Lav Gupta, lavgupta at wustl.edu (A paper written under the guidance of Prof. Raj Jain) | Download |
Abstract: Healthcare expenses are a growing concern in most countries. This has forced medical researchers to look for non-intrusive and ambulatory health monitoring of patient's vital signs. The objective is to reduce patient visits and the use of medical and support staff for frequent examinations. Body Area Networks(BANs) consist of implanted, or worn, tiny health monitoring sensor nodes so that the vital body parameters and movements of the patient can be recorded and communicated to the medical facilities for processing, diagnosis and prescription. BANs are required to have small form and low power consumption. Reducing energy consumption of the sensor and communication equipment is one of the key research areas. It is also important for BANs to be secure, protected and reliable. Failure to obtain authentic and correct medical data may prevent a patient from being treated effectively, or even lead to wrong treatments. As patient identity can be obtained by correlating physiological information, privacy concerns must be addressed for wide acceptance of the technology. While security is paramount, the cost of implementing security techniques in BANs may be prohibitive. It, therefore, becomes necessary to find cryptographic solutions that consume less energy. Research efforts are being made to reduce the cost of cryptography used in BANs. In this paper we discuss the current and future security solutions for low energy BANs.
Keywords: Wireless Sensors, Body Area Network, Energy Efficiency, Security, Health, Implanted Medical Device, Symmetric Encryption, Public Key Cryptography, Elliptic Curve Cryptography
Healthcare expenses are a growing concern in most countries. As people age, their dependence on the healthcare system increases. People above the age of 60 years show larger dependence on the health care system because of increased preponderance of age related diseases like cardiac ailments, respiratory problems, arthritis, neurological diseases and dementia. According to World Health Organization (WHO), by the year 2020 people older than 60 years will outnumber children below 5 years. By 2047 people 60 and above will be 2 billion, up from 841 million today. About 80% of this elderly population will be in low and middle-income countries. According to the US Bureau of the Census, in US alone elderly people are expected to double to 70 million by 2025. This would cause a tripling of the healthcare expenditure to about $ 5.4 trillion from the 2004 figure. This represents a staggering 20% of the Gross Domestic Product (GDP)! A fundamental change is needed in the way in which healthcare is delivered [Ullah12] [Chatterji14]. In this section we look at BAN as an agent that could provide a revolutionary change in the way the medical system works.
A large part of the expense in providing healthcare is attributed to patients' visits, indoor treatment and need for continuous monitoring of the chronically ill patients. This has forced medical researchers to look for methods for non-intrusive and ambulatory health monitoring of patient's vital signs. The idea is to reduce patient visits and consequent use of medical and support staff for conducting frequent tests like Electro Cardio Gram (ECG), blood pressure or blood sugar levels. Besides, it is also desirable to have the capability of monitoring patients, while they go about their daily routines, and updating their data in real time over the Internet. This would help the doctors and other medical staff to take into account updated records for taking timely decisions that are vital for patients' health and well-being. Body Area Networks (BANs) provide the capability of achieving these goals and provide an economical solution to the challenges that healthcare system faces today.
Body Area Networks (BANs) consist of implanted (inside the body) or worn (over the body) tiny health monitoring sensor nodes for recording vital body parameters and movements of the patient and communicating them to the medical facilities for processing, diagnosis and prescription. These networks are known by various names: Body Area Networks (BANs), Body Area Sensor Networks (BASNs) and Wireless Body Area Networks (WBANs). We shall use the term BANs in this paper. These BANs provide long term health monitoring of patients under natural neurological and physiological conditions without constraining their normal activities. BANs have the potential to become part of all the facets of a smart and economical healthcare system viz. diagnostics, prescription, monitoring intake and reaction to medicines, taking care of chronic conditions, supervising recovery from surgeries and handling emergencies. Fig. 1 shows the BAN and associated infrastructure. We shall see in this paper the current status and future directions of research in making the power constrained body area networks secure.
