+ All Categories
Home > Documents > Body Area Network Security: Robust Secret Sharing Area Network Background Body area network (BAN)...

Body Area Network Security: Robust Secret Sharing Area Network Background Body area network (BAN)...

Date post: 06-Sep-2018
Category:
Upload: dokiet
View: 215 times
Download: 1 times
Share this document with a friend
24
Body Area Network Security: Robust Secret Sharing 1 Sang-Yoon Chang , Yih-Chun Hu, Hans Anderson, Ting Fu, Evelyn Huang University of Illinois
Transcript

Body Area Network Security:Robust Secret Sharing

1

Sang-Yoon Chang, Yih-Chun Hu, Hans Anderson, Ting Fu, Evelyn Huang

University of Illinois

Title changed (secret instead of key!!)

Body Area Network Background§ Body area network (BAN) consists of nodes physically touching the human body (either worn or implanted)

§ Sensor nodes monitor the state of the human body, usually for health reasons

2

body, usually for health reasons§ Nodes want to talk to each other

3From: http://groups.csail.mit.edu/netmit/IMDShield/

Motivation for Our Work§ Wireless connectivity introduces vulnerabilities§ Halperin et al.* demonstrate successful

eavesdropping and impersonation attacks§ We achieve security against outsiders § A network must share a secret to give the

4

§ A network must share a secret to give the network an advantage over outsiders

* Halperin, Heydt-Benjamin, Ransford, Clark, Defend, Morgan, Fu, Kohno, Maisel, “Pacemakers and implantable cardiac defibrillators: software radio attacks and zero-power defenses”, IEEE S&P 2008

State-of-the-Art§ Secret sharing using body physiological value

– Use the randomness of physiological value to share secret

§ Physiological state can be modeled as a time-varying signal generated by a random process

5

varying signal generated by a random process – The history of such states derive secret

(Attacker may know the statistics of the random process but not the exact history)

6

Related Work§ Prior researchers propose using

electrocardiogram (ECG) to share a secret– Bao, et al., “Using the timing information of heartbeats as an entity

identifier to secure body sensor network,” IEEE Transactions on Information Tehcnology in Biomedicine, 2008

– Venkatasubramanian, et al., “EKG-based key agreement in body sensor networks,” IEEE Infocom 2008

7

networks,” IEEE Infocom 2008– Poon, et al., “A Novel biometrics method to secure wireless body area

sensor networks for telemedicine and m-health,” IEEE Communications Magazine, 2006

– Xu, et al., “IMDGuard: securing implantable medical devices with the external wearable guardian, ” IEEE Infocom, 2011

– Etc.

§ They generally assume ideal ECG measurement, using hospital-provided data

Our Contribution§ We investigate the feasibility of the current literature,

propose a novel scheme, study human body channel, and demonstrate the practicality of our scheme

§ We conduct four experiments:– ECG Experiment: to investigate the practicality of

current literature by studying the physiological value

8

current literature by studying the physiological value measurements

– Mouse Experiment: to build our scheme and derive preliminary results about human body channel

– Homogeneous Tissue Experiment: to devise a channel amplitude model using empirical data

– Noise Measurement: to study channel noise on living human body

ECG Experiment§ Correlation coefficient (ρ)

for a quantitative measurement of similarity between ideal (I) and other locations

§ The measurements are sensitive to electrode orientation; we only show

N

W

M1

P

N�������P�������

M�����M�

W����

9

orientation; we only show the maximum correlation (the minimum is 0)

§ Time synchronization is crucial; readings not aligned in time but otherwise identical yield low correlation (ρ=0.0394)

§ Designated target sensor locations that emulate popular BAN use (see diagram on the right)

WP

M2

A

A����M�����M�

ECG Experiment Result

0.77091

0.84735

0.913915

ρDistance

0.77091

0.84735

0.913915

ρDistance

0.34427

ρDistance

0.34427

ρDistance

ρDistance ρDistance

0.66771

0.74365

ρDistance

0.66771

0.74365

ρDistance

N

W

M1

P

10

0.01551

0.03715

0.09928

ρDistance

0.01551

0.03715

0.09928

ρDistance

0.10031

0.30475

0.34427

0.10031

0.30475

0.34427

0.01231

0.03625

0.078220

ρDistance

0.01231

0.03625

0.078220

ρDistance

0.09721

0.13285

ρDistance

0.09721

0.13285

ρDistanceW P

M2

A

(Distance in cm)

