of the ACM 47(6), 53–57 (2004)
Zhou, L., Haas, Z.J.: Securing ad hoc networks. IEEE Network 13(6), 24–30 (1999)
Eschenauer, L., Gligor, V.: A key-management scheme for distributed sensor networks. In: Proceedings of the 9th ACM Conference on Computer and Communications Security, CCS 2002, pp. 41–47 (November 2002)
Perrig, A., Szewczyk, R., Wen, V., Culler, D.E., Tygar, J.D.: SPINS: Security protocols for sensor networks. In: Mobile Computing and Networking, pp. 189–199 (2001)
Baldus, H., Klabunde, K., Msch, G.: Reliable set-up of medical body-sensor networks. In: Karl, H., Wolisz, A., Willig, A. (eds.) EWSN 2004. LNCS, vol. 2920, pp. 353–363. Springer, Heidelberg (2004)
Poon, C.C.Y., Yuan-Ting, Z., Shu-Di, B.: A novel biometrics method to secure wireless body area sensor networks for telemedicine and m-health. IEEE Communications Magazine 44(4), 73–81 (2006)
Falck, T., Baldus, H., Espina, J., Klabunde, K.: Plug ’n play simplicity for wireless medical body sensors. Mobile Networks and Applications 12(2-3), 143–153 (2007)
Gehrmann, C., Mitchell, C., Nyberg, K.: Manual authentication for wireless devices. RSA Cryptobytes 7(1), 29–37 (2004)
Singelée, D., Preneel, B.: Key establishment using secure distance bounding protocols. In: Proceedings of the first Workshop on the Security and Privacy of Emerging Ubiquitous Communication Systems, SPEUCS 2007, Philadelphia, PA, USA, August 2007. IEEE Computer Society Press, Los Alamitos (2007)
Stajano, F., Anderson, R.: The resurrecting duckling: Security issues in ad–hoc wireless networks. In: Malcolm, J.A., Christianson, B., Crispo, B., Roe, M. (eds.) Security Protocols 1999. LNCS, vol. 1796, pp. 172–182. Springer, Heidelberg (2000)
Menezes, A.J., van Oorschot, P.C., Vanstone, S.A.: Handbook of Applied Cryptography. CRC Press, Boca Raton (1996)
ISO/IEC 9798-2. Information technology – Security techniques – Entity authentication – Part 2: Mechanisms using symmetric encipherment algorithms (1999)
Daemen, J., Rijmen, V.: The Design of Rijndael – AES – The Advanced Encryption Standard. Springer, Heidelberg (2002)
NIST Special Publication 800-38C. Recommendation for block cipher modes of operation – the CCM mode for authentication and confidentiality. U.S. DoC/NIST (May 2004), http://csrc.nist.gov/publications/
NIST Special Publication 800-38D. Recommendation for block cipher modes of operation – galois/counter mode (GCM) and GMAC. U.S. DoC/NIST (November 2007), http://csrc.nist.gov/publications/
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2008 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Singelée, D. et al. (2008). A Secure Cross-Layer Protocol for Multi-hop Wireless Body Area Networks. In: Coudert, D., Simplot-Ryl, D., Stojmenovic, I. (eds) Ad-hoc, Mobile and Wireless Networks. ADHOC-NOW 2008. Lecture Notes in Computer Science, vol 5198. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-85209-4_8
Download citation
DOI: https://doi.org/10.1007/978-3-540-85209-4_8
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-85208-7
Online ISBN: 978-3-540-85209-4
eBook Packages: Computer ScienceComputer Science (R0)