Fig. 1: BAN and Associated Systems
A number of developments have taken place in recent times that have made Body Area BANs possible. These developments include advancements in the field of wearable low power medical sensors that can be integrated with fabric that patients can wear without any kind of discomfort. Along with these sensors, advances in wireless communication and data processing have made wireless Body Area Networks a promising technique that has the potential or revolutionizing the way the healthcare will be sought and delivered. A number of challenges need to be over come to make it widely acceptable by hospitals and patients alike. Section 2 deals with the background material including challenges to implementation of BANs, their application areas and starndards. Section 3 talks about the energy efficiency issues in BANs. How security and privacy is handled is taken up in Section 4 and the steps that have been taken to incorporate low energy cryptography in BANs in Section 5. Section 6 gives the summary and the future research directions in security and energy related issues of BANs.
In this section we would discuss the challenges in implementing BANs, their applications and the relevant standards.
While BANs have immense potential, there are quite a few challenges to its large-scale inclusion in the healthcare regime and mass acceptance. These challenges and what will take to mitigate them is discussed below:
While healthcare is perhaps its most important application, BANs can actually be used in several applications including sports, interactive gaming, military and security. In this paper we will focus on healthcare. BANs enable a wide range of new applications such as ubiquitous health monitoring (UHM), computer-assisted rehabilitation, emergency medical response system (EMRS), and even promoting healthy living styles. In UHM the BAN frees people from visiting the hospital frequently, and eases the heavy dependence on a specialized workforce in healthcare. Thus, it is a desirable technique to quickly build cost-effective health-care systems, especially for countries that are short of medical infrastructure and well-trained staff. In addition, in an EMRS temporary BANs can be rapidly deployed with minimum human effort at a disaster scene so that the vital signs of injured patients can be monitored and reported to the remote health center in time, which is potentially capable of saving the lives of numerous people. Fig. 2 shows monitoring through BANs.
Fig. 2: Patient Monitoring Through BAN
One way to categorize medical applications of BANs is based on the method of monitoring: discrete or continuous. In discrete monitoring the devices are remotely triggered at appropriate times for recording parameters like oxygen saturation of the blood. Continuous monitoring, on the other hand, is required in many cases like cardiac conditions and neurological disorders. Continuous monitoring is valuable when transient abnormalities are otherwise difficult to capture. For instance, many cardiac diseases are associated with episodic rather than continuous abnormalities, such as transient surges in blood pressure, paroxysmal arrhythmias or induced episodes of myocardial ischemia and their time cannot be accurately predicated. Frequent monitoring in diabetics enables proper dosing of medicines and reduces the risk of fainting and in later life blindness, loss of circulation and other complications [Ullah12].
Another method of classifying BANs is based on the location of the sensor: implanted inside the human body or over the body. In-body applications include, monitoring and reconfiguration of pacemakers and implantable cardiac defibrillators, control of bladder function, and retinal implants. On-body medical applications include monitoring blood pressure, electro cardiogram at rest and impost, temperature and respiration. Furthermore, on-body non-medical applications include monitoring forgotten things, establishing a social network, and assessing soldier fatigue and battle readiness.
BANs are human-centric and can facilitate highly personalized and individual care. BANs can offer real-time sensing, processing and control and can be vital in preserving body functions and human life. BAN researchers are already working to improve deep brain stimulation, heart regulation, drug delivery, and prosthetic actuation. BASN technology will also help protect those exposed to potentially life-threatening environments, such as soldiers, first responders, and deep-sea and space explorers [Chen11].
Applications vary in their use of sensor nodes. Due to strong heterogeneity, the data rates vary widely, ranging from a few bps to video streams of several Mbps. Data can also be sent in bursts, which means that it is sent at higher rate during the bursts [Latre11]. Table I shows sensors used for different applications along with their indicative data rates.
Table I BAN Applications, Sensors and Data Rates
Medical condition | Type of sensor | Data rate | Description |
---|---|---|---|
Muscular atrophy | Accelerometer/gyroscope | 35kbps | Faulty postures and movements |
Diabetes | Blood glucose | 1600bps | Blood glucose levels post partum and fasting |
Cardiac, hypertension | Blood pressure | 1000bps | Non invasive systolic, diastolic and venous pressure |
Pulmonary, Asthma | CO2 gas sensor | 10kbps | Carbon dioxide and oxygen content in the blood |
Cardiac arrhythmias and other abnormalities | ECG sensor | 12 lead:288kbps, 6lead:71kbps | Electrical activity of the heart |
Neurological | EEG sensor | 86.4 kbps, deep brain stimulation: 1Mbps | Electrical activity of the brain |
Neuromuscular abnormalities | EMG sensor | 1.536Mbps | Electrical activity in response to a nerve's stimulation of the muscle |
Cyanosis | Pulse Oximetry | 16bps | Oxygen delivery to the peripheral tissues |
Ophthalmological problems | Retinal sensors | 50-700kbps | Chemical, nerve, cell level observation |
Ear disorders | Cochlear sensors | 200kbps | Ear effusions and perfusions |
Gastric abnormalities | Endoscope: 1 Mbps | 1 Mbps | Ulcers in the gastric pathway |
Interoperability, low cost, and user convenience are key enablers for the mass market. To enable true plug-and-play interoperability, all layers of the protocol stack, application profiles, and data exchange formats have to be standardized. Until relatively recently BAN deployments relied upon general standards for WSNs and other wireless networks. This situation was altered with publication of IEEE 802.15.6 standard in the year 2012. We will discuss here this standard and its precursors IEEE 802.15.4 and Zigbee.
In this section we will examine in details the energy requirement of BANs, consequences of heat dissipation and energy conservation.
Energy consumption can be divided into three domains: sensing, communication and data processing. The wireless communication is usually the most power consuming among the three. The size of the battery used to store the needed energy is in most cases the largest contributor to the sensor’s size and weight. As a result batteries are kept small for which energy consumption of the devices needs to be reduced. At the same time, some BANs need to continuously operate for months or years without intervention or battery change. The need for replacement or recharging induces a cost and convenience penalty. This is especially true for implanted devices, as intervention would mean surgical procedures. An implanted pacemaker, for example, would require a lifetime lasting more than 5 years. Lithium batteries work well for handheld electronics, but their capacity is limited in small BAN enclosures. The need to replace or recharge these batteries frequently makes BAN use less desirable. Super-capacitors and carbon-nanotube-based energy stores have great potential to improve battery capacity, but have not yet matured to commercial availability. The search is on for the ideal battery for BANs [Diop13].
1. Energy Conservation: In BANs the sensor nodes are low power devices that collect body parameters and communicated them to the central server. In case of long term monitoring it is important that the network has high-energy efficiency and reliability. In BANs, sensor node’s transceiver is one of the dominant energy dissipation sources. It is necessary for long battery life that the data acquisition, storage, processing and communication operations are energy efficient. This will also allow the size of the battery to be smaller. Multiple and dynamic power management schemes can be used to prolong lifespan of sensor nodes [Rahim12].
The IEEE 802.15.4 defines some power management mechanisms for edge devices and none for forwarding devices. Thus, most networks built on this standard do not include power management. Some form of duty cycles have been tried such that devices communicate in pre-defined time slots or coordinate communication in some way. Any protocol that is adopted for BAN networks would have to build in energy conservation features at least at the physical and MAC layers. At the physical layer, however, power savings should be attained without compromising fidelity. Ideally there should be a linear relation between the data rate and power consumption so that energy per bit is constant. Seamless connectivity should be maintained when the nodes are mobile. Fast changeovers from transmit to receive and between sleep and wakeup cycles would conserve power.
