TRUST-DRIVEN KEY MANAGEMENT FOR SECURE WIRELESS BODY AREA NETWORKS
Aziz Dahmani , Department of telecommunications, University of Tlemcen, Tlemcen, AlgeriaAbstract
Wireless Body Area Networks (WBANs) are instrumental in healthcare monitoring, relying on continuous and secure data exchange among implanted and external devices. Ensuring confidentiality and integrity of sensitive medical data is paramount, necessitating robust key management schemes. This paper proposes a Trust-Driven Key Management (TDM) framework tailored for WBANs, leveraging trust metrics to enhance security and efficiency. By dynamically adjusting trust levels based on node behavior and communication patterns, the TDM scheme optimizes key distribution, authentication, and revocation processes. Simulation results demonstrate improved resilience against security threats while minimizing overhead, affirming the efficacy of TDM in enhancing WBANs' security posture.
Keywords
Wireless Body Area Networks (WBANs), Key Management, Trust-Based Security
References
S. D. Bao, C. Y. Poon, Y. T. Zhang, and L. F. Shen, “Using the timing information of heartbeats as an entity identifier to secure body sensor network,” IEEE Transactions on Information Technology in Biomedicine, pp. 772-779, 2008.
S. Cherukuri, K. K. Venkatasubramanian, and S.K. S. Gupta, “Biosec: A biometric based approach for securing communication in wireless networks of biosensors implanted in the human body,” Proceedings of the 32nd International Conference on Parallel Processing, pp. 432-439, 2003.
E. Dishman, “Inventing wellness systems for aging in place,” IEEE Computer, vol. 37, no. 5, pp. 34-41,May 2004.
M. R. Doomun and K. M. S. Soyjaudah, “Analytical comparison of cryptographic techniques for resourceconstrained wireless security,” International Journal of Network Security, vol. 9, no. 1, pp. 82-94, July 2009.
J. GrosschLadl, “TinySA: A security architecture for wireless sensor networks (extended abstract),” Proceedings of the 2nd International Conference on Emerging Networking Experiments and Technologies (CoNEXT 2006), Lisbon, Portugal, December 4–7, ACM Press, 2006.
J, GrosschL adl, Alexander Szekely, Stefan Tillich, ” The Energy Cost of Cryptographic Key Establishment in Wireless Sensor Networks (Extended Abstract)”, ASIACCS ’07, pp. 380-382, Singapore, Mar.20-22, 2007.
M. Guennoun, M. Zandi, and K. E. Khatib, “On the use of biometrics to secure wireless biosensor networks,” Information and Communication Technologies: From Theory to Applications, pp. 1-5, 2008.
R. S. H. Istepanian, E. Jovanov, and Y. T. Zhang, “Guest editorial introduction to the special section on m-health: Beyond seamless mobility and global wireless health-care connectivity,” IEEE Transactions on Information Technology in Biomedicine, vol. 8, no. 4, pp. 405-414, Dec. 2004.
E. Jovanov, A. Milenkovic, C. Otto, and P. C.D. Groen, “A wireless body area network of intelligent motion sensors for computer assisted physical rehabilitation,” Journal of NeuroEngineering and Rehabilitation, vol. 2, no. 6, Mar. 2005. (http://www.jneuroengrehab.com/content/2/1/6)
C. Karlof, N. Sastry, and D. Wagner, “TinySec: A link layer security architecture for wireless sensornetworks,” Second ACM Conference on Embedded Networked Sensor Systems, pp. 162-175, Nov. 2004.
T. Landstra, S. Jagannathan, and M. Zawodniok, “Energy-efficient hybrid key management protocol for wireless sensor networks,” International Journal of Network Security, vol. 9, no. 2, pp. 121-134, Sep.2009.
Article Statistics
Downloads
Copyright License
Copyright (c) 2024 Aziz Dahmani
This work is licensed under a Creative Commons Attribution 4.0 International License.