DocumentCode :
119801
Title :
Security in wireless sensor networks for health monitoring helmet with anomaly detection using power analysis and probabilistic model
Author :
Panja, Biswajit ; Scott, Zachary ; Meharia, Priyanka
Author_Institution :
Univ. of Michigan-Flint, Flint, MI, USA
fYear :
2014
fDate :
26-28 Oct. 2014
Firstpage :
73
Lastpage :
78
Abstract :
Litigation faced by the NFL has called for better prevention and understanding of concussions and other sports injuries. To achieve this, sports officials have turned to wireless sensor networks, or WSNs, in the form of helmet sensors that automatically report any harmful injuries to attendants on the sidelines. While this approach provides players with a greater assurance of safety and a faster response to their injuries, the security weaknesses of WSNs must be addressed. These systems, being not only recently developed but also highly resource-constrained, may be easily manipulated by those looking to gain information about players (a form of passive attack) or even attempting to remove them from the game through the sending of false reports (a form of active attack). To prevent attacks such as these, we propose a system that uses a modification of the AES-CCM protocol as well as a novel attack detection system that uses probabilistic methods to report any harmful behavior to the user. The system´s power usage due to injury reports is compared to a probability model that is based on past research that recorded the likelihood of injury for the positions played in professional football. This system offers many advantages over conventional cryptography as it is a lightweight approach that costs few resources; individual helmet sensors need only send simple power reports to a central base station which uses on-the-grid power to conduct security analysis. Provided below is detail of the paper which describes the problem in greater detail, a section that details the system architecture, a section that explains the AES-CCM protocol, and an explanation of the probabilistic approach. This is followed by a security analysis that compares the approach to several other approaches found in the literature, and finally a conclusion.
Keywords :
biomedical communication; cryptographic protocols; injuries; patient monitoring; telecommunication security; wireless sensor networks; AES-CCM protocol; active attack; anomaly detection; attack detection system; central base station; conventional cryptography; harmful injury report; health monitoring helmet; helmet sensor; on-the-grid power; passive attack; power analysis; probabilistic model; security analysis; wireless sensor network security; Base stations; Cryptography; Injuries; Protocols; Sensors; Wireless sensor networks; power analysis; security; wireless sensors;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Wireless Sensors (ICWiSE), 2014 IEEE Conference on
Conference_Location :
Subang
Print_ISBN :
978-1-4799-5593-0
Type :
conf
DOI :
10.1109/ICWISE.2014.7042664
Filename :
7042664
Link To Document :
بازگشت