Abstract
The emerging wireless body area networks (WBANs) have a great potential for the growth and development of future ubiquitous healthcare systems. However, due to the use of unreliable wireless media, WBANs are exposed to a variety of attacks. The prevention of these attacks depends upon the cryptographic techniques. The strength of cryptography is based on the keys used for encryption and decryption in the communication process. Security is still an alarming challenge for WBANs and needs attention of the research community. The proposed work introduces a hybrid key management scheme for both intra-WBAN and inter-WBAN communications. The proposed technique is based on preloaded keys as well as keys automatically generated from biometrics of the human body. The biometric-based calculations are of linear time complexity to cater the strict resource constraints and security requirements of WBANs. The proposed security mechanism provides an efficient solution for the security of both intra-WBAN and inter-WBAN communications. The results of the proposed technique are compared with an existing key management technique known as BARI+. The results show significant improvement over the results produced by BARI+ in terms of storage, communication, energy overhead, and security.
1. Introduction
Wireless body area network (WBAN) is a special type of network in which sensors are deployed on the human body. The sensors collect physiological values from the body and transmit the collected records to the concerned medical server. The applications of WBANs include health monitoring of patients in a hospital and monitoring of soldiers in a battlefield. The WBAN monitoring system is used to monitor a person's vital signs remotely. The system also receives feedback for maintaining a good health status of the subject so that proper action can be taken to rectify the abnormalities [1, 2]. The introduction of WBANs to E-Health monitoring system has revolutionized the field of health monitoring and resulted in better quality of life [3]. Since we deal with the personal information of a person, the security and privacy becomes an essential part of this communication. In case of medical applications, the security threats may lead a patient to a dangerous condition, and sometimes to the death of the patient [4]. WBAN communication can be classified into intra-WBAN communication and inter-WBAN communication. Intra-WBAN communication refers to the on-body sensors communication while inter-WBAN communication refers to the communication between two different WBANs. WBAN communication faces security issues as biomedical sensors implanted on the human body for mobile healthcare monitoring communicate with external networks, which increases the security risk. Since biomedical sensor nodes are allowed to monitor and transmit potentially sensitive medical data, the security and privacy becomes a major concern in WBANs. WBANs consist of lightweight sensors, which are limited both in terms of computational and communication resources; therefore, the security models and protocols used for wireless sensor networks (WSNs) cannot be applied to WBANs in exactly the same manner for different resource-constrained applications and scenarios [5, 6].
The existing key management techniques for WBANs are either plug-and-play or based on preloading. The work proposed in this paper consists of a hybrid technique; that is, it supports both plug-and-play capability as well as some predeployment of keys in order to strengthen the security in WBANs. In intra-WBAN communication of the proposed technique, the sensors measure physiological values (PVs) of the human body, and then by using those PVs, the keys are calculated among the sensor nodes. All this process is carried out in an automatic manner; that is, the sensors are put on the human body and the keys are calculated automatically for secure communication. In intra-WBAN communication, our technique has linear time complexity that is
The major contributions of the proposed work are summarized as follows.
The rest of the paper is organized as follows. In Section 2, the related work is presented. Section 3 discusses the system model whereas Section 4 describes the proposed technique for intra-WBAN communication. Section 5 describes the proposed technique for inter-WBAN communication. The performance of our proposed technique is analyzed in Section 6, whereas Section 7 concludes the paper.
2. Related Work
The first work that addresses the issue of security for implantable and wearable medical sensors was presented in [8]. These devices are used for nursing human body over long periods of time [9]. Ensuring the security of communication among these devices is critically important [10, 11]. Some works describe the use of human body as a means of generating cryptographic keys for securing intersensor communication. Human body can produce many specific physiological values that are time-variant and are not easy to guess [12]. Using this property of human body for cryptographic purposes provides strong security and gives us great opportunity for automatic key distribution and plug-and-play capability. Both the sender and the receiver can now measure the physiological values from their environment and use them for security purposes whenever they want to communicate [8]. The services like confidentiality and integrity are also ensured in some previous works as discussed in the TLS (transport layer security) protocol [13]. TLS provides privacy and data integrity between two communicating applications. SHELL [14] is a scalable, hierarchical, efficient, and location-aware key management scheme for WSNs. SHELL also provides integrity and confidentiality services in WSNs. SHELL is based on exclusion basis systems (EBSs), which is a combinatorial formulation of the problem of group key management. The main drawback of these protocols for using in WBANs is that these protocols do not fulfill the storage and power limitations of WBANs. Hence, these protocols are not suitable to be used in WBANs. There are some symmetric key management schemes available in the literature for secure trust establishment such as predeployment of keys in nodes, intersensor-communication based key agreement, and public-key-based key agreement schemes. Each of these schemes has its own limitations like memory problem, authentication from a centralized authority, complex mathematics, and so forth, which make these schemes difficult to use in WBANs [8].
Since recently, researchers have been focusing on applications of WBANs and have designed key management techniques for WBANs by using physiological values of the human body such as EKG. The use of EKG signal for generating pairwise keys brings plug-and-play capability in WBANs. Both communicating sensors first sense the EKG values and then, by applying certain hashing and watermarking technique, exchange these values for generating common keys for communication [15, 16]. In [17, 18], the idea of cluster-based secure key agreement protocol for WBANs is presented. The authors use physiological value-based keys for secure cluster topology formation. In [19, 20], the interpulse interval derived from ECG/PPG signals is used to generate common cryptographic keys. In [21], the authors proposed the use of fuzzy vault for physiological signal-based key agreement (PSKA) to secure intersensor communication. In [11], the authors proposed a lightweight security scheme for WBAN communication. The authors also proposed a microcontroller design to reduce energy consumption in WBAN communication. Restrained energy model is considered in this approach where star topology is used for WBAN communication using time division multiple access medium access control (TDMA MAC). The energy overhead is evaluated for the security mechanism introduced in the WBAN. The authors in [22] proposed a security mechanism for WBANs. They reviewed IBE-Lite [23] technique and addressed its limitations such as exposure of master key, partial heath records decryption problem after rekeying, and lack of adequate privacy provisioning. To overcome these limitations, the authors proposed a scheme that introduced anonymity and unlinkability and offered authorized access of patients’ health information. However, they use third party for key generation that itself introduces overhead to the WBAN communication. In [24], the authors proposed a security suite for WBANs. To improve the security of a WBAN, the authors presented techniques such as independent and adaptive management of keys (IAMKeys) for security in WBANs and key management and encryption for securing intersensor communication (KEMESIS). In the proposed schemes, the keys are generated randomly and the security is ensured by eliminating the key exchange between sensor nodes.
In BARI+ [7], the authors proposed a key management scheme purely based on preloading of keys. They use the concept of preloading in intra-WBAN communication. However, in intra-WBAN communication, the advantages of preloading are not so useful due to the fact that preloading-based schemes have no variations and same keys are used for communication between different sensor nodes, whereas in PV-based solution every node that wants to communicate with another node will calculate its own keys. Similarly, in preloading-based schemes, if a key is captured during a communication process, the next key calculations and communications are totally based on that captured key. So, the newly calculated key will also be compromised. While in PV-based key generation, the next set of values cannot be guessed. Preloading of keys for WSNs has also been used in several other papers such as [25–27]. All the PV-based techniques discussed so far are developed purely for intra-WBAN communication without considering inter-WBAN communication. Also, there is a need for a hybrid kind of key agreement scheme that combines the advantages of both PV and preloading-based key agreement. The work presented in this paper uses a hybrid approach for key agreement in WBANs, which tackles the problems of both intra-WBAN and inter-WBAN communications. We present a technique that uses preloading of keys and also generates biometric keys automatically. Keeping in view the strict resource constraints and security requirements of WBANs, minimal preloading of keys is used in the proposed approach.
3. System Model
We assume a WBAN to consist of sensor devices that are capable of measuring biometrics related to human body and also a high power and high storage device known as personal server (PS), which can be a laptop or a hand-held device. Medical server (MS) receives all the information collected by PS through the sensor nodes. All sensor nodes are directly connected to their relevant PSs. Sensor nodes measure biometrics and forward them to the PS. PS in turn transmits collected information to the MS through the internet. Each WBAN is associated with one body. Multiple WBANs are associated with the central MS. PS can communicate with other PSs as well as the MS. The MS stores and processes the information of all the WBANs that are associated with it.
All sensor nodes are constrained in energy because they use rechargeable batteries. Sensor nodes are ordinary devices with limited computation, communication, energy supply, and storage capabilities. PS is a powerful node and has more computation, communication, energy supply, and storage capabilities. We assume that the PS is preloaded with node identities and relevant keys before deployment. Keeping in view the storage constraints, in intra-WBAN communication, only one key is preloaded in sensor nodes before deployment. The system architecture of the WBAN, as per our assumptions, is shown in Figure 1. The application scenario of inter-WBAN communication includes multiple bodies under surveillance and all bodies communicate to a remote base station, like in the battlefield, the soldiers are deployed in the enemy territory and they communicate to the remote base station in their own territory. As in Figure 1, the PSs of all the bodies communicate to the base station and then through Internet to the remote MS.

System architecture of wireless body area networks.
