9 research outputs found

    Double threshold authentication using body area radio channel characteristics

    Get PDF
    The demand of portable and body-worn devices for remote health monitoring is ever increasing. One of the major challenges caused by this influx of wireless body area network (WBAN) devices is security of user's extremely vital and personal information. Conventional authentication techniques implemented at upper layers of the Open System Interconnection (OSI) model usually consumes huge amount of power. They also require significant changes at hardware and software levels. It makes them unsuitable for inherently low powered WBAN devices. This letter investigates the usability of a double threshold algorithm as a physical layer security measure in these scenarios. The algorithm is based on the user's behavioral fingerprint extracted from the radio channel characteristics. Effectiveness of this technique is established through experimental measurements considering a variety of common usage scenarios. The results show that this method provides high level of security against false authentication attacks and has great potential in WBANs

    Patterns-of-Life Aided Authentication

    Get PDF
    Wireless Body Area Network (WBAN) applications have grown immensely in the past few years. However, security and privacy of the user are two major obstacles in their development. The complex and very sensitive nature of the body-mounted sensors means the traditional network layer security arrangements are not sufficient to employ their full potential, and novel solutions are necessary. In contrast, security methods based on physical layers tend to be more suitable and have simple requirements. The problem of initial trust needs to be addressed as a prelude to the physical layer security key arrangement. This paper proposes a patterns-of-life aided authentication model to solve this issue. The model employs the wireless channel fingerprint created by the user’s behavior characterization. The performance of the proposed model is established through experimental measurements at 2.45 GHz. Experimental results show that high correlation values of 0.852 to 0.959 with the habitual action of the user in different scenarios can be used for auxiliary identity authentication, which is a scalable result for future studies
    corecore