Misplaced Pages

Physiological Signal Based Security

Article snapshot taken from Wikipedia with creative commons attribution-sharealike license. Give it a read and then ask your questions in the chat. We can research this topic together.
This article has multiple issues. Please help improve it or discuss these issues on the talk page. (Learn how and when to remove these messages)
This article includes a list of general references, but it lacks sufficient corresponding inline citations. Please help to improve this article by introducing more precise citations. (March 2014) (Learn how and when to remove this message)
This article may be confusing or unclear to readers. Please help clarify the article. There might be a discussion about this on the talk page. (July 2024) (Learn how and when to remove this message)
This article needs additional citations for verification. Please help improve this article by adding citations to reliable sources. Unsourced material may be challenged and removed.
Find sources: "Physiological Signal Based Security" – news · newspapers · books · scholar · JSTOR (July 2024) (Learn how and when to remove this message)
The topic of this article may not meet Misplaced Pages's general notability guideline. Please help to demonstrate the notability of the topic by citing reliable secondary sources that are independent of the topic and provide significant coverage of it beyond a mere trivial mention. If notability cannot be shown, the article is likely to be merged, redirected, or deleted.
Find sources: "Physiological Signal Based Security" – news · newspapers · books · scholar · JSTOR (July 2024) (Learn how and when to remove this message)
(Learn how and when to remove this message)

Body Area Networks (BANs) are inherently cyber-physical systems which interact with the human body by using sensors to collect, process and communicate health data (vital signals, temperature, pressure) from the person. This information from the environment that is already being collected can be used to provide security to the BAN.

Physiological Value based Security (PVS) uses the vital signals of the human body that is collected during health monitoring operation to provide usable security to BAN.

Figure 1. Physiological Value Based Key Agreement Protocol

Properties of PVS

For PVS to succeed the scheme developed should have the following properties:

  1. The keys provided by PVS for security are long and random (a basic requirement in any security protocol).
  2. Knowing the physiological signals at any time will not provide significant advantage in knowing the keys agreed upon in future executions of the scheme, i.e. time variance (required to prevent attacker from guessing future feature values from present ones).
  3. The physiological stimuli used for PVS is universally (ensures that sensors at different location can measure the same signal).
  4. Knowing the physiological value of one individual will not provide significant advantage in guessing the keys being agreed by sensors on another individual, i.e. distinctiveness.

Implementation of PVS using Photoplethysmogram (PPG) signals

Plethysmogram based Key Agreement protocol (PKA) uses PPG signals to provide PVS infrastructure to the BAN. It provides secure key agreement between two sensors that wish to communicate in a BAN.

Figure 2. Signal Processing for Extracting Common Features from 2 PPG Sensors on the Same Body

PKA has been divided into four basic steps as described in Figure 1:

  1. Sensing - PPG signals are sensed using Smith Medical pulse oximeter boards. The sampling rate of the instrument was 60 Hz. 12.8 seconds of PPG signals were sensed by the two communicating sensors.
  2. Generate features
    1. Frequency domain features were generated by performing 256 point overlapped windowed FFT on the measured signal. The signal was divided into five Hamming windows with an overlap of 50. The first 32 coefficients of the FFT of each of the windows are concatenated to form the frequency domain features. The FFT computation is shown in Figure 2.
    2. Peak Detection, Peaks (maxima) in the FFT coefficient curve were detected by detecting sudden change in slopes (from positive to negative) of the curve. Both the peak index and the peak values were noted.
    3. Quantization, The peak indexes were represented in 8 bits binary (since they could only take values from 1 to 160). The peak values were re-quantized into 16 non uniform levels. The first twelve levels were exponential while the next 4 levels were linear. The main reason for doing this was to extract the variations in the higher frequency components (with low coefficient values) in the FFT. Thus the peak values got quantized into 5 bits binary numbers.
  3. Secure Transmission of Features: Fuzzy Vault security primitive was used for secure transmission of the features from transmitting sensor to receiving sensor.
  4. Select Common Features.

References

  1. Cherukeri, Shriram; Venkatasubramanian, Krishna K.; Gupta, Sandeep K. S. (October 2003). Biosec: a biometric based approach for securing communication in wireless networks of biosensors implanted in the human body. Parallel Processing Workshops, 2003. Kaohsiung, Taiwan. doi:10.1109/MILCOM.2008.4753199.
  • Venkatasubramanian, Krishna K.; Banerjee, Ayan; Gupta, Sandeep K. S. (November 2008). Plethysmogram-based Secure Inter-Sensor Communication in Body Area Networks. IEEE Military Communications Conference (MILCOM'08). San Diego, CA. doi:10.1109/MILCOM.2008.4753199.
  • Venkatasubramanian, Krishna K.; Gupta, Sandeep K. S. (July 2010). "Physiological Value Based Efficient Usable Security Solutions for Body Sensor Networks". ACM Transactions on Sensor Networks. 6 (4): 1–36. doi:10.1145/1777406.1777410. S2CID 13269926.
  • Venkatasubramanian, Krishna K.; Banerjee, Ayan; Gupta, Sandeep K. S. (January 2010). "PSKA: Usable and Secure Key Agreement Scheme for Body Area Networks". IEEE Transactions on Information Technology in Biomedicine. 14 (1): 60–8. doi:10.1109/TITB.2009.2037617. PMID 20007032. S2CID 1511743.
Category: