BioSec: A Biometric Based Approach for Securing Communication in Wireless Networks
#1

BioSec: A Biometric Based Approach for Securing Communication in Wireless
Networks of Biosensors Implanted in the Human Body

Abstract
Advances in microelectronics, material science and wireless technology have led to the development of sensors that can be used for accurate monitoring of inaccessible environments. Health monitoring, telemedicine, military and environmental monitoring are some of the applications where sensors can be used. The sensors implanted inside the human body to monitor parts of the body are called biosensors. These biosensors form a network and collectively monitor the health condition of their carrier or host. Health monitoring involves collection of data about vital body parameters from different parts of the body and making decisions based on it. This information is of personal nature and is required to be secured. Insecurity may also lead to dangerous consequences. Due to the extreme constraints of energy, memory and computation securing the communication among the biosensors is not a trivial problem. Key distribution is central to any security mechanism. In this paper we propose an approach wherein, biometrics derived from the body are used for securing the keying material. This method obviates the need for expensive computation and avoids unnecessary communication making our approach novel compared to existing approaches. Index Terms—security, key management, Pervasive Computing, biometrics, randomness.
I. INTRODUCTION
Pervasive computing is an environment where people interact with various companion, embedded, and invisible computers. The objective of pervasive computing technologies is to enable a seamless integration of computing devices with the environment. This enables the environment to react to the user’s computing needs without the user actually expending his time and energy. Use of embedded micro- sensors is an integral part of pervasive computing. Health care is a very important aspect of everyday life. Hence it is imperative that pervasive computing be extended to health care applications. Pervasive computing has the potential to provide low cost, high performance, and people centric solutions for health care, and monitoring. The rapid improvements in microprocessor and sensing material technology has lead to a development of miniature sensors that can be implanted in the human body. The biosensor based approach to health care makes it much more effective by reducing the response time, and decreasing the granularity of the application. By this technology continuous health monitoring of a human body and real time data collection would be possible. The biosensors are implanted in the human body. These sensor form a wireless network between themselves and some entities which are external to the human body. A wireless network is the most suitable option because a wired network would require laying wires within the human body, which is not desirable. Such a network can be used for a multitude of applications. These include both data aggregation and data dissemination applications. Biosensors may be used for monitoring the physiological parameters like blood pressure, glucose levels and collecting the data for further analysis. This enables real time health monitoring. Biosensors placed in the subcutaneous layer of skin, nasal area, tongue may be used to detect the presence of harmful toxins in say the food ingested and air inhaled. As soon as a toxin is detected corrective actions may be taken or at least the host may be informed about it. Such applications would prove to be extremely useful in situations like biological and chemical attacks where small response time is very crucial to avoid extensive damage. Data dissemination applications include biosensors for visually impaired, wherein biosensors are implanted in the retina of persons with visual disabilities. These biosensors collect the light signals from outside and stimulate optical cells of the eye, thereby enabling at least partial vision. Other applications include those which stimulate actions like drug administration inside the body based on certain inputs. In any information system it is essential to build a security mechanism in order to protect the information, as it is susceptible to breaches either when it is stored or when it is being transmitted. The required degree of security depends upon the particular application. A trade-off always exists between the provided level of security and the performance of the system. The information to be transmitted in the present application is crucial medical information. It is required by law that this information must be secure [1], in the sense that it must possess the characteristics of secure data: authenticity, integrity, and confidentiality.


Download full report
http://googleurl?sa=t&source=web&cd=2&ve...1.1.2.1812%26rep%3Drep1%26type%3Dpdf&ei=f2FcTpueBs_nrAfflrGaDw&usg=AFQjCNH8kSTl6bzn27DqBwdkClwS9M88Kg
Reply

Important Note..!

If you are not satisfied with above reply ,..Please

ASK HERE

So that we will collect data for you and will made reply to the request....OR try below "QUICK REPLY" box to add a reply to this page
Popular Searches: securing under water wireless communication network, securing wireless communications with ppt, absrtract for securing tcp ip communication using cryptography vb net, ppt on novel approach of biometric system, securing underwater wireless communication networks with, securing underwater wireless communication networks ppt s, securing tcp ip communication using cryptography vb net,

[-]
Quick Reply
Message
Type your reply to this message here.

Image Verification
Please enter the text contained within the image into the text box below it. This process is used to prevent automated spam bots.
Image Verification
(case insensitive)

Possibly Related Threads...
Thread Author Replies Views Last Post
  Opportunistic Routing in Multi-radio Multi-channel Multi-hop Wireless Networks seminar class 4 3,542 17-10-2017, 02:48 PM
Last Post: jaseela123d
  A Link-Based Cluster Ensemble Approach for Categorical Data Clustering 1 1,062 16-02-2017, 10:51 AM
Last Post: jaseela123d
  Privacy- and Integrity-Preserving Range Queries in Sensor Networks 1 849 15-02-2017, 04:10 PM
Last Post: jaseela123d
  LTE-ADVANCED AND 4G WIRELESS COMMUNICATIONS 1 720 15-02-2017, 12:51 PM
Last Post: jaseela123d
  Protecting Location Privacy in Sensor Networks Against a Global Eavesdropper 1 780 15-02-2017, 11:01 AM
Last Post: jaseela123d
  Protecting Location Privacy in Sensor Networks Against a Global Eavesdropper 1 742 15-02-2017, 11:00 AM
Last Post: jaseela123d
  Critical State-Based Filtering System for Securing SCADA Network Protocols 1 838 14-02-2017, 12:48 PM
Last Post: jaseela123d
  projects on computer networks? shakir_ali 2 1,574 25-01-2016, 02:26 PM
Last Post: seminar report asees
  DYNAMIC SEARCH ALGORITHM IN UNSTRUCTURED PEER-TO-PEER NETWORKS--PARALLEL AND DISTRIBU electronics seminars 9 7,326 14-07-2015, 02:25 PM
Last Post: seminar report asees
  Revisiting Dynamic Query Protocols in Unstructured Peer-to-Peer Networks Projects9 2 1,301 14-07-2015, 02:11 PM
Last Post: seminar report asees

Forum Jump: