ABSTRACT
Body Sensor Network (BSN) is a network of wirelessly connected physiological sensors. BSNs offer promising innovative medical and non-medical applications. In such applications and networks, security is essential, critical, and challenging. In this context, data privacy and data security are major requirements. The ultimate goal of data privacy is to implement an efficient fine-grained data access control. Ciphertext-Policy Attribute-Based Encryption (CP-ABE) schemes offer a vital option for achieving fine-grained data access control in BSNs. In this work, we propose a secure cluster-based BSN architecture optimized for an energy-efficient operation. The new architecture is designed to allow flexible operation by 1) implementing CP-ABE either on sensor nodes or on the BSN controller, and 2) targeting specific performance merits through proposed enhancement approaches. Three CP-ABE schemes are investigated, the original CP-ABE (BSW), an enhanced CP-ABE (ECP- ABE), and a CP-ABE scheme with constant ciphertext length (CCP-ABE). Thorough simulations are conducted on the MICAz sensor node platform. The performance evaluation, for typical BSN applications, shows that ECP-ABE outperforms BSW. Interestingly, CCP-ABE provides only a marginal advantage in cluster lifetime compared to ECP-ABE defeating the purpose of sacrificing flexible access structure for constant ciphertext length.
- M. Hanson, H. Powell, A. Barth, K. Ringgenberg, B. Calhoun, J. Aylor, and J. Lach, "Body Area Sensor Networks: Challenges and Opportunities," IEEE Computer Society, vol. 42, pp. 58-- 65, 2009. Google Scholar
Digital Library
- H. Cao, V. Leung, C. Chow, and H, Chan, "Enabling Technologies for Wireless Body Area Networks: A Survey and Outlook," IEEE Communications Magazine, vol. 47, issue 12, pp. 84-- 93, 2009. Google Scholar
Digital Library
- Q. Wang, K. Ren, C. Wang, and W, Lou, "Efficient Fine-Grained Data Access Control in Wireless Sensor Networks," IEEE Military Communications Conference (MILCOM), pp. 1--7, 2009. Google Scholar
Digital Library
- M. Patel, and W. Jianfeng, "Applications, Challenges, and Prospective in Emerging Body Area Networking Technologies," IEEE Wireless Communication, pp. 80--88, 2010. Google Scholar
Digital Library
- S. Nabar, J. Walling, and R. Poovendran, "Minimizing Energy Consumption in Body Sensor Networks via Convex Optimization," International Conference on Body Sensor Networks (BSN), pp. 62--67, 2010. Google Scholar
Digital Library
- S. Jinyuan, F. Yuguang, and Z. Xiaoyan, "Privacy and emergency response in e-healthcare leveraging wireless body sensor networks," IEEE Wireless Communication, pp. 66--73, 2010. Google Scholar
Digital Library
- H. Ghasemzadeh and R. Jafari, R. "Data Aggregation in Body Sensor Networks: A Power Optimization Technique for Collaborative Signal Processing," IEEE Communications Society Conference on Sensor Mesh and Ad Hoc Communications and Networks (SECON), pp. 1--9, 2010.Google Scholar
- A. Natarajan, B. de Silva, K. Yap, and M. Motani, "To Hop or Not to Hop: Network Architecture for Body Sensor Networks," Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks (SECON), pp. 1--9, 2009. Google Scholar
Digital Library
- K.K. Venkatasubramanian, A. Banerjee, and S.K.S. Gupta, "PSKA: Usable and Secure Key Agreement Scheme for Body Area Networks," IEEE Transactions on Information Technology in Biomedicine, vol. 14, issue 1, pp. 60--68, 2010. Google Scholar
Digital Library
- Y. Zhu, S. L. Keoh, M. Sloman, and E. C. Lupu, "A lightweight policy system for body sensor networks," IEEE Transactions on Network and Service Management, vol. 6, pp. 137--148, 2010. Google Scholar
Digital Library
- S. Yu, K. Ren, and W. Lou, "FDAC: Toward Fine-Grained Distributed Data Access Control in Wireless Sensor Networks," IEEE Transactions on Parallel and Distributed Systems, vol. 22, issue 4, pp. 673--686, 2011. Google Scholar
Digital Library
- M. Li, W. Lou, and K. Ren, "Data Security and Privacy in Wireless Body Area Network," IEEE Wireless Communications, vol. 17, issue 1, pp. 51--58, 2010. Google Scholar
Digital Library
- J. Bethencourt, A. Sahai, and B. Waters, "Ciphertext-Policy Attribute-Based Encryption," IEEE Symposium on Security and Privacy, pp. 321--334, 2007. Google Scholar
Digital Library
- J. Hur and D. Noh, "Attribute-Based Access Control with Efficient Revocation in Data Outsourcing Systems," IEEE Transactions Parallel and Distributed Systems, vol. PP, issue 99, 2010. Google Scholar
Digital Library
- M. Li, S. Yu, W. Lou, and K. Ren, "Group Device Pairing based Secure Sensor Association and Key Management for Body Area Networks," IEEE INFOCOM, pp. 1--9, 2010. Google Scholar
