Authenticated Key Agreement with Rekeying for Secured Body Sensor Networks

نویسندگان

  • Mohamed Hamdy Eldefrawy
  • Muhammad Khurram Khan
  • Khaled Alghathbar
  • Ahmed Saleh Tolba
  • Kyngn Jung Kim
چکیده

Many medical systems are currently equipped with a large number of tiny, non-invasive sensors, located on, or close to, the patient’s body for health monitoring purposes. These groupings of sensors constitute a body sensor network (BSN). Key management is a fundamental service for medical BSN security. It provides and manages the cryptographic keys to enable essential security features such as confidentiality, integrity and authentication. Achieving key agreement in BSNs is a difficult task. Many key agreement schemes lack sensor addition, revocation, and rekeying properties, which are very important. Our proposed protocol circumvents these shortcomings by providing node rekeying properties, as well as node addition and revocation. It proposes a key distribution protocol based on public key cryptography—the RSA (Rivest, Shamir and Adleman) algorithm, and the DHECC (Diffie-Hellman Elliptic Curve Cryptography) algorithm. The proposed protocol does not trust individual sensors, and partially trusts the base station (hospital). Instead of loading full pair-wise keys into each node, after installation our protocol establishes pair-wise keys between nodes according to a specific routing algorithm. In this case, each node doesn’t have to share a key with all of its neighbors, only those involved in the routing path; this plays a key role in increasing the OPEN ACCESS Sensors 2011, 11 5836 resiliency against node capture attacks and the network storage efficiency. Finally we evaluate our algorithm from the BSN security viewpoint and evaluate its performance in comparison with other proposals.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Retraction: Eldefrawy, M.H.; Khan, M.K.; Alghathbar, K.; Tolba, A.S.; Kim, K.J. Authenticated Key Agreement with Rekeying for Secured Body Sensor Networks. Sensors 2011, 11, 5835–5849.

It has been brought to our attention by a reader of Sensors that substantial portions of this article [1] have been copied from an earlier publication [2] without credit. After confirming this case with the authors, we have determined that indeed this manuscript clearly violates our policy on originality of all material submitted for publication and the generally accepted ethics of scientific p...

متن کامل

Security Analysis of Lightweight Authentication Scheme with Key Agreement using Wireless Sensor Network for Agricultural Monitoring System

Wireless sensor networks have many applications in the real world and have been developed in various environments. But the limitations of these networks, including the limitations on the energy and processing power of the sensors, have posed many challenges to researchers. One of the major challenges is the security of these networks, and in particular the issue of authentication in the wireles...

متن کامل

Secured Key Agreement Scheme with Trust Forcluster Based Mobile Ad Hoc Networks

Mobile Ad-hoc Networks (MANET) has become prominent in recent years whose security is one among the major issue concerned extensively. The security solutions from various researches lacks in considering node to node communication, especially in the infrastructure-less adhoc networks. In this paper, we present a one round secured key agreement scheme with trust (SKAT) in a cluster based MANET en...

متن کامل

Efficient and Secure Temporal Credential-Based Authenticated Key Agreement Using Extended Chaotic Maps for Wireless Sensor Networks

A secure temporal credential-based authenticated key agreement scheme for Wireless Sensor Networks (WSNs) enables a user, a sensor node and a gateway node to realize mutual authentication using temporal credentials. The user and the sensor node then negotiate a common secret key with the help of the gateway node, and establish a secure and authenticated channel using this common secret key. To ...

متن کامل

A new approach towards authenticated key agreement schemes for resource-constrained devices

This paper describes a novel solution for authenticated key agreement for wireless sensor networks (WSN) in logistics. The retrieved data may not be spoofed as it is used to generate information about the quality of the freight, especially for sensitive freight like food. Instead of relying on pre-configuration, every sensor node is authenticated immediately before deployment (e.g. loading into...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره 11  شماره 

صفحات  -

تاریخ انتشار 2011