biometric-based security for data authentication in wireless body area network(wban)
DESCRIPTION
The empowerment in wireless communication technologies and sensors have developed the Wireless Body Area Network (WBAN). The rapid growth in physiological sensors, low-power integrated circuits, and wireless communication has enabled a new invention of wireless sensor networks, now used for purposes such as monitoring traffic and health etc. Wireless body area network (BAN) is a promising technology for real-time monitoring of physiological signals to support medical applications. A security system to secure medical information communications using biometric features of the body in WBAN. In order to ensure the trustworthy and reliable gathering of patient’s critical health information, it is essential to provide node authentication servicing a BAN, which prevents an attacker from impersonation and false data/command injection. Biometrics refers to or metrics) related to human characteristics and traits. Biometrics identification (or biometric authentication) is used in computer science as a form of identification and access control. It is also used to identify individuals in groups that are under surveillance. Biometric identifiers are the distinctive, measurable characteristics used to label and describe individuals. Biometric identifiers are unique to individuals, they are more reliable in verifying identity than other method like token. Many different aspects of human physiology, chemistry or behavior can be used for biometric authentication.TRANSCRIPT
![Page 1: Biometric-based Security for Data Authentication in Wireless Body Area Network(WBAN)](https://reader033.vdocuments.us/reader033/viewer/2022052901/556d19d9d8b42a540c8b48b3/html5/thumbnails/1.jpg)
A BIOMETRIC-BASED SECURITY FOR DATAAUTHENTICATION IN WIRELESS BODY AREA
NETWORK(WBAN)By
Shreyas S. Tote
Under the guidance
Prof. J.H.Saturwar
Department Of Computer Science and EngineeringJawaharlal Darda Institute of Engineering & Technology,
Yavatmal, (M.S), India-445001Session 2014-2015
![Page 2: Biometric-based Security for Data Authentication in Wireless Body Area Network(WBAN)](https://reader033.vdocuments.us/reader033/viewer/2022052901/556d19d9d8b42a540c8b48b3/html5/thumbnails/2.jpg)
CONTENTS
What is Biometric Security?What is WBAN? Security Issues In WBANWhy Biometric based Security Approach for
Data authenticationApplications of WBANAdvantages and Disadvantages of BiometricsConclusion
![Page 3: Biometric-based Security for Data Authentication in Wireless Body Area Network(WBAN)](https://reader033.vdocuments.us/reader033/viewer/2022052901/556d19d9d8b42a540c8b48b3/html5/thumbnails/3.jpg)
WHAT IS BIOMETRIC SECURITY?
It is a security mechanism used to
authenticate.
Based on Human Characteristic.
Often used Critical Environment.
![Page 4: Biometric-based Security for Data Authentication in Wireless Body Area Network(WBAN)](https://reader033.vdocuments.us/reader033/viewer/2022052901/556d19d9d8b42a540c8b48b3/html5/thumbnails/4.jpg)
![Page 5: Biometric-based Security for Data Authentication in Wireless Body Area Network(WBAN)](https://reader033.vdocuments.us/reader033/viewer/2022052901/556d19d9d8b42a540c8b48b3/html5/thumbnails/5.jpg)
BIOMETRIC DEVICES
![Page 6: Biometric-based Security for Data Authentication in Wireless Body Area Network(WBAN)](https://reader033.vdocuments.us/reader033/viewer/2022052901/556d19d9d8b42a540c8b48b3/html5/thumbnails/6.jpg)
WHAT IS WBAN?
Smart biomedical sensor platform
Analyze the measured signals and
transmit them to user interface
wirelessly.
Consist of a set of a mobile and small size
intercommunicating sensors.
Limited Resources
![Page 7: Biometric-based Security for Data Authentication in Wireless Body Area Network(WBAN)](https://reader033.vdocuments.us/reader033/viewer/2022052901/556d19d9d8b42a540c8b48b3/html5/thumbnails/7.jpg)
Working of WBAN
![Page 8: Biometric-based Security for Data Authentication in Wireless Body Area Network(WBAN)](https://reader033.vdocuments.us/reader033/viewer/2022052901/556d19d9d8b42a540c8b48b3/html5/thumbnails/8.jpg)
SECURITY ISSUES IN WBAN
Security Problems in WBAN
Less Extent on Evolving Network Protocol
Cryptography Techniques are used in WBAN
Problems in Cryptographic Technique
Complex and Difficult to use
![Page 9: Biometric-based Security for Data Authentication in Wireless Body Area Network(WBAN)](https://reader033.vdocuments.us/reader033/viewer/2022052901/556d19d9d8b42a540c8b48b3/html5/thumbnails/9.jpg)
WHY BIOMETRIC BASED SECURITY
APPROACH FOR DATA AUTHENTICATION
Universal
Distinctive
Permanent
Collectable
Effective
Invulnerable
Acceptable
![Page 10: Biometric-based Security for Data Authentication in Wireless Body Area Network(WBAN)](https://reader033.vdocuments.us/reader033/viewer/2022052901/556d19d9d8b42a540c8b48b3/html5/thumbnails/10.jpg)
