skip to main content
10.1145/2517300.2517303acmconferencesArticle/Chapter ViewAbstractPublication PagesccsConference Proceedingsconference-collections
research-article

Securing data provenance in body area networks using lightweight wireless link fingerprints

Published: 04 November 2013 Publication History

Abstract

Wireless bodyworn sensing devices are becoming popular for fitness, sports training and personalized healthcare applications. Securing the data generated by these devices is essential if they are to be integrated into the current health infrastructure and employed in medical applications. In this paper, we propose a mechanism to secure data provenance for these devices by exploiting symmetric spatio-temporal characteristics of the wireless link between two communicating parties. Our solution enables both parties to generate closely matching 'link' fingerprints which uniquely associate a data session with a wireless link such that a third party, at a later date, can verify the links the data was communicated on. These fingerprints are very hard for an eavesdropper to forge, lightweight compared to traditional provenance mechanisms, and allow for interesting security properties such as accountability and non-repudiation. We validate our solution with experiments using bodyworn devices in scenarios approximating actual device deployment, and we present optimization mechanisms. We believe this is a promising first step towards using wireless-link characteristics for data provenance in body area networks.

References

[1]
Nike+ FuelBand. Retrieved on 21 July, 2013. http://www.nike.com/us/en_us/c/nikeplus-fuelband.
[2]
Fitbit Flex. Retrieved on 21 July, 2013. http://allthingsd.com/20130715/fitbit-flex-vs- jawbone-up-and-more-a-wearables-comparison/.
[3]
Toumaz Technology Ltd. Sensium Life Platform. http://www.toumaz.com/page.php?page=sensium_intro.
[4]
David Szondy. Bracelet Uses Social Network to Protect Civil Rights Activists. 7 April, 2013. http://goo.gl/MIEk2.
[5]
Waiting for Apple's iWatch. 22 March, 2013. http://goo.gl/xTsQO.
[6]
Disposable Wireless Sensor Market Shows Signs of Life: Healthcare Shipments to Reach 5 Million in 2018. 3 March, 2013. http://goo.gl/V9QoP0.
[7]
A. S. Wander, N. Gura, H. Eberle, V. Gupta, and S. C. Shantz. Energy Analysis of Public-key Cryptography for Wireless Sensor Networks. In 3rd IEEE International Conference on Pervasive Computing and Communications (PerCom), pages 324--328, 2005.
[8]
U. Braun, A. Shinnar, and M. I. Seltzer. Securing Provenance. In USENIX Summit on Hot Topics in Security (HotSec), 2008.
[9]
D. J. Pohly, S. McLaughlin, P. McDaniel, and K. Butler. Hi-Fi: Collecting High-fidelity Whole-system Provenance. In Proceedings of the 28th ACM Annual Computer Security Applications Conference, pages 259--268, 2012.
[10]
B. Przydatek, D. Song, and A. Perrig. SIA: Secure Information Aggregation in Sensor Networks. In Proceedings of the 1st ACM International Conference on Embedded Networked Sensor Systems, pages 255--265, 2003.
[11]
H. Lim, Y. Moon, and E. Bertino. Provenance-based Trustworthiness Assessment in Sensor Networks. In Proceedings of the Seventh ACM International Workshop on Data Management for Sensor Networks, pages 2--7, 2010.
[12]
H. Lim, G. Ghinita, E. Bertino, and M. Kantarcioglu. A Game-Theoretic Approach for High-Assurance of Data Trustworthiness in Sensor Networks. In 28th IEEE International Conference on Data Engineering (ICDE), pages 1192--1203, 2012.
[13]
M. A. Chowdhury, W. Mciver, and J. Light. Data Association in Remote Health Monitoring Systems. IEEE Communications Magazine, 50(6):144--149, 2012.
[14]
S. T. Ali, V. Sivaraman, and D. Ostry. Authentication of Lossy Data in Body-sensor Networks for Healthcare Monitoring. In 9th Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks (SECON), pages 470--478, 2012.
[15]
J. C. Sriram, M. Shin, T. Choudhury, and D. Kotz. Activity-aware ECG-based Patient Authentication for Remote Health Monitoring. In Proceedings of the ACM International Conference on Multimodal Interfaces, pages 297--304, 2009.
[16]
