Ayan Banerjee & Karthik Thangavel. Project Goals Study of present state of security in Body Area Networks(BAN) Cyber-Physical security Resource Footprint.

Slides:



Advertisements
Similar presentations
Wireless Sensor Networks Studies and experiences at ISMB Torino, Italy Edoardo Calia Human Factors and the Digital Home Workshop ETSI, Sophia.
Advertisements

SELF-ORGANIZING MEDIA ACCESS MECHANISM OF A WIRELESS SENSOR NETWORK AHM QUAMRUZZAMAN.
GRS: The Green, Reliability, and Security of Emerging Machine to Machine Communications Rongxing Lu, Xu Li, Xiaohui Liang, Xuemin (Sherman) Shen, and Xiaodong.
Efficient Public Key Infrastructure Implementation in Wireless Sensor Networks Wireless Communication and Sensor Computing, ICWCSC International.
PSKA: Usable and Secure Key Agreement Scheme for Body Area Networks Authors: Krishna K. Venkatasubramanian, Ayan Banerjee, Sandeep K.S. Gupta Presenter:Francis.
Optimization of intrusion detection systems for wireless sensor networks using evolutionary algorithms Martin Stehlík Faculty of Informatics Masaryk University.
A Mobile Ad hoc Biosensor Network Muzammil KP S7,ECE Govt. Engg. College, Wayanad.
AES based secure LEACH for WSN’s. Obstacles of WSN Security Limited resources-Limited memory, code space and energy. Unreliable Communication-Densely.
DoS Attacks on Sensor Networks Hossein Nikoonia Department of Computer Engineering Sharif University of Technology
1 Intrusion Tolerance for NEST Bruno Dutertre, Steven Cheung SRI International NEST 2 Kickoff Meeting November 4, 2002.
1 Security in Wireless Sensor Networks Group Meeting Fall 2004 Presented by Edith Ngai.
Prepared By: Kopila Sharma  Enables communication between two or more system.  Uses standard network protocols for communication.  Do.
Secure Mobile Networking Lab Exercise / Project Winter 2010 Kick-off meeting Prof. Dr.-Ing. Matthias Hollick Technische Universität Darmstadt Secure Mobile.
Wireless Sensor Networks Haywood Ho
Adaptive Security for Wireless Sensor Networks Master Thesis – June 2006.
Generic Sensor Platform for Networked Sensors Haywood Ho.
Security in Wireless Sensor Networks Perrig, Stankovic, Wagner Jason Buckingham CSCI 7143: Secure Sensor Networks August 31, 2004.
SPINS: Security Protocols for Sensor Networks Adrian Perrig, Robert Szewczyk, Victor Wen, David Culler, J.D. Tygar Research Topics in Security in the context.
25 April Securing Wireless Sensor Networks Cheyenne Hollow Horn SFS Presentation 2005.
Wireless Sensor Network Security Anuj Nagar CS 590.
Key management in wireless sensor networks Kevin Wang.
WISENET Wireless Sensor Network Project Team: J. Dunne D. Patnode Advisors: Dr. Malinowski Dr. Schertz.
Introduction To Wireless Sensor Networks Wireless Sensor Networks A wireless sensor network (WSN) is a wireless network consisting of spatially distributed.
“SDJS: Efficient Statistics in Wireless Networks” Albert Krohn, Michael Beigl, Sabin Wendhack TecO (Telecooperation Office) Institut für Telematik Universität.
Cyber-Physical Codesign of Distributed Structural Health Monitoring With Wireless Sensor Networks Gregory Hackmann*, Weijun Guo*, Guirong Yany, Chenyang.
BAND-AiDe: A Tool for Cyber-Physical Oriented Analysis and Design of Body Area Networks and Devices Authors: Ayan Banerjee, Sailesh Kandula, Tridib Mukherjee.
MICA: A Wireless Platform for Deeply Embedded Networks
Katherine Liu Olivia Nordquist
Intrusion Detection System for Wireless Sensor Networks: Design, Implementation and Evaluation Dr. Huirong Fu.
Tufts Wireless Laboratory School Of Engineering Tufts University “Network QoS Management in Cyber-Physical Systems” Nicole Ng 9/16/20151 by Feng Xia, Longhua.
WSN Done By: 3bdulRa7man Al7arthi Mo7mad AlHudaib Moh7amad Ba7emed Wireless Sensors Network.
Vampire Attacks: Draining Life from Wireless Ad Hoc Sensor Networks.
