A Biometric-based Security for Data Authentication in

Download Report

Transcript A Biometric-based Security for Data Authentication in

A Biometric-based
Security for Data
Authentication
in Wireless Body Area
Network (WBAN)
Raz Avraham 066706896
Sergey Vasserman 317226215
Introduction
• This presentation focuses on the security aspect of WBAN and
it suggests that by using biometric features, the body itself can
form a secure communication pathway that is unavailable to
other kinds of wireless networks.
Wireless sensor network (WSN)
Wireless sensor network (WSN)
applications
• Area monitoring
• The army uses sensors to detect enemy intrusion
• Forest fire detection
• A network of Sensor Nodes can be installed in a forest to detect
when a fire has started.
• Water quality monitoring
• Water quality monitoring involves analyzing water properties in
dams, rivers and etc.
• Natural disaster prevention
• Wireless sensor networks can effectively act to prevent the
consequences of natural disasters.
Wireless sensor network (WSN)
applications
Wireless sensor network (WSN)
• Wireless Body Area Network (WBAN)
• Is a wireless network used for communication among sensor nodes
operating on, in or around the human body in order to monitor vital
body parameters and movements.
Security in WSN
• Many WSN use Security protocols for sensor networks (SPINS)
which is a set of protocols for achieving security requirements
such as confidentiality, integrity and authenticity that uses
symmetric keys to encrypt the data and generate the MAC.
• Not in WBAN! Because WBAN has a different environmental
features and limited computing resources.
• Security system for WBAN must be implemented with low
computational complexity and high power efficiency.
Biometrics
• Biometric is a technique commonly known as the automatic
identification or verification of an individual by his or her
unique physiological or behavioral characteristics.
Biometrics
The use of biometrics
• WBAN carries various security issues such as loss of data,
authentication and access control. In this article it is proposed
that biometric features will be used in order to implement
high security and increase efficiency in WBAN.
• The use of biometric systems can naturally secure the
information transmission within WBAN, where other
techniques use hardware and software to achieve the same
purpose.
Security in WBAN
symmetric or asymmetric?
• Symmetric cryptosystem
• Key management too complex, weak security
• Using a biometric feature as the key results in higher security and
less computation and memory requirements.
symmetric or asymmetric?
• Asymmetric cryptosystem
• resource constraint problem, low performance.
symmetric or asymmetric?
• Symmetric and asymmetric has a trade-off between
performance and security
• A research group has proposed the use of both symmetric
and asymmetric cryptosystem (heterogeneous) – their
suggestion provides better security and performance.
• However Symmetric, asymmetric and heterogeneous
cryptosystems still require time synchronization and key
distribution.
• In light of those problems a wavelet-domain Hidden Markov
Model was introduced.
Biometrics in WBAN
• A biometric attribute should present 100% reliability, user
friendly, fast operation and low cost.
• Before choosing a biometric type, the following properties
must be satisfied:
Universal
Distinctive
Permanent
Collectable
Effective
Acceptable
Invulnerable
HRV as Biometric
authentication in WBAN
• Heart Rate Variability (HRV) - is a physiological phenomenon
where the time interval between heartbeats varies.
• HRV have unique characteristics and can be utilized in secure
communications.
HRV is measured by calculating the time between the spikes
HRV measuring
• HRV can be measured by any cardiac related signal, but
Electrocardiogram (ECG) is the most preferred because of the
following traits:
Universality
Permanence
Uniqueness
Robustness
Liveness detection
HRV measuring
• HRV can be analyzed by using two major techniques. One is
statistically analyzing a sequence of RR intervals of ECG in time
domain.
• The other one is analyzing the spectrum of the same RR
intervals of ECG data in frequency domain.
• In this study, HRV was analyzed in time domain since ECG
signals are recorded in time series. Therefore, it has reduced
computational complexity and save more resources.
HRV measuring
• Pre processing and after processing the ECG in time domain
Data Authentication Model
Conclusions
• A biometric-based security framework is proposed for data
authentication within WBAN. Specifically, the sender's
electrocardiogram (ECG) feature is selected as the biometric
key for data authentication mechanism within WBAN system.
Therefore, patient's records can only be sensed and derived
personally from this patient's dedicated WBAN system and
cannot be mixed with other patients.
• https://www.youtube.com/watch?v=7uE7_LBliQo