Eliminating Reconciliation Cost in Secret Key Generation for Body-Worn Health Monitoring Devices

被引:75
作者
Ali, Syed Taha [1 ]
Sivaraman, Vijay [1 ]
Ostry, Diethelm [2 ]
机构
[1] Univ New S Wales, Sch Elect Engn & Telecommun, Sydney, NSW 2018, Australia
[2] CSIRO ICT Ctr, Sydney, NSW 2122, Australia
关键词
Body area networks; secret key generation; physical layer security;
D O I
10.1109/TMC.2013.71
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Medical data collected by wearable wireless sensor devices must be adequately secured. A prerequisite for mass deployment of these secure systems is the ability to periodically renew cryptographic keys without user involvement. Recent work has shown that two communicating devices can generate secret keys directly from measurements of their common wireless channel, which is symmetric but cannot be inferred in detail by an eavesdropper. These schemes may, however, yield mismatching keys at the two ends, requiring reconciliation mechanisms with high implementation and energy costs, unsuitable for resource-poor body-worn devices. In this work, we demonstrate a scheme for secret-key generation able to construct shared keys with near-perfect agreement, thereby avoiding reconciliation costs. Our specific contributions are: (1) we identify non-simultaneous probing of the channel by the link end-points as the dominant cause of channel measurement disagreement; (2) we develop a practical filtering scheme to reduce this disagreement, dramatically improving signal correlation between the two ends without affecting key entropy; and (3) we show that by restricting key generation to periods of significant channel fluctuation, we achieve near-perfect key agreement. We demonstrate in several representative body-worn settings that our scheme can generate secret bits with 99.8% agreement, and so yield near-perfect matching 128-bit keys approximately every half hour.
引用
收藏
页码:2763 / 2776
页数:14
相关论文
共 36 条
[1]  
ABI Research Service, 2012, MARK WEAR WIR SENS G
[2]  
Ali S. T., 2010, Proceedings 2010 IEEE/IFIP 8th International Conference on Embedded and Ubiquitous Computing (EUC 2010), P644, DOI 10.1109/EUC.2010.103
[3]  
Ali S. T, 2012, P 5 ACM C SEC PRIV W, P39
[4]  
[Anonymous], P EUR COMP SCI
[5]  
[Anonymous], 2011, 2011 IEEE 13th International Conference on e-Health Networking, Applications and Services, DOI [DOI 10.1109/HEALTH.2011.6026732, 10.1109/HEALTH.2011.6026732]
[6]  
[Anonymous], 1974, MICROWAVE MOBILE CO
[7]  
[Anonymous], INT C COMP COMM TECH
[8]  
[Anonymous], 2004, 2 4 GHZ IEEE 802 15, V4
[9]  
Apple Inc, 2010, SENS STRIP
[10]   Robust Key Generation from Signal Envelopes in Wireless Networks [J].
Azimi-Sadjadi, Babak ;
Kiayias, Aggelos ;
Mercado, Alejandra ;
Yener, Bulent .
CCS'07: PROCEEDINGS OF THE 14TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2007, :401-+