A Secure Transmission Protocol for Wireless Body Sensor Networks
نویسندگان
چکیده
A wireless body sensor network (WBSN) is a typically wearable wireless network deployed on a user’ body, which consists of biosensors and a local personal wireless hub, which we commonly call wireless body sensor network controller (WBSNC). The sensitive micro data (SMD) of WBSN users is collected by biosensors and forwarded to the WBSNC before it is delivered to the data process center (healthcare terminal or remote server) for further processing. Since SMD involves user’s personal privacy, it is important to protect secure transmission of SMD. Therefore it is crucial to admit only legitimate biosensors and WBSNC into the network in a WBSN. Ensuring the safety of data transmission from each biosensor to WBSNC or between WBSNC and the data process center is essential because of the open feature in wireless channel. In this paper, we present a novel kind of cryptography and authentication method to assure a secure network admission and transmission in a WBSN based on ID. The procedures in this system to establish keys for each biosensor and WBSNC must offer high communication validity and as low energy consumption as possible. In addition, we also propose a new way to protect BSN secure access for biosensor and WBSNC in order to block interference from Pseudo Node.
منابع مشابه
An Adaptive Congestion Alleviating Protocol for Healthcare Applications in Wireless Body Sensor Networks: Learning Automata Approach
Wireless Body Sensor Networks (WBSNs) involve a convergence of biosensors, wireless communication and networks technologies. WBSN enables real-time healthcare services to users. Wireless sensors can be used to monitor patients’ physical conditions and transfer real time vital signs to the emergency center or individual doctors. Wireless networks are subject to more packet loss and congestion. T...
متن کاملA Secure Routing Algorithm for Underwater Wireless Sensor Networks
Recently, underwater Wireless Sensor Networks (UWSNs) attracted the interest of many researchers and the past three decades have held the rapid progress of underwater acoustic communication. One of the major problems in UWSNs is how to transfer data from the mobile node to the base stations and choosing the optimized route for data transmission. Secure routing in UWSNs is necessary for packet d...
متن کاملAn efficient symmetric polynomial-based key establishment protocol for wireless sensor networks
An essential requirement for providing secure services in wireless sensor networks is the ability to establish pairwise keys among sensors. Due to resource constraints on the sensors, the key establishment scheme should not create significant overhead. To date, several key establishment schemes have been proposed. Some of these have appropriate connectivity and resistance against key exposure, ...
متن کاملAn efficient solution for management of pre-distribution in wireless sensor networks
A sensor node is composed of different parts including processing units, sensor, transmitter, receiver, and security unit. There are many nodes in a sensor unit. These networks can be used for military, industrial, medicine, environmental, house, and many other applications. These nodes may be established in the lands of enemies to monitor the relations. Hence, it is important to consider conse...
متن کاملDTMP: Energy Consumption Reduction in Body Area Networks Using a Dynamic Traffic Management Protocol
Advances in medical sciences with other fields of science and technology is closely casual profound mutations in different branches of science and methods for providing medical services affect the lives of its descriptor. Wireless Body Area Network (WBAN) represents such a leap. Those networks excite new branches in the world of telemedicine. Small wireless sensors, to be quite precise and calc...
متن کاملAn Adaptive LEACH-based Clustering Algorithm for Wireless Sensor Networks
LEACH is the most popular clastering algorithm in Wireless Sensor Networks (WSNs). However, it has two main drawbacks, including random selection of cluster heads, and direct communication of cluster heads with the sink. This paper aims to introduce a new centralized cluster-based routing protocol named LEACH-AEC (LEACH with Adaptive Energy Consumption), which guarantees to generate balanced cl...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید
ثبت ناماگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید
ورودعنوان ژورنال:
- JSW
دوره 9 شماره
صفحات -
تاریخ انتشار 2014