CN104135727B - A kind of wireless body area network safe transmission method - Google Patents
A kind of wireless body area network safe transmission method Download PDFInfo
- Publication number
- CN104135727B CN104135727B CN201410148159.8A CN201410148159A CN104135727B CN 104135727 B CN104135727 B CN 104135727B CN 201410148159 A CN201410148159 A CN 201410148159A CN 104135727 B CN104135727 B CN 104135727B
- Authority
- CN
- China
- Prior art keywords
- node
- data
- sink
- data1
- nodes
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Expired - Fee Related
Links
Landscapes
- Mobile Radio Communication Systems (AREA)
- Small-Scale Networks (AREA)
Abstract
The invention discloses a kind of wireless body area network safe transmission method, it was included with the next stage:1st, system initialization:System is exchanged the clock progress frequency between two adjacent nodes and node and Sink node, is formed two kinds of pairwise key using the clock progress frequency and the clock skew of two nodes of node;2nd, Security routing is formed:After all nodes receive " OK " information, each original AODV routing iinformations of knot removal, using improved AODV agreements formation Security routing and encrypted transmission data;3rd, Data Encryption Transmission:Packet is divided into routing iinformation Data1 and perception data Data2 two parts, encrypted respectively with two kinds of different pairwise key, two adjacent nodes verify mutually Data1, Sink node checking Data2, are then transmitted.This programme supports " plug and play " and ensure that BAN data safeties and privacy, it is adaptable to all BAN networks.
Description
Technical field
The present invention relates to wireless network encrypted transmission field, more particularly, to it is a kind of without prepackage key in advance without wire body
Domain network security transmission method.
Background technology
Wireless body area network BAN (Body Area Network), is that one kind is worn on monitoring human body life with custodial person
The data of perception are sent to BAN Sink by the network of reason and medical data, its sensing node by way of a jump or multi-hop
Data further can be transmitted PC or PDA by node, the node, to custodial person(Old man, infant, sportsman, disabled person with
And chronic disease patient)There is provided physiological data to monitor in real time, be also widely used for consumer electronics, amusement, motion, ambient intelligence, poultry
Herd, the field such as military or safety.Although BAN is WSN(Wireless sensor network, Wireless Sensor Network)Point
Branch, has many similitudes with WSN;But BAN is in the side such as deployment way, node type and scale, discharge pattern, delay, mobility
Face often assumes to run under conditions of unattended different from general WSN, particularly WSN again, and BAN is to operate in someone's value
In the environment kept(Custodial person, medical worker or household).
Due to the related physiology of the custodial person that sensing node is perceived in BAN and medical data is to medical diagnosis and treats
Considerable effect, and also relates to custodial person's privacy problem, thus data safety and privacy are BAN networks
A key issue, while the safety measure of clinical practice wishes the simple operations of " plug and play " again.Information is encrypted and section
Point certification is the major measure for ensureing secure communication of network, and key Key management is to ensure information privacy, integrality and prevention again
The key of illegal node invasion.In general sensing network, it is ensured that data safety mainly has prepackage symmetric key and asymmetric public affairs
Two kinds of key technology, but this is not all suitable for BAN networks.
Pre-install symmetric key technique:Because BAN node scales are smaller(General N is less than 50), it is individual close that each node pre-installs N-1
Key, it is possible to ensure Data Encryption Transmission between any two contact, this surface sees feasible, but there is problems with:
(1)Each BAN must pre-install the N-1 key different from other BAN, otherwise as two patients for dressing BAN
Being likely to form pairwise key when close, between two BAN node causes the transmission of mistake;
(2)Due to BAN node foreign peoples, different manufacturers, terminal user are may be from(Medical worker or patient)Give
N-1 key of each node distribution in BAN is highly difficult, and they are more desirable to " plug and play " in clinic(Plug-And-
Play)Simple operations, i.e. any type of Key distributions and management process should all be minimized, automated and be saturating to user in BSN
It is bright;
(3)N-1 key has been pre-installed even across effort, but when finding Key Exposure after BAN work, has been changed in clinic
N-1 key of prepackage is also highly difficult.
Asymmetric public key technology:The technology mainly has problems with:
(1)Energy and computing cost are not suitable for resource-constrained sensing node;
(2)Dependence and Operating Complexity to environment limit the application in clinic.
At present, symmetric key encryption data are mainly produced using Human Physiology information and wireless channel attribute in BAN,
In the case of not prior shared key, " plug and play " effect is obtained, but both have weak point:
1st, Human Physiology information is utilized
Because BSN networks are the physiologic informations for monitoring people, and physiologic information is difficult to imitate.Many research and utilizations
Electroencephalogram(EEG), photoplethysmogra(PPG), the physiologic information such as electrocardiogram (ECG), set up hidden passageway to node and letter
Breath is authenticated.However, this needs all nodes to possess perception identical signal(EEG or ECG etc.)Ability, it is hard to node
Part proposes new requirement;In addition, the sensing node of diverse location measures identical physiological signal with custodial person, it is difficult to
Possesses identical accuracy, that is to say, that the accuracy of key recovery is it cannot be guaranteed that 100%.
2nd, the physical attribute of node and wireless channel is utilized
Symmetric key is produced using the physical attribute of the channel characteristics and node itself of BAN/BSN networks it is one and compares
New direction, the physical attribute for being easier to obtain mainly has signal intensity (Signal Strength), solves and utilizes human body
Key recovery accuracy that physiologic information is brought is it cannot be guaranteed that the problem of 100%.However, because most of wireless sensing nodes are adopted
With half-duplex operation, RSS measurement can not simultaneously be carried out in both direction, and the generation of two key between nodes will be undergone to wireless communication
Number sampled, quantified, being coordinated(Reconcile), privacy amplification (Privacy Amplification) four-stage, this band
The low efficiency problem of cipher key-extraction is carried out.