A Design for Secure and Survivable Wireless Sensor Networks Yi Qian, Kejie Lu, David Tipper Presented by: William Newton University of Maryland, Baltimore.
Mobile Relay Configuration in Data-Intensive Wireless Sensor Networks.
Thermal Aware Routing in Implanted Sensor Networks Masters thesis by Naveen Tummala Advising Committee: Dr. Sandeep Gupta Dr. Arunabha Sen Dr. Partha Dasgupta.
Introduction to Wireless Sensor Networks
SECURITY SCHEMES FOR AMI Jincheol Kim et al. – Korea – Distribution business and impact of regulation – 0845 Jincheol Kim, Seongji Ahn, Youngeok Kim Jongman.
Overview of Sensor Networks David Culler Deborah Estrin Mani Srivastava.
System Architecture Directions for Networked Sensors Jason Hill, Robert Szewczyk, Alec Woo, Seth Hollar, David Culler, Kris Pister Presented by Yang Zhao.
1 A Secure Communication Protocol For Wireless Biosensor Networks Masters Thesis by Krishna Kumar Venkatasubramanian Committee: Dr. Sandeep Gupta Dr. Rida.
Software Development for Atom based Safe and Sustainable BSN IMPACT LAB Project Report on “Safe, Secure and Sustainable Body Area Networks using Intel.
Pervasive Health Monitoring Krishna Venkatasubramanian IMPACT LAB Arizona State University.
TinySec: A Link Layer Security Architecture for Wireless Sensor Networks Chris Karlof :: Naveen Sastry :: David Wagner Presented by Roh, Yohan October.
Evaluation of Body Sensor Network Platforms A Design Space and Benchmarking Analysis Ayan Banerjee, Sandeep K.S. Gupta IMPACT Lab, Arizona State University.
Efficient Energy Management Protocol for Target Tracking Sensor Networks X. Du, F. Lin Department of Computer Science North Dakota State University Fargo,
A Passive Approach to Sensor Network Localization Rahul Biswas and Sebastian Thrun International Conference on Intelligent Robots and Systems 2004 Presented.
Computer Science 1 TinySeRSync: Secure and Resilient Time Synchronization in Wireless Sensor Networks Speaker: Sangwon Hyun Acknowledgement: Slides were.
Security in Wireless Ad Hoc Networks. 2 Outline  wireless ad hoc networks  security challenges  research directions  two selected topics – rational.
Interfacing External Sensors to Telosb Motes April 06,2005 Raghul Gunasekaran.
Security Issues in Distributed Sensor Networks Yi Sun Department of Computer Science and Electrical Engineering University of Maryland, Baltimore County.
Author: Hangyang Dai and Hongbing Xu
TELEHEALTH [3] Remote Patient Monitoring obtained from patches of sensors on human body. Challenge: Energy efficient Body Area Network (BAN) and reliable.
Introduction to Wireless Sensor Networks
MAC Hurdles in Body Sensor Networks Name : Tahani Mohammad Al-lihaibi ID:
1 Self-Certified Group Key-Generation for Ad Hoc Clusters in Wireless Sensor Networks Ortal Arazi, Hairong Qi Dept. Electrical & Computer Engineering The.
Implementation and Analysis of an Overhearing Cost Model based Broadcast Method for Wireless Sensor Networks Newton Alex Venkatraman Jayaraman.
Security of the Internet of Things: perspectives and challenges
Wireless Sensor Network: A Promising Approach for Distributed Sensing Tasks.
Lecture 8: Wireless Sensor Networks By: Dr. Najla Al-Nabhan.
Green and Sustainable Cyber-Physical Security Solutions for Body Area Networks 1. Introduction 2. Security in Body Area Networks: Need and Approach Krishna.
Medium Access Control. MAC layer covers three functional areas: reliable data delivery access control security.
Introduction to Wireless Sensor Networks
Energy Neutral Systems
Ayan Banerjee, Krishna Venkatasubramanian, Sandeep Gupta
TinyOS: Concurrent Execution, and Power control
Ayushman: Pervasive Health Monitoring System and Testbed
EKG-Based Key Agreement in Body Sensor Networks
Energy-efficient Long Term Physiological Monitoring
WISENET Wireless Sensor Network
Lab 3 Routing in Sensor Networks
Presentation transcript:

