Title :
A two-tiered authentication and encryption scheme in secure healthcare sensor networks
Author :
Kanjee, Mohammed Raza ; Divi, Kalyani ; Liu, Hong
Author_Institution :
Dept. of Electr. & Comput. Eng., Univ. of Massachusetts Dartmouth, North Dartmouth, MA, USA
Abstract :
This paper presents a novel two-tier authentication and encryption scheme that explores the unique characteristics of Wireless Sensor Networks (WSN) in Healthcare Applications. The first phase authenticates among the sensor nodes of a Body Area Network (BAN) fused in a patient, where a U key is generated in a decentralized fashion. Based on the rule of separating user and platform credentials, U key approaches maximize security in a non-trusted environment. The second phase authenticates the data aggregation node elected among the sensor nodes of a patient with the base station in the vicinity to securely relay the U key as a session key. Encryption, secure hash, random number padding, and time stamp follow to meet the security requirements for WSN in Healthcare Applications: confidentiality, integrity, authorization, availability, and freshness. The scheme takes in consideration of WSN´s resource constraints and mobility that hinder the applicability of conventional security schemes in WSN. Apart from general WSN-targeted security approaches that over-emphasize on energy consumption, this scheme provides robust, prompt, and scalable security services to healthcare systems.
Keywords :
authorisation; body area networks; body sensor networks; cryptography; energy consumption; health care; WSN resource constraint; authorization; body area network; confidentiality; data aggregation node; encryption scheme; energy consumption; hash function; random number padding; secure healthcare sensor networks; time stamp; two-tiered authentication; wireless sensor networks; Authentication; Base stations; Encryption; Medical services; Public key; Wireless sensor networks; Authentication; Encryption; Hash Function; Wireless Sensor Networks in Healthcare Applications;
Conference_Titel :
Information Assurance and Security (IAS), 2010 Sixth International Conference on
Conference_Location :
Atlanta, GA
Print_ISBN :
978-1-4244-7407-3
DOI :
10.1109/ISIAS.2010.5604195