State Intellectual Property Office of the People's Republic of China disclosed application publication number on 08 01st, 2012
CN102624530A patent document, title be wireless body area network without the long-range anonymous authentication method of certificate, it passes through public key/private
The method that key coordinates realizes the encryption of data, the problem of there is low accuracy and low extraction efficiency.
The content of the invention
The present invention mainly solves that present in prior art plug and play characteristic and accuracy, extraction efficiency can not be taken into account
Technical problem there is provided a kind of without pre-install key in advance, in the case where additional firmware need not be increased, with sensing node with
The pairwise key encryption data of Sink node and the pairwise key of two adjacent nodes encrypt the thought and method of routing iinformation, support
" plug and play " so that ensure that this complicated theory of BAN data safeties and privacy becomes with operability with technical problem
With the wireless body area network safe transmission method of practicality.
The present invention is mainly what is be addressed by following technical proposals for above-mentioned technical problem:A kind of wireless body area network
Network safe transmission method, including with the next stage:
(1)System initialization:System utilizes the dynamic of the clock progress frequency of node and the clock skew of two nodes
With uniqueness, in the case where the Sink node standard time controls, the clock exchanged between two adjacent nodes and node and Sink node enters
Spread spectrum rate, forms two kinds of pairwise key;
(2)Security routing is formed:After all nodes receive " OK " information, each original AODV of knot removal(Ad hoc
on-demand distance vector routing)Routing iinformation, forms Security routing using improved AODV agreements and adds
Close transmission data;
(3)Data Encryption Transmission:Packet is divided into routing iinformation Data1 and perception data Data2 two parts, used respectively
Two kinds of different pairwise key encryptions, two adjacent nodes verify mutually Data1, Sink node checking Data2, are then passed
It is defeated.
If preferably,CF x (t) represent nodexIn actual timetTime, clock progress frequencyCF x ′(t) definition
For:
CF x ′(t)=dCF x (t)/dt (t>=0) (1)
The time of Sink node is equal to 1 as actual time, the clock progress frequency of actual time;
The clock skew of node 1 and node 2CS 12 (t) be defined asCF 1 ′(t) andCF 2 ′(t) difference:
CS 12 (t)= CF 1 ′(t)- CF 2 ′(t) (2)
NodexID be designated asID x ;
System initialization concrete operations are:
(1)Sink node is in single-hop mode into wireless body area network during the standard of all two random intervals of node broadcasts
Between stabT 1 WithT 2 ;
(2)NodexReceiveT 1 WithT 2 Afterwards, formula is used(1)Calculate oneself clock progress frequency be:
CF x ′(T 2 -T 1 )=(CF x (T 2 )- CF x (T 1 ))/( T 2 -T 1 )
NodexPreserveCF x ′(T 2 -T 1 ), and willCF x ′(T 2 -T 1 )+ID x Sink sections are sent to by original AODV agreements
Point, when wireless body area network works, nodexWithK x Data to perception are encrypted,K x It is defined as follows:
K x =F(CF x ′(T 2 -T 1 ),ID x ) (3)
Here F is key-function, and the key of designated length is produced as needed, but key must is fulfilled for some mathematics
Feature.If for example,ID x Length is 1 byte,CF x ′(T 2 -T 1 ) it is 4 bytes, producing the key of 64 needs basisID x WithCF x ′
(T 2 -T 1 ) value difference, insertion 3 bytes meet mathematical feature;Key such as can be generated with Hash functions;
(3)NodexWillCF x ′(T 2 -T 1 )+ID x When being sent to Sink node,xOne jump in the range of neighbor node also can
Receive the information and be stored in oneself storage;Equally,xThe clock progress frequency of other nodes can be also received as neighbor node
And id information, so, two nodes complete clock progress frequency and exchanged in BAN;
(4)In nodexOnto the path of Sink node, two adjacent nodesm、nThere is the clock progress frequency of other side, at that time
Clock offsets the key produced with the ID of two nodesK mn OrK nm It is unique, for encrypting routing iinformation, two nodes are mutually recognized each other
Card,K mn OrK nm It is identical, it is defined as follows:
K mn =K nm =F(CS mn (T 2 -T 1 ),ID m ,ID n ) (4)
CS mn (T 2 -T 1 ) =ABS(CF m ′(T 2 -T 1 )- CF n ′(T 2 -T 1 ))
Here F is key-function, with formula(3)Identical, ABS is to take absolute value;
(5)Sink node is received after the clock progress frequency and id information of all nodes, Sink node and each nodex
Form a pairwise keyK x , for encryption data in itself, two adjacent nodesm、nForm pairwise keyK mn OrK nm , it is used for
Encrypt routing iinformation;After Sink node broadcasts " OK " information in single-hop mode, BAN enters Security routing formation and data encryption
The transmission stage.
