R2NA: Received Signal Strength (RSS) Ratio-Based Node Authentication for Body Area Network

نویسندگان

  • Yang Wu
  • Kai Wang
  • Yongmei Sun
  • Yuefeng Ji
چکیده

The body area network (BAN) is an emerging branch of wireless sensor networks for personalized applications. The services in BAN usually have a high requirement on security, especially for the medical diagnosis. One of the fundamental directions to ensure security in BAN is how to provide node authentication. Traditional research using cryptography relies on prior secrets shared among nodes, which leads to high resource cost. In addition, most existing non-cryptographic solutions exploit out-of-band (OOB) channels, but they need the help of additional hardware support or significant modifications to the system software. To avoid the above problems, this paper presents a proximity-based node authentication scheme, which only uses wireless modules equipped on sensors. With only one sensor and one control unit (CU) in BAN, we could detect a unique physical layer characteristic, namely, the difference between the received signal strength (RSS) measured on different devices in BAN. Through the above-mentioned particular difference, we can tell whether the sender is close enough to be legitimate. We validate our scheme through both theoretical analysis and experiments, which are conducted on the real Shimmer nodes. The results demonstrate that our proposed scheme has a good security performance.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Adaptive RLS-Received Signal Strength Algorithm in Wireless Network Area for Multi-Mobile Nodes Location Estimation System

Recently, the current Received Signal Strength based positioning systems have been designed to monitor the location information of mobile nodes and Patients. The positioning systems are designed with different wireless communication technologies and adapted algorithms in wireless network area. The adaptive algorithms improve the accuracy of location of mobile nodes in RSS (Received Signal Stren...

متن کامل

SeAK: Secure Authentication and Key Generation Protocol Based on Dual Antennas for Wireless Body Area Networks

The increasing interest in the usage of wireless body area networks (WBAN) in healthcare and other critical applications underscores the importance of secure communication among the body sensor devices. Associating an unknown device with an existing network without prior knowledge of a secret key poses a major challenge. Existing authentication schemes in WBAN are typically based on received si...

متن کامل

Three Dimensional Localization of an Unknown Target Using Two Heterogeneous Sensors

Heterogeneous wireless sensor networks consist of some different types of sensor nodes deployed in a particular area. Different sensor types can measure different quantity of a source and using the combination of different measurement techniques, the minimum number of necessary sensors is reduced in localization problems. In this paper, we focus on the single source localization in a heterogene...

متن کامل

A Routing Protocol Based on Received Signal Strength for Underwater Wireless Sensor Networks (UWSNs)

Underwater wireless sensor networks (UWSNs) are featured by long propagation delay, limited energy, narrow bandwidth, high BER (Bit Error Rate) and variable topology structure. These features make it very difficult to design a short delay and high energy-efficiency routing protocol for UWSNs. In this paper, a routing protocol independent of location information is proposed based on received sig...

متن کامل

Security Improvement of Dropper Elimination Scheme for IoT Based Wireless Networks

Eliminate the eavesdropper collusion occurredby the two or more devices communicating via optimal relay with centralized router using IOT network. The overall delay is reduced with increase in throughput.This paper studies the important of Received signal strength of wireless communication under eavesdropper collusion where detecting the malicious node. To provide knowledge about the security i...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره 13  شماره 

صفحات  -

تاریخ انتشار 2013