You are on page 1of 8

772 IEEE TRANSACTIONS ON INFORMATION TECHNOLOGY IN BIOMEDICINE, VOL. 12, NO.

6, NOVEMBER 2008

Using the Timing Information of Heartbeats as an


Entity Identifier to Secure Body Sensor Network
Shu-Di Bao, Student Member, IEEE, Carmen C. Y. Poon, Student Member, IEEE,
Yuan-Ting Zhang, Fellow, IEEE, and Lian-Feng Shen

Abstract—Security of the emerging body sensor network (BSN)


in telemedicine applications is a crucial problem because personal
medical information must be protected against flaws and misdeeds.
The solution is, however, nontrivial because lightweight mecha-
nisms have to be deployed to meet the stringent resource con-
straints of these networks. It has been suggested that the inherent
ability of human body to transfer information is a unique and
resource-saving method to secure wireless communications within
a BSN. For example, physiological characteristics can be captured
by individual sensors of a BSN to generate entity identifiers (EIs)
for identifying nodes and even securing keying materials, i.e., by Fig. 1. Integration of personalized BSN in a telemedicine system.
a biometric approach. This study demonstrates the performance
analysis of such a biometric trait, i.e., the interpulse intervals (IPIs)
of heartbeats that were calculated from electrocardiogram and
photoplethysmogram of 99 subjects. Based on the characteristics system. Each BSN connects all sensors that are placed on or
of IPIs, a lightweight generation scheme of EIs is proposed. Indi- in a person’s body, and each sensor being connected to a mi-
vidual randomness and group similarity of the generated EIs are croprocessor, wireless transceiver, and battery forms a “BSN
then evaluated. False acceptance rate and false rejection rate are
also calculated to measure the effectiveness of the proposed iden- node complex” capable of seamlessly integrating with outside
tification system. The results suggest that the readily available IPI environments via various wireless access technologies. Wire-
information can be a good source for generating EIs among BSN less BSN is preferred for monitoring patients in environments
nodes. where medical professionals are not available, such as at homes
Index Terms—Biometrics, body sensor network (BSN), entity and workplaces. It may also be applied to in-hospital patients
identifier (EI), interpulse interval (IPI), security. and even those in the intensive care unit (ICU) environments,
provided that the RF technology used is compliant with existing
I. INTRODUCTION regulations.
ODY SENSOR network (BSN) is emerging as one of the Considering that the scale of BSN is quite small and di-
B main research trends to facilitate the joint processing of bi-
ological data, which can be collected from different parts of the
rect communications between each pair of sensors may not be
necessary, star topologies are often preferred. For this type of
body at different times, for resource optimization and systematic topology, the intelligence of the system is concentrated in a
health monitoring and diagnosis [1], [2]. For the ease of data central node (master) that is superior to other nodes (slaves) in
collection and user convenience, RF technology has been widely terms of processing, memory, and power resources. Not only
adopted to interconnect in-body and on-body sensors. Fig. 1 il- does the master act as a gateway to the outside world, but it
lustrates a simplified example of using BSNs in a telemedicine is also configured to perform a variety of tasks, such as data
fusion, abnormity detection and assessment, and danger alert in
Manuscript received October 25, 2006. First published May 30, 2008; current emergency situations.
version published November 5, 2008. This work was supported in part by Hong Issues and concerns related to the safe and effective use of
Kong Innovation and Technology Fund (ITF).
S.-D. Bao was with the National Mobile Communications Research Labora- RF technology in medical devices, including their function per-
tory, Southeast University, Nanjing 210096, China, and also with the Joint Re- formance, wireless coexistence, electromagnetic compatibility,
search Centre for Biomedical Engineering, Chinese University of Hong Kong, and data security, have been addressed in [3]. Besides, social,
Shatin N.T., Hong Kong. She is now with Agilent Technologies Singapore,
Singapore 768923, Singapore (e-mail: sdbao@ieee.org). legal, and ethical concerns are also evoked based on a variety of
C. C. Y. Poon is with the Joint Research Centre for Biomedical Engi- factors, such as fears about the centralization of information and
neering, Chinese University of Hong Kong, Shatin N.T., Hong Kong (e-mail: the potential misuse of data. Among these problems, data secu-
cpoon@ee.cuhk.edu.hk).
Y.-T. Zhang is with the Joint Research Centre for Biomedical Engi- rity should be a key concern in the use of wireless RF technology
neering, Chinese University of Hong Kong, Shatin N.T., Hong Kong, and because it opens up an opportunity for unauthorized parties to
also with the Key Laboratory of Biomedical Informatics and Health En- eavesdrop on and even tamper with medical data. As mandated
gineering, Chinese Academy of Sciences, Beijing 518067 China (e-mail:
ytzhang@ee.cuhk.edu.hk). by privacy laws and regulations, such as the Health Information
L.-F. Shen is with the National Mobile Communications Research Labora- and Portability Accountability Act (HIPAA) [4] and the Euro-
tory, Southeast University, Nanjing 210096 China (e-mail: lfshen@seu.edu.cn). pean Union Directive 2002/58/EC [5], wireless standards with
Color versions of one or more of the figures in this paper are available online
at http://ieeexplore.ieee.org. medical applications have to have a high level of reliability to
Digital Object Identifier 10.1109/TITB.2008.926434 guarantee the quality of patient care and the privacy of healthcare
1089-7771/$25.00 © 2008 IEEE
BAO et al.: USING THE TIMING INFORMATION OF HEARTBEATS AS AN ENTITY IDENTIFIER TO SECURE BODY SENSOR NETWORK 773

history. Therefore, security mechanisms must be incorporated chip, the protocol was able to generate a pair of 163-bit private
to build a secure BSN ensuring data confidentiality, integrity, and public keys and a piece of a shared secret between two nodes
and freshness, as well as nonrepudiation of origin, delivery, and within 34 s. Because asymmetric cryptography requires compu-
receipt. It is however a nontrivial task because limited by the tationally expensive or energy-intensive operations, it is often
targeted size and cost, most sensor nodes are subject to stringent ruled out as the infrastructure for authentication, integrity, and
resource constraints. security in sensor networks [12], [13], particularly in wireless
To address the security issue in BSN, we proposed in [6] BSNs.
that since the body itself can form an inherently secure com-
munication pathway, a novel biometrics method, which uses A. Key Predistribution Solutions
the intrinsic characteristics of the human body to generate the
As wireless BSN works within the body area, using a base
entity identifier (EI) of each BSN node for identifying nodes
station to distribute a network-wide initial key to each sensor
and protecting the transmission of keying materials, can be used
before deployment is a straightforward scheme. The process of
to secure intra-BSN communications. Since the interpulse in-
distribution of initial keys must be carried out in a secure envi-
terval (IPI) of heartbeats can be readily available in various
ronment, which the intruders cannot access by any means. The
cardiovascular signals, it was used as an example of the in-
main disadvantage of this scheme is that whenever there is a
trinsic characteristic to illustrate the feasibility of the proposed
need to add or change a body sensor, the user has to configure
biometrics method. Preliminary experimental results of the IPI
a new initial key to ensure that the new sensor can securely
based system performance was presented in [6].
communicate with the existing sensors. This obviously discour-
In this paper, the performance of IPIs as a biometric trait
ages people, such as family members, to share sensors (mainly
for such security purposes will be evaluated. Furthermore, a
wearable sensors) between themselves. Furthermore, thorough
lightweight scheme for generating EI from IPI information is
key updates are also discouraged.
proposed and analyzed.
Recently, a family of random-key predistribution protocols
The rest of this paper is organized as follows. Section II in-
was developed for large-scale sensor networks [14], [15]. The
troduces existing solutions of authenticated key distribution that
basic idea of random-key predistributions was first proposed by
may be applicable to BSNs, with an emphasis on the newly pro-
Eschenauer et al. [16], in which a large pool of symmetric keys
posed biometrics method. The performance of IPIs calculated
S is generated and a random subset m is distributed to each node.
from different cardiovascular signals is studied in terms of indi-
The number of keys in the key-pool, i.e., |S|, is chosen such that
vidual randomness and group similarity in Section III. Then, the
two random subsets, each of size |m|, will share at least one key
lightweight generation scheme of EI based on IPI information is
with certain probability. After the deployment, a network-wide
proposed in Section IV. In Section V, the performance analysis
key-setup phase is performed. Each node first performs a key-
of such generated EIs is elaborated in terms of individual ran-
discovery procedure to find out with which of its neighbors it
domness, group similarity, as well as false acceptance/rejection
shares at least a key. A mutual verification is then carried out
evaluation. Finally, conclusions are given in Section VI.
through a challenge-response protocol. The shared key becomes
the key for that link.
II. BACKGROUND AND RELATED WORKS To further improve the performance, other key predistribution
techniques have also been proposed, including the threshold-
Since wireless BSN nodes are usually subjected to severely
based key predistribution [17], [18] that aimed to improve
constrained resources, asymmetric cryptography is too expen-
the resilience of sensor networks against node compromises
sive in terms of system overhead. Thus, a promising approach
and the group-based key pre-distribution [19] that aimed to re-
is to use more efficient symmetric cryptographic alternatives.
move the dependency on expected sensor locations, and thus,
Nevertheless, symmetric cryptography is not as versatile as
simplify the deployment.
asymmetric cryptographic techniques, and thus, complicates
A major disadvantage of applying the aforementioned tech-
the design of secure applications. Prior to using any encryp-
niques in wireless BSNs is that if there is a need to add any
tion, communicating parties must possess a shared secret key,
new sensor, the same key pool must be used to generate a key
which theoretically requires a secure channel for distribution.
subset, and the key predistribution for the new sensor must be
Such a secure channel is, however, often not available in most
taken place in a secure environment. As mentioned before, the
cases, and thus, key distribution is always vulnerable to man-in-
predistribution process will unavoidably cause inconvenience to
the-middle attacks. To prevent such attacks, a variety of authen-
BSN users. To this end, a new family of solutions without an
ticated key distribution protocols have been developed, as the
initial deployment is desirable for wireless BSNs.
means of gaining confidence that an entity is what it claims to
be and at the same time distributing a shared secret key between
communicating entities [7]–[10]. B. Biometric Security Model
Typically, authenticated key distribution protocols can be de- Conventionally, biometrics refers to the automatic recogni-
signed using symmetric or asymmetric cryptography. Regarding tion of individuals based on their physiological and/or behav-
the use of asymmetric cryptography to secure sensor networks, ioral characteristics [20], [21]. The biometrics method discussed
Malan et al. [11] implemented the elliptic curve cryptography in this study is, however, different from the conventional one.
on MICA2 mote with TinyOS. When tested on a fully loaded The concept behind this new approach to use biometrics is to
774 IEEE TRANSACTIONS ON INFORMATION TECHNOLOGY IN BIOMEDICINE, VOL. 12, NO. 6, NOVEMBER 2008

make use of the communication channels already available on in the security model, can be regarded as an initial key generated
or in the human body, i.e., the biochannels, for securing wireless by any BSN node that wants to initiate a secure conversion with
communications in BSN. Cherukuri et al. [22] proposed using other nodes.
a group of similar random numbers generated from properties Before the protocol is initiated, each BSN node has to gen-
obtained from different human body parts to protect the trans- erate a binary sequence b from a biometric trait. As the binary
mission of symmetric keys between communicating parties. The biometric sequence is used for a BSN node to judge whether a re-
transmitting node binds a cryptographic key with a locally cap- questing node is in the same BSN as itself, we name the binary
tured biometric trait. At the receiving node, a binding-off pro- biometric sequence EI to emphasize its outstanding commit-
cess is preceded using the biometric trait captured by its own to ment. Let EIT = {ITi ∈ {0, 1}n |1 ≤ i ≤ N } represent a set of
recovery the cryptographic key. EIs, where N is the size of the network and T is a synchronized
Since the biometric trait captured at different locations of the time period during which the binary biometric sequence is gen-
body should have slight variations, a fuzzy commitment scheme erated. Similar to the biometric traits, EIT should satisfy the
[23] is employed to ensure that differences between biometric following requirements: 1) each EI (ITi ) should possess a sig-
values captured at different locations are tolerable to a certain nificant degree of randomness and 2) any pair of EIs (ITi , ITj )
degree. The cryptographic key used in the fuzzy commitment should have high similarity. The first property implies that each
scheme needs to be constructed as an error-correcting code. bit of ITi should theoretically contain one bit of entropy. On
Let the function g : M → C represent a one-to-one mapping the other hand, the distance between any pair should be small
of messages to codewords, where M = {0, 1}k represent the enough for any two nodes in the same BSN to accept each other.
space of messages and C = {0, 1}n represent the corresponding After sharing the initial key K among BSN nodes by using
error-correcting codeword. Conversely, g −1 is used to retrieve the fuzzy similar EIs, session keys can be subsequently estab-
the transmitted message from a reconstructed codeword. The lished. Besides, it is noted that a practical protocol should be
error-correcting function f : {0, 1}n → C ∪ {φ} is used to map robust against a variety of potential threats, including tampering
arbitrary n-bit strings to codewords. When successful, f maps attacks, replay attacks, and reflection attacks.
a given n-bit string to the nearest codeword in C. Otherwise, f
fails and outputs φ. We say that f has a correction threshold of III. ANALYSIS ON TIMING INFORMATION OF HEARTBEATS
size t if it can correct any set of up to t bit errors.
Let K ∈ {0, 1}k and K̂ ∈ {0, 1}n represent a cryptographic A. Experimental Data
key and the corresponding error-correcting codeword, respec- We used data collected from two experiments, the original
tively, b ∈ {0, 1}n represent the biometric value (also called purpose of which was to simultaneously capture ECG and pho-
the original encrypting witness) used to protect cryptographic toplethysmogram (PPG) for the estimation of blood pressure.
keys, and h : {0, 1}n → {0, 1}l be a one-way hash func- In one experiment (Exp. I), 14 healthy subjects were recruited.
tion. The fuzzy commitment scheme is defined as F (K̂, b) = ECG was captured from the three fingers of the subjects and
(h(K̂), K̂ ⊕ b), where ⊕ is the bitwise XOR operation. To de- two channels of PPG were captured from the index fingers of
commit F (K̂, b) using a witness b , the receiver computes the two hands, respectively. For each subject, the three signals
K̂  = f (b ⊕ (K̂ ⊕ b)) = f (K̂ ⊕ (b ⊕ b)). If h(K̂  ) = h(K̂), were captured simultaneously for 2–3 min. In another experi-
then the decommitment is successful and the result of g −1 (K̂) ment (Exp. II), 85 clinical subjects were recruited, and within a
is the correct key K. Otherwise, b is an incorrect witness that is two-month period, a PPG and ECG were captured for 40 s on
not close enough to the original encrypting witness in a suitable three or four days. A 12-bit A/D converter sampling at 1 kHz
metric. was deployed to get the digital signals. Fig. 2 depicts a segment
It was discussed in [6] that biometric traits used in such a of simultaneously captured ECG and PPG. Peak-to-peak inter-
security model must be: 1) distinctive, i.e., the trait should be vals of ECG and foot-to-foot intervals of PPG were calculated.
sufficiently different on any two individuals when copies of it In order not to extend effects of detection errors in bad signal
are captured simultaneously, even if the copies are captured by segments, a segmentation mechanism was introduced to divide
different types of sensors and at different locations of the body the signals into segments consisting of consecutive 16 IPIs.
and 2) time-variant but invulnerable, i.e., the trait should change
with time and have a high degree of randomness so that copies
B. Multi-IPI Versus Individual IPI
of it captured at different times would not match even if they are
obtained from the same individual. More importantly, from a As mentioned earlier, EIs generated from time-variable bio-
cryptographic perspective, devices outside of a particular BSN metric traits should meet two requirements, i.e., individual ran-
have neither access to, nor can they reliably predict a particular domness and group similarity. To achieve better performances
period record of such a biometric trait. of EIs from a given number of IPIs, multi-IPI is examined as
compared to individual IPI for its capability of EI generation.
Given L = 16 consecutive individual IPIs, a series of multi-IPIs
C. Protocol Design Based on the Biometric Security Model can be obtained as follows:
Based on the biometric security model, an authenticated key  
i
distribution protocol can be carefully designed for BSN nodes to mIPIi = IPIl |1 ≤ i ≤ L . (1)
securely share session keys for later uses. The key K, described l=1
BAO et al.: USING THE TIMING INFORMATION OF HEARTBEATS AS AN ENTITY IDENTIFIER TO SECURE BODY SENSOR NETWORK 775

TABLE I
NUMERIC RESULTS OF SAMPEN (3, 0.2, M)

Fig. 2. Segment of simultaneously captured ECG and PPG from Exp. I.

To randomize the monotonically increasing multi-IPIs, a


modulo operation is further introduced to get the modulus of di-
viding mIPIi by 2p , i.e., (mIPIi )mod(2p ), where p is a positive
integer referred to as the modulo parameter. Noted that a smaller Fig. 3. Histogram of the mean Euclidean distance between true pairs of IPIs
p will result in a more uniformly distributed (mIPIi )mod(2p ) in (comparison of individual IPI and multi-IPI). (a) Exp. I. (b) Exp. II.
the range of [0, 2p −1].

C. Analysis of Individual Randomness


Entropy that measures the degree of randomness of observed
sequences is commonly used to analyze the chaotic character-
istics of heart rate variability in patients with heart diseases. In
this study, a recently developed sample entropy (SampEn) [24],
which is a measure similar to but less biased than the popular
approximate entropy (ApEn) [25], was employed to quantify Fig. 4. Histogram of the mean Euclidean distance between true pairs of mIPIi
information in IPIs. SampEn(m, r, M) is precisely the negative mod 2 p . (a) p = 9. (b) p = 8. (c) p = 7.
natural logarithm of the conditional probability that a dataset
of length M, having repeated itself within a tolerance r for m
on the value of p. A smaller p results in a relatively higher degree
points, will also repeat itself for m+1 points, without allow-
of randomness.
ing self-matches. A larger value of SampEn indicates that the
observed data have a relatively higher degree of randomness.
One advantage of using SampEn is that it is relatively con- D. Analysis of Group Similarity
sistent where ApEn is not [26]. That is, if SampEn(m1 ,r1 ) of U Group similarity is analyzed by calculating the mean value
is not larger than SampEn(m1 , r1 ) of V, then it is expected that of the Euclidean distance (MED) between IPI sequences simul-
SampEn(m2 , r2 ) of U is also not larger than SampEn(m2 , r2 ) taneously detected from the same individual, i.e.,
of V, where U and V are records with the same data length.
1 
L
Since SampEn shows relative consistency, we can use it to
d= |xl − xl | (2)
compare the randomness of sequences of individual IPI and L
l=1
(mIPIi )mod(2p ), though there is no golden guideline for se-
lecting an optimal pair of m and r. We chose m and r to be 3 where xl and xl can represent a pair of individual IPIs, multi-
and 0.2, respectively, in accordance with some previous studies IPIs, or modulo results of multi-IPIs, respectively. Fig. 3 depicts
on heart rate and its variability [26], and set M to be the num- the distance distributions calculated from the experimental data.
ber of IPIs in each trial. For random numbers with a uniform As can be seen in Fig. 3, though the results from multi-IPIs
distribution, the theoretical predicted value of SampEn (3,0.2) exhibit a little bit worse performance of similarity than those
is about 2.2. Table I shows the mean SampEn of individual from individual IPIs, most of the distances are smaller than
IPI and (mIPIi )mod(2p ). It can be seen that the randomness 16 ms.
of individual IPIs from 14 healthy subjects is better than that After a modulo operation of multi-IPI, most of the distances
from 85 clinical subjects, which is consistent with previous stud- fall onto the two ends of the range of [0, 2p −1]. Fig. 4 depicts
ies [27], [28], while SampEn results of ( mIPIi )mod(2p ) from the distributions of the MEDs for (mIPIi )mod(2p ), where p is
the two experimental groups show a smaller difference. Fur- set to 9, 8, and 7, respectively. As can be seen, a larger value of
thermore, the randomness of (mIPIi )mod(2p ) depends heavily p results in a better performance of similarity.
776 IEEE TRANSACTIONS ON INFORMATION TECHNOLOGY IN BIOMEDICINE, VOL. 12, NO. 6, NOVEMBER 2008

ing p least significant bits of the multi-IPI, i.e., [(mIPIi ) mod


(2p )]10 = (bp−1 bp−2 · · · b0 )2 . The contraction mapping can also
be done by reading q most significant bits of the result of mod-
ulo operation, i.e., (bp−1 bp−2 · · · bp−q )2 . Rewrite the mapping
results as (Bq −1 Bq −2 · · · B0 )2 . The corresponding Gray code
(Gq −1 Gq −2 · · · G0 )2 is constructed as follows:

Gq −1 = Bq −1
Fig. 5. Generation scheme of binary entity identifiers from IPIs. Gi = Bi+1 ⊕ Bi , i = 0, 1, . . . , q − 2.
It can be seen that the Gray coding only needs (q − 1)
For the case of (mIPIi )mod(2p ), it is also observed that there bitwise addition operations for each mapping result. Thus,
is a tradeoff between individual randomness and group similar- the number of bitwise addition operations for the Gray cod-
ity while selecting the value of p. To achieve better performance ing is (q − 1)L. Since bitwise operations are slightly faster
of group similarity, a relatively large value of p is desirable, compared to addition operations, a bitwise addition opera-
which will, however, reduce the degree of randomness. tion can be regarded as a fraction of an addition operation,
denoted as α(0 < α < 1). To this end, the order of computa-
IV. GENERATION OF IPI-BASED ENTITY IDENTIFIER
tional complexity of the generation scheme can be expressed as
A. Generation Scheme O[(1/2)(L − 1)L + α(q − 1)L] = O(L2 ) in terms of addition
The generation scheme of network-wide EIs is depicted in operations. It shows that the generation scheme only increases
Fig. 5. To begin with, a node in BSN, usually the master node a little complexity to each sensor node.
with less resource constraint, sends out a synchronization signal
C. Matching of Entity Identifiers
indicating the beginning of network-wide EI generation. Upon
receiving the synchronization signal, other nodes in the same Because the biometric traits are time-variant, they should be
BSN begin to record at least one cardiovascular signal. The ini- captured synchronously at different sensor nodes in the same
tiating node also begins the signal recording at the same time. BSN. However, there might exist one-IPI nonsynchronization
Each node calculates a series of IPIs from its own recorded car- due to the time delay of cardiovascular pulses and the trans-
diovascular signal, which can be denoted as {IPIi |1 ≤ i ≤ L}. mission delay of the synchronization signal. Therefore, an error
Afterwards, an accumulation operation is performed to toleration mechanism needs to be introduced to make the match-
the series of IPIs followed by the modulo operation, i.e., ing of EIs robust against such errors.
(mIPIi )mod(2p ). To compensate measurement differences Let x = I1 ||I2 · · · ||IL −1 ||IL and x = I1 ||I2 · · · ||IL −1 ||IL
among different BSN nodes, the modulo result is further be the EIs of a judging node and a requesting node that wants
transformed into a smaller integer by a contraction mapping to start a protocol involving identification (e.g. authenticated
fˆ : [0, 2p ) → [0, 2q ), i.e., key distribution), respectively, and let H denote the Hamming
 m  distance between two binary sequences. With a preset decision
fˆ(m) = (p−q ) (3) threshold δ, the judging node first carries out a full match to
2
where p > q and · returns the largest integer less than or equal see
Lif the distance between their identifiers is small enough, i.e.,

H(I , I )) ≤ δ. If it is true, the judging node will accept
to m/2(p−q ) . In the following analysis, we will refer to 2(p−q ) as k =1 k k
the requesting node. Otherwise, a shift matching will be conse-
the mapping parameter. Finally, to increase the noise margin of
quently taking place, i.e., Lk=2 H(Ik , Ik −1 ) ≤ (L − 1)/Lδ
measurements, the classical binary reflected Gray code scheme  −1
is employed to get binary EIs. or Lk =1 H(Ik , Ik +1 ) ≤ (L − 1)/Lδ. If either of these two
The generated EI can be expressed as EI = I1 ||I2 · · · inequalities is true, the judging node will also accept the re-
||IL −1 ||IL , where || is a concatenation operation. Each block questing node; otherwise, it will reject the request.
of EI, i.e., Ii , is generated from a corresponding mIPIi . The bit
length of Ii is q, and thus, the bit length of EI is L · q. V. PERFORMANCE EVALUATION OF IPI-BASED
ENTITY IDENTIFIER
B. Computational Complexity For the performance evaluation of EIs, we will focus on ana-
Assume that the signal detection and IPI calculation are basic lyzing the effects of the mapping parameter 2(p−q ) on the per-
functions of body sensors. In this section, the computational formance of EIs, while setting the value of p to 8 according to
complexity of the proposed generation scheme will be analyzed the analysis in Section III.
by transforming all operations in the scheme into an equivalent
A. Randomness Evaluation
number of addition operations. For the accumulation operation,
the equivalent number of addition operations is (1/2)(L − 1)L. The randomness performance of binary sequences can be
The computational complexity of modulo operation can be evaluated using a variety of randomness tests. Because of the
ignored because given the multi-IPI, which is represented as length limitation in the generated binary EIs from each subject,
(mIPIi )10 = (b15 b14 · · · b0 )2 with two-byte coding space, the we selected several tests from the National Institute of Stan-
modulo operation can be easily performed by simply read- dards and Technology (NIST) standards to do the randomness
BAO et al.: USING THE TIMING INFORMATION OF HEARTBEATS AS AN ENTITY IDENTIFIER TO SECURE BODY SENSOR NETWORK 777

TABLE II
ERROR RATES ASSOCIATED WITH IPI BIOMETRIC SYSTEMS
(p = 8; q = 2, 3, 4, 5; L = 16)

Fig. 6. Similarity analysis with the Hamming distance (p = 8, L = 16). (a)


q = 5. (b) q = 4. (c) q = 3 and (d) q = 2.

including the lowest FRR for FAR ≤ 0.1% as well as the min-
imum half total error rate (HTER) that equals (FRR+FAR)/2.
It can be seen from Table II that although larger q values result
in EIs with longer bit lengths, the minimum HTERs are also
generally higher. The parameter δ is the corresponding decision
threshold while the minimum HTER is achieved. Besides, an ef-
ficiency parameter, i.e., η = (n − δ)/n, where n is the bit length
of EI, is used to evaluate the efficiency of the generated EIs. In
practical use, the threshold δ can be set to a smaller value com-
pared to the one corresponding to the minimum HTER, because
a lower FAR is desirable for a more secure system at the expense
of a higher FRR. Moreover, consider the error-correcting coding
Fig. 7. FA–FR curves of EIs under different q values (p = 8, L = 16). (a) q = scheme (n, k, t) of secret keys described in Section II, where n
5. (b) q = 4. (c) q = 3 and (d) q = 2. is the bit length of codewords, k is the number of information
bits, and t is the error-correcting ability. Since t is often set
evaluation, including frequency (monobit) test, frequency test
equal to the decision-making threshold of the EI, a smaller
within a block, cumulative sums test, runs test, and discrete
threshold is also desirable to get a higher coding rate, i.e., k/n.
Fourier transform test [29]. All bit streams passed the selected
As long as the EIs of sensor nodes in the same BSN are
tests, and thus, showed an acceptable degree of randomness.
similar enough, the identification process will succeed with a
B. Similarity Analysis high probability. Although there are diseases that can cause
abnormal heartbeat signals, all cardiovascular signals captured
The similarity between any pair of EIs generated by sensors by nodes of the same BSN will be undergoing the same kind
on the same individual can be analyzed with the Hamming of changes in the heart functions. Therefore, the EIs generated
distance. Fig. 6 depicts the Hamming distance distribution of from IPI information by nodes of the same BSN will still have
EIs under different mapping parameters. a high similarity and the proposed method still holds. In fact, in
Exp. II, over two-thirds of subjects were old unhealthy people
C. False Acceptance–False Rejection Performance with various kinds of cardiovascular diseases. Nevertheless, the
False acceptance (FA, also known as false match) and false re- results still show a good FA–FR performance compared with
jection (FR, also known as false nonmatch) were used to charac- Exp. I where only young healthy subjects were involved. We
terize the two aspects of EIs. Fig. 7 depicts the FA-FR curves of found that the quality of the ECG and PPG signals of Exp.
EIs generated with different q values, where false rejection rate II were not as good as those recorded in Exp. I, resulting in
(FRR) was the rate at which two EIs generated from the same higher FRRs. In the future, more tests should be carried out on
person during the same period of time were unmatched, and false specific kinds of patients to study whether the proposed trait and
acceptance rate (FAR) was the rate at which two EIs generated biometric method are applicable to them.
from a different person or at a different time were matched. Compared to one of our previous studies [6] that used the
Table II shows the error rates of the IPI based biometric system, same set of raw data, this study was able to achieve a lower
778 IEEE TRANSACTIONS ON INFORMATION TECHNOLOGY IN BIOMEDICINE, VOL. 12, NO. 6, NOVEMBER 2008