There is larger scope of energy savings through innovative techniques at the MAC layer. Some MAC layer protocols that have been proposed specifically for BAN that contribute to conservation of energy are given in Table II [Fang09][Timmons09]:
Table II Energy Efficient MAC Protocols for BANs
Protocol | Designation | Principle | Description |
---|---|---|---|
CICADA | Cascading Information retrieval by Controlling Access with Distributed Slot Assignment | Multi-hop wireless | All sensors send data, high traffic capability, low delays, no local buffering resulting in small sensors |
BAN-MAC | Body Area sensor Network-Media Access Control | Dynamic adjustment of parameters | Ultra Low power, star topology |
H-MAC | Heartbeat driven Media Access Control | TDMA based | Uses human heartbeat for synchronization and increases sleep time of radios for energy conservation |
BodyMAC | Body Media Access Control | TDMA based | Node remain in sleep mode when there is no data to send |
MedMAC | Medical Media Access Control | TDMA based | Variable time slots according to sensor’s requirement |
2. Energy Renewal: The lifetime of a node can be enhanced by scavenging energy during the operation of the system. If the scavenged energy is larger than the average consumed energy, such systems could run eternally. However, energy scavenging will only deliver small amounts of energy. A combination of lower energy consumption and energy scavenging is the optimal solution for achieving autonomous Body Area Networks. For a BAN, energy scavenging from on-body sources such as body heat and body vibration seems very well suited. In the former, a thermo-electric generator (TEG) is used to transform the temperature difference between the environment and the human body into electrical energy. The latter uses, for example, the human gait as energy source. Energy can also be harvested from external sources like sunlight. Recharging batteries with harvested energy could not only extend battery life, but also simplify BAN use. Research challenges are formidable because of node placement variability and uncertainty about the user’s exposure to ambient energy. Finally, the available harvestable power will differ substantially among individuals, which means it will be necessary to carefully match application profiles to activity levels in the target demographic [Ali13].
The patient related data generated, stored and communicated by BANs is critical for medical diagnosis and treatment. Importance of securing this data, therefore, cannot be overemphasized. If the data is corrupted or pilfered, the effect could range from ineffective treatment of patients to mistreatments threatening patients' lives. For widespread acceptance by patients, as an important part of the healthcare system, BANs must also address privacy concerns. Access to patient data must be restricted to authorized uses and according to the law of the country in question. The distributed nature of data in BANs makes implementing security and privacy difficult. It is important to deal with these issues even when the node is compromised or fails. Use of encryption and cryptography is gaining currency for enforcing access control to protect the privacy of patients [Saleem10] [Selimis11].
In WSNs, the security mechanisms (encryption, decryption, signing data, verifying signatures) are the main factors that influence power consumption by sensor nodes. Limited energy prohibits the use of complex security mechanisms for message expansion. BANs are even more energy and storage constrained, therefor, the security protocols designed for WSNs cannot be applied to BANs. Moreover, the key management protocols for WSNs will not work as efficiently as the protocols specifically designed for BANs [Ali13], e.g., currently the public key-based protocols is difficult to implement in BANs. While both symmetric key management strategies for secure trust establishment and public key-based key management schemes have been used in WSNs, it is necessary to well balance security level and the associated energy consumption overhead. Each of these schemes has its own limitations for BANs. In this section the infrastructure for meeting the security requirements and the security mechanisms used in BANs [Lim10].
Security and privacy of the patients' physiological and neurological data generated by BANs are two indispensable components BANs. These requirements together ensure that data is securely stored, communicated and accessed by authorized persons. To this end, data confidentiality, integrity and availability are key requirements [Yoon14].
Thus, the data stored in a distributive manner in the BAN nodes has to meet, sometimes contradictory, requirements. They should be secure, be securely transferred to the central server when the patient arrives at the hospital or other designated times through the internet, latency should be controlled and updated data should always be available to the physician for timely diagnosis and treatment. Beyond the basic requirements for security and privacy mentioned above some other requirements are as follows[Diop13]:
BANs require a security infrastructure to keep data secure and reliable and protect patients' privacy. However, due to the extreme energy scarcity, bandwidth and storage constraints of the nodes, conventional solutions are not applicable. To design data security and privacy mechanisms for BANs one must overcome a number of challenges, including how to make tough balances between security, efficiency, and practicality. Stringent resource constraints on devices within a BAN, especially the sensor nodes, basically require the security mechanisms to be as lightweight as possible. Practical issues, such as conflicts between security, safety, and usability, also need to be considered carefully. For example, in order to ensure legitimate access to patients' data under time sensitive scenarios such as emergency care, the access control mechanisms should be context-aware and flexible.