Preferably, after all nodes receive " OK " information, each original AODV routing iinformations of knot removal, using changing
The AODV agreements formation Security routing and encrypted transmission data entered;Improved AODV protocol messages are increased on original message basis
Plus a clock progress frequency field CF;Work as nodexWhen wishing to Sink node transmission data, first have to send RREQ(Route
Request)Then message formation transmit data, data source nodes to the Security routing of Sink node further according to the routexAsk shape
It is as follows into the Security routing operation to Sink node:
(1)NodexA RREQ message is produced, each field information in the inside, increased CF words are equally filled with original AODV
Section nodex'sCF x ′(T 2 -T 1 ) filling, it is then broadcast to neighbor node;
(2)Work as nodexNeighbor nodemWhen receiving RREQ message, point three kinds of situation operations are as follows:
If A. the CF fields in RREQ message are sky, illustrate that RREQ, from a distrust node, stops forwarding this and disappeared
Breath;
If the CF fields B. in RREQ message are present and nodemIn preserve nodexCF valuesCF x ′(T 2 -T 1 ), section
PointmWhether equal compare both values, if equal, nodemWith the CF values of oneselfCF m ′(T 2 -T 1 ) replace in RREQ message and save
PointxCF values, continue forward the RREQ;Otherwise, stop forwarding;
If the CF fields C. in RREQ message are present and nodemIn without preserve nodexCF values, nodemJust to
Sink node requesting nodexCF values, if Sink node has nodexCF values, just willCF x ′(T 2 -T 1 ) useK m After encryption with
Single-hop mode is sent to nodem, nodemThe message is received to be used in combinationK m After correct decryption, preserveCF x ′(T 2 -T 1 ) in internal memory, after
Continuous operation is identical with B;
(3)Work as nodemNeighbor node receive after RREQ message, same to step(2)Similar mode forwards RREQ message;
(4)When Sink node receives RREQ message, a RREP is produced(Being routed back to should)Message, with the CF of Sink node
Value filling RREP CF fields, then unicast is returned to the neighbor node of Sink node;
(5)After the neighbor node of Sink node receives RREP message, same to step(2)It is similar to pass RREP message back;
(6)Work as data source nodesxWhen receiving RREP message, the Security routing that only legitimate node is participated in is formed.
Preferably, N1, N2 and N3 are node, it is assumed that N1 to Sink Security routing is N1->N2->N3->Sink,
Source node N1 produces the packet by marking Tag, Data1 and Data2 to constitute;Tag is type of message, and Data1 includes source ID, mesh
ID and data generation time information are marked, Data2 is the data of N1 actual perceiveds;In encrypted data transmission, node N1, N2, N3
Operated with Sink as follows:
(1)N1:The pairwise key that Data2 is known with only N1 and Sink nodeK 1Encryption is obtainedE(Data2,K 1),
The Data1 pairwise key that only node N1 and N2 knowK 12It is encrypted asE(Data1,K 12), then packet unicast is transmitted
To N2;
(2)N2:First useK 12Data1 is decrypted, i.e.,D(E(Data1,K 12), K 12) Data1 is obtained, obtain after routing iinformation
Again with the pairwise key that only node N2 and N3 knowK 23It is encrypted asE(Data1,K 23), then transfer a packet to N3;E is
Cryptographic operation, D is decryption oprerations;
(3)N3:First useK 23Data1 is decrypted, i.e.,D(E(Data1,K 23), K 23) Data1 is obtained, obtain after routing iinformation
Again with the pairwise key that only node N3 and Sink node are knownK 30It is encrypted asE(Data1,K 30), then transfer a packet to
Sink node;
(4)Sink:First useK 30Data1 is decrypted, i.e.,D(E(Data1,K 30), K 30) Data1 is obtained, obtain source node letter
After breath, useK 1Data2 is decrypted, i.e.,D(E(Data2,K 1), K 1) obtain True Data Data2.
Encryption and decryption can use conventional algorithm to handle, such as aes algorithm.
The substantial effect that the present invention is brought is on the premise of security is ensured, to meet the characteristic of plug and play, no
Need to set key by complicated process, possess good key recovery accuracy, it is also low in the absence of cipher key-extraction efficiency
The problem of.
Brief description of the drawings
Fig. 1 is a kind of general BAN structural representations of the present invention;
Fig. 2 is the AODV protocol message structure schematic diagrames of a modification of the present invention;
Fig. 3 is a kind of encryption and the transmitting procedure schematic diagram of the present invention.
Embodiment
Below by embodiment, and with reference to accompanying drawing, technical scheme is described in further detail.
Embodiment:A kind of wireless body area network BAN (Body Arear without pre-installing key in advance of the present embodiment
Networks) safe transmission method, is divided into three phases:
(1)System initialization:System initialization need to be carried out in a secure environment, utilize the clock progress frequency of node(It is micro-
Second level), the clock skew Clock Skew of two nodes dynamic and uniqueness, in the case where the Sink standard time controls, exchange two
Clock progress frequency between adjacent node and node and Sink, forms two kinds of pairwise key (Pairwise Key);
(2)Security routing is formed:By the improvement to famous reactive protocols AODV, formed and only have legitimate node to participate in
Security routing;
(3)Packet is divided into routing iinformation Data1 and perception data Data2 two parts, respectively with two kinds it is different into
Key is encrypted, two adjacent nodes verify mutually Data1, Sink node checking Data2, so both improved encryption, decrypted
Efficiency, in turn ensure that data safety and privacy.
