10.1145/3231830.3231841acmotherconferencesArticle/Chapter ViewAbstractPublication PagesawictConference Proceedingsconference-collections
research-article

A Secure Body Sensor Network Architecture with CP-ABE Based Fine-Grained Data Access Control

Authors Info & Claims
Published:13 November 2017Publication History

ABSTRACT

Body Sensor Network (BSN) is a network of wirelessly connected physiological sensors. BSNs offer promising innovative medical and non-medical applications. In such applications and networks, security is essential, critical, and challenging. In this context, data privacy and data security are major requirements. The ultimate goal of data privacy is to implement an efficient fine-grained data access control. Ciphertext-Policy Attribute-Based Encryption (CP-ABE) schemes offer a vital option for achieving fine-grained data access control in BSNs. In this work, we propose a secure cluster-based BSN architecture optimized for an energy-efficient operation. The new architecture is designed to allow flexible operation by 1) implementing CP-ABE either on sensor nodes or on the BSN controller, and 2) targeting specific performance merits through proposed enhancement approaches. Three CP-ABE schemes are investigated, the original CP-ABE (BSW), an enhanced CP-ABE (ECP- ABE), and a CP-ABE scheme with constant ciphertext length (CCP-ABE). Thorough simulations are conducted on the MICAz sensor node platform. The performance evaluation, for typical BSN applications, shows that ECP-ABE outperforms BSW. Interestingly, CCP-ABE provides only a marginal advantage in cluster lifetime compared to ECP-ABE defeating the purpose of sacrificing flexible access structure for constant ciphertext length.