K. B. Rasmussen and S. Capkun. Implications of Radio Fingerprinting on the Security of Sensor Networks. In Third International Conference on Security and Privacy in Communications Networks, SecureComm, pages 331--340. IEEE, 2007.
[17]
B. Shebaro, S. Sultana, S. R. Gopavaram, and E. Bertino. Demonstrating a Lightweight Data Provenance for Sensor Networks. In Proceedings of the ACM Conference on Computer and Communications Security, pages 1022--1024, 2012.
[18]
M. G. Zapata. Secure Ad hoc On-demand Distance Vector Routing. ACM SIGMOBILE Mob. Comput. Commun. Rev., 6(3):106--107, 2002.
[19]
S. Jana, S. N. Premnath, M. Clark, S. K. Kasera, N. Patwari, and S. V. Krishnamurthy. On the Effectiveness of Secret Key Extraction from Wireless Signal Strength in Real Environments. In Proceedings of the 15th ACM Annual International Conference on Mobile Computing and Networking, pages 321--332, 2009.
[20]
Z. Li, W. Xu, R. Miller, and W. Trappe. Securing Wireless Systems via Lower Layer Enforcements. In Proceedings of the 5th ACM Workshop on Wireless Security, pages 33--42, 2006.
[21]
J. Tang and P. Fan. A RSSI-based Cooperative Anomaly Detection Scheme for Wireless Sensor Networks. In International Conference on Wireless Communications, WiCom, pages 2783--2786. IEEE, 2007.
[22]
N. Patwari and S. K. Kasera. Robust Location Distinction using Temporal Link Signatures. In Proceedings of the 13th Annual ACM International Conference on Mobile Computing and Networking, pages 111--122, 2007.
[23]
S. T. Ali, V. Sivaraman, and D. Ostry. Zero Reconciliation Secret Key Generation for Body-worn Health Monitoring Devices. In Proceedings of the 5th ACM Conference on Security and Privacy in Wireless and Mobile Networks, pages 39--50, 2012.
[24]
L. Shi, M. Li, S. Yu, and J. Yuan. Bana: Body Area Network Authentication Exploiting Channel Characteristics. In Proceedings of the 5th ACM conference on Security and Privacy in Wireless and Mobile Networks, pages 27--38, 2012.
[25]
W. C. Jakes. Microwave Mobile Communications. Wiley, 1974.
[26]
S. Mathur, W. Trappe, N. Mandayam, C. Ye, and A. Reznik. Radio-telepathy: Extracting a Secret Key from an Unauthenticated Wireless Channel. In Proceedings of the 14th ACM International Conference on Mobile Computing and Networking, pages 128--139, 2008.
[27]
L. Yao, S. T. Ali, V. Sivaraman, and D. Ostry. Improving Secret Key Generation Performance for On-body Devices. In Proceedings of the 6th International Conference on Body Area Networks, pages 19--22. ICST, 2011.
[28]
D. Culler, D. Estrin, and M. Srivastava. Guest editors' introduction: Overview of sensor networks. Computer, 37:41--49, 2004.
[29]
NIST. A Statistical Test Suite for Random and Pseudorandom Number Generators for Cryptographic Applications, 2001.

Cited By

View all

Index Terms

  1. Securing data provenance in body area networks using lightweight wireless link fingerprints

    Recommendations

    Comments

    Information & Contributors

    Information

    Published In

    cover image ACM Conferences
    TrustED '13: Proceedings of the 3rd international workshop on Trustworthy embedded devices
    November 2013
    82 pages
    ISBN:9781450324861
    DOI:10.1145/2517300
    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

    Sponsors

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 04 November 2013

    Permissions

    Request permissions for this article.

    Check for updates

    Author Tags

    1. body area networks
    2. data provenance

    Qualifiers

    • Research-article

    Conference

    CCS'13
    Sponsor:

    Acceptance Rates

    TrustED '13 Paper Acceptance Rate 7 of 14 submissions, 50%;
    Overall Acceptance Rate 24 of 49 submissions, 49%

    Upcoming Conference

    CCS '25

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)3
    • Downloads (Last 6 weeks)0
    Reflects downloads up to 10 Feb 2025

    Other Metrics

    Citations

    Cited By

    View all

    View Options

    Login options

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    Figures

    Tables

    Media

    Share

    Share

    Share this Publication link

    Share on social media