Security in Wireless Sensor Networks for Health Monitoring Helmet with Anomaly Detection using Power Analysis and Probabilistic Model

被引:0
作者
Panja, Biswajit [1 ]
Scott, Zachary [1 ]
Meharia, Priyanka [2 ]
机构
[1] Univ Michigan, Flint, MI 48502 USA
[2] Eastern Michigan Univ, Ypsilanti, MI 48197 USA
来源
2014 IEEE CONFERENCE ON WIRELESS SENSORS (ICWISE) | 2014年
关键词
security; wireless sensors; power analysis;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Litigation faced by the NFL has called for better prevention and understanding of concussions and other sports injuries. To achieve this, sports officials have turned to wireless sensor networks, or WSNs, in the form of helmet sensors that automatically report any harmful injuries to attendants on the sidelines. While this approach provides players with a greater assurance of safety and a faster response to their injuries, the security weaknesses of WSNs must be addressed. These systems, being not only recently developed but also highly resource-constrained, may be easily manipulated by those looking to gain information about players (a form of passive attack) or even attempting to remove them from the game through the sending of false reports (a form of active attack). To prevent attacks such as these, we propose a system that uses a modification of the AES-CCM protocol as well as a novel attack detection system that uses probabilistic methods to report any harmful behavior to the user. The system's power usage due to injury reports is compared to a probability model that is based on past research that recorded the likelihood of injury for the positions played in professional football. This system offers many advantages over conventional cryptography as it is a lightweight approach that costs few resources; individual helmet sensors need only send simple power reports to a central base station which uses on-the-grid power to conduct security analysis. Provided below is detail of the paper which describes the problem in greater detail, a section that details the system architecture, a section that explains the AES-CCM protocol, and an explanation of the probabilistic approach. This is followed by a security analysis that compares the approach to several other approaches found in the literature, and finally a conclusion.
引用
收藏
页码:73 / 78
页数:6
相关论文
共 21 条
[1]  
Abuhaiba Ibrahim S. I., 2012, International Journal of Computer Network and Information Security, V4, P18, DOI 10.5815/ijcnis.2012.12.02
[2]   Efficient hardware architecture for the AES-CCM protocol of the IEEE 802.11i standard [J].
Algredo-Badillo, Ignacio ;
Feregrino-Uribe, Claudia ;
Cumplido, Rene ;
Morales-Sandoval, Miguel .
COMPUTERS & ELECTRICAL ENGINEERING, 2010, 36 (03) :565-577
[3]  
[Anonymous], P USENIX WORKSH HLTH
[4]  
[Anonymous], 2010, COMPUT SCI
[5]  
Banerjee S., 2012, RECENT TRENDS COMPUT, P372, DOI 10.1007/978-3-642-34135-9 37
[6]  
Bogdanov A, 2007, LECT NOTES COMPUT SC, V4727, P450
[7]   Concussion in the national football league: an overview for neurologists [J].
Casson, Ira R. ;
Pellman, Elliot J. ;
Viano, David C. .
NEUROLOGIC CLINICS, 2008, 26 (01) :217-+
[8]   Head impact exposure in collegiate football players [J].
Crisco, Joseph J. ;
Wilcox, Bethany J. ;
Beckwith, Jonathan G. ;
Chu, Jeffrey J. ;
Duhaime, Ann-Christine ;
Rowson, Steven ;
Duma, Stefan M. ;
Maerlender, Arthur C. ;
McAllister, Thomas W. ;
Greenwald, Richard M. .
JOURNAL OF BIOMECHANICS, 2011, 44 (15) :2673-2678
[9]  
Dudani S. A., 1976, IEEE Transactions on Systems, Man and Cybernetics, VSMC-6, P325, DOI 10.1109/TSMC.1976.5408784
[10]  
Engels D, 2010, LECT NOTES COMPUT SC, V6054, P3, DOI 10.1007/978-3-642-14992-4_2