| Literature DB >> 26131666 |
Sandeep Pirbhulal1,2, Heye Zhang3,4, Subhas Chandra Mukhopadhyay5, Chunyue Li6,7, Yumei Wang8, Guanglin Li9,10,11, Wanqing Wu12,13, Yuan-Ting Zhang14,15,16.
Abstract
Body Sensor Network (BSN) is a network of several associated sensor nodes on, inside or around the human body to monitor vital signals, such as, Electroencephalogram (EEG), Photoplethysmography (PPG), Electrocardiogram (ECG), etc. Each sensor node in BSN delivers major information; therefore, it is very significant to provide data confidentiality and security. All existing approaches to secure BSN are based on complex cryptographic key generation procedures, which not only demands high resource utilization and computation time, but also consumes large amount of energy, power and memory during data transmission. However, it is indispensable to put forward energy efficient and computationally less complex authentication technique for BSN. In this paper, a novel biometric-based algorithm is proposed, which utilizes Heart Rate Variability (HRV) for simple key generation process to secure BSN. Our proposed algorithm is compared with three data authentication techniques, namely Physiological Signal based Key Agreement (PSKA), Data Encryption Standard (DES) and Rivest Shamir Adleman (RSA). Simulation is performed in Matlab and results suggest that proposed algorithm is quite efficient in terms of transmission time utilization, average remaining energy and total power consumption.Entities:
Keywords: Body Sensor Network (BSN); Electrocardiogram (ECG); Heart Rate Variability (HRV); biometric; efficiency; security
Mesh:
Year: 2015 PMID: 26131666 PMCID: PMC4541821 DOI: 10.3390/s150715067
Source DB: PubMed Journal: Sensors (Basel) ISSN: 1424-8220 Impact factor: 3.576
Figure 1Body Sensor Network Architecture, with the permission form [3].
Figure 2Block diagram of capacitive measurement system.
Figure 3Block diagram of Biometric-based Proposed Algorithm.
The average Standard Deviation of NN interval (SDNN) and average Root-Mean Squared of the Successive Differences (RMSSD), and SDNN-to-RMSSD (SRR) for different subjects.
| Subjects | Average SDNN | Average RMSSD | SDNN-to-RMSSD Ratio (SRR) | SRR*103 | SRR*103 (Binary 16 Bits) |
|---|---|---|---|---|---|
| 1 | 87.823 | 46.877 | 1.873 | 1873 | 0000011101010001 |
| 2 | 88.294 | 29.964 | 2.946 | 2946 | 0000101110000010 |
| 3 | 65.404 | 24.712 | 2.646 | 2646 | 0000101001010110 |
| 4 | 99.772 | 56.776 | 1.757 | 1757 | 0000011011011101 |
| 5 | 64.684 | 24.926 | 2.595 | 2595 | 0000101000100011 |
| 6 | 60.779 | 31.389 | 1.936 | 1936 | 0000011110010000 |
| 7 | 103.311 | 86.998 | 1.187 | 1187 | 0000010010100011 |
| 8 | 95.670 | 45.338 | 2.110 | 2110 | 0000100000111110 |
| 9 | 67.413 | 28.804 | 2.340 | 2340 | 0000100100100100 |
| 10 | 145.398 | 82.814 | 1.755 | 1755 | 0000011011011011 |
| 11 | 171.083 | 121.290 | 1.410 | 1410 | 0000010110000010 |
| 12 | 61.675 | 30.409 | 2.028 | 2028 | 0000011111101100 |
| 13 | 107.385 | 76.436 | 1.404 | 1404 | 0000010101111100 |
| 14 | 77.977 | 31.235 | 2.496 | 2496 | 0000100111000000 |
| 15 | 89.431 | 61.906 | 1.444 | 1444 | 0000010110100100 |
| 16 | 69.660 | 30.627 | 2.274 | 2274 | 0000100011100010 |
| 17 | 62.985 | 31.688 | 1.987 | 1987 | 0000011111000011 |
| 18 | 57.524 | 17.604 | 3.267 | 3267 | 0000110011000011 |
| 19 | 113.543 | 79.594 | 1.426 | 1426 | 0000010110010010 |
| 20 | 97.117 | 66.308 | 1.464 | 1464 | 0000010110111000 |
| 21 | 70.131 | 47.749 | 1.468 | 1468 | 0000010110111100 |
| 22 | 72.651 | 39.758 | 1.827 | 1827 | 0000011100100011 |
| 23 | 100.784 | 74.449 | 1.353 | 1353 | 0000010101001001 |
| 24 | 61.608 | 36.512 | 1.687 | 1687 | 0000011010010111 |
Figure 4The block diagram of communication model for Body Sensor Networks (BSNs) using proposed authentication protocol.
Figure 5The key generation procedure for proposed algorithm.
Figure 6Amount of data transmission in bits with same percentage of resource utilization for different methods.
List of abbreviations used in performance analysis.
| Abbreviation | Detail | Abbreviation | Detail |
|---|---|---|---|
|
| Total simulation time |
| Data length in binary |
|
| Complexity per round |
| Initial energy |
|
| Number of rounds |
| Average remaining energy |
|
| Number of keys required for all rounds |
| Remaining energy for destination |
|
| Number of keys required per round |
| Remaining energy from source |
|
| Initial key size |
| Transmission power |
|
| Data length in decimal |
| Reception power |
|
| Data rate |
| Power utilized |
Comparison between proposed algorithm, Physiological Signal based Key Agreement (PSKA), Data Encryption Standard (DES) and Rivest Shamir Adleman (RSA).
| Methods | Parameters | ||
|---|---|---|---|
| Transmission Time (ms) | Average Remaining Energy (Joules) | Power Utilization (mW) | |
| Proposed Algorithm | 0.207 | 0.998 | 9.64 |
| PSKA | 0.239 | 0.976 | 9.89 |
| DES(Symmetric Encryption Approach) | 3.40 | 0.963 | 10.05 |
| RSA(Asymmetric-Encryption Approach) | 6.40 | 0.932 | 10.10 |
Figure 7ECG waveform of 20-year-old female patient.
Figure 8The inter-beat (RR) interval representation (a) RR-interval for 1 min; (b) RR-interval for 1 h; and (c) RR-interval for complete wave.
Figure 9(a) Histogram representation of RR-interval for 1 min; (b) histogram representation of RR-interval for 1 h; and (c) histogram representation of RR-interval for complete wave.
Figure 10Performance analysis: (a) total Transmission Time for different methods; (b) average remaining energy for different methods; and (c) total power required for different methods.