Skip to main content

A Secure Cross-Layer Protocol for Multi-hop Wireless Body Area Networks

  • Conference paper

Part of the book series: Lecture Notes in Computer Science ((LNCCN,volume 5198))

Abstract

The development of Wireless Body Area Networks (WBANs) for wireless sensing and monitoring of a person’s vital functions, is an enabler in providing better personal health care whilst enhancing the quality of life. A critical factor in the acceptance of WBANs is providing appropriate security and privacy protection of the wireless communication. This paper first describes a general health care platform and pinpoints the security challenges and requirements. Further it proposes and analyzes the CICADA-S protocol, a secure cross-layer protocol for WBANs. It is an extension of CICADA, which is a cross-layer protocol that handles both medium access and the routing of data in WBANs. The CICADA-S protocol is the first integrated solution that copes with threats that occur in this mobile medical monitoring scenario. It is shown that the integration of key management and secure, privacy preserving communication techniques within the CICADA-S protocol has low impact on the power consumption and throughput.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Takahashi, D., Xiao, Y., Hu, F.: LTRT: Least total-route temperature routing for embedded biomedical sensor networks. In: Proceedings of the 50th IEEE Global Telecommunications Conference, GLOBECOM 2007 (November 2007)

    Google Scholar 

  2. Moh, M., Culpepper, B.J., Lan, D., Teng-Sheng, M., Hamada, T., Ching-Fong, S.: On data gathering protocols for in-body biomedical sensor networks. In: Proceedings of the 48th IEEE Global Telecommunications Conference, GLOBECOM 2005 (November/December 2005)

    Google Scholar 

  3. Ruzzelli, A.G., Jurdak, R., O’Hare, G.M.P., Van Der Stok, P.: Energy-efficient multi-hop medical sensor networking. In: Proceedings of the 1st ACM SIGMOBILE international workshop on Systems and networking support for healthcare and assisted living environments, HealthNet 2007, New York, NY, USA, pp. 37–42 (2007)

    Google Scholar 

  4. Latré, B., Braem, B., Moerman, I., Blondia, C., Reusens, E., Joseph, W., Demeester, P.: A low-delay protocol for multihop wireless body area networks. In: Proceedings of the 4th Annual International Conference on Mobile and Ubiquitous Systems: Networking & Services, Philadelphia, PA, USA (August 2007)

    Google Scholar 

  5. Otto, C., Milenkovic, A., Sanders, C., Jovanov, E.: System architecture of a wireless body area sensor network for ubiquitous health monitoring. Journal of Mobile Multimedia 1(4), 307–326 (2006)

    Google Scholar 

  6. IBBT IM3-project, http://projects.ibbt.be/im3

  7. Perrig, A., Stankovic, J., Wagner, D.: Security in wireless sensor networks. Communications of the ACM 47(6), 53–57 (2004)

    Article  Google Scholar 

  8. Zhou, L., Haas, Z.J.: Securing ad hoc networks. IEEE Network 13(6), 24–30 (1999)

    Article  Google Scholar 

  9. Eschenauer, L., Gligor, V.: A key-management scheme for distributed sensor networks. In: Proceedings of the 9th ACM Conference on Computer and Communications Security, CCS 2002, pp. 41–47 (November 2002)

    Google Scholar 

  10. Perrig, A., Szewczyk, R., Wen, V., Culler, D.E., Tygar, J.D.: SPINS: Security protocols for sensor networks. In: Mobile Computing and Networking, pp. 189–199 (2001)

    Google Scholar 

  11. Baldus, H., Klabunde, K., Msch, G.: Reliable set-up of medical body-sensor networks. In: Karl, H., Wolisz, A., Willig, A. (eds.) EWSN 2004. LNCS, vol. 2920, pp. 353–363. Springer, Heidelberg (2004)

    Google Scholar 

  12. Poon, C.C.Y., Yuan-Ting, Z., Shu-Di, B.: A novel biometrics method to secure wireless body area sensor networks for telemedicine and m-health. IEEE Communications Magazine 44(4), 73–81 (2006)

    Article  Google Scholar 

  13. Falck, T., Baldus, H., Espina, J., Klabunde, K.: Plug ’n play simplicity for wireless medical body sensors. Mobile Networks and Applications 12(2-3), 143–153 (2007)

    Article  Google Scholar 

  14. Gehrmann, C., Mitchell, C., Nyberg, K.: Manual authentication for wireless devices. RSA Cryptobytes 7(1), 29–37 (2004)

    Google Scholar 

  15. Singelée, D., Preneel, B.: Key establishment using secure distance bounding protocols. In: Proceedings of the first Workshop on the Security and Privacy of Emerging Ubiquitous Communication Systems, SPEUCS 2007, Philadelphia, PA, USA, August 2007. IEEE Computer Society Press, Los Alamitos (2007)

    Google Scholar 

  16. Stajano, F., Anderson, R.: The resurrecting duckling: Security issues in ad–hoc wireless networks. In: Malcolm, J.A., Christianson, B., Crispo, B., Roe, M. (eds.) Security Protocols 1999. LNCS, vol. 1796, pp. 172–182. Springer, Heidelberg (2000)

    Chapter  Google Scholar 

  17. Menezes, A.J., van Oorschot, P.C., Vanstone, S.A.: Handbook of Applied Cryptography. CRC Press, Boca Raton (1996)

    Google Scholar 

  18. ISO/IEC 9798-2. Information technology – Security techniques – Entity authentication – Part 2: Mechanisms using symmetric encipherment algorithms (1999)

    Google Scholar 

  19. Daemen, J., Rijmen, V.: The Design of Rijndael – AES – The Advanced Encryption Standard. Springer, Heidelberg (2002)

    MATH  Google Scholar 

  20. NIST Special Publication 800-38C. Recommendation for block cipher modes of operation – the CCM mode for authentication and confidentiality. U.S. DoC/NIST (May 2004), http://csrc.nist.gov/publications/

  21. NIST Special Publication 800-38D. Recommendation for block cipher modes of operation – galois/counter mode (GCM) and GMAC. U.S. DoC/NIST (November 2007), http://csrc.nist.gov/publications/

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2008 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Singelée, D. et al. (2008). A Secure Cross-Layer Protocol for Multi-hop Wireless Body Area Networks. In: Coudert, D., Simplot-Ryl, D., Stojmenovic, I. (eds) Ad-hoc, Mobile and Wireless Networks. ADHOC-NOW 2008. Lecture Notes in Computer Science, vol 5198. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-85209-4_8

Download citation

  • DOI: https://doi.org/10.1007/978-3-540-85209-4_8

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-85208-7

  • Online ISBN: 978-3-540-85209-4

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics