Body Sensor Network (BSN) is a network of several associated sensor nodes on, inside or around the human body to monitor vital signals, such as, Electroencephalogram (EEG), Photoplethysmography (PPG), Electrocardiogram (ECG), etc. Each sensor node in BSN delivers major information; therefore, it is very significant to provide data confidentiality and security. All existing approaches to secure BSN are based on complex cryptographic key generation procedures, which not only demands high resource utilization and computation time, but also consumes large amount of energy, power and memory during data transmission. However, it is indispensable to put forward energy efficient and computationally less complex authentication technique for BSN. In this paper, a novel biometric-based algorithm is proposed, which utilizes Heart Rate Variability (HRV) for simple key generation process to secure BSN. Our proposed algorithm is compared with three data authentication techniques, namely Physiological Signal based Key Agreement (PSKA), Data Encryption Standard (DES) and Rivest Shamir Adleman (RSA). Simulation is performed in Matlab and results suggest that proposed algorithm is quite efficient in terms of transmission time utilization, average remaining energy and total power consumption.

Download full-text PDF

Source
http://www.ncbi.nlm.nih.gov/pmc/articles/PMC4541821PMC
http://dx.doi.org/10.3390/s150715067DOI Listing

Publication Analysis

Top Keywords

biometric-based algorithm
8
heart rate
8
rate variability
8
body sensor
8
secure bsn
8
key generation
8
proposed algorithm
8
bsn
5
efficient biometric-based
4
algorithm
4

Similar Publications

The increasing integration of telehealth systems underscores the importance of robust and secure methods for patient data management. Traditional authentication methods, such as passwords and PINs, are prone to breaches, underscoring the need for more secure alternatives. Therefore, there is a need for alternative approaches that provide enhanced security and user convenience.

View Article and Find Full Text PDF

GazeForensics: DeepFake detection via gaze-guided spatial inconsistency learning.

Neural Netw

December 2024

Chongqing Key Laboratory of Image Cognition, Chongqing University of Posts and Telecommunications, Chongqing 400065, PR China. Electronic address:

Article Synopsis
  • DeepFake detection is crucial for maintaining personal privacy and public safety as advanced techniques create increasingly convincing fake media.
  • Traditional methods of DeepFake detection often overlook the integration of biometric features, which can limit effectiveness and performance.
  • The innovative GazeForensics method, introduced in this paper, leverages 3D gaze estimation to improve detection by combining gaze data with general features, leading to better results and clear interpretability.
View Article and Find Full Text PDF

Keystroke dynamics is a soft biometric based on the assumption that humans always type in uniquely characteristic manners. Previous works mainly focused on analyzing the key press or release events. Unlike these methods, we explored a novel visual modality of keystroke dynamics for human identification using a single RGB-D sensor.

View Article and Find Full Text PDF

Biometric-based personal identification models are generally considered to be accurate and secure because biological signals are too complex and person-specific to be fabricated, and EMG signals, in particular, have been used as biological identification tokens due to their high dimension and non-linearity. We investigate the possibility of effectively attacking EMG-based identification models with adversarial biological input via a novel EMG signal individual-style transformer based on a generative adversarial network and tiny leaked data segments. Since two same EMG segments do not exist in nature; the leaked data can't be used to attack the model directly or it will be easily detected.

View Article and Find Full Text PDF

Trustworthy AI applications such as biometric authentication must be implemented in a secure manner so that a malefactor is not able to take advantage of the knowledge and use it to make decisions. The goal of the present work is to increase the reliability of biometric-based key generation, which is used for remote authentication with the protection of biometric templates. Ear canal echograms were used as biometric images.

View Article and Find Full Text PDF

Want AI Summaries of new PubMed Abstracts delivered to your In-box?

Enter search terms and have AI summaries delivered each week - change queries or unsubscribe any time!