uKeMa: An Ultra-Lightweight Key Management and Authentication Scheme for Wearable Ad Hoc Networks Based on Body Language

Article Preview

Abstract:

Wearable consumer electronics such as Google glasses, Apple iWatch, Nike Shoes have been envisioned as next consuming hot spot. It invokes a large amount of applications in the personal healthy, personal safety, and digital entertainment. To save power consumption, those wearable devices usually connect to Internet via a smart phone that performs as a gateway. To avoid unauthorized access from unfriendly devices, it is desirable to encrypt the personal data in the communications of wearable devices. Therefore, the keys for encryption and integrity are required. In this paper, we make the first attempt to solve both key management and authentication together for wearable devices in an ultra-lightweight manner. We propose a scheme called uKeMa that can provide key generation, key updating and authentication for wearable devices with ultra-lightweight power consumption.

You might also be interested in these eBooks

Info:

Periodical:

Pages:

986-989

Citation:

Online since:

July 2014

Authors:

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2014 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

* - Corresponding Author

[1] Ali, S.; Sivaraman, V.; Ostry, D., Eliminating Reconciliation Cost in Secret Key Generation for Body-Worn Health Monitoring Devices, IEEE Transactions on Mobile Computing, vol. PP, no. 99, p.1, 1, 0 doi: 10. 1109/TMC. 2013. 71.

DOI: 10.1109/tmc.2013.71

Google Scholar

[2] C. Li; Raghunathan, A.; Jha, N.K., Hijacking an insulin pump: Security attacks and defenses for a diabetes therapy system, 13th IEEE International Conference on e-Health Networking Applications and Services (Healthcom), vol., no., p.150, 156, 13-15 June (2011).

DOI: 10.1109/health.2011.6026732

Google Scholar

[3] D. He; Chan, S.; Shaohua Tang, A Novel and Lightweight System to Secure Wireless Medical Sensor Networks, IEEE Journal of Biomedical and Health Informatics, vol. 18, no. 1, p.316, 326, Jan. (2014).

DOI: 10.1109/jbhi.2013.2268897

Google Scholar

[4] Daniluk, K.; Niewiadomska-Szynkiewicz, E., Energy-efficient security in implantable medical devices, 2012 Federated Conference on Computer Science and Information Systems (FedCSIS), vol., no., p.773, 778, 9-12 Sept. (2012).

Google Scholar

[5] J. Kim; B. Lee; S.K. Yoo, Design of real-time encryption module for secure data protection of wearable healthcare devices, 35th Annual International Conference of the IEEE Engineering in Medicine and Biology Society (EMBC), vol., no., p.2283, 2286, 3-7 July (2013).

DOI: 10.1109/embc.2013.6609993

Google Scholar

[6] Khan, N. A.; Javaid, N.; Khan, Z. A.; Jaffar, M.; Rafiq, U.; Bibi, A., Ubiquitous HealthCare in Wireless Body Area Networks, 11th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom), vol., no., p.1960, 1967, 25-27 June (2012).

DOI: 10.1109/trustcom.2012.289

Google Scholar

[7] Lara, O.D.; Labrador, M.A., A Survey on Human Activity Recognition using Wearable Sensors, Communications Surveys & Tutorials, IEEE, vol. 15, no. 3, p.1192, 1209, Third Quarter (2013).

DOI: 10.1109/surv.2012.110112.00192

Google Scholar