minimum HTER with fewer IPIs. For example, the error rate [11] D. J. Malan, M. Welsh, and M. D. Smith, “A public-key infrastructure for
with 64-bit EIs generated from 16 IPIs is 2.83%, while the key distribution in TinyOS based on elliptic curve cryptography,” in Proc.
1st IEEE Int. Conf. Sens. Ad Hoc Commun. Netw., Oct. 2004, pp. 71–80.
previous one was 6.98% using 34 IPIs. In consideration of [12] A. Perrig, R. Szewczyk, J. D. Tygar, V. Wen, and D. E. Culler, “SPINS:
resource efficiency, the improved algorithm can use fewer IPIs Security protocols for sensor networks,” Wireless Netw., vol. 8, no. 5,
to generate EIs of the same bit length, and at the same time, pp. 521–534, Sep. 2002.
[13] C. Karlof, N. Sastry, and D. Wagner, “TinySec: A link layer security archi-
yield a better FA–FR performance. tecture for wireless sensor networks,” in Proc. 2nd Int. Conf. Embedded
On the other hand, the FA–FR performance of conventional Netw. Sens. Syst., Baltimore, MD, 2004, pp. 162–175.
biometric systems can be used as a reference while not a [14] H. Chan, A. Perrig, and D. Song, “Random key predistribution schemes
for sensor networks,” in Proc. IEEE Symp. Sec. Privacy, Oakland, CA,
benchmark for this specific biometric system because of quite May 2003, pp. 197–213.
different application scenarios. At the Fingerprint Verification [15] O. G. Morchon, H. Baldus, and D. S. Sanchez, “Resource-efficient security
Competition 2006, state-of-art fingerprint technologies were for medical body sensor networks,” in Proc. Int. Workshop Wearable
Implantable Body Sens. Netw., Cambridge, MA, Apr. 2006, pp. 80–83.
able to achieve an averaged equal error rate (i.e., when [16] L. Eschenauer and V. Gligor, “A key-management scheme for distributed
FAR = FRR) of 2.16% and lowest averaged FRR for FAR sensor networks,” in Proc. 9th ACM Conf. Comput. Commun. Sec.,
≤ 0.1% of 4.22% on four databases, each consisting of 150 Washington, DC, Nov. 2002, pp. 41–47.
[17] D. Liu, P. Ning, and R. Li, “Establishing pairwise keys in distributed
subjects (http://bias.csr.unibo.it/fvc2006/, 2008). Our system sensor networks,” ACM Trans. Inf. Syst. Sec., vol. 8, no. 1, pp. 41–77,
can achieve minimum HTERs of less than 1.46% and 3.19% Feb. 2005.
on 14 and 85 subjects, respectively. Moreover, as shown in [18] W. Du, J. Deng, Y. S. Han, P. K. Varshney, J. Katz, and A. Khalili, “A
pairwise key predistribution scheme for wireless sensor networks,” ACM
Table II, the lowest FRR for FAR ≤ 0.1% that our proposed Trans. Inf. Syst. Sec., vol. 8, no. 2, pp. 228–258, May 2005.
system can achieve were 1.65% and 5.03% for 14 and 85 [19] D. Liu, P. Ning, and W. Du, “Group-based key pre-distribution in wireless
subjects, respectively. The results indicate that the proposed sensor networks,” in Proc. 4th ACM Workshop Wireless Sec., Cologne,
Germany, Sep. 2005, pp. 11–20.
technology is a promising technique. [20] A. K. Jain, A. Ross, and S. Prabhakar, “An introduction to biometric
recognition,” IEEE Trans. Circ. Syst. Video Technol., vol. 14, no. 1,
VI. CONCLUSION pp. 4–20, Jan. 2004.
[21] P. Reid, Biometrics for Network Security. Englewood Cliffs, NJ:
In this study, we have demonstrated the performance of using Prentice-Hall, 2004, pp. 4–5.
IPIs of heartbeats to generate binary EIs, which allow sensor [22] S. Cherukuri, K. K. Venkatasubramanian, and S. K. S. Gupta, “BioSec:
A biometric based approach for securing communication in wireless net-
nodes on the same person to recognize each other. The proposed works of biosensors implanted in the human body,” in Proc. IEEE Int.
generation scheme of binary EIs based on IPI information is Conf. Parallel Process. Workshops, 2003, pp. 432–439.
applicable to any biometric trait that satisfies the requirements [23] A. Juels and M. Wattenberg, “A fuzzy commitment scheme,” in Proc. 6th
ACM Conf. Comput. Commum. Sec., 1999, pp. 28–36.
for securing wireless BSNs; however, the modulo parameter and [24] J. S. Richman and J. R. Moorman, “Physiological time-series analysis
mapping parameter may vary according to the characteristics of using approximate entropy and sample entropy,” Am. J. Physiol., vol. 278,
the underlying biometric trait. no. 6, pp. H2039–H2049, 2000.
[25] A. L. Rukhin, “Approximate entropy for testing randomness,” J. Appl.
Probab., vol. 37, no. 1, pp. 88–100, Mar. 2000.
REFERENCES [26] D. E. Lake, J. S. Richman, M. P. Griffin, and J. R. Moorman, “Sample
entropy analysis of neonatal heart rate variability,” Am. J. Physiol. Regul.
[1] R. S. H. Istepanian, E. Jovanov, and Y. T. Zhang, “Guest editorial in- Integr. Comp. Physiol., vol. 283, no. 3, pp. R789–R797, 2002.
troduction to the special section on m-health: Beyond seamless mobility [27] M. G. Signorini, F. Marchetti, and S. Cerutti, “Applying nonlinear noise
and global wireless health-care connectivity,” IEEE Trans. Inf. Technol. reduction in the analysis of heart rate variability,” IEEE Eng. Med. Biol.
Biomed., vol. 8, no. 4, pp. 405–414, Dec. 2004. Mag., vol. 20, no. 2, pp. 59–68, Mar./Apr. 2001.
[2] G. Z. Yang, Body Sensor Networks. London: Springer-Verlag, 2006, [28] R. Yulmetyev, P. Hanggi, and F. Gafarov, “Quantification of heart rate vari-
pp. 4–13. ability by discrete nonstationary non-Markov stochastic process,” Phys.
[3] Food and Drug Administration (FDA). (2007, Jan.) Radio frequency wire- Rev. E, vol. 65, pp. 046107-1–046107-15, 2002.
less technology in medical devices—Draft guidance for industry and [29] A. Rukhin et al., “A statistical test suite for random and pseudoran-
FDA staff. [Online]. Available: http://www.fda.gov/cdrh/osel/guidance/ dom number generators for cryptographic applications,” Nat. Inst. Stand.
1618.html Technol., NIST Special Publication 800-22, Gaithersburg, MD, 2001.
[4] J. Hash, P. Bowen, A. Johnson, C. D. Smith, and D. I. Steinberg, “An intro-
ductory resource guide for implementing the health insurance portability
and accountability act (HIPAA) security rule,” Nat. Inst. Stand. Technol., Shu-Di Bao (S’03–M’08) received the B.S. degree
NIST Spec. Publ. 800-66, Gaithersburg, MD, Mar. 2005. from Ningbo University, Ningbo, China, in 1999,
[5] The European Parliament and the Council of The European Union, “Di- and the M.S. and Ph.D. degrees from the Southeast
rective 2002/58/EC concerning the processing of personal data and the University, Nanjing, China, in 2003 and 2007,
protection of privacy in the electronic communications sector,” Official respectively, all in communications and information
J. Eur. Communities, pp. L201/37–47, Jul. 2002. systems.
[6] C. Poon, Y. T. Zhang, and S. D. Bao, “A novel biometrics method to secure She was a Research Assistant at the Joint Research
wireless body area sensor networks for telemedicine and m-health,” IEEE Centre for Biomedical Engineering, Chinese Univer-
Commun. Mag., vol. 44, no. 4, pp. 73–81, Apr. 2006. sity of Hong Kong, Shatin N.T., Hong Kong. She is
[7] M. Bellare and P. Rogaway, “Entity authentication and key distribution,” currently an R&D Engineer at Agilent Technologies
in Proc. 13th Annu. Int. Cryptol. Conf., Santa Barbara, CA, pp. 232– 249, Singapore, Singapore. Her previous research interests
Aug. 1993. included information retrieval, security and fault tolerance, efficient communi-
[8] Information Technology—Security Techniques—Entity Authentication— cations for body sensor networks, and telemedicine systems.
Part 1: General, ISO/IEC Standard 9798-1:1997. Dr. Bao won the Young Investigator Award (YIA) and the YIA Best Pre-
[9] Information Technology—Security Techniques—Key Management— sentation Award at the 6th Asian-Pacific Conference on Medical and Biological
Part 1: Framework, ISO/IEC Standard 11770-1:1996. Engineering in 2005 and the Second Prize of the International Federation for
[10] Information Technology—Security Techniques—Key Management—Part Medical and Biological Engineering (IFMBE) Outstanding Chinese Student
1: Mechanisms Using Symmetric Techniques, ISO/IEC Standard 11770- Award at the 27th Annual International Conference of the IEEE Engineering in
2:1996. Medicine and Biology Society in 2005.
BAO et al.: USING THE TIMING INFORMATION OF HEARTBEATS AS AN ENTITY IDENTIFIER TO SECURE BODY SENSOR NETWORK 779

