CFP last date
22 April 2024
Call for Paper
May Edition
IJCA solicits high quality original research papers for the upcoming May edition of the journal. The last date of research paper submission is 22 April 2024

Submit your paper
Know more
Reseach Article

Secure Communication in BAN using Modified Fuzzy Vault Scheme

Published on July 2015 by R.rekha, R.vidhyapriya, R.geetha Rajakumari
International Conference on Innovations in Computing Techniques (ICICT 2015)
Foundation of Computer Science USA
ICICT2015 - Number 1
July 2015
Authors: R.rekha, R.vidhyapriya, R.geetha Rajakumari
08676866-1e27-4196-8606-6ef7a5f33a35

R.rekha, R.vidhyapriya, R.geetha Rajakumari . Secure Communication in BAN using Modified Fuzzy Vault Scheme. International Conference on Innovations in Computing Techniques (ICICT 2015). ICICT2015, 1 (July 2015), 37-42.

@article{
author = { R.rekha, R.vidhyapriya, R.geetha Rajakumari },
title = { Secure Communication in BAN using Modified Fuzzy Vault Scheme },
journal = { International Conference on Innovations in Computing Techniques (ICICT 2015) },
issue_date = { July 2015 },
volume = { ICICT2015 },
number = { 1 },
month = { July },
year = { 2015 },
issn = 0975-8887,
pages = { 37-42 },
numpages = 6,
url = { /proceedings/icict2015/number1/21459-1472/ },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Proceeding Article
%1 International Conference on Innovations in Computing Techniques (ICICT 2015)
%A R.rekha
%A R.vidhyapriya
%A R.geetha Rajakumari
%T Secure Communication in BAN using Modified Fuzzy Vault Scheme
%J International Conference on Innovations in Computing Techniques (ICICT 2015)
%@ 0975-8887
%V ICICT2015
%N 1
%P 37-42
%D 2015
%I International Journal of Computer Applications
Abstract

Wireless Body Sensor Network (WBSN) is an emerging technology in the area of telemedicine. It helps doctors to remotely monitor the health condition of patients. The success of usage of WBSNs for health care monitoring relies mainly on the security provided to the private information collected by the sensors. Security depends on key agreement scheme used. This paper aims at developing a fuzzy based key agreement scheme that uses ECG signal to protect the symmetric key to be exchanged. Here the correlation attack is overcome by using two different polynomial of different order due to which the integrity property of system is preserved. The effectiveness of the proposed scheme is to improve the performance of the system by overcoming correlation and collusion attacks. It also aims at minimizing False Acceptance Rate (FAR) and False Rejection Rate (FRR).

References
  1. Venkatasubramanian. K. K, Banerjee. A and Gupta. S. K. S, "PSKA: Usable and Secure Key Agreement Scheme for Body Area Networks", IEEE Transactions on Information Technology in Biomedicine, Vol. 14, No. 1, January 2010.
  2. Sriram Cherukuri, Krishna K Venkatasubramanian , Sandeep K S Gupta , "BioSec: A Biometric Based Approach for Securing Communication in Wireless Networks of Biosensors Implanted in the Human Body" , IEEE International Conference on Parallel Processing, 2003.
  3. Ari Juels and Madhu Sudan. A Fuzzy Vault Scheme. In Proceedings of the IEEE International Symposium on Information Theory (ISIT), page 408, 2002.
  4. T. Charles Clancy, Negar Kiyavash, and Dennis J. Lin. Secure Smartcard-Based Fingerprint Authentication. In Proceedings of the ACM SIGMM Workshop on Biometrics Methods and Applications, pages 45-52, Berkley, California, 2003.
  5. Umut Uludag, Sharath Pankanti, and Anil K. Jain. Fuzzy Vault for Fingerprints. In Proceedings of the Audio- and Video-based Biometric Person Authentication pages 310-319, Hilton Rye Town, USA, 2005.
  6. S. Yang and I. Verbauwhede. Automatic Secure Fingerprint Veri_cation System Based on Fuzzy Vault Scheme. In Proceedings of the IEEE International Conference on Acoustics, Speech, and Signal Processing pages 609-612, Philadelphia, USA, 2005.
  7. Ee-Chien Chang, Ren Shen, and Francis Weijian Teo. Finding the Original Point Set Hidden among Cha_. In Proceedings of the ACM Symposium on Information,Computer and ommunications Security pages 182-188, 2006.
  8. Ee-Chien Chang and Qiming Li. Hiding Secret Points Amidst Chaff. In Proceedings of the 24th Annual International Conference on the Theory and Applications of Cryptographic Techniques, pages 59-72, Petersburg, Russia, 2006.
  9. Preda Mihailescu. The Fuzzy Vault for Fingerprints is Vulnerable to Brute Force Attack. W. L. W. AlTarawneh and W. L Woo. Biometric Key Capsulation Technique Based on Fingerprint Vault: Anatomy and Attack. In Proceedings of the International Conference on Information and Communication Technologies: From Theory to Applications, pages 1-5, Syria, 2008.
  10. Karthik Nandakumar, Abhishek Nagar, and Anil K. Jain. Hardening Fingerprint Fuzzy Vault Using Password. In Proceedings of the International Conference on Biometrics,pages 927-937, Seoul, Korea, 2007.
Index Terms

Computer Science
Information Sciences

Keywords

Physiological Signals Key Agreement Fuzzy Vault Scheme.