First, system model
1 network model
The general BAN structures of the present invention are as shown in figure 1, square nodes are Sink node in figure(ID=0), it is assumed that:
(1)HaveNIndividual sensing node { S1,S2,……,SNBe deployed in custodial person(In general in BANN<50),
Each node has unique ID (being more than 0), and node is orthogonal(Each node can be independently determined the data of perception), equipped with identical
Wireless communication interface, such as ZigBee;
(2)There is 1 Sink node, its ID=0 collects the data that all sensing nodes are perceived, itself is safe, and
And know that node ID and each node in current operation BAN produce the frequency interval of data;
(3)The Sink node power enough due to having can be passed with the mode of a jump mode or multi-hop to all sensing nodes
Data are sent, sensing node uses the short-distance transmission of very low-power(It is beneficial to human body), passed in a multi-hop fashion to Sink node
The data of perception are sent, host-host protocol uses AODV;
(4)BAN networks have taken certain Time Synchronization Mechanism, but are different at PPM grades, and it is synchronously safety in itself
's;
(5)When BAN is initialized or addition new node resets, around without malicious node(Grasped by medical worker or guardian
Make, can ensure under environment indoors), in general WSN, often also so assumed;
2 challenge models
Present invention primarily contemplates the confidentiality and integrity of data, challenge model is assumed to:
(1)In range for wireless communication, attacker can arbitrarily eavesdrop the data that each node is sent in BAN, change or prolong
Lag to resume to BAN relayings with various power and broadcast;
(2)Attacker can palm off other legitimate nodes, to BAN Web Publishing data falsifications;
(3)Attacker can carry out node capture attack.
2nd, agreement is described
1 clock progress frequency and clock skew
IfCF x (t) represent nodexIn actual timetTime, clock progress frequency(Referred to as CF)CF x ′(t) definition
For:
CF x ′(t)=dCF x (t)/dt (t>=0) (1)
The time of Sink node is equal to 1 as actual time, the clock progress frequency of actual time;
The clock skew of node 1 and node 2CS 12 (t) be defined asCF 1 ′(t) andCF 2 ′(t) difference:
CS 12 (t)= CF 1 ′(t)- CF 2 ′(t) (2)
Node x ID is designated asID x ;
Generally, modern processors digital dock has following two attribute:
1st, the clock skew of any clock is stable at a normal temperature;
2nd, each stable clock skew may be considered uniquely.
2 system initializations
In a secure environment, when BAN is powered up or reset(System initialization)When, each node is removed and preserved in memory
Original clock progress frequency and routing iinformation, data are transmitted using unmodified AODV, operated as follows:
(1)Sink node is in single-hop mode into wireless body area network during the standard of all two random intervals of node broadcasts
Between stabT 1 WithT 2 ;
(2)NodexReceiveT 1 WithT 2 Afterwards, formula is used(1)Calculate oneself clock progress frequency be:
CF x ′(T 2 -T 1 )=(CF x (T 2 )- CF x (T 1 ))/( T 2 -T 1 )
NodexPreserveCF x ′(T 2 -T 1 ), and willCF x ′(T 2 -T 1 )+ID x Sink sections are sent to by original AODV agreements
Point, when wireless body area network works, nodexWithK x Data to perception are encrypted,K x It is defined as follows:
K x =F(CF x ′(T 2 -T 1 ),ID x ) (3)
Here F is key-function, and the key of designated length is produced as needed;
(3)NodexWillCF x ′(T 2 -T 1 )+ID x When being sent to Sink node,xOne jump in the range of neighbor node also can
Receive the information and be stored in oneself storage;Equally,xThe clock progress frequency of other nodes can be also received as neighbor node
And id information, so, two nodes complete clock progress frequency and exchanged in BAN;
(4)In nodexOnto the path of Sink node, two adjacent nodesm、nThere is the clock progress frequency of other side, at that time
Clock offsets the key produced with the ID of two nodesK mn OrK nm It is unique, for encrypting routing iinformation, two nodes are mutually recognized each other
Card,K mn OrK nm It is identical, it is defined as follows:
K mn =K nm =F(CS mn (T 2 -T 1 ),ID m ,ID n ) (4)
CS mn (T 2 -T 1 ) =ABS(CF m ′(T 2 -T 1 )- CF n ′(T 2 -T 1 ))
Here F is key-function, with formula(3)Identical, ABS is to take absolute value;
(5)Sink node is received after the clock progress frequency and id information of all nodes, Sink node and each nodex
Form a pairwise keyK x , for encryption data in itself, two adjacent nodesm、nForm pairwise keyK mn OrK nm , it is used for
Encrypt routing iinformation;After Sink node broadcasts " OK " information in single-hop mode, BAN enters Security routing formation and data encryption
The transmission stage.
3 Security routings are formed
After all nodes receive " OK " information, each original AODV routing iinformations of knot removal, using improved AODV
Agreement formation Security routing and encrypted transmission data.Improved AODV protocol messages are when increasing by one on original message basis
Clock progress frequency field CF, as shown in Figure 2;Form the method CF verification process similar to original AODV but many of route.Work as section
PointxWish to Sink node send data when, first have to send RREQ ask to form Sink Security routing, then further according to
The route transmits data, data source nodesxRequest formation to Sink Security routing operation is as follows:
(1)NodexA RREQ message is produced, each field information in the inside, increased CF words are equally filled with original AODV
Section nodex'sCF x ′(T 2 -T 1 ) filling, it is then broadcast to neighbor node;
(2)Work as nodexNeighbor nodemWhen receiving RREQ message, point three kinds of situation operations are as follows:
If A. the CF fields in RREQ message are sky, illustrate that RREQ, from a distrust node, stops forwarding this and disappeared
Breath;
If the CF fields B. in RREQ message are present and nodemIn preserve nodexCF valuesCF x ′(T 2 -T 1 ), section
PointmWhether equal compare both values, if equal, nodemWith the CF values of oneselfCF m ′(T 2 -T 1 ) replace in RREQ message and save
PointxCF values, continue forward the RREQ;Otherwise, stop forwarding(Illustrate that RREQ may be from a personation node);
If the CF fields C. in RREQ message are present and nodemIn without preserve nodexCF values, this be probably by
The result that network topology structure changes is caused in human motion or different gestures.NodemJust to Sink node requesting nodex
CF values, if Sink node has nodexCF values, just willCF x ′(T 2 -T 1 ) useK m Section is sent in single-hop mode after encryption
Pointm, nodemThe message is received to be used in combinationK m After correct decryption, preserveCF x ′(T 2 -T 1 ) in internal memory, subsequent operation is identical with B;
(3)Work as nodemNeighbor node receive after RREQ message, same to step(2)Similar mode forwards RREQ message;
(4)When Sink node receives RREQ message, a RREP message is produced, with the CF values of Sink node(Equal to 1)
RREP CF fields are filled, then unicast is returned to the neighbor node of Sink node;
(5)After the neighbor node of Sink node receives RREP message, same to step(2)It is similar to pass RREP message back;
(6)Work as data source nodesxWhen receiving RREP message, the Security routing that only legitimate node is participated in is formed.
