Biometric-based Security for Data Authentication in Wireless Body Area Network(WBAN)


Published on

The empowerment in wireless communication technologies and sensors have developed the Wireless Body Area Network (WBAN). The rapid growth in physiological sensors, low-power integrated circuits, and wireless communication has enabled a new invention of wireless sensor networks, now used for purposes such as monitoring traffic and health etc. Wireless body area network (BAN) is a promising technology for real-time monitoring of physiological signals to support medical applications. A security system to secure medical information communications using biometric features of the body in WBAN. In order to ensure the trustworthy and reliable gathering of patient’s critical health information, it is essential to provide node authentication servicing a BAN, which prevents an attacker from impersonation and false data/command injection. Biometrics refers to or metrics) related to human characteristics and traits. Biometrics identification (or biometric authentication) is used in computer science as a form of identification and access control. It is also used to identify individuals in groups that are under surveillance. Biometric identifiers are the distinctive, measurable characteristics used to label and describe individuals. Biometric identifiers are unique to individuals, they are more reliable in verifying identity than other method like token. Many different aspects of human physiology, chemistry or behavior can be used for biometric authentication.

Published in: Technology
  • Be the first to comment

  • Be the first to like this

No Downloads
Total views
On SlideShare
From Embeds
Number of Embeds
Embeds 0
No embeds

No notes for slide

Biometric-based Security for Data Authentication in Wireless Body Area Network(WBAN)

  1. 1. A BIOMETRIC-BASED SECURITY FOR DATA AUTHENTICATION IN WIRELESS BODY AREA NETWORK(WBAN) By Shreyas S. Tote Under the guidance Prof. J.H.Saturwar Department Of Computer Science and Engineering Jawaharlal Darda Institute of Engineering & Technology, Yavatmal, (M.S), India-445001 Session 2014-2015
  2. 2. CONTENTS  What is Biometric Security?  What is WBAN?  Security Issues In WBAN  Why Biometric based Security Approach for Data authentication  Applications of WBAN  Advantages and Disadvantages of Biometrics  Conclusion
  3. 3. WHAT IS BIOMETRIC SECURITY?  It is a security mechanism used to authenticate.  Based on Human Characteristic.  Often used Critical Environment.
  5. 5. WHAT IS WBAN?  Smart biomedical sensor platform  Analyze the measured signals and transmit them to user interface wirelessly.  Consist of a set of a mobile and small size intercommunicating sensors.  Limited Resources
  6. 6. Working of WBAN
  7. 7. SECURITY ISSUES IN WBAN  Security Problems in WBAN  Less Extent on Evolving Network Protocol  Cryptography Techniques are used in WBAN  Problems in Cryptographic Technique  Complex and Difficult to use
  8. 8. WHY BIOMETRIC BASED SECURITY APPROACH FOR DATA AUTHENTICATION  Universal  Distinctive  Permanent  Collectable  Effective  Invulnerable  Acceptable
  9. 9. HEART RATE VARIABILITY(HRV)  Unique Characteristics  Time interval between heart varies  Autonomic Nervous System comprise two basic component *Sympathetic *Parasympathetic
  10. 10. WHY ELETROCARDIOGRAM(ECG) PREFERRED  Universality  Uniqueness  Robustness  Liveness detection
  11. 11. R-PEAK DETECTION Schematic representation of normal ECG
  12. 12. R-PEAK DETECTION Fig. Before and After Preprocessing of NOISY ECG signal
  13. 13. R-peak Detection HRV calculation Binary Conversion Sender Receiver Authentication Sender Protocol Fig:- Biometric Feature Used to Calculate MAC
  14. 14. Preprocessing Message MAC Likelihood algorithm Estimation Hash Function Schematic representation of normal ECG Biometric Feature (from medical database) Authentication(Yes/No) Biometric Feature Fig-Proposed biometric based security for data authentication | | |_ _ _ _ _ _ _ _ _ _ _ _ _ _ __ _ _ _ __ _ _ _ _ __ Original message
  15. 15. APPLICATIONS OF BIOMETRICS  Biometric Time and Attendance  Biometric Safe and Locks  Securing Access To PC‟s  High End Security  Identifying Criminals
  17. 17. ADVANTAGES & DISADVANTAGES OF BIOMETRICS ADVANTAGES  Error  Mistakes  Fraud,  Forgery DISADVANTAGES  limited by many situations  Affordability
  18. 18. CONCLUSION  Secure communications in BANs are strongly required to preserves a person‟s health, privacy and safety.  Senders electrocardiogram feature is selected as the biometric key for data authentication mechanism.  The security system implemented with low computational complexity and high power efficiency instead of cryptographic key distribution.
  19. 19. REFERENCES [1]P.Abina, K.Dhivyakala, L.Suganya, S.Mary Praveena “Biometric Authentication System for Body Area Network Vol. 3, Issue 3, International Journal of Advanced Research in Electrical, Electronics and Instrumentation Engineering, Coimbatore, India March 2014 [2] Sofia Najwa Ramlil, Rabiah Ahmad, Mohd Faizal Abdollah, Eryk Dutkiewicz4 “A Biometric-based Security for Data Authentication in Wireless Body Area NetworK(WBAN),ICACT January 27 ,2013 [3]Systems and Network Analysis Center Information Assurance Directorate by National Security Agency,United states of America,2013
  20. 20. [5] L. Eschenauer and V. D. Gligor, „A Key Management Scheme forDistributed Sensor Networks‟, Version: pp. 41–47, November 18–22, 2002 [4] Lin Yao, Bing Liu, GuoweiWu, Kai Yao and JiaWang1,” A Biometric Key Establishment Protocol for Body Area Networks”, IJDSN, vol 2011