A Fuzzy Trust Model for Public Key Distribution in Body Area Networks

Article Preview

Abstract:

It is now possible to implant a network of sensors inside the human body for monitoring the human body functions and the surrounding environment. In a body area network (BAN), the confidentiality and integrity of the sensitive health information are particularly important. The key establishment is thus a fundamental security service in BANs. To guarantee validity of the key and avoid misbehavior of self-ish nodes, we propose a fuzzy trust model for public key queries in BANs. Every user accesses the public keys of other nodes from those trusted neighbors rather than all of its neighbors. The proposed trust model uses fuzzy sets to calculate every node’s trust value. Our trust model exploits multiple metrics rather than a single metric, and converts them into a single numerical ranking. We perform an extensive evaluation of the proposed approach. The results indicate that our trust model can not only identify abnormal nodes’ behaviors, but can also reduce query traffic while improving the reliability of the returned public keys.

You might also be interested in these eBooks

Info:

Periodical:

Advanced Materials Research (Volumes 989-994)

Pages:

4837-4840

Citation:

Online since:

July 2014

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2014 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

* - Corresponding Author

[1] Y. S. Li M, G. J. D, Secure ad hoc trust initialization and key management in wireless body area networks, ACM Transactions on Sensor Networks (TOSN) 9 (2) (2013) 18.

DOI: 10.1145/2422966.2422975

Google Scholar

[2] M. Mana, M. Feham, Trust key management scheme for wireless body area networks, IJ Network Security 12 (2) (2011) 75–83.

Google Scholar

[3] Y. Kong, J. Deng, S. R. Tate, A distributed public key caching scheme in large wireless networks, in: Proc. of IEEE Global Telecommunications Conference on Communication and Information System Security, Miami, FL, USA, 2010, p.1–5.

DOI: 10.1109/glocom.2010.5683646

Google Scholar

[4] R. Vidhyapriya, P. Vanathi, Energy aware routing for wireless sensor networks, in: International Conference on Signal Processing, Communications and Networking, IEEE, 2007, p.545–550.

DOI: 10.1109/icscn.2007.350661

Google Scholar

[5] S. Marti, T. J. Giuli, K. Lai, M. Baker, Mitigating routing misbehavior in mobile ad hoc networks, in: Proceedings of the 6th annual international conference on Mobile computing and networking, Vol. 6, 2000, p.255–265.

DOI: 10.1145/345910.345955

Google Scholar