4 encrypted data transmissions
After Security routing is formed, data source nodes just can transmit data to Sink, and it is encrypted with transmitting procedure such as
Shown in Fig. 3.
In figure 3, N1, N2 and N3 are node, it is assumed that N1 to Sink Security routing is N1->N2->N3->Sink, source
Node N1 produces the packet by marking Tag, Data1 and Data2 to constitute;Tag is type of message, and Data1 includes source ID, target
ID and data generation time information, Data2 are the data of N1 actual perceiveds;In encrypted data transmission, node N1, N2, N3 and
Sink operations are as follows:
(1)N1:The pairwise key that Data2 is known with only N1 and Sink nodeK 1Encryption is obtainedE(Data2,K 1),
The Data1 pairwise key that only node N1 and N2 knowK 12It is encrypted asE(Data1,K 12), then packet unicast is transmitted
To N2;
(2)N2:First useK 12Data1 is decrypted, i.e.,D(E(Data1,K 12), K 12) Data1 is obtained, obtain after routing iinformation again
With the pairwise key that only node N2 and N3 knowK 23It is encrypted asE(Data1,K 23), then transfer a packet to N3;E is to add
Close operation, D is decryption oprerations;
(3)N3:First useK 23Data1 is decrypted, i.e.,D(E(Data1,K 23), K 23) Data1 is obtained, obtain after routing iinformation
Again with the pairwise key that only node N3 and Sink node are knownK 30Data1 is encrypted, i.e.,E(Data1,K 30), then by packet
Send Sink node to;
(4)Sink:First useK 30Data1 is decrypted, i.e.,D(E(Data1,K 30), K 30) Data1 is obtained, obtain source node letter
After breath, useK 1Data2 is decrypted, i.e.,D(E(Data2,K 1), K 1) obtain True Data Data2.
5 safety analysis
Add and " insert i.e. from key dynamic with accuracy, passively with active attack, node capture, new node below
With " in terms of analyze we invent security:
(1)Key dynamic and accuracy:Two kinds of keys that initialization is produced every time are dynamic, and this is due to Sink sections
The standard time interval of point broadcast is random, and CF changes with environment temperature again, cipher key calculation formula(3)、(4)And and node
ID(Uniquely)Binding, thus, two kinds of keys are unique again;
The present invention will not be brought produces the accuracy problem that symmetric key recovers using physiologic information, also not from wireless communication
The physical attribute in road extracts the low efficiency problem of key;Because CF is calculated by node oneself, it is not necessary to which a node goes to survey
The CF of another node is measured, two adjacent nodes complete the exchange of CF values in a secure environment, do not have cipher key-extraction process.
(2)Passive attack:The data that each node is sent in BAN can be eavesdropped with infinite approach BAN by eavesdropping node;Due to section
Point data bag is divided into two parts, is encrypted respectively with two kinds of different pairwise key, the legitimate node on Security routing is only known
Which node is data come from, and does not also know the content of track data;Even if earwig is aware of key-functionF, do not know steathily yet
The information listened is sent by which node, does not also know which neighbor node is received, earwig's analysis keyK mn It is highly difficult, andK x And withxID be closely related, thus hardly result in real Data2.
(3)Active attack
Three kinds of main manifestation modes to active attack are analyzed:
Reset:For attacker, outdated data is only reset just meaningful.It is assumed that attacker pretends to be nodexBroadcasted
When data(Make no modifications, simply delay forwarding), onlyxNeighbor nodeiCan correctly it decryptE(Data1,K xi ), obtain
Send routing information, be transmitted toiNeighbor node, other nodes are due to can not correctly decryptE(Data1,K xi ) and stop forwarding;But
BAN the whole network time synchronizeds,xNode can judge whether the packet is out-of-date with a time thresholding, even in the thresholding time
Interior, data have passed to Sink node, Sink node the data can also be compared with the last data of the node and abandon it is out-of-date
Data are simultaneously alarmed;
Personation:Personation is exactly that attacker palms off legitimate node ID to Sink node transmission data falsification.It is assumed that personation node
Power is sufficiently large, and the legitimate node in all BAN/BSN can receive the message that personation node is sent.If it is one to palm off node
Individual new node, Security routing will be initially formed before sending data, need to be authenticated node due to forming Security routing, Suo Youhe
In method node(Containing Sink)The CF information of node is not palmed off, it is impossible to set up routing iinformation, thus spurious information can not be sent
To Sink node;If palming off a legitimate nodexSend data falsification, attacker must be toxNeighbor nodeiThere is providedx's
CF information;Attacker can not form route due to no item data, thus can not transmit personation legitimate node to Sink
Data.
