Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1145/3231830.3231841acmotherconferencesArticle/Chapter ViewAbstractPublication PagesawictConference Proceedingsconference-collections
research-article

A Secure Body Sensor Network Architecture with CP-ABE Based Fine-Grained Data Access Control

Published: 13 November 2017 Publication History

Abstract

Body Sensor Network (BSN) is a network of wirelessly connected physiological sensors. BSNs offer promising innovative medical and non-medical applications. In such applications and networks, security is essential, critical, and challenging. In this context, data privacy and data security are major requirements. The ultimate goal of data privacy is to implement an efficient fine-grained data access control. Ciphertext-Policy Attribute-Based Encryption (CP-ABE) schemes offer a vital option for achieving fine-grained data access control in BSNs. In this work, we propose a secure cluster-based BSN architecture optimized for an energy-efficient operation. The new architecture is designed to allow flexible operation by 1) implementing CP-ABE either on sensor nodes or on the BSN controller, and 2) targeting specific performance merits through proposed enhancement approaches. Three CP-ABE schemes are investigated, the original CP-ABE (BSW), an enhanced CP-ABE (ECP- ABE), and a CP-ABE scheme with constant ciphertext length (CCP-ABE). Thorough simulations are conducted on the MICAz sensor node platform. The performance evaluation, for typical BSN applications, shows that ECP-ABE outperforms BSW. Interestingly, CCP-ABE provides only a marginal advantage in cluster lifetime compared to ECP-ABE defeating the purpose of sacrificing flexible access structure for constant ciphertext length.

