A Survey on the Development of Security Mechanisms for Body Area Networks

被引:13
作者
Karaoglan, Duygu [1 ]
Levi, Albert [1 ]
机构
[1] Sabanci Univ, Fac Engn & Nat Sci, Istanbul, Turkey
关键词
body area networks; security mechanisms; elliptic curve cryptography; bio-cryptography; fuzzy commitment; fuzzy vault; ELLIPTIC CURVE CRYPTOGRAPHY; SENSOR NETWORKS; HEALTH-CARE; SYSTEM; ECG; AUTHENTICATION; TELEMEDICINE; CHALLENGES; BIOMETRICS; MODEL;
D O I
10.1093/comjnl/bxt077
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Advances in lightweight, small-sized and low-power sensors led to the development of wearable biosensors, and thus, to the accurate monitoring of human periphery. On top of this, pervasive computing has been improved and technologies have been matured enough to build plug-and-play body area networks (BANs). In a BAN, the main functionality of a node is to effectively and efficiently collect data from vital body parts, share it with the neighbors and make decisions accordingly. Because of the fact that the captured phenomenon is highly sensitive to privacy breaches in addition to being transmitted using the wireless communication medium, BANs require a security infrastructure. However, due to the extreme energy scarcity, bandwidth and storage constraints of the nodes, conventional solutions are inapplicable. In this survey, we present an overview of BANs and provide a detailed investigation into the developed security infrastructures. We examined the literature and combined the corresponding proposals under two major classes: (i) pure-cryptographic security mechanisms and (ii) bio-cryptographic security mechanisms. Pure-cryptographic methods include constructions based on the well-known symmetric or asymmetric cryptography primitives and they are suitable for securing the communication between any two network entities. On the other hand, bio-cryptographic methods benefit from the network's context-awareness and to the best of our knowledge, they have been utilized only for the communication among the biosensors.
引用
收藏
页码:1484 / 1512
页数:29
相关论文
共 106 条
  • [1] Andersen J, 2007, IFMBE PROC, V13, P223
  • [2] A security policy model for clinical information systems
    Anderson, RJ
    [J]. 1996 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS, 1996, : 30 - 43
  • [3] [Anonymous], P IEE EUR BIRM UK SE
  • [4] [Anonymous], WMCS200711 COLL WILL
  • [5] [Anonymous], 2003, PROC 1 ACM WORKSHOP
  • [6] [Anonymous], P INT C BOD AR NETW
  • [7] [Anonymous], P INT C BOD AR NETW
  • [8] [Anonymous], FUZZY EXTRACTORS
  • [9] [Anonymous], TR200195 SUN MICR LA
  • [10] [Anonymous], P INT C SEC PERV COM