Distort:Distorting is reset again after changing data, that is, attacker have modified Data2(Data1 is unmodified), will close
Method nodexPacket retransmit once;WithxAdjacent legitimate node all receives the spurious information, but AODV rows into route
It is unicast transmission, does not existxNode on to Sink routes will not show interest in the spurious information, in routing tablexNeighbor nodei
(First hop node)With with legitimate nodexBetween keyK xi DecryptionE(Data1,K xi )(Intermediate node does not verify Data2), do not send out
Existing mistake, data can be sent to Sink node, but Sink node can not be usedK x DecryptionE(Data2,K x ), thus abandon the data simultaneously
Alarm.
(4)Node is captured
It is assumed that node is captured (losing or other approach), after legitimate node leaves custodial person for a period of time, become to dislike
Meaning node is returned in original BAN;This period, attacker can obtain the CF of CF and its neighbor node in legitimate node, can
To pass through key-functionTwo kinds of pairwise key are calculated, that is, BAN does not have any secret to say that challenge model is also examined
Consider such case.Because BAN belongs to Attended mode network, node foreign peoples and irredundant node, when there is node loss, first
Sink is in the range of certain time(Node produces the interval of data)Certain node failure or loss can be perceived and alarmed;Secondly,
Even if it was found that node capture attack(Patient, medical worker are easier to find node loss or are replaced), remove malice contact
Afterwards, it need to only be powered back up resetting in a secure environment, Sink broadcasts newT 1 WithT 2 , when malicious node is again introduced into BAN, because
The CF information that last time produces has not been used, and can not equally carry out passive and active attack.
(5)New node is added and " plug and play "
When needing to add new sensing node in original BAN, only need in a secure environment, new node to be installed to being supervised
After with shield person, a power-on reset is performed just;Say to be exactly to re-start system initialization from inside(Key is produced), safety
Route is formed, three processes of encrypted data transmission;Inherently one push-botton operation of power-on reset is said from outside, to medical matters people
Member, domestic monitoring people etc. are exercisable, it is not necessary to special professional knowledge, thus meet " plug and play ".
Specific embodiment described herein is only to spirit explanation for example of the invention.Technology neck belonging to of the invention
The technical staff in domain can be made various modifications or supplement to described specific embodiment or be replaced using similar mode
Generation, but without departing from the spiritual of the present invention or surmount scope defined in appended claims.
Although more having used the terms such as node, progress frequency, skew herein, it is not precluded from using other terms
Possibility.It is used for the purpose of more easily describing and explaining the essence of the present invention using these terms;It is construed as any
A kind of additional limitation is all disagreed with spirit of the present invention.
Claims (2)
1. a kind of wireless body area network safe transmission method, it is characterised in that including with the next stage:
(1)System initialization:System using node clock progress frequency and two nodes clock skew dynamic with only
One property, in the case where the Sink node standard time controls, the clock exchanged between two adjacent nodes and node and Sink node enters spread spectrum
Rate, forms two kinds of pairwise key;
(2)Security routing is formed:After all nodes receive " OK " information, each original AODV routing iinformations of knot removal are adopted
With improved AODV agreements formation Security routing and encrypted transmission data;
(3)Data Encryption Transmission:Packet is divided into routing iinformation Data1 and perception data Data2 two parts, respectively with two kinds
Different pairwise key encryptions, two adjacent nodes verify mutually Data1, Sink node checking Data2, are then transmitted;
IfCF x (t) represent nodexIn actual timetTime, clock progress frequencyCF x ′(t) be defined as:
CF x ′(t)=dCF x (t)/dt (t>=0) (1)
The time of Sink node is equal to 1 as actual time, the clock progress frequency of actual time;
The clock skew of node 1 and node 2CS 12 (t) be defined asCF 1 ′(t) andCF 2 ′(t) difference:
CS 12 (t)= CF 1 ′(t)- CF 2 ′(t) (2)
Node x ID is designated asID x ;
System initialization concrete operations are:
(First 1)Sink node is with the standard time of single-hop mode all two random intervals of node broadcasts into wireless body area network
StampT 1 WithT 2 ;
(First 2)NodexReceiveT 1 WithT 2 Afterwards, formula is used(1)Calculate oneself clock progress frequency be:
CF x ′(T 2 -T 1 )=(CF x (T 2 )- CF x (T 1 ))/( T 2 -T 1 )
NodexPreserveCF x ′(T 2 -T 1 ), and willCF x ′(T 2 -T 1 )+ID x Sink node is sent to by original AODV agreements, when
When wireless body area network works, nodexWithK x Data to perception are encrypted,K x It is defined as follows:
K x =F(CF x ′(T 2 -T 1 ),ID x ) (3)
Here F is key-function, and the key of designated length is produced as needed;
(First 3)NodexWillCF x ′(T 2 -T 1 )+ID x When being sent to Sink node,xOne jump in the range of neighbor node can also receive
The information is simultaneously stored in oneself storage;Equally,xThe clock progress frequency and ID of other nodes can be also received as neighbor node
Information, so, two nodes complete clock progress frequency and exchanged in BAN;
(First 4)In nodexOnto the path of Sink node, two adjacent nodesm、nThere are the clock progress frequency of other side, its clock
The key that the ID of skew and two nodes is producedK mn OrK nm It is unique, for encrypting routing iinformation, two nodes are mutually recognized each other
Card,K mn OrK nm It is identical, it is defined as follows:
K mn =K nm =F(CS mn (T 2 -T 1 ),ID m ,ID n ) (4)
CS mn (T 2 -T 1 ) =ABS(CF m ′(T 2 -T 1 )- CF n ′(T 2 -T 1 ))
Here F is key-function, with formula(3)Identical, ABS is to take absolute value;
(First 5)Sink node is received after the clock progress frequency and id information of all nodes, Sink node and each nodexShape
Into a pairwise keyK x , for encryption data in itself, two adjacent nodesm、nForm pairwise keyK mn OrK nm , for adding
Close routing iinformation;After Sink node broadcasts " OK " information in single-hop mode, BAN enters Security routing formation and data encryption is passed
The defeated stage;
After all nodes receive " OK " information, each original AODV routing iinformations of knot removal, using improved AODV agreements
Form Security routing and encrypted transmission data;Improved AODV protocol messages are to increase a clock on original message basis to enter
Spread spectrum rate field CF;Work as nodexWhen wishing to Sink node transmission data, first have to transmission RREQ and ask to form Sink node
Security routing, then further according to the route transmit data, data source nodesxThe Security routing that request is formed to Sink node is grasped
Make as follows:
(Second 1)NodexA RREQ message is produced, each field information in the inside, increased CF fields are equally filled with original AODV
Use nodex'sCF x ′(T 2 -T 1 ) filling, it is then broadcast to neighbor node;
(Second 2)Work as nodexNeighbor nodemWhen receiving RREQ message, point three kinds of situation operations are as follows:
If A. the CF fields in RREQ message are sky, illustrate that RREQ, from a distrust node, stops forwarding the message;
If the CF fields B. in RREQ message are present and nodemIn preserve nodexCF valuesCF x ′(T 2 -T 1 ), nodemThan
It is whether equal compared with both values, if equal, nodemWith the CF values of oneselfCF m ′(T 2 -T 1 ) replace RREQ message interior jointsx's
CF values, continue to forward the RREQ;Otherwise, stop forwarding;
If the CF fields C. in RREQ message are present and nodemIn without preserve nodexCF values, nodemJust saved to Sink
Point requesting nodexCF values, if Sink node has nodexCF values, just willCF x ′(T 2 -T 1 ) useK m With single-hop side after encryption
Formula is sent to nodem, nodemThe message is received to be used in combinationK m After correct decryption, preserveCF x ′(T 2 -T 1 ) in internal memory, subsequent operation
It is identical with B;
(Second 3)Work as nodemNeighbor node receive after RREQ message, same to step(Second 2)Similar mode forwards RREQ message;
(Second 4)When Sink node receives RREQ message, a RREP message is produced, fills RREP's with the CF values of Sink node
CF fields, then unicast is returned to the neighbor node of Sink node;
(Second 5)After the neighbor node of Sink node receives RREP message, same to step(Second 2)It is similar to pass RREP message back;
(Second 6)Work as data source nodesxWhen receiving RREP message, the Security routing that only legitimate node is participated in is formed.
2. a kind of wireless body area network safe transmission method according to claim 1, it is characterised in that N1, N2 and N3 are
For node, it is assumed that N1 to Sink Security routing is N1->N2->N3->Sink, source node N1 produce by mark Tag, Data1 and
The packet of Data2 compositions;Tag is type of message, and Data1 includes source ID, Target id and data generation time information, Data2
For the data of N1 actual perceiveds;In encrypted data transmission, node N1, N2, N3 and Sink operation are as follows:
(The third 1)N1:The pairwise key that Data2 is known with only N1 and Sink nodeK 1Encryption is obtainedE(Data2,K 1), Data1
With the pairwise key that only node N1 and N2 knowK 12It is encrypted asE(Data1,K 12), then send packet unicast to N2;
(The third 2)N2:First useK 12Data1 is decrypted, i.e.,D(E(Data1,K 12), K 12) Data1 is obtained, obtain after routing iinformation again
With the pairwise key that only node N2 and N3 knowK 23It is encrypted asE(Data1,K 23), then transfer a packet to N3;E is to add
Close operation, D is decryption oprerations;
(The third 3)N3:First useK 23Data1 is decrypted, i.e.,D(E(Data1,K 23), K 23) Data1 is obtained, obtain after routing iinformation again
With the pairwise key that only node N3 and Sink node are knownK 30It is encrypted asE(Data1,K 30), then transfer a packet to
Sink node;
(The third 4)Sink:First useK 30Data1 is decrypted, i.e.,D(E(Data1,K 30), K 30) Data1 is obtained, obtain source node identification
Afterwards, useK 1Data2 is decrypted, i.e.,D(E(Data2,K 1), K 1) obtain True Data Data2.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201410148159.8A CN104135727B (en) | 2014-04-15 | 2014-04-15 | A kind of wireless body area network safe transmission method |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201410148159.8A CN104135727B (en) | 2014-04-15 | 2014-04-15 | A kind of wireless body area network safe transmission method |
Publications (2)
Publication Number | Publication Date |
---|---|
CN104135727A CN104135727A (en) | 2014-11-05 |
CN104135727B true CN104135727B (en) | 2017-09-08 |
Family
ID=51808234
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201410148159.8A Expired - Fee Related CN104135727B (en) | 2014-04-15 | 2014-04-15 | A kind of wireless body area network safe transmission method |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN104135727B (en) |
