Channel-Based Key Generation for Encrypted Body-Worn Wireless Sensor Networks
AbstractBody-worn sensor networks are important for rescue-workers, medical and many other applications. Sensitive data are often transmitted over such a network, motivating the need for encryption. Body-worn sensor networks are deployed in conditions where the wireless communication channel varies dramatically due to fading and shadowing, which is considered a disadvantage for communication. Interestingly, these channel variations can be employed to extract a common encryption key at both sides of the link. Legitimate users share a unique physical channel and the variations thereof provide data series on both sides of the link, with highly correlated values. An eavesdropper, however, does not share this physical channel and cannot extract the same information when intercepting the signals. This paper documents a practical wearable communication system implementing channel-based key generation, including an implementation and a measurement campaign comprising indoor as well as outdoor measurements. The results provide insight into the performance of channel-based key generation in realistic practical conditions. Employing a process known as key reconciliation, error free keys are generated in all tested scenarios. The key-generation system is computationally simple and therefore compatible with the low-power micro controllers and low-data rate transmissions commonly used in wireless sensor networks. View Full-Text
Share & Cite This Article
Van Torre, P. Channel-Based Key Generation for Encrypted Body-Worn Wireless Sensor Networks. Sensors 2016, 16, 1453.
Van Torre P. Channel-Based Key Generation for Encrypted Body-Worn Wireless Sensor Networks. Sensors. 2016; 16(9):1453.Chicago/Turabian Style
Van Torre, Patrick. 2016. "Channel-Based Key Generation for Encrypted Body-Worn Wireless Sensor Networks." Sensors 16, no. 9: 1453.
Note that from the first issue of 2016, MDPI journals use article numbers instead of page numbers. See further details here.