“…Traditionally, authentication in WSNs and BANs relied on the existence of prior security context [19], [20], [21], [22], [23]. If the device in BANs is physically compromised, the prior security context in the device will be disclosed to attackers.…”
In wireless body area network (BAN), node authentication is essential for trustworthy and reliable gathering of patient's critical health information. Traditional authentication solutions depend on prior trust among nodes whose establishment would require either key pre-distribution or non-intuitive participation by inexperienced users. Most existing non-cryptographic authentication schemes require advanced hardware or significant modifications to the system software, which are impractical for BANs.In this paper, for the first time, we propose a lightweight body area network authentication scheme BANA. Different from previous work, BANA does not depend on prior-trust among nodes and can be efficiently realized on commercial off-the-shelf low-end sensors. We achieve this by exploiting a unique physical layer characteristic naturally arising from the multi-path environment surrounding a BAN, i.e., the distinct received signal strength (RSS) variation behaviors among on-body channels and between on-body and off-body communication channels. Based on distinct RSS variations, BANA adopts clustering analysis to differentiate the signals from an attacker and a legitimate node. We also make use of multi-hop on-body channel characteristics to enhance the robustness of our authentication mechanism. The effectiveness of BANA is validated through extensive real-world experiments under various scenarios. It is shown that BANA can accurately identify multiple attackers with minimal amount of overhead.
“…Traditionally, authentication in WSNs and BANs relied on the existence of prior security context [19], [20], [21], [22], [23]. If the device in BANs is physically compromised, the prior security context in the device will be disclosed to attackers.…”
In wireless body area network (BAN), node authentication is essential for trustworthy and reliable gathering of patient's critical health information. Traditional authentication solutions depend on prior trust among nodes whose establishment would require either key pre-distribution or non-intuitive participation by inexperienced users. Most existing non-cryptographic authentication schemes require advanced hardware or significant modifications to the system software, which are impractical for BANs.In this paper, for the first time, we propose a lightweight body area network authentication scheme BANA. Different from previous work, BANA does not depend on prior-trust among nodes and can be efficiently realized on commercial off-the-shelf low-end sensors. We achieve this by exploiting a unique physical layer characteristic naturally arising from the multi-path environment surrounding a BAN, i.e., the distinct received signal strength (RSS) variation behaviors among on-body channels and between on-body and off-body communication channels. Based on distinct RSS variations, BANA adopts clustering analysis to differentiate the signals from an attacker and a legitimate node. We also make use of multi-hop on-body channel characteristics to enhance the robustness of our authentication mechanism. The effectiveness of BANA is validated through extensive real-world experiments under various scenarios. It is shown that BANA can accurately identify multiple attackers with minimal amount of overhead.
“…Many security experts in the field of wireless technologies have conducted research on different aspects within the security architecture of Bluetooth and have provided amazing results with new tweaks that enhances the security of the device within a network. Some commendable research work is mentioned in [6]. [7] and [8].…”
Section: Related Workmentioning
confidence: 99%
“…In [6], the authors have presented a light weight protocol to provide location privacy in wireless body area network. The basic idea of their protocol is on the use of temporary pseudonyms instead the use of hardware addresses to communicate in the wireless body area networks.…”
Section: Related Workmentioning
confidence: 99%
“…So, using combination keys are safer. 6 For devices using Secure Simple Pairing (SSP), avoid using the "Just Works" model. Mutual authentication is required to provide verification that all devices on the network are legitimate.…”
Bluetooth technology has become an integral part of this modern society. The availability of mobile phones, game controllers, Personal Digital Assistant (PDA) and personal computers has made Bluetooth a popular technology for short range wireless communication. However, as the Bluetooth technology becomes widespread, vulnerabilities in its security protocols are increasing which can be potentially dangerous to the privacy of a user's personal information. The security issues of Bluetooth have been an active area of research for the last few years. This paper presents the vulnerabilities in the security protocols of this technology along with some past security threats and possible countermeasures as reported in the literatures which have been surveyed and summarized in this paper. It also presents some tips that end-users can implement immediately to become more cautious about their private information. Finally, the paper concludes with some recommendations for future security enhancements that can be implemented in the Bluetooth standard.
“…solution the function used in the central system is just the inverse of the function used at the sensor node for cipher the data. There are few methods present [17] for key generation and cipher the data. …”
In Wireless Body Area Network (WBAN), detection of fault node improves reliability and security for long range transmission. In this paper, we propose a combined approach for reliable and secured data transmission in WBAN. The proposed architecture consists of sensor nodes, relay nodes, the intermediate processing nodes and body area network (BAN) coordinator where the nodes are modeled to have direct and relay mode. The secured communication is ensured among the node and BAN coordinator by following simple protocol. The secure data transmission is proposed through authentication check, duplication check and faulty node detection. The proposed method is applicable to long ranges of transmission. It is also supporting a retransmission concept. Advancement of work to secure level checking provides a prohibition unwanted responses of WBAN and retransmission improves the probability of sending all most all data. Faulty node detection powers our security checking methodology further. By simulation results we prove that the proposed approach reduces the packet drop, energy consumption and the delay.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.