Security for pervasive health monitoring sensor applications

Krishna K. Venkatasubramanian, Sandeep Gupta

Research output: Chapter in Book/Report/Conference proceedingConference contribution

69 Scopus citations

Abstract

Maintaining security of wearable networked health monitoring sensors (Body Sensor Networks (BSN)) is very important for the acceptance and long term viability of the technology. Sensors in BSNs organize themselves into different topologies for efficiency purpose. Securing these topology formation process is of prime importance. In this paper we present two schemes which rely on the novel technique of using physiological values from the wearer's body for securing a cluster topology formation. Traditional schemes for cluster (one of the most commonly used topology) formation were not designed with security in mind and are susceptible to security flaws. The schemes proposed here not only solve the secure cluster formation problem but also do so efficiently by eliminating all key distribution overheads. We analyzed the security of the protocols and tested their accuracy on a prototype implementation developed using Mica2 motes.

Original languageEnglish (US)
Title of host publicationProceedings - 4th International Conference on Intelligent Sensing and Information Processing, ICISIP 2006
Pages197-202
Number of pages6
DOIs
StatePublished - 2006
Event4th International Conference on Intelligent Sensing and Information Processing, ICISIP 2006 - Bangalore, India
Duration: Dec 15 2006Dec 18 2006

Publication series

NameProceedings - 4th International Conference on Intelligent Sensing and Information Processing, ICISIP 2006

Other

Other4th International Conference on Intelligent Sensing and Information Processing, ICISIP 2006
Country/TerritoryIndia
CityBangalore
Period12/15/0612/18/06

ASJC Scopus subject areas

  • Artificial Intelligence
  • Information Systems
  • Information Systems and Management

Fingerprint

Dive into the research topics of 'Security for pervasive health monitoring sensor applications'. Together they form a unique fingerprint.

Cite this