Efficient Distributed Security for Wireless Medical Sensor Networks

被引:0
|
作者
Morchon, Oscar Garcia
Baldus, Heribert
机构
来源
ISSNIP 2008: PROCEEDINGS OF THE 2008 INTERNATIONAL CONFERENCE ON INTELLIGENT SENSORS, SENSOR NETWORKS, AND INFORMATION PROCESSING | 2008年
关键词
Medical Sensor networks; Security; Distributed Algorithms; Key Establishment; Access Control;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Wireless medical sensor networks (MSNs) enable ubiquitous health monitoring of users during their everyday life, at home or at hospital, without restricting their freedom. MSNs improve therefore users' wellbeing and help to quickly react during emergency situations. Security is a key requirement to guarantee safety and privacy of MSN users. However, the resource-constrained nature of the sensor nodes and the operational requirements of these networks hinder the use of traditional security methods. This paper presents a lightweight security system allowing for distributed key establishment and access control in MSNs. The heart of our system is founded on the use of polynomial-based key distribution systems. The security system enables lightweight distributed key agreement and verification of cryptographically signed information, e.g., access control roles or identifiers, on medical sensor nodes without the need of public-key cryptography or a central online trust center. As proof-of-concept, we have implemented our security system on a commercial sensor node platform. Our performance and security analysis shows the feasibility of our approach to deploy resilient and robust MSNs.
引用
收藏
页码:249 / 254
页数:6
相关论文
共 50 条
  • [41] Efficient anonymous authentication with key agreement protocol for wireless medical sensor networks
    Mir, Omid
    Munilla, Jorge
    Kumari, Saru
    PEER-TO-PEER NETWORKING AND APPLICATIONS, 2017, 10 (01) : 79 - 91
  • [42] The future of security in Wireless Multimedia Sensor Networks
    Guerrero-Zapata, Manel
    Zilan, Ruken
    Barcelo-Ordinas, Jose M.
    Bicakci, Kemal
    Tavli, Bulent
    TELECOMMUNICATION SYSTEMS, 2010, 45 (01) : 77 - 91
  • [43] Enhanced Security Protocol in Wireless Sensor Networks
    Aseri, T. C.
    Singla, N.
    INTERNATIONAL JOURNAL OF COMPUTERS COMMUNICATIONS & CONTROL, 2011, 6 (02) : 214 - 221
  • [44] Security Architecture and Requirements for Wireless Sensor Networks
    Gong, Yiguang
    Ruan, Feng
    Fan, Zhiyong
    Hou, Jianmin
    Mei, Ping
    Li, Tao
    INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2016, 10 (08): : 295 - 302
  • [45] Security for Wireless Sensor Networks in Military Operations
    Gupta, Rajat
    Singh, Pallavi
    Sultania, Kaushal
    Gupta, Archit
    2013 FOURTH INTERNATIONAL CONFERENCE ON COMPUTING, COMMUNICATIONS AND NETWORKING TECHNOLOGIES (ICCCNT), 2013,
  • [46] Security Completeness Problem in Wireless Sensor Networks
    Shaikh, Riaz Ahmed
    Lee, Sungyoung
    Albeshri, Aiiad
    INTELLIGENT AUTOMATION AND SOFT COMPUTING, 2015, 21 (02) : 235 - 250
  • [47] Security Issues in Wireless Sensor Networks: A Survey
    Chowdhury, Mahfuzulhoq
    Kader, Md Fazlul
    Asaduzzaman
    INTERNATIONAL JOURNAL OF FUTURE GENERATION COMMUNICATION AND NETWORKING, 2013, 6 (05): : 97 - 115
  • [48] Securing wireless sensor networks: Security architectures
    Boyle, David
    Newe, Thomas
    Journal of Networks, 2008, 3 (01) : 65 - 77
  • [49] Security and Flexibility Contribution for Wireless Sensor Networks
    Mitta, Nourreddine
    Elgouri, Rachid
    Hlou, Lamari
    INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2013, 13 (08): : 21 - 24
  • [50] Research on Security Problems in Wireless Sensor Networks
    Liu, Wentao
    INDUSTRIAL INSTRUMENTATION AND CONTROL SYSTEMS II, PTS 1-3, 2013, 336-338 : 2415 - 2418