2013
DOI: 10.12720/jcm.8.5.307-314
|View full text |Cite
|
Sign up to set email alerts
|

A Secure Data Transmission Scheme for Body Sensor Network

Abstract: Personal privacy has been realized as the most important security issue in wireless sensor networks. While there are much researches on privacy information protection, most of them shared the same condition that the sensing action happened anywhere at any time and few of them tackle the problem in the body sensor network (BSN). To address the problem, this paper proposes a system model according to BSN's specific features. The proposed model includes a hierarchical structure and an adversary model which origin… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
5
0

Year Published

2015
2015
2020
2020

Publication Types

Select...
2
1

Relationship

1
2

Authors

Journals

citations
Cited by 3 publications
(5 citation statements)
references
References 18 publications
0
5
0
Order By: Relevance
“…Step 3: Decrypt the data block ffH.Data 1 1 /, Data 1 1 g K 1 CfH.Data 2 1 /, Data 2 1 g K 1 CfH.Data 3 1 /, Data 3 1 g K 1 g with the symmetric key K 1 , then the private key data of the node are obtained as follows: fH.Data 1 1 /, Data 1 1 0 g, fH.Data 2 1 /, Data 2 1 00 g, fH.Data 3 1 /, Data 3 1 000 g Step 4: In order to verify the integrity of the data received, it is necessary to calculate the hash value of the private data fData 1 1 0 , Data 2 1 00 , Data 3 1 000 g, and the result is fH.Data 1 1 0 /, H.Data 2 1 00 /, H.Data 3 1 000 /g, then it is needed to judge whether it is equal to fH.Data 1 1 /, H.Data 2 1 /, H.Data 3 1 /g. If they are equal, then it can be said that the data received have integrity, that is to say, fData 1 1 0 , Data 2 1 00 , Data 3 1 000 g is the raw data for WBAN; otherwise, it illustrates that the collected data may have been tampered by an attacker, and the data should be discarded.…”
Section: Phase Of Decryption and Integrity Verificationmentioning
confidence: 99%
See 2 more Smart Citations
“…Step 3: Decrypt the data block ffH.Data 1 1 /, Data 1 1 g K 1 CfH.Data 2 1 /, Data 2 1 g K 1 CfH.Data 3 1 /, Data 3 1 g K 1 g with the symmetric key K 1 , then the private key data of the node are obtained as follows: fH.Data 1 1 /, Data 1 1 0 g, fH.Data 2 1 /, Data 2 1 00 g, fH.Data 3 1 /, Data 3 1 000 g Step 4: In order to verify the integrity of the data received, it is necessary to calculate the hash value of the private data fData 1 1 0 , Data 2 1 00 , Data 3 1 000 g, and the result is fH.Data 1 1 0 /, H.Data 2 1 00 /, H.Data 3 1 000 /g, then it is needed to judge whether it is equal to fH.Data 1 1 /, H.Data 2 1 /, H.Data 3 1 /g. If they are equal, then it can be said that the data received have integrity, that is to say, fData 1 1 0 , Data 2 1 00 , Data 3 1 000 g is the raw data for WBAN; otherwise, it illustrates that the collected data may have been tampered by an attacker, and the data should be discarded.…”
Section: Phase Of Decryption and Integrity Verificationmentioning
confidence: 99%
“…Step 5: If the data packet fData 1 1 0 , Data 2 1 00 , Data 3 1 000 g is proved to be integrated after verification, it can be summed to acquire an integrated raw data for each node. The result can be expressed as DATA i .i D 1 : : : 5/, DATA 1 =Data 1 1 0 CData 2 1 00 C Data 3 1 000 . Step 6: Repeat steps 1-4, until remote information processing center obtains the original real data information of all the nodes, that is to say, the data packet of each node DATA i .i D 1 : : : 5/.…”
Section: Phase Of Decryption and Integrity Verificationmentioning
confidence: 99%
See 1 more Smart Citation
“…., In other respects, due to the randomness of interpolation factors, the curve of encrypted data made by the improved INTRAS will hide the original curve of biometric data. For instance, if ℓ = 10, = 16, = 2, we use the Matlab tool to simulate the encryption, where initialization vector is randomly produced from range [1,1023]; the fragment of the biometric data sequence is [11 13 15 17 11 13 15 17 11 13 15 17 11 13 15 17], the interpolation factors are randomly produced from range [1,1023], and each fragment of interpolation factors sequence is used to encrypt two fragments of biometric data sequence. For instance, the first fragment of interpolation factors sequence is used to encrypt ⟨V 1 , .…”
Section: Security Analysismentioning
confidence: 99%
“…Body sensor networks (BSNs) are an important branch of wireless sensor networks (WSNs) [1, 2]. A BSN is a medical information system in the field of e-health, and it consists of some biosensor nodes that form a wireless micronetwork on the human body.…”
Section: Introductionmentioning
confidence: 99%