Securing communications between external users and Wireless Body Area Networks

Chunqiang Hu, Fan Zhang, Xiuzhen Cheng, Xiaofeng Liao, Dechang Chen

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

28 Scopus citations

Abstract

Wireless Body Area Networks (BANs) are expected to play a crucial role in patient-health monitoring in the near future. Establishing secure communications between BAN sensors and external users is key to addressing the prevalent security and privacy concerns. In this paper, we propose the primitive functions to implement a secret-sharing based Ciphertext-Policy Attribute-Based Encryption (CP-ABE) scheme, which encrypts the data based on an access structure specified by the data source. We also design two protocols to securely retrieve the sensitive patient data from a BAN and instruct the sensors in a BAN. Our analysis indicates that the proposed scheme is feasible, can provide message authenticity, and can counter possible major attacks such as collusion attacks and battery-draining attacks.

Original languageEnglish
Title of host publicationHotWiSec 2013 - Proceedings of the 2013 ACM Workshop on Hot Topics on Wireless Network Security and Privacy
Pages31-35
Number of pages5
DOIs
StatePublished - 2013
Externally publishedYes
Event2013 2nd ACM Workshop on Hot Topics on Wireless Network Security and Privacy, HotWiSec 2013 - Budapest, Hungary
Duration: 19 Apr 201319 Apr 2013

Publication series

NameHotWiSec 2013 - Proceedings of the 2013 ACM Workshop on Hot Topics on Wireless Network Security and Privacy

Conference

Conference2013 2nd ACM Workshop on Hot Topics on Wireless Network Security and Privacy, HotWiSec 2013
Country/TerritoryHungary
CityBudapest
Period19/04/1319/04/13

Keywords

  • Access control tree
  • Attribute-based cryptosystem
  • Bilinear map
  • Secure communications
  • Wireless body area networks

Fingerprint

Dive into the research topics of 'Securing communications between external users and Wireless Body Area Networks'. Together they form a unique fingerprint.

Cite this