Security requirements often vary with application and context, but in general, security for nodes should primarily focus on the protection of the data itself and network connections between the nodes and the server. As discussed confidentiality, integrity and authentication are the most important data security concerns. When considering the network itself, we need have an adapted media access control and often there is need to conceal the physical location of the nodes. Defense has to be set up against malicious attacks on the nodes, denial of service attacks, node capturing, and node injection. Consequence of any of these attacks may be life threatening in body area networks.
Because of the distributed nature of the BANs they tend to be extremely vulnerable to simple node attacks, weaknesses in a subsystem can easily be exploited to mount attacks on the whole network, even beyond the base station or “sink”. So it’s crucial to design smart node networks with security considerations as design requirements and not as as an add-on feature of the system. Security will always add some overhead, which will lead to increased power requirements and add on security measures are simply not safe. Tight integration of security techniques in processing and communications simply allows for more efficient use of scarce resources.
Security techniques implemented in BANs would usually have a key management infrastructure. Though necessary, key management is usually considered a primary obstacle to true security for BANs. In other words, the defining characteristics of wireless body area networks conspire to make it difficult for two nodes to share a secret key, a basic requirement of encrypted communications. The best method for key management on the Internet—RSA or Diffie-Hellman based public key cryptography—even elliptic curve—is untenable on these networks, at least in terms of energy cost of processing, storage and communications. For networks that are infrastructure less, nodes can’t rely on a central security server like, say, a Kerberos server, much less a Public Key Certificate Server. If public key is not an option, a single secret key can be loaded onto all of the nodes but in this case capturing a single node would compromise the entire network. Another approach is to preload that single key, then establish “link keys” unique to every pair of nodes based on the original secret key and then destroy the original secret key. This scheme is not scalable.
Alternatively, the trusted central server can establish link keys with each node, but this is difficult to implement in many networks because it requires time synchronization across nodes, besides which, the trusted central server becomes a single point of failure for the entire network. Random key pre-distribution protocols have also been suggested. If the key is large enough, then every node can establish connections with at least a few others and thereby create a secure network containing all objects. The downsides to this approach include a requirement for a trusted base station, and tamper resistant hardware in each node to conceal the keys that is difficult to achieve.
The BAN nodes have multiple functions. They act as data collectors, processors, and as traffic forwarders for other objects in the network. If public key infrastructure is not established then a common approach is to periodically disseminate fresh keys to nodes. There is risk of interception during dissemination. A malicious user could paralyze these networks by either (1) capturing a single object (node) and extracting the secret keys or (2) modifying the communications code of a captured object. Tamper-resistant hardware could mitigate these concerns (to protect keys and routing functions) but at significant added expense. For these reasons, many security functions on sensors are relegated to software [IPSO10]. In any case whatever hardware, codes and procedures are implemented would need to be individually and ‘system’ tested thoroughly before the system is used on humans.
There are many security schemes proposed for a traditional Wireless Sensor Network (WSN) but few of them can be embedded in a BAN. For example, Security Protocols for Sensor Networks (SPINS) provide data confidentiality, two-party authentication and data freshness, which can be implemented in BAN nodes with low-power computation [Kumar13]. Generally, the application layer is used to explicitly enable the security by adjusting certain control parameters. For example, in IEEE 802.15.4 the application has a choice of security modes that control the different security level [Diop13]. Each security mode has different security properties, protection levels, and frame formats. The IEEE 802.15.4-based security modes can be improved for a BAN according to the application requirements.
The security depends on the size of the MAC frame that can be 32, 64, or 128 bits long. In case of a BAN, the MAC frame size varies from few bytes (implant) to hundreds of bytes (wearable), depending on the application. A longer MAC frame reduces the chances of blind forging. The application layer selects a security mode using an Access Control List (ACL) that controls security and keying information. The destination address of an outgoing packet is matched with address field in the ACL entry. If there is a match, the security mode, key, and nonce1 specified in the ACL entry are used to process the packet. Encryption algorithms are used to prevent unauthorized access. Exchange of keys may be required by devices to be able communicate. The following sections discuss AES-CTR, AES- CBC, and AES-CCM modes for a BAN [Ullah12].