Families Citing this family (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN104507085A (en) * | 2015-01-13 | 2015-04-08 | 重庆邮电大学 | Wireless body area network data encryption method |
CN108809639B (en) * | 2018-05-25 | 2021-02-09 | 中国计量大学 | WSN dynamic key generation method in severe environment |
CN108900529B (en) * | 2018-07-25 | 2020-09-15 | 中国计量大学 | WBAN in-vivo node reprogramming safety processing method |
CN110191469B (en) * | 2019-06-19 | 2020-05-12 | 西南交通大学 | Certificate-based wireless body area network group authentication and key agreement method |
CN110752977B (en) * | 2019-10-11 | 2021-07-27 | 中国海洋大学 | Abnormal intrusion detection method and device for CAN bus of Internet of vehicles |
CN112512007B (en) * | 2020-12-29 | 2022-07-22 | 河南科技大学 | Energy-saving routing method based on temperature state perception in wireless body area network |
Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1996833A (en) * | 2006-12-04 | 2007-07-11 | 中国科学院计算技术研究所 | Allocation and management method of the secrete key in the sensor network |
CN101218780A (en) * | 2005-06-13 | 2008-07-09 | 西门子公司 | Method and system for the secure transmission of data in an AD HOC network |
CN101253747A (en) * | 2005-08-29 | 2008-08-27 | 西门子公司 | Method and arrangement for the secure transmission of data in a multi-hop communication system |
CN101820619A (en) * | 2010-01-15 | 2010-09-01 | 北京工业大学 | Efficient and energy-saving link safety method in wireless sensor network |
CN102655643A (en) * | 2011-03-04 | 2012-09-05 | 希姆通信息技术(上海)有限公司 | Wireless data encryption method and wireless data decryption method |
JP5163732B2 (en) * | 2010-12-07 | 2013-03-13 | 富士通株式会社 | Communication terminal |
CN103596174A (en) * | 2013-11-04 | 2014-02-19 | 中国计量学院 | PairwiseKey generating method |
-
2014
- 2014-04-15 CN CN201410148159.8A patent/CN104135727B/en not_active Expired - Fee Related
Patent Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101218780A (en) * | 2005-06-13 | 2008-07-09 | 西门子公司 | Method and system for the secure transmission of data in an AD HOC network |
CN101253747A (en) * | 2005-08-29 | 2008-08-27 | 西门子公司 | Method and arrangement for the secure transmission of data in a multi-hop communication system |
CN1996833A (en) * | 2006-12-04 | 2007-07-11 | 中国科学院计算技术研究所 | Allocation and management method of the secrete key in the sensor network |
CN101820619A (en) * | 2010-01-15 | 2010-09-01 | 北京工业大学 | Efficient and energy-saving link safety method in wireless sensor network |
JP5163732B2 (en) * | 2010-12-07 | 2013-03-13 | 富士通株式会社 | Communication terminal |
CN102655643A (en) * | 2011-03-04 | 2012-09-05 | 希姆通信息技术(上海)有限公司 | Wireless data encryption method and wireless data decryption method |
CN103596174A (en) * | 2013-11-04 | 2014-02-19 | 中国计量学院 | PairwiseKey generating method |
Also Published As
Publication number | Publication date |
---|---|
CN104135727A (en) | 2014-11-05 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN104135727B (en) | A kind of wireless body area network safe transmission method | |
Mana et al. | Trust key management scheme for wireless body area networks. | |
Venkatasubramanian et al. | Physiological value-based efficient usable security solutions for body sensor networks | |
CN104780532B (en) | One cluster key management method that can be used for wireless sensor network | |
Ali et al. | Energy-efficient cluster-based security mechanism for intra-WBAN and inter-WBAN communications for healthcare applications | |
Jang et al. | Hybrid security protocol for wireless body area networks | |
US8291220B2 (en) | Securing wireless body sensor networks using physiological values for nonces | |
Khernane et al. | BANZKP: A secure authentication scheme using zero knowledge proof for WBANs | |
Singelée et al. | A secure cross-layer protocol for multi-hop wireless body area networks | |
Sharavanan et al. | A privacy preservation secure cross layer protocol design for IoT based wireless body area networks using ECDSA framework | |
Nirmal Raja et al. | Secure data aggregation in wireless sensor network-Fujisaki Okamoto (FO) authentication scheme against Sybil attack | |
US20090268914A1 (en) | Securing Wireless Body Sensor Networks Using Physiological Data | |
Bu et al. | Ban-gzkp: Optimal zero knowledge proof based scheme for wireless body area networks | |
Law et al. | Kalwen: A new practical and interoperable key management scheme for body sensor networks | |
CN102802151A (en) | Wireless body area network symmetric key negotiation method | |
Wang et al. | Encryption-free data transmission and hand-over in two-tier body area networks | |
Bista et al. | A new sensitive data aggregation scheme for protecting integrity in wireless sensor networks | |
Zhao et al. | Biometric behavior authentication exploiting propagation characteristics of wireless channel | |
Hussien et al. | Secure and efficient e-health scheme based on the Internet of Things | |
Sudarsono et al. | An implementation of secure wireless sensor network for e-healthcare system | |
Vignesh et al. | Healthcare sensors issues, challenges & security threats in wireless body area network: A comprehensive survey | |
Jariwala et al. | AdaptableSDA: secure data aggregation framework in wireless body area networks | |
Vishwakarma et al. | A secure three-party authentication protocol for wireless body area networks | |
Altop et al. | SKA-PS: Secure key agreement protocol using physiological signals | |
CN103596174B (en) | Pairwise key production method |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant | ||
CF01 | Termination of patent right due to non-payment of annual fee | ||
CF01 | Termination of patent right due to non-payment of annual fee |
Granted publication date: 20170908 |