Threat§ Physiological value measurements are not

robust to the sensor deployment location§ Outsiders can use other technology to remotely

measure ECG and compromise physiological value-based secret sharing

11

value-based secret sharing

Side channel

Our Countermeasure§ Our scheme replaces the body physiological

values with an artificial electrical signal§ Our electrical signal operates below the action

potential level of human body (and thus does not cause change in body physiological state)cause change in body physiological state)

§ Our scheme is based on body-coupled communication with galvanic coupling

< Images from Wegmueller et al., 2006 (left) and Baldus et al., 2009 (right) >

Mouse Experiment

13

Building Our Scheme§ Source transmits 2Hz rectangular pulse

amplitude modulated signal with non-return-to-zero, and receiver uses maximum-likelihood threshold-based decision

§ Successful bit transfer

14

§ Successful bit transfer – 0% at every region except for Ankle (A) region – A region showed mean error rate of 0.16%

The mouse is dead (noise is much less than living medium)

Heterogeneous Tissue Channel§ Tissue channel phase

measurement– Transient state lasts

up to 200ms – Data rate/bandwidth is

limited to 5Hz

+

N

M1

0.072Obese

0.094Healthy

Vpp(1.5)Mouse

0.072Obese

0.094Healthy

Vpp(1.5)Mouse

-

0.005Obese

0.008Healthy

Vpp(2)Mouse

0.005Obese

0.008Healthy

Vpp(2)Mouse

Vpp(8)Mouse Vpp(8)Mouse Vpp(4)Mouse Vpp(4)Mouse

Normalized peak-to-peak received voltage magnitude

limited to 5Hz§ Tissue channel amplitude

measurement on the right picture

§ However, human is bigger than mouse

N

M2

P

A

0.028Obese

0.190Healthy

Vpp(8)Mouse

0.028Obese

0.190Healthy

Vpp(8)Mouse

0.008Obese

0.010Healthy

Vpp(4)Mouse

0.008Obese

0.010Healthy

Vpp(4)Mouse

0.005Obese

0.006Healthy

Vpp(6)Mouse

0.005Obese

0.006Healthy

Vpp(6)Mouse

§ Additive noise channel model

Human Body Channel Model

S’ = h • S + n

S is the transmitted signal, S’ is the distorted and received signal,

Path loss model for channel amplitudeh(d) = α•d-γ,

where d is distance and α, γ some constants16

S’ is the distorted and received signal, h is channel amplitude, n is noise

10-1

100

Nor

mal

ized

Pea

k-to

-Pea

k V

olta

ge (

V)

Data (homogeneous)Data (mouse)Fit (homogeneous)

Body Channel Amplitude

+13.7 dB

17

0 2 4 6 8 10 12 14 1610

-3

10-2

Distance (cm)

Nor

mal

ized

Pea

k-to

-Pea

k V

olta

ge (

V)

Using dry pork loin meat

-3.7 dB

h

hlower bound

Channel Amplitude Response h§ We validate our path loss model from homogeneous meat experiment with data acquired from mouse experiment

§ h = 2.1 • 10-4 d-0.5562

§ hlower bound = 8.9582 • 10-4 d-0.5562

18

lower bound

§ Conservative amplitude response because signals travel through a longer path in human than mouse (and by law of large numbers)

Noise Variance (σ2) Measurement

N

W

M1

P

�2 = 124.3

��2 = 142.4

�2 = 358.3

19

W P

M2

A

�2 = 239.5�2 = 142.4

�2 = 35.74 �2 = 116.6

(σ2 in µV2)

Analysis of Our Scheme§ Our channel model (not the dead mouse) is

used to analyze the performance of our scheme§ To provide a simple numerical value, we use

Shannon capacity while assuming Gaussian noise

§ Source transmitter is located on the torso region

20

§ Source transmitter is located on the torso region above the belly button, effectively giving maximum distance of 100 cm to reach anywherein most human body

§ Worst-case capacity because we use hlower bound

Capacity of Our Scheme

21(d in cm, SNR in dB, R in bits per hour)

Application to Body Area Network

§ Shannon capacity over 11 bits per day§ BAN applications being characterized by high-

risk, low-occurrence events make the very low performance tolerable

§ Secret updates are necessary when there is a

22

§ Secret updates are necessary when there is a change in infrastructure, e.g., node misbehaving and needs replacement

§ Our scheme requires minimal hardware and is power-efficient, making it suitable for BAN applications

Conclusion§ Investigated state-of-the-art technology for

secret sharing§ Realized the necessity to have more

understanding about the human body channel§ Measured that channel using empirical data

23

§ Measured that channel using empirical data§ Proposed our scheme that does not leak

information, demonstrated its feasibility, and analyzed the performance on a practical setting

Thank you

Questions ?

24

Questions ?


Recommended