Generally, the addition of security protocols to BAN consumes extra energy due to overhead transmission required by the protocols. The best way is to use a stream cipher for en- cryption, where the size of the ciphertext is exactly the same as the plaintext. In this case, the MAC uses 16 bytes of 60 bytes data frame. Moreover, the Cyclic Redundancy Check (CRC) is not required since the MAC itself achieves data integrity. Law et al. concluded that the most energy efficient cipher is Rijndael [Ullah12]. They examined the number of CPU cycles during they key setup and encryption/decryption procedures.
While security is paramount, the cost of implementing security techniques in BANs may be prohibitive. It, therefore, becomes necessary to find cryptographic solutions that consume less energy. This section deals with the discussion of cryptographic methods in use and those that are proposed and their costs.
Researchers have proposed a number of methods for making security protocols more energy efficient. One broad category is of techniques that make execution of cryptographic algorithms efficient through a combination of hardware and software techniques. Usually, in these techniques, there is an overhead in the form of an increase in silicon area or more complex software.
Another method of achieving energy efficiency is to use energy-aware protocols. These protocols tune their operation to the environment. This may involve a rule-based tradeoff between the level of security and consumption of energy. Commonly used security protocols, like SSL/TLS, IPSec, etc., have the freedom of realizing the desired security objectives by choosing specific cryptographic algorithms from a predefined set. Additionally, the controller and the BAN nodes can also decide upon parameters that influence the mode of operation of the chosen cryptographic algorithm [Lakshmi13].
Cryptographic algorithms that provide trust that is present in face-to-face meetings are divided into the following categories
We shall discuss is some more detail the secret key and asymmetric algorithms that are being studied for BANs.
It is seen that public key encryption (PKE) methods provide better security but they are mathematically hard and cost more in terms of energy consumed. Therefore, most BAN systems today use symmetric key encryption (SKE)(Fig. 3). In SKE, methods like AES and RC4 are used. Most of the WSNs use the symmetric key schemes because these schemes require less computation time than other schemes. Based on the key distribution, key discovery and key establishment there can be different categories of symmetric key schemes. For example, pure probabilistic-based schemes and polynomial-based key pre-distribution schemes are two of them.
Fig. 3: Symmetric Key Encryption
SKE is today considered to be an efficient choice for distributed access control in BANs. In general, SKE based approaches suffer from three main disadvantages: Fine-grained access control is hard to realize due to the high key management complexity, they are vulnerable to user collusion, compromising a node will possibly expose the data, since if a node cannot store encrypted copies for all possible users and it must store the data in plaintext. It is desirable that the data remain encrypted even when stored in BAN nodes or servers. In order to achieve both fine-grained access control and efficiency, it is more desirable to encrypt once and for all so that all authorized users can have access.
Symmetric ciphers are of two types, block and stream ciphers. Block ciphers operate on similar-sized blocks of plaintext and ciphertext. Examples of block ciphers include DES and AES. Stream ciphers, such as RC4, convert a plaintext to ciphertext one bit (or byte) at a time. Before a block or stream cipher starts the encryption/decryption operation, the input key (usually 64 bits) is expanded in order to derive a distinct and cryptographically strong key for each round (key setup). Encryption or decryption in symmetric algorithms then proceeds through a repeated sequence (rounds) of mathematical computations. RC4 is supposed to be a fast and efficient stream cipher, which is suitable for encrypting data in high-speed networking applications. However, it has a significant encryption cost compared to other symmetric ciphers. Blowfish exhibits the greatest contrast between the energy costs of key setup and encryption/decryption: The energy cost of key setup is the highest, while that of encryption/decryption is lowest. AES has competitive energy costs, and its cryptanalytic properties have been well studied. The round operations in AES operate on 8-bit data blocks and are amenable to implementation efficiency on 8-bit processors. However, optimizations exist to make AES run extremely fast on 32-bit processors at the cost of some space overhead (up to 4KB). In this case the round operations are transformed into table lookups which can be speeded up using multithreaded processors.