Carmen C. Y. Poon (S’05–M’08) received the Dr. Zhang has been active in the IEEE Engineering in Medicine and Biology
B.A.Sc. degree in engineering science (Biomedical Society (EMBS). He was the Technical Program Chair of the 20th Annual In-
Option) and the M.A.Sc. degree in biomedical engi- ternational Conference in 1998 and the General Conference Chair of the 27th
neering from the University of Toronto, ON, Canada, Annual International Conference in 2005. He was the Technical Programme
and the Ph.D. degree from Chinese University of Committee (TPC) Chair of the IEEE-EMBS Summer School and Symposium
Hong Kong, Shatin N.T., Hong Kong. on Medical Devices and Biosensors (ISSS-MDBS) in 2006. He was elected as
She was a Postdoctoral Fellow at Chinese Uni- an AdCom member in 1999 and served as the Vice President (Conferences)
versity of Hong Kong. She is currently with the in 2000. He was also an Associate Editor for the IEEE TRANSACTIONS ON
Joint Research Centre for Biomedical Engineering, BIOMEDICAL ENGINEERING and the IEEE TRANSACTIONS ON MOBILE COMPUT-
Chinese University of Hong Kong. Her current re- ING. He was also the Guest Editor of the IEEE COMMUNICATION MAGAZINE
search interests include biosignal processing, biosys- and IEEE TRANSACTIONS ON INFORMATION TECHNOLOGY IN BIOMEDICINE. He
tem modeling, and development of wearable medical devices for telemedicine has been selected as the Editor-in-Chief of the IEEE TRANSACTIONS ON IN-
and m-Health. FORMATION TECHNOLOGY IN BIOMEDICINE. He is currently a member of the
Dr. Poon was awarded the First Prize of the International Federation for Editorial Board of the Book Series of Biomedical Engineering (IEEE Press),
Medical and Biological Engineering (IFMBE) Outstanding Chinese Student the IEEE-EMBS Technical Committee of Wearable Systems and Sensors, the
Award at the 27th Annual International Conference of the IEEE Engineering in Editorial Committee of China Medical Device Information, and an Associate
Medicine and Biology Society in 2005. Editor of the International Journal of NeuroEngineering and Rehabilitation.
He is an honorary advisor of the Hong Kong Medical and Healthcare Device
Manufacture Association. He has received numerous awards and recognitions
that include the Fellow of the International Academy of Medical and Biological
Engineering, the Fellow of the American Institute for Medical and Biological
Engineering, and the 2006 recipient of the IEEE-EMBS Service Award.
Yuan-Ting Zhang (M’90–SM’93–F’06) received
the Master’s degree from Shandong University, Jinan,
China, and the Ph.D. degree from the University of
New Brunswick, Fredericton, NB, Canada, in 1990.
From 1989 to 1994, he was a Research Associate
and an Adjunct Assistant Professor at the University
of Calgary, Calgary, AB, Canada. During 1996–1997
and 2000–2001, he was the Chair of the Biomedical Lian-Feng Shen received the B.S. degree in radio
Division, Hong Kong Institution of Engineers. He technology and the M.S. degree in radio communica-
is currently the Head of the Division of Biomedical tions from the Southeast University, Nanjing, China,
Engineering and the Director of the Joint Research in 1978 and 1982, respectively.
Centre for Biomedical Engineering, Chinese University of Hong Kong, Shatin Since 1997, he has been a Professor at the Na-
N.T., Hong Kong. He is also the Director of the Key Laboratory of Biomedical tional Mobile Communications Research Laboratory,
Informatics and Health Engineering, Chinese Academy of Sciences, and the Southeast University. His current research interests
Chairman (Adjunct) of the Department of Biomedical Engineering, Sun Yat- include information theory and technologies, coding
sen Medical School, Sun Yat-Sen University, Guangzhou, China. His current theory, and wireless and mobile communications. He
research interests include neural engineering, terahertz (THz) imaging, wearable has been recently focusing on the broadband mobile
medical devices, and body sensor networks particularly for mobile health and communications including wireless Internet technol-
telemedicine. He is the author or coauthor of more than 300 scientific articles ogy, broadband wireless access systems, intelligent home networks, wireless
in the area of biomedical engineering. sensor networks, and broadband wireless multimedia communications.

You might also like