| Literature DB >> 22319333 |
Khaliq-ur-Rahman Raazi Syed Muhammad1, Heejo Lee, Sungyoung Lee, Young-Koo Lee.
Abstract
Wireless body area networks (WBAN) consist of resource constrained sensing devices just like other wireless sensor networks (WSN). However, they differ from WSN in topology, scale and security requirements. Due to these differences, key management schemes designed for WSN are inefficient and unnecessarily complex when applied to WBAN. Considering the key management issue, WBAN are also different from WPAN because WBAN can use random biometric measurements as keys. We highlight the differences between WSN and WBAN and propose an efficient key management scheme, which makes use of biometrics and is specifically designed for WBAN domain.Entities:
Keywords: body area networks; healthcare; humanware; key management; security
Mesh:
Year: 2010 PMID: 22319333 PMCID: PMC3274185 DOI: 10.3390/s100403911
Source DB: PubMed Journal: Sensors (Basel) ISSN: 1424-8220 Impact factor: 3.576
Differences between WBAN and WSN.
| Small scale (Number of nodes may not exceed 20) | Large scale (Number of nodes may exceed even 1,000) | |
| Very small (Size of human body). All nodes may be in communication range of each other | Spans area like battlefields or natural habitat large | |
| Possible rather inevitable in some cases | Not possible in most cases | |
| Yes, Sensor nodes need not generate random numbers | No |
Differences between the security requirements of WBAN and WSN.
| Required | Required | |
| Required | Required | |
| Required | Required | |
| Not necessary | Required | |
| Not required | Required | |
| Not required | Required | |
List of Used Notations.
Figure 1.System architecture of wireless body area networks.
Figure 2.Example of a key management schedule with n slots.
Figure 3.Flowchart of our proposed scheme.
Storage requirements (in bytes) of each type of node in all three schemes.
| { | ( | |
| [( | (4 × |
Average number of messages transmitted by each type of node in initial deployment phase of all three schemes.
| 1 | ||
| 2 × ( | 2 × | |
| 1 | 1 |
Average number of messages transmitted by each type of node when communication key is refreshed in all three schemes.
| ( | ||
| 1 | − | |
| 1 | − |
Average number of messages transmitted by each type of node when administrative key is refreshed in all three schemes.
| ( | (( | |
| ((2 × | 1 |
Figure 4.Comparison of Average Energy Consumed by a Sensor Node in different phases of each scheme.
Figure 5.Comparison of average energy consumed by a personal server in different phases of each scheme.
Figure 6.Comparison of average energy consumed by a node (including sensor nodes and the personal server) in different phases of each scheme.