Digital Library
- B. Lo and G. Yang, "Body Sensor Networks--Research Challenges and Opportunities," IET Seminar on Antennas and Propagation for Body-Centric Wireless Communications, pp. 26--32, 2007.Google Scholar
Cross Ref
- C. YounSun and B. Lichun, "Secure Access Control for Location-Based Applications in WLAN Systems," IEEE International Conference on Mobile Adhoc and Sensor Systems (MASS), pp. 852--857, 2006.Google Scholar
- S. Saleem, S. Ullah, and K. S. Kwak, "Towards Security Issues and Solutions in Wireless Body Area Networks," International Conference on Networked Computing (INC), pp. 1--4, 2010.Google Scholar
- C.C. Tan, H. Wang, S. Zhong, and Q. Li, "Body Sensor Network Security: An Identity- Based Cryptography Approach," ACM conference on Wireless network security, pp. 148--153, 2008. Google Scholar
Digital Library
- C.C. Tan, H. Wang, S. Zhong, and Q. Li, "IBE-Lite: A Lightweight Identity-Based Cryptography for Body Sensor Networks," IEEE Transactions on Information Technology in Biomedicine, vol. 13, issue 6, pp. 926--932, 2009. Google Scholar
Digital Library
- H. Li and J. Tan, "Heartbeat-Driven Medium-Access Control for Body Sensor Networks," IEEE Transactions on Information Technology in Biomedicine, vol. 14, issue 1, pp. 44--51, 2010. Google Scholar
Digital Library
- S. Yu-long, M. Jian-feng, and P. Qing-qi, "An Access Control Scheme in Wireless Sensor Networks," IFIP International Conference on Network and Parallel Computing, pp. 362--367, 2007. Google Scholar
Digital Library
- H. Wang and Q. Li, "Efficient Implementation of Public Key Cryptosystems on Mote Sensors," the International Conference on Information and Communication Systems (ICICS), pp. 519--528, 2006. Google Scholar
Digital Library
- B. Malek and A. Miri, "Combining Attribute-Based and Access Systems," International Conference on Computational Science and Engineering, vol. 3, pp. 305--312, 2009. Google Scholar
Digital Library
- Z. Zhou and D. Huang, "On Efficient Ciphertext-Policy Attribute Based Encryption and Broadcast Encryption," ACM conference on Computer and communications security (CCS), 2010. Google Scholar
Digital Library
- K. Emura, A. Miyaji, K. Omote, A. Nomura, and M. Soshi, "A ciphertext-policy attribute- based encryption scheme with constant ciphertext length," International Conference on Information Security Practice and Experience, pp. 46--59, 2010. Google Scholar
Digital Library
- A. Liu and P. Ning, "TinyECC: A Configurable Library for Elliptic Curve Cryptography in Wireless Sensor Networks," International Conference on Information Processing in Sensor Networks (IPSN), pp. 245--256, 2008. Google Scholar
Digital Library
- O.G. Morchon and H. Baldus, "Efficient distributed security for wireless medical sensor networks," International Conference on Intelligent Sensors, Sensor Networks and Information Processing (ISSNIP), pp. 249--254, 2008.Google Scholar
- S. Nabar, A. Banerjee, S.K.S. Gupta, and R. Poovendran, "Evaluation of body sensor network platforms: a design space and benchmarking analysis," Wireless Health, 2010. Google Scholar
Digital Library
- Crossbow Technology, "MPR-MIB Users Manual," 2007.Google Scholar
- J. Polastre, R. Szewczyk, and D. Culler, "Telos: Enabling Ultra-Low Power Wireless Research," International Symposium on Information Processing in Sensor Networks (IPSN), 2005. Google Scholar
Digital Library
- K. Piotrowski, P. Langendoerfer, and S. Peter, "How Public Key Cryptography Influences Wireless Sensor Node Lifetime," the fourth ACM workshop on Security of ad hoc and sensor networks, pp. 169--176, 2006. Google Scholar
Digital Library
- E. Perla, A.Ó. Catháin, R.S. Carbajo, M. Huggard, and C.M. Goldrick, "PowerTOSSIM z: realistic energy modelling for wireless sensor network environments," ACM workshop on Performance Monitoring and Measurement of Heterogeneous Wireless and Wired Networks (PM2HW2N), pp. 35--42, 2008. Google Scholar
Digital Library
- G. de Meulenaer, F. Gosset, F. Standaert, and O. F.-X. Pereira, "On the Energy Cost of Communication and Cryptography in Wireless Sensor Networks," IEEE International Conference on Wireless and Mobile Computing Networking and Communications (WIMOB), pp. 580--585, 2008. Google Scholar
Digital Library
- H. Wang, B. Sheng, and Q. Li, "Elliptic curve cryptography-based access control in sensor networks," International Journal of Security and Networks (IJSN), vol. 1, issue 3, pp. 127--137, 2006. Google Scholar
Digital Library
- N. Gura, A. Patel, A. Wander, H. Eberle, and S. C. Shantz, "Comparing elliptic curve cryptography and RSA on 8-bit CPUs," Cryptographic Hardware and Embedded Systems (CHES), pp. 119--132, 2004.Google Scholar





Comments