Elements of Information Theory (Wiley Series in Telecommunications and Signal Processing)
Elements of Information Theory (Wiley Series in Telecommunications and Signal Processing)
Body-coupled communication for body sensor networks
BodyNets '08 Proceedings of the ICST 3rd international conference on Body area networks
Adapting radio transmit power in wireless body area sensor networks
BodyNets '08 Proceedings of the ICST 3rd international conference on Body area networks
Joint encryption/multiple access for body area sensor networks
BodyNets '08 Proceedings of the ICST 3rd international conference on Body area networks
Channel Identification: Secret Sharing Using Reciprocity in Ultrawideband Channels
IEEE Transactions on Information Forensics and Security - Part 1
Unconditionally secure key agreement and the intrinsic conditional information
IEEE Transactions on Information Theory
Secret-key agreement over unauthenticated public channels .I. Definitions and a completeness result
IEEE Transactions on Information Theory
Proceedings of the 4th International Symposium on Applied Sciences in Biomedical and Communication Technologies
Zero reconciliation secret key generation for body-worn health monitoring devices
Proceedings of the fifth ACM conference on Security and Privacy in Wireless and Mobile Networks
Improving secret key generation performance for on-body devices
Proceedings of the 6th International Conference on Body Area Networks
Hi-index | 0.00 |
We consider secure communication for Body-Area-Networks (BAN's). We examine the near-body radio channel of BAN's as a source of common randomness between two sensors. The movement of the subject and associated fading is used to hide a secure key from Eve. We examine recently approved radio channel models of the IEEE 802.15.6 Task Group, and show that the common randomness is too low rate for unconditional encoding. We find a key-generation rate around 2bits/second. We suggest the channel randomness may be better used in generating perpetually new keys for an AES-style encryption -- eg, a 128bits key every minute -- via a randomness scavenging procedure.