Secure ad hoc on-demand distance vector routing
ACM SIGMOBILE Mobile Computing and Communications Review
SIA: secure information aggregation in sensor networks
Proceedings of the 1st international conference on Embedded networked sensor systems
Energy Analysis of Public-Key Cryptography for Wireless Sensor Networks
PERCOM '05 Proceedings of the Third IEEE International Conference on Pervasive Computing and Communications
Securing wireless systems via lower layer enforcements
WiSe '06 Proceedings of the 5th ACM workshop on Wireless security
Robust location distinction using temporal link signatures
Proceedings of the 13th annual ACM international conference on Mobile computing and networking
Radio-telepathy: extracting a secret key from an unauthenticated wireless channel
Proceedings of the 14th ACM international conference on Mobile computing and networking
HOTSEC'08 Proceedings of the 3rd conference on Hot topics in security
On the effectiveness of secret key extraction from wireless signal strength in real environments
Proceedings of the 15th annual international conference on Mobile computing and networking
Activity-aware ECG-based patient authentication for remote health monitoring
Proceedings of the 2009 international conference on Multimodal interfaces
Provenance-based trustworthiness assessment in sensor networks
Proceedings of the Seventh International Workshop on Data Management for Sensor Networks
BANA: body area network authentication exploiting channel characteristics
Proceedings of the fifth ACM conference on Security and Privacy in Wireless and Mobile Networks
Zero reconciliation secret key generation for body-worn health monitoring devices
Proceedings of the fifth ACM conference on Security and Privacy in Wireless and Mobile Networks
A Game-Theoretic Approach for High-Assurance of Data Trustworthiness in Sensor Networks
ICDE '12 Proceedings of the 2012 IEEE 28th International Conference on Data Engineering
Improving secret key generation performance for on-body devices
Proceedings of the 6th International Conference on Body Area Networks
Demonstrating a lightweight data provenance for sensor networks
Proceedings of the 2012 ACM conference on Computer and communications security
Hi-Fi: collecting high-fidelity whole-system provenance
Proceedings of the 28th Annual Computer Security Applications Conference
Hi-index | 0.00 |
Wireless bodyworn sensing devices are becoming popular for fitness, sports training and personalized healthcare applications. Securing the data generated by these devices is essential if they are to be integrated into the current health infrastructure and employed in medical applications. In this paper, we propose a mechanism to secure data provenance for these devices by exploiting symmetric spatio-temporal characteristics of the wireless link between two communicating parties. Our solution enables both parties to generate closely matching 'link' fingerprints which uniquely associate a data session with a wireless link such that a third party, at a later date, can verify the links the data was communicated on. These fingerprints are very hard for an eavesdropper to forge, lightweight compared to traditional provenance mechanisms, and allow for interesting security properties such as accountability and non-repudiation. We validate our solution with experiments using bodyworn devices in scenarios approximating actual device deployment, and we present optimization mechanisms. We believe this is a promising first step towards using wireless-link characteristics for data provenance in body area networks.