Ayan Banerjee & Karthik Thangavel

Project Goals Study of present state of security in Body Area Networks(BAN) Cyber-Physical security Resource Footprint Energy efficiency Sustainability Effect of security on present day BANs Vision of security in future wearable sensor platforms Intel Atom based wearable platforms

Body Area Networks (BAN) A network of low capability sensors (physiological, environmental and activity monitoring) Sensors communicate with each other through wireless media Base Station is a gateway for the sensors to the internet SpO2 EKG EEG BP Base Station Motion Sensor Base Station Sensors Environmental sensors Physiological sensors Activity sensors

Why ? BANs deal with sensitive information Wireless media open to security breaches Requirements Integrity Confidentiality Authentication Plug-n-Play Security in BAN  Non intrusive and low deployment overhead  Traditional Schemes not applicable  Can a cyber–physical approach provide the solution?

Cyber-Physical Security Interaction through sensing Feedback Use this to provide security Signal Processing Cryptographic primitives Cyber-Physical Security The term Cyber-physical implies interaction of computing world with the physical environment

PKA Index Peak Values PV FFT Values Peak Values Index PV FFT Values SENSOR 1 SENSOR 2 Time FFT Peak Detection Index Peak Detection Index Quantize Polynomial Generation and evaluation Polynomial Generation and evaluation F s = [f s 1 f s 2 …….. f s n ] F r = [f r 1 f r 2 …….. f r n ] fs1fs1 p(f s 1 ) fsnfsn p(f s n ) p(f s 2 ) fs2fs2 cf i,d i Adding Chaff Transmit Vault R Receive Vault p(x) Lagrangian Interpolation Lagrangian Interpolation Transmit Acknowledgement Transmit Acknowledgement Receive Acknowledgement Receive Acknowledgement Sensing Extensive experiments with Plethysmogram data Data obtained from 10 volunteers  Data collected using Smith Medical pulse oximeter boards Processing done in MATLAB environment

Related Work PKI based security [1] The idea of using signals from environment to provide security was first proposed in [2] and [3] [3] proposed an algorithm to generate security keys from localized measurements of Inter Pulse Interval signals. [4] proposes a secure key agreement protocol PKA (Physiological value based Key Agreement) Resource Usage ?Energy Efficiency ?Sustainability ? 1.D. J. Malan, M. Welsh, and M. D. Smith. A Public-Key Infrastructure for Key Distribution in TinyOS Based on Elliptic Curve Cryptography. pages 71–80, Oct In Proc. of IEEE 2nd Intl. Conf. on Sensor & Ad Hoc Comm. & Networks. 2.S. Cherukuri, K. Venkatasubramanian, and S. K. S. Gupta. BioSec: A Biometric Based Approach for Securing Communication in Wireless Networks of Biosensors Implanted in the Human Body. pages 432–439, Oct In Proc. of Wireless Security & Privacy Workshop K. Venkatasubramanian and S. K. S. Gupta. Security for Pervasive Health Monitoring Sensor Applications. pages 197–202, Dec In Proc. of the 4th Intl. Conf. on Intelligent Sensing & Information Processing. 4.C. C. Y. Poon, Y.-T. Zhang, and S.-D. Bao. A Novel Biometrics Method To Secure Wireless Body Area Sensor Networks for Telemedicine And M-Health. IEEE Communications Magazine, 44(4):73–81, K. K. Venkatasubramanian, A. Banerjee, and S. K. S. Gupta. Plethysmogram-based secure inter-sensor communication in body area networks. Military Communications Conference, MILCOM IEEE, pages 1-7, Nov

Resource Footprint Security protocol RAM requirements RAM Limit in motes Code SizeROM LimitTime (sec) PVS~ 7KB10KB~ 16 KB16 KB~ 20 PKI~ 4KB10KB~ 10 KB16 KB~ 34 70% of RAM utilization Near 100% ROM usage 20 seconds to perform a single iteration TelosB sensors 8 MHz clock 10 KB RAM TinyOS operating system that supports NesC

Experimental Setup for power measurement Bread board circuit for power measurement

Energy Efficiency & sustainability 59 mW of power required for 20 seconds to perform one iteration Offhand analysis of scavenging techniques Body Heat – 200 mW Respiration – 420 mW Ambulation – 1500 mW Solar Power – 100 mW/cm 2 PKA can be sustained using scavenged energy

Effect of security in present day BAN Pros Secure Energy efficient Sustainable Cons High memory usage Applications getting complex Security will be obtrusive Require more and more computing in sensor nodes

Vision of a future BAN Intel Atom based sensors as nodes ? High computing capability 1.6 GHz processor 512 KB L1 cache Present Future

Open research questions Can we guarantee energy efficient operation of Atom based platforms? Can we sustain Atom operation through scavenging of energy? What effect does the power dissipation in Atom has on human body? Do we need changes in the security protocols in order to sustain operation of Atom based platforms?

Off hand analysis Atom requires 2W of power at normal operation and 0.5 W in deep sleep states. Source Power Gain (mW) Hrs of scavenging operation in a day Energy stored (J) Energy leaked (J) Available energy (J) Hrs of operating ATOM in deep sleep Hrs of operating Atom in normal mode F sleep Body Heat200 – – – – – – Respiration Ambulation 1500 – – – – – 4.74 Sun Light100 – 200 (on a 1cm 2 – 2cm 2 photovoltai c cell) 30.3 – 0.6 ~ – – – 0.3

Conclusions Security has huge resource overhead on present day wireless sensor platforms Sensor node capability have to be increased in order to provide security along with complex applications Atom based platforms are promising

Thank You