References

  1. M. Hanson, H. Powell, A. Barth, K. Ringgenberg, B. Calhoun, J. Aylor, and J. Lach, "Body Area Sensor Networks: Challenges and Opportunities," IEEE Computer Society, vol. 42, pp. 58-- 65, 2009. Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. H. Cao, V. Leung, C. Chow, and H, Chan, "Enabling Technologies for Wireless Body Area Networks: A Survey and Outlook," IEEE Communications Magazine, vol. 47, issue 12, pp. 84-- 93, 2009. Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. Q. Wang, K. Ren, C. Wang, and W, Lou, "Efficient Fine-Grained Data Access Control in Wireless Sensor Networks," IEEE Military Communications Conference (MILCOM), pp. 1--7, 2009. Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. M. Patel, and W. Jianfeng, "Applications, Challenges, and Prospective in Emerging Body Area Networking Technologies," IEEE Wireless Communication, pp. 80--88, 2010. Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. S. Nabar, J. Walling, and R. Poovendran, "Minimizing Energy Consumption in Body Sensor Networks via Convex Optimization," International Conference on Body Sensor Networks (BSN), pp. 62--67, 2010. Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. S. Jinyuan, F. Yuguang, and Z. Xiaoyan, "Privacy and emergency response in e-healthcare leveraging wireless body sensor networks," IEEE Wireless Communication, pp. 66--73, 2010. Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. H. Ghasemzadeh and R. Jafari, R. "Data Aggregation in Body Sensor Networks: A Power Optimization Technique for Collaborative Signal Processing," IEEE Communications Society Conference on Sensor Mesh and Ad Hoc Communications and Networks (SECON), pp. 1--9, 2010.Google ScholarGoogle Scholar
  8. A. Natarajan, B. de Silva, K. Yap, and M. Motani, "To Hop or Not to Hop: Network Architecture for Body Sensor Networks," Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks (SECON), pp. 1--9, 2009. Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. K.K. Venkatasubramanian, A. Banerjee, and S.K.S. Gupta, "PSKA: Usable and Secure Key Agreement Scheme for Body Area Networks," IEEE Transactions on Information Technology in Biomedicine, vol. 14, issue 1, pp. 60--68, 2010. Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. Y. Zhu, S. L. Keoh, M. Sloman, and E. C. Lupu, "A lightweight policy system for body sensor networks," IEEE Transactions on Network and Service Management, vol. 6, pp. 137--148, 2010. Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. S. Yu, K. Ren, and W. Lou, "FDAC: Toward Fine-Grained Distributed Data Access Control in Wireless Sensor Networks," IEEE Transactions on Parallel and Distributed Systems, vol. 22, issue 4, pp. 673--686, 2011. Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. M. Li, W. Lou, and K. Ren, "Data Security and Privacy in Wireless Body Area Network," IEEE Wireless Communications, vol. 17, issue 1, pp. 51--58, 2010. Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. J. Bethencourt, A. Sahai, and B. Waters, "Ciphertext-Policy Attribute-Based Encryption," IEEE Symposium on Security and Privacy, pp. 321--334, 2007. Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. J. Hur and D. Noh, "Attribute-Based Access Control with Efficient Revocation in Data Outsourcing Systems," IEEE Transactions Parallel and Distributed Systems, vol. PP, issue 99, 2010. Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. M. Li, S. Yu, W. Lou, and K. Ren, "Group Device Pairing based Secure Sensor Association and Key Management for Body Area Networks," IEEE INFOCOM, pp. 1--9, 2010. Google ScholarGoogle ScholarDigital LibraryDigital Library
  16. B. Lo and G. Yang, "Body Sensor Networks--Research Challenges and Opportunities," IET Seminar on Antennas and Propagation for Body-Centric Wireless Communications, pp. 26--32, 2007.Google ScholarGoogle ScholarCross RefCross Ref
  17. C. YounSun and B. Lichun, "Secure Access Control for Location-Based Applications in WLAN Systems," IEEE International Conference on Mobile Adhoc and Sensor Systems (MASS), pp. 852--857, 2006.Google ScholarGoogle Scholar
  18. S. Saleem, S. Ullah, and K. S. Kwak, "Towards Security Issues and Solutions in Wireless Body Area Networks," International Conference on Networked Computing (INC), pp. 1--4, 2010.Google ScholarGoogle Scholar
  19. C.C. Tan, H. Wang, S. Zhong, and Q. Li, "Body Sensor Network Security: An Identity- Based Cryptography Approach," ACM conference on Wireless network security, pp. 148--153, 2008. Google ScholarGoogle ScholarDigital LibraryDigital Library
  20. C.C. Tan, H. Wang, S. Zhong, and Q. Li, "IBE-Lite: A Lightweight Identity-Based Cryptography for Body Sensor Networks," IEEE Transactions on Information Technology in Biomedicine, vol. 13, issue 6, pp. 926--932, 2009. Google ScholarGoogle ScholarDigital LibraryDigital Library