AES offers a good mixture of security and energy efficiency. Its security properties have been well-studied, and it was found to offer high resistance to linear and differential cryptanalysis. In addition, it also has a low energy cost for both key setup and encryption. However, recent studies have pointed out that it might be susceptible to algebraic attacks. In terms of high resistance to cryptanalytic attacks, other algorithms that fare well are 3DES and IDEA. When lower energy consumption is a higher priority, RC5 and Blowfish serve as possible candidates. Blowfish is the ideal choice when large amounts of data are to be transmitted with a low frequency of key refreshes.
Encryption in the ultra-low energy domain is an important and growing challenge. Example applications include Implantable Medical Devices (lMDs), Wireless Sensor Networks (WSNs), and Radio Frequency Identification (RFID) tags. In this class of applications, the energy cost of each operation is important for the solution’s success. For example, in a typical IMD, each extra Joule consumed in computation reduces the life of the device, and each surgical replacement of the device endangers the life of the patient. In the case of IMDs, unauthorized access to an implanted cardiac defibrillator's programming interface poses an unambiguous threat to the patent's health and privacy. Despite the obvious need for security in this domain, relatively few designs have incorporate encryption. The devices that do employ encryption use symmetric (shared-key) techniques, as they are low on computation. Asymmetric key cryptography provides higher security by have higher computational complexity making the energy requirements a difficult proposition or low energy applications like BANs [Darwish11]. Public Key Cryptography (PKC) requires separate keys for encryption and decryption, allowing it to solve a host of security challenges not possible with symmetric cryptography alone. Uses for asymmetric cryptography range from session key establishment for secure communications to digital signatures for message authenticity and non-repudiation. While symmetric cryptography is based on diffusion (data shifts) and confusion (permutations), asymmetric cryptography is built upon a foundation of mathematically hard problems [Targhetta14]. Fig. 4 gives block diagram of PKC.
Fig. 4: Public Key Cryptography
The most common methods used in Public Key Cryptography (PKC) are RSA and the elliptic curve cryptography (ECC). However, while the public and private key generation speeds have been increased, encrypting and decrypting large volume of data is slow in RSA and ECC. Researchers have dedicated much effort to achieving significant acceleration using hardware in FPGA and ASIC designs; however, only a few publications seem to investigate the energy consumption aspect of public key cryptography for embedded devices. To see how employing asymmetric cryptographic capabilities on ultralow energy devices can be especially challenging we can take a cue from WSN research. Wander et al. found that in WSNs even weak asymmetric cryptography (160-bit ECC, equivalent to 1024-bit RSA) consumes approximately 72% of the energy allotted for communication handshaking. They compared the energy cost of 1024-bit RSA with that of 160-bit ECC to show that 160-bit ECC significantly reduces energy consumption. The results provide a very compelling argument for ECC, showing that, based on an assumed battery life, the device using ECC could execute 4.2 times the number of key exchange operations. Enthused by results in the domain of WSN, researchers are trying to adapt PKC to BAN environments. If energy harvesting is used then the energy budget can be reduced.
To summarize, energy efficient, secure and reliable BANs described in the sections above, can be realized with collaboration among a number of domain experts. For example, for producing trustworthy and acceptable solutions for providing healthcare to the elderly the collaboration is required between technologists, physicians, medical support staff, psychologists and epidemiologists. This would ensure that BANs are not only designed to collect and provide physiological and psychological information but are also acceptable to the elderly. Security in BANs is one of the most important issues. There have been some implementations of symmetric key cryptography. However, public key cryptography provides higher security but at high energy cost. More research is required to make public key cryptography for low energy BAN systems.
Some important research directions are discussed below:
Energy Efficient Devices: Research is being undertaken to improve the design of wearable sensors and make them more patient friendly. The new generation sensors would not require accurate positioning by skilled staff. They would reduce the detrimental effect of the human skin on low-power radio signals. More research is required to find material that would make implantable sensors more compatible with the human tissue. The BAN nodes need to be made smaller, smarter and with long recharge cycles. They need to have smart batteries that last long and recharge themselves by harvesting energy from the patients' body heat or movement. As these devices are very close or inside the human body, concerns regarding electromagnetic energy radiation need to be addressed.
Security, Encryption and Cryptography: Effective authentication schemes based on human facial features and EEG signals are being actively developed in academia and industry. However, these may create privacy issues for the patients. Encryption in the ultra-low energy domain is an important and growing challenge. Research efforts are being made to reduce the energy cost of elliptic curve cryptography. For unconscious patients some method based on biometrics and physiological signals based authentication is necessary.
Communication: Technology’s success will ultimately lie in its value perceived by the users. BANs must effectively transmit and transform sensed phenomena into valuable information and do so while meeting other system requirements, such as energy efficiency. Research efforts are directed towards designing architectures that would process and deliver the required data securely, timely and accurately in the best interest of the patients' condition. Bluetooth Low Energy is a promising emerging wireless technology that has less communication overhead because it is devised for inter-BAN communication exclusively by supporting a single hop topology, short range coverage, and compatibility with widely used Bluetooth devices. Transmitting signals through bones and taking body movements into account are other areas in which more work is required.
Integration of BANs with other technologies: Efforts are being made to incorporate BAN technology in RFID, WSNs and video surveillance. This would help extend the usefulness of the existing e-healthcare applications. RFID containing patient’s identification can allow fast verification by healthcare providers for providing timely medical care even if the patient is unconscious.
Protocol Layers: Body area propagation environments have been characterized extensively at the link level. There is still a need for accurate models that help researchers pre- dict the impact of realistic channels on network level performance. Taking into account, reliability, latency, mutual interference, energy consumption and mobility factors in such a model will yield a more effective network architecture, so that better routing algorithms for BANs can be devised. Recent years have seen growing interests in using UWB channel models for BANs.
MAC layer: We have discussed above the energy saving protocols already proposed at the MAC layer. Despite these developments a number of issues still remain to be resolved. One is that of network capacity. As the packet size is low, achieving high data rate required for some medical applications would result is high overhead. MAC protocols that reduce overhead are required to be developed. Ultra low power consumption requires effective duty cycle that increase the operations at MAC level. Frame delays may be increased resulting in QoS issues for some applications. The ideal MAC protocol would also take care of a wide variety of sensor nodes and QoS requirements.
Standardization: Interoperability of BANs is important for patient mobility across medical facilities. Intelligent healthcare in ambulatory environment regardless of the patients' location providing them of same kind of privacy and treatment requires more to be done in terms of standardization.
ACL | Access Control List |
AES | Advanced Encryption Standard |
BAN | Body Area Network |
BASN | Body Area Sensor Networks |
ECC | Elliptical Curve Cryptography |
ECG | Electro Cardio Gram |
EEG | Electroencephalography |
EMG | Electromyography |
EMRS | Emergency Medical Response System |
FCC | Federal Communication Commission |
FPGA | Field Programmable Gate Array |
GDP | Gross Domestic Product |
IEEE | Institute of Electrical and Electronics Engineering |
IMD | Implantable Medical Device |
ISM | Industrial, Scientific and Medical |
LAN | Local Area Network |
LOS | Line of Sight |
LR-PAN | Low Rate-Personal Area Network |
MAC | Media Access Control |
MAN | Metropolitan Area Network |
NLOS | Non Line of Sight |
PHY | Physical Layer |
PKC | Public Key Cryptography |
QoS | Quality of Service |
RFID | Radio Frequency Identification |
SAR | Specific Absorption Ratio |
SKE | Secret Key Encryption |
SPINS | Security Protocol for Sensor Networks |
TDMA | Time Division Multiple Access |
TEG | Thermo Electrical Generator |
UHM | Ubiquitous Health Monitoring |
UWB | Ultra Wide Band |
WBAN | Wireless Body Area Network |
WHO | World Health Organization |
WLAN | Wireless Local Area Network |
WMTS | Wireless Medical Telemetry System |
WPAN | Wireless Personal Area Network |
WSN | Wireless Sensor Network |