1 / 10

Implementation of Secure Cluster Formation and Key Distribution Protocol for Biosensors

Implementation of Secure Cluster Formation and Key Distribution Protocol for Biosensors. Krishna Venkatasubramanian (993-65-5945) CSE 591. Biosensors. Biosensors are sensor nodes placed within the human body for monitoring purposes and collect real-time data about the body.

zorana
Download Presentation

Implementation of Secure Cluster Formation and Key Distribution Protocol for Biosensors

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Implementation of Secure Cluster Formation and Key Distribution Protocol for Biosensors Krishna Venkatasubramanian (993-65-5945) CSE 591

  2. Biosensors • Biosensors are sensor nodes placed within the human body for monitoring purposes and collect real-time data about the body. • Biosensors monitor: heart rate, blood glucose, temperature and so on. • Other uses of biosensors: controlled drug release, prosthetics, human/animal tracking.

  3. Project Goals • To implement, a secure cluster formation and key exchange protocol for biosensor networks, on Mica2 motes running on TinyOS[2] operating system.

  4. Traditional Cluster Formation • Cluster is one of the topologies used for minimizing communication costs. • Clusters formed based on cluster head solicitation beacon strength. • Traditional cluster formation protocols (LEACH) [3] can lead to sinkhole [4] formation. • Security lapse because of lack of shared secret between cluster head and the cluster member nodes.

  5. Secure Cluster Formation • Idea is to use sensor member nodes to send solicitation beacon. • The designated cluster heads (CH) forward this beacon to the base station along with received signal strength. • Base station decides which node will be part of which cluster. • Uses biometrics to authenticate sensor nodes to cluster head.

  6. Advantages of this scheme • The base station can distribute any control information( keys, MAC schedule etc.) to nodes while forming clusters. • Avoids sink-hole formation completely by involving base station in the formation of clusters. • More energy-efficient: as it allows key distribution along with cluster formation in one step.

  7. Key Distribution • Keys essential for encryption of data being transmitted to base station. • Base station manages all keys. • Keys assigned to nodes based on attributes (location, sensor type) of nodes. • Attribute Based Keying (ABK) allows secure data centric addressing.

  8. Implementation • To implement the protocol we will use the Mica2 motes[1] designed at UC Berkeley and manufactured by Crossbow Inc. • Aim is to implement the protocol in actual sensors and assess the efficiency and security of the protocol.

  9. Timeline • The following is the timeline for this project and some of the important dates:

  10. References • [1] http://www.crossbow.com • [2] http://www.tinyos.net • [3] Wendi Heinzelman, Anantha Chandrakasan, and Hari Balakrishnan, Energy-Efficient Communication Protocols for Wireless Microsensor Networks, Proc. Hawaaian Int'l Conf. on Systems Science, January 2000.  • [4] Chris Karlof and David Wagner, Secure Routing in Wireless Sensor Networks: Attacks and Countermeasures, First IEEE International Workshop on Sensor Network Protocols and Applications, pages 113-127, May 2003.

More Related