  21. H. Li and J. Tan, "Heartbeat-Driven Medium-Access Control for Body Sensor Networks," IEEE Transactions on Information Technology in Biomedicine, vol. 14, issue 1, pp. 44--51, 2010. Google ScholarGoogle ScholarDigital LibraryDigital Library
  22. S. Yu-long, M. Jian-feng, and P. Qing-qi, "An Access Control Scheme in Wireless Sensor Networks," IFIP International Conference on Network and Parallel Computing, pp. 362--367, 2007. Google ScholarGoogle ScholarDigital LibraryDigital Library
  23. H. Wang and Q. Li, "Efficient Implementation of Public Key Cryptosystems on Mote Sensors," the International Conference on Information and Communication Systems (ICICS), pp. 519--528, 2006. Google ScholarGoogle ScholarDigital LibraryDigital Library
  24. B. Malek and A. Miri, "Combining Attribute-Based and Access Systems," International Conference on Computational Science and Engineering, vol. 3, pp. 305--312, 2009. Google ScholarGoogle ScholarDigital LibraryDigital Library
  25. Z. Zhou and D. Huang, "On Efficient Ciphertext-Policy Attribute Based Encryption and Broadcast Encryption," ACM conference on Computer and communications security (CCS), 2010. Google ScholarGoogle ScholarDigital LibraryDigital Library
  26. K. Emura, A. Miyaji, K. Omote, A. Nomura, and M. Soshi, "A ciphertext-policy attribute- based encryption scheme with constant ciphertext length," International Conference on Information Security Practice and Experience, pp. 46--59, 2010. Google ScholarGoogle ScholarDigital LibraryDigital Library
  27. A. Liu and P. Ning, "TinyECC: A Configurable Library for Elliptic Curve Cryptography in Wireless Sensor Networks," International Conference on Information Processing in Sensor Networks (IPSN), pp. 245--256, 2008. Google ScholarGoogle ScholarDigital LibraryDigital Library
  28. O.G. Morchon and H. Baldus, "Efficient distributed security for wireless medical sensor networks," International Conference on Intelligent Sensors, Sensor Networks and Information Processing (ISSNIP), pp. 249--254, 2008.Google ScholarGoogle Scholar
  29. S. Nabar, A. Banerjee, S.K.S. Gupta, and R. Poovendran, "Evaluation of body sensor network platforms: a design space and benchmarking analysis," Wireless Health, 2010. Google ScholarGoogle ScholarDigital LibraryDigital Library
  30. Crossbow Technology, "MPR-MIB Users Manual," 2007.Google ScholarGoogle Scholar
  31. J. Polastre, R. Szewczyk, and D. Culler, "Telos: Enabling Ultra-Low Power Wireless Research," International Symposium on Information Processing in Sensor Networks (IPSN), 2005. Google ScholarGoogle ScholarDigital LibraryDigital Library
  32. K. Piotrowski, P. Langendoerfer, and S. Peter, "How Public Key Cryptography Influences Wireless Sensor Node Lifetime," the fourth ACM workshop on Security of ad hoc and sensor networks, pp. 169--176, 2006. Google ScholarGoogle ScholarDigital LibraryDigital Library
  33. E. Perla, A.Ó. Catháin, R.S. Carbajo, M. Huggard, and C.M. Goldrick, "PowerTOSSIM z: realistic energy modelling for wireless sensor network environments," ACM workshop on Performance Monitoring and Measurement of Heterogeneous Wireless and Wired Networks (PM2HW2N), pp. 35--42, 2008. Google ScholarGoogle ScholarDigital LibraryDigital Library
  34. G. de Meulenaer, F. Gosset, F. Standaert, and O. F.-X. Pereira, "On the Energy Cost of Communication and Cryptography in Wireless Sensor Networks," IEEE International Conference on Wireless and Mobile Computing Networking and Communications (WIMOB), pp. 580--585, 2008. Google ScholarGoogle ScholarDigital LibraryDigital Library
  35. H. Wang, B. Sheng, and Q. Li, "Elliptic curve cryptography-based access control in sensor networks," International Journal of Security and Networks (IJSN), vol. 1, issue 3, pp. 127--137, 2006. Google ScholarGoogle ScholarDigital LibraryDigital Library
  36. N. Gura, A. Patel, A. Wander, H. Eberle, and S. C. Shantz, "Comparing elliptic curve cryptography and RSA on 8-bit CPUs," Cryptographic Hardware and Embedded Systems (CHES), pp. 119--132, 2004.Google ScholarGoogle Scholar

Comments

Login options

Check if you have access through your login credentials or your institution to get full access on this article.

Sign in
  • Published in

    cover image ACM Other conferences
    AWICT 2017: Proceedings of the Second International Conference on Advanced Wireless Information, Data, and Communication Technologies
    November 2017
    116 pages
    ISBN:9781450353106
    DOI:10.1145/3231830

    Copyright © 2017 ACM

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    • Published: 13 November 2017

    Permissions

    Request permissions about this article.

    Request Permissions

    Check for updates

    Qualifiers

    • research-article
    • Research
    • Refereed limited
  • Article Metrics

    • Downloads (Last 12 months)2
    • Downloads (Last 6 weeks)0

    Other Metrics

PDF Format

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader
About Cookies On This Site

We use cookies to ensure that we give you the best experience on our website.

Learn more

Got it!