HEART RATE VARIABILITY(HRV)
Unique Characteristics
Time interval between heart varies
Autonomic Nervous System comprise two basic
component
*Sympathetic
*Parasympathetic
![Page 11: Biometric-based Security for Data Authentication in Wireless Body Area Network(WBAN)](https://reader033.vdocuments.us/reader033/viewer/2022052901/556d19d9d8b42a540c8b48b3/html5/thumbnails/11.jpg)
WHY ELETROCARDIOGRAM(ECG)
PREFERRED
Universality
Uniqueness
Robustness
Liveness detection
![Page 12: Biometric-based Security for Data Authentication in Wireless Body Area Network(WBAN)](https://reader033.vdocuments.us/reader033/viewer/2022052901/556d19d9d8b42a540c8b48b3/html5/thumbnails/12.jpg)
R-PEAK DETECTION
Schematic representation of normal ECG
![Page 13: Biometric-based Security for Data Authentication in Wireless Body Area Network(WBAN)](https://reader033.vdocuments.us/reader033/viewer/2022052901/556d19d9d8b42a540c8b48b3/html5/thumbnails/13.jpg)
R-PEAK DETECTION
Fig. Before and After Preprocessing of NOISY ECG signal
![Page 14: Biometric-based Security for Data Authentication in Wireless Body Area Network(WBAN)](https://reader033.vdocuments.us/reader033/viewer/2022052901/556d19d9d8b42a540c8b48b3/html5/thumbnails/14.jpg)
R-peak
DetectionHRV
calculation
Binary
Conversion
Sender ReceiverAuthentication
Sender Protocol
Fig:- Biometric Feature Used to Calculate MAC
![Page 15: Biometric-based Security for Data Authentication in Wireless Body Area Network(WBAN)](https://reader033.vdocuments.us/reader033/viewer/2022052901/556d19d9d8b42a540c8b48b3/html5/thumbnails/15.jpg)
Preprocessing
Message MAC
Likelihood
algorithm
Estimation
Hash
Function
Schematic representation of normal ECG
Biometric Feature
(from medical
database)
Authentication(Yes/No)
Biometric Feature
Fig-Proposed biometric based security for data authentication
|
|
|_ _ _ _ _ _ _ _ _ _ _ _ _ _ __ _ _ _ __ _ _ _ _ __ Original message
![Page 16: Biometric-based Security for Data Authentication in Wireless Body Area Network(WBAN)](https://reader033.vdocuments.us/reader033/viewer/2022052901/556d19d9d8b42a540c8b48b3/html5/thumbnails/16.jpg)
APPLICATIONS OF BIOMETRICS
Biometric Time and Attendance
Biometric Safe and Locks
Securing Access To PC‟s
High End Security
Identifying Criminals
![Page 17: Biometric-based Security for Data Authentication in Wireless Body Area Network(WBAN)](https://reader033.vdocuments.us/reader033/viewer/2022052901/556d19d9d8b42a540c8b48b3/html5/thumbnails/17.jpg)
APPLICATION’S OF WBAN
![Page 18: Biometric-based Security for Data Authentication in Wireless Body Area Network(WBAN)](https://reader033.vdocuments.us/reader033/viewer/2022052901/556d19d9d8b42a540c8b48b3/html5/thumbnails/18.jpg)
ADVANTAGES & DISADVANTAGES OF
BIOMETRICS
ADVANTAGES
Error
Mistakes
Fraud,
Forgery
DISADVANTAGES
limited by many situations
Affordability
![Page 19: Biometric-based Security for Data Authentication in Wireless Body Area Network(WBAN)](https://reader033.vdocuments.us/reader033/viewer/2022052901/556d19d9d8b42a540c8b48b3/html5/thumbnails/19.jpg)
CONCLUSION
Secure communications in BANs are strongly
required to preserves a person‟s health, privacy and
safety.
Senders electrocardiogram feature is selected as the
biometric key for data authentication mechanism.
The security system implemented with low computational
complexity and high power efficiency instead of
cryptographic key distribution.
![Page 20: Biometric-based Security for Data Authentication in Wireless Body Area Network(WBAN)](https://reader033.vdocuments.us/reader033/viewer/2022052901/556d19d9d8b42a540c8b48b3/html5/thumbnails/20.jpg)
REFERENCES
[1]P.Abina, K.Dhivyakala, L.Suganya, S.Mary Praveena
“Biometric Authentication System for Body Area Network Vol.
3, Issue 3, International Journal of Advanced Research in
Electrical, Electronics and Instrumentation Engineering,
Coimbatore, India March 2014
[2] Sofia Najwa Ramlil, Rabiah Ahmad, Mohd Faizal Abdollah,
Eryk Dutkiewicz4 “A Biometric-based Security for Data
Authentication in Wireless Body Area NetworK(WBAN),ICACT
January 27 ,2013
[3]Systems and Network Analysis Center Information Assurance
Directorate by National Security Agency,United states of
America,2013
![Page 21: Biometric-based Security for Data Authentication in Wireless Body Area Network(WBAN)](https://reader033.vdocuments.us/reader033/viewer/2022052901/556d19d9d8b42a540c8b48b3/html5/thumbnails/21.jpg)
[5] L. Eschenauer and V. D. Gligor, „A Key Management
Scheme forDistributed Sensor Networks‟, Version: pp.
41–47, November 18–22, 2002
[4] Lin Yao, Bing Liu, GuoweiWu, Kai Yao and
JiaWang1,” A Biometric Key Establishment Protocol for
Body Area Networks”, IJDSN, vol 2011
![Page 22: Biometric-based Security for Data Authentication in Wireless Body Area Network(WBAN)](https://reader033.vdocuments.us/reader033/viewer/2022052901/556d19d9d8b42a540c8b48b3/html5/thumbnails/22.jpg)