| Literature DB >> 30042302 |
Puning Zhang1, Jie Ma2.
Abstract
Advances of information and communication technologies in medical areas have led to the emergence of wireless body area network (WBAN). The high accessibility of media in WBAN can easily lead to the malicious tapping or tampering attacks, which may steal privacy data or inject wrong data. However, existing privacy protection mechanisms in WBAN depend on the third-party key management system and have a complex key exchange process. To enhance user privacy at a low cost and with high flexibility, a channel characteristic aware privacy protection mechanism is proposed for WBAN. In the proposed mechanism, the similarity of RSS is measured to authenticate nodes. The key extraction technique can reduce the cost of the key distribution process. Due to the half duplex communication mode of sensors, the biased random sequences are extracted from the RSS of sensor nodes and coordinator. To reduce the inconsistency, we propose the n-dimension quantification and fuzzy extraction, which can quickly encrypt the transmission information and effectively identify malicious nodes. Simulation results show that the proposed mechanism can effectively protect user privacy against tampering and eavesdropping attacks.Entities:
Keywords: information encryption; node authentication; privacy protection; wireless body area network
Year: 2018 PMID: 30042302 PMCID: PMC6111416 DOI: 10.3390/s18082403
Source DB: PubMed Journal: Sensors (Basel) ISSN: 1424-8220 Impact factor: 3.576
Figure 1WBAN Network Model.
The meaning of notations.
| Notation | Meaning |
|---|---|
| The received signal intensity of arbitrary distance | |
| The transmission power of sensor node. | |
| The antenna gain of sensor node. | |
| The antenna gain of the coordinator. | |
| The system loss factor. | |
| The wavelength of the wireless signal. | |
| The path loss factor. | |
| A normal random variable. | |
| The mean square error between the RSS observations of | |
| The correlation coefficient. | |
| The wave factor. |
Figure 2RSS filter quantizer.
Figure 3The fuzzy extractor.
Figure 4The influence of various actions on the false probability of authentication.
Figure 5The influence of inconsistent initial bits on the inconsistent key rate.
Figure 6The change of bit generation rate with different dimensions.
Figure 7The variation of bit inconsistency with .
NIST test results for generating keys under different dimensions.
| Dimensional | 1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 |
|---|---|---|---|---|---|---|---|---|
| Frequency | 0.48 | 0.21 | 0.35 | 0.12 | 0.68 | 0.68 | 0.31 | 0.025 |
| Block frequency | 0.99 | 0.53 | 0.58 | 0.48 | 0.48 | 0.91 | 0.87 | 0.24 |
| Cumulative sums (Fwd) | 0.39 | 0.27 | 0.14 | 0.35 | 0.18 | 0.18 | 0.68 | 0.43 |
| Cumulative sums (Rev) | 0.87 | 0.58 | 0.18 | 0.74 | 0.99 | 0.16 | 0.27 | 0.16 |
| Runs | 0.68 | 0.91 | 0.68 | 0.74 | 0.78 | 0.24 | 0.18 | 0.53 |
| Longest runs of ones | 0.96 | 0.4 | 0.87 | 0.74 | 0.27 | 0.74 | 0.96 | 0.017 |
| FFT | 0.28 | 0.1 | 0.23 | 0.21 | 0.31 | 0.17 | 0.07 | 0.00 |
| Approximate entropy | 0.53 | 0.78 | 0.12 | 0.35 | 0.91 | 0.24 | 0.35 | 0.41 |
| Serial | 0.21, 0.4 | 0.83, 0.48 | 0.63, 0.63 | 0.78, 0.79 | 0.21, 0.53 | 0.87, 0.53 | 0.03, 0.16 | 0.04, 0.63 |
Figure 8The change in the bit generation rate with the increase of dimension.
Figure 9The variation of the bit disagreement rate with the dimension.
Figure 10Complexity benchmarking based on execution time.