References

[1]
M. Hanson, H. Powell, A. Barth, K. Ringgenberg, B. Calhoun, J. Aylor, and J. Lach, "Body Area Sensor Networks: Challenges and Opportunities," IEEE Computer Society, vol. 42, pp. 58-- 65, 2009.
[2]
H. Cao, V. Leung, C. Chow, and H, Chan, "Enabling Technologies for Wireless Body Area Networks: A Survey and Outlook," IEEE Communications Magazine, vol. 47, issue 12, pp. 84-- 93, 2009.
[3]
Q. Wang, K. Ren, C. Wang, and W, Lou, "Efficient Fine-Grained Data Access Control in Wireless Sensor Networks," IEEE Military Communications Conference (MILCOM), pp. 1--7, 2009.
[4]
M. Patel, and W. Jianfeng, "Applications, Challenges, and Prospective in Emerging Body Area Networking Technologies," IEEE Wireless Communication, pp. 80--88, 2010.
[5]
S. Nabar, J. Walling, and R. Poovendran, "Minimizing Energy Consumption in Body Sensor Networks via Convex Optimization," International Conference on Body Sensor Networks (BSN), pp. 62--67, 2010.
[6]
S. Jinyuan, F. Yuguang, and Z. Xiaoyan, "Privacy and emergency response in e-healthcare leveraging wireless body sensor networks," IEEE Wireless Communication, pp. 66--73, 2010.
[7]
H. Ghasemzadeh and R. Jafari, R. "Data Aggregation in Body Sensor Networks: A Power Optimization Technique for Collaborative Signal Processing," IEEE Communications Society Conference on Sensor Mesh and Ad Hoc Communications and Networks (SECON), pp. 1--9, 2010.
[8]
A. Natarajan, B. de Silva, K. Yap, and M. Motani, "To Hop or Not to Hop: Network Architecture for Body Sensor Networks," Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks (SECON), pp. 1--9, 2009.
[9]
K.K. Venkatasubramanian, A. Banerjee, and S.K.S. Gupta, "PSKA: Usable and Secure Key Agreement Scheme for Body Area Networks," IEEE Transactions on Information Technology in Biomedicine, vol. 14, issue 1, pp. 60--68, 2010.
[10]
Y. Zhu, S. L. Keoh, M. Sloman, and E. C. Lupu, "A lightweight policy system for body sensor networks," IEEE Transactions on Network and Service Management, vol. 6, pp. 137--148, 2010.
[11]
S. Yu, K. Ren, and W. Lou, "FDAC: Toward Fine-Grained Distributed Data Access Control in Wireless Sensor Networks," IEEE Transactions on Parallel and Distributed Systems, vol. 22, issue 4, pp. 673--686, 2011.
[12]
M. Li, W. Lou, and K. Ren, "Data Security and Privacy in Wireless Body Area Network," IEEE Wireless Communications, vol. 17, issue 1, pp. 51--58, 2010.
[13]
J. Bethencourt, A. Sahai, and B. Waters, "Ciphertext-Policy Attribute-Based Encryption," IEEE Symposium on Security and Privacy, pp. 321--334, 2007.
[14]
J. Hur and D. Noh, "Attribute-Based Access Control with Efficient Revocation in Data Outsourcing Systems," IEEE Transactions Parallel and Distributed Systems, vol. PP, issue 99, 2010.
[15]
M. Li, S. Yu, W. Lou, and K. Ren, "Group Device Pairing based Secure Sensor Association and Key Management for Body Area Networks," IEEE INFOCOM, pp. 1--9, 2010.
[16]
B. Lo and G. Yang, "Body Sensor Networks--Research Challenges and Opportunities," IET Seminar on Antennas and Propagation for Body-Centric Wireless Communications, pp. 26--32, 2007.
[17]
C. YounSun and B. Lichun, "Secure Access Control for Location-Based Applications in WLAN Systems," IEEE International Conference on Mobile Adhoc and Sensor Systems (MASS), pp. 852--857, 2006.
[18]
S. Saleem, S. Ullah, and K. S. Kwak, "Towards Security Issues and Solutions in Wireless Body Area Networks," International Conference on Networked Computing (INC), pp. 1--4, 2010.
[19]
C.C. Tan, H. Wang, S. Zhong, and Q. Li, "Body Sensor Network Security: An Identity- Based Cryptography Approach," ACM conference on Wireless network security, pp. 148--153, 2008.
[20]
C.C. Tan, H. Wang, S. Zhong, and Q. Li, "IBE-Lite: A Lightweight Identity-Based Cryptography for Body Sensor Networks," IEEE Transactions on Information Technology in Biomedicine, vol. 13, issue 6, pp. 926--932, 2009.
[21]
H. Li and J. Tan, "Heartbeat-Driven Medium-Access Control for Body Sensor Networks," IEEE Transactions on Information Technology in Biomedicine, vol. 14, issue 1, pp. 44--51, 2010.
[22]
S. Yu-long, M. Jian-feng, and P. Qing-qi, "An Access Control Scheme in Wireless Sensor Networks," IFIP International Conference on Network and Parallel Computing, pp. 362--367, 2007.
[23]
H. Wang and Q. Li, "Efficient Implementation of Public Key Cryptosystems on Mote Sensors," the International Conference on Information and Communication Systems (ICICS), pp. 519--528, 2006.
[24]
B. Malek and A. Miri, "Combining Attribute-Based and Access Systems," International Conference on Computational Science and Engineering, vol. 3, pp. 305--312, 2009.
[25]
Z. Zhou and D. Huang, "On Efficient Ciphertext-Policy Attribute Based Encryption and Broadcast Encryption," ACM conference on Computer and communications security (CCS), 2010.
[26]
K. Emura, A. Miyaji, K. Omote, A. Nomura, and M. Soshi, "A ciphertext-policy attribute- based encryption scheme with constant ciphertext length," International Conference on Information Security Practice and Experience, pp. 46--59, 2010.
[27]
A. Liu and P. Ning, "TinyECC: A Configurable Library for Elliptic Curve Cryptography in Wireless Sensor Networks," International Conference on Information Processing in Sensor Networks (IPSN), pp. 245--256, 2008.
[28]
O.G. Morchon and H. Baldus, "Efficient distributed security for wireless medical sensor networks," International Conference on Intelligent Sensors, Sensor Networks and Information Processing (ISSNIP), pp. 249--254, 2008.
[29]
S. Nabar, A. Banerjee, S.K.S. Gupta, and R. Poovendran, "Evaluation of body sensor network platforms: a design space and benchmarking analysis," Wireless Health, 2010.
[30]
Crossbow Technology, "MPR-MIB Users Manual," 2007.
[31]
J. Polastre, R. Szewczyk, and D. Culler, "Telos: Enabling Ultra-Low Power Wireless Research," International Symposium on Information Processing in Sensor Networks (IPSN), 2005.
[32]
K. Piotrowski, P. Langendoerfer, and S. Peter, "How Public Key Cryptography Influences Wireless Sensor Node Lifetime," the fourth ACM workshop on Security of ad hoc and sensor networks, pp. 169--176, 2006.
[33]
E. Perla, A.Ó. Catháin, R.S. Carbajo, M. Huggard, and C.M. Goldrick, "PowerTOSSIM z: realistic energy modelling for wireless sensor network environments," ACM workshop on Performance Monitoring and Measurement of Heterogeneous Wireless and Wired Networks (PM2HW2N), pp. 35--42, 2008.
[34]
G. de Meulenaer, F. Gosset, F. Standaert, and O. F.-X. Pereira, "On the Energy Cost of Communication and Cryptography in Wireless Sensor Networks," IEEE International Conference on Wireless and Mobile Computing Networking and Communications (WIMOB), pp. 580--585, 2008.
[35]
H. Wang, B. Sheng, and Q. Li, "Elliptic curve cryptography-based access control in sensor networks," International Journal of Security and Networks (IJSN), vol. 1, issue 3, pp. 127--137, 2006.
[36]
N. Gura, A. Patel, A. Wander, H. Eberle, and S. C. Shantz, "Comparing elliptic curve cryptography and RSA on 8-bit CPUs," Cryptographic Hardware and Embedded Systems (CHES), pp. 119--132, 2004.

Cited By

View all
  • (2022)Security in Wireless Body Sensor Network: A Multivocal Literature StudyApplied System Innovation10.3390/asi50400795:4(79)Online publication date: 15-Aug-2022

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Other conferences
AWICT 2017: Proceedings of the Second International Conference on Advanced Wireless Information, Data, and Communication Technologies
November 2017
116 pages
ISBN:9781450353106
DOI:10.1145/3231830
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

In-Cooperation

  • CNRS: Centre National De La Rechercue Scientifique

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 13 November 2017

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. BSN
  2. CCP-ABE
  3. CP-ABE
  4. ECP-ABE
  5. Encryption
  6. MICAz

Qualifiers

  • Research-article
  • Research
  • Refereed limited

Conference

AWICT 2017

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)4
  • Downloads (Last 6 weeks)0
Reflects downloads up to 20 Feb 2025

Other Metrics

Citations

Cited By

View all
  • (2022)Security in Wireless Body Sensor Network: A Multivocal Literature StudyApplied System Innovation10.3390/asi50400795:4(79)Online publication date: 15-Aug-2022

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media