4. Proposed Scheme for Intra-WBAN Communication
Intra-WBAN communication includes the communication of sensor nodes with the PS. We propose a hybrid approach for key management in intra-WBAN communication. Due to the memory limitations, only a single key named as secret key
4.1. Feature Generation
In the feature generation phase, features are extracted and then quantized for secure intersensor communication with the help of EKG using discrete wavelet transform (DWT). DWT allows good localization both in time and spatial frequency domains and is computationally inexpensive. In the process of communication between SNs and PS, sensors sample the EKG signal at the sampling rate of 125 Hz in time duration of 5 seconds. To remove unnecessary frequency components, the signal is then filtered. 625 samples are produced by five-second sample of EKG and then divided into 5 parts of 125 samples each. DWT is applied on each part after applying filtration. The 320 coefficients feature vector is formed by concatenating the 64 coefficients horizontally. In the quantization phase, the generated feature vector is divided into 20 blocks, each containing 16 coefficients, and then they are quantized into a binary stream.
4.2. Key Agreement
After the process of quantization, creation of feature vectors, and formation of blocks, the key agreement process is done. In the key agreement phase, PS broadcasts data request message as shown in message

Flowchart of the proposed scheme for intra-WBAN communication.
SN encrypts the data with key
In Figure 2, the key agreement phase is shown. EKG signal is used for feature generation. Feature vector of 320 coefficients is generated by concatenating 64 coefficients horizontally. These generated features are then divided into 20 blocks of 16 coefficients and then quantized into the binary stream. PS sends data request with its ID to SNs. SNs generate the shared pairwise key with PS by applying keyed hashing on the feature blocks and IDs of both PS and SN. The resulting key is used to encrypt data requested by the PS [9]. Data is verified through MAC verification of the PS. Hamming distance is calculated to verify that the data blocks of both the sender and the receiver are the same.
4.3. Rekeying
In intra-WBAN communication, there is a need to have a common key in order to securely communicate messages to PS. Key is computed after network initialization and generation of the shared pairwise keys between PS and SNs. PS broadcasts a signaling message of GenKey to direct the SNs to generate a common key as follows:
Each SN when receives this message generates the key
WBAN key K is refreshed after fixed intervals. When PS wants to refresh K, it sends GenKey message and SNs upon receiving this message and regenerates K by applying keyed-hash function on the current feature blocks and IDPS.
5. Proposed Scheme for Inter-WBAN Communication
Inter-WBAN communication includes the communication of a PS with other PSs. Each body in the WBAN contains one PS. The communication of different PSs is needed when a PS is out of range of the MS. PS communicates with other PSs and transmits data to the MS through the nearby PS. Our proposed scheme supports the use of biometric measurements. Keys are generated with the help of biometrics of any PS. The PS generates key pool using its biometrics and then transmits to the whole network. Our scheme for inter-WBAN communication also makes use of key refreshment mechanism schedule. MS assigns any PS (key generator) the responsibility of refreshing the key. Figure 3 shows the manner in which our scheme manages the keys of a WBAN.

Flowchart of our proposed scheme for inter-WBAN communication.
Our scheme consists of four types of keys: administrative key
5.1. Initial Deployment
All PSs are deployed in the beginning. Throughout the network lifetime, PS is connected with the medical server through an external secure communication channel, which may be the Internet. Personal servers come preloaded with
MS authenticates PS and sends the key
MS assigns any PS the responsibility to generate
Example of Key Refreshment Schedule with n slots.
The assigned PS generates
5.2. Rekeying
In order to refresh
KeyGen computes new value of
MS sends new refreshment schedule to all PSs encrypting with the current value of
Administrative key
Basic keys
5.3. Personal Server Addition
We assume that MS contains all the information of the deployed PSs and the newly deployed PSs as all PSs transmit data to the MS. The addition of PS is possible; that is, in case of PS compromise new PS is added to the network. When a PS is added to the network, it sends discovery message to MS as follows:
MS authenticates its ID and authentication code and sends
Administrative key and network key are refreshed always when a new PS is added into the network following the same rekeying method.
6. Analysis and Comparison
In this section, we analyze our proposed technique with respect to storage, communication, and energy overhead as well as perform the security and performance analysis. We also compare our proposed technique with a well-known key management technique known as BARI+ [7]. Our proposed scheme involves values that are time variant, that is, EKG values that possess the randomness property. We use HMAC-MD5 for hashing. HMAC-MD5 is more efficient than other hashing techniques as it takes less computation cycles for key generation [28]. Randomness of keys can be determined by calculating the probabilities of keys.
6.1. Storage Overhead
Storage overhead is computed by analyzing all the keys and authentication codes for nodes of different types. Storage requirements of authentication nodes are not included in the analysis. In intra-WBAN communication, we use only one key for communication in the network. Sensor nodes store one key
PS stores all IDs of sensor nodes,

Storage overhead comparison of BARI+ and the proposed scheme for intra-WBAN communication.
In inter-WBAN communication, only PS takes part in the network communication. So, the PS stores the key refreshment schedule which takes 4 integer bytes. Three keys
Storage requirements of BARI+ and the proposed scheme are shown in Table 2.
Storage requirement (in bytes) of each type of nodes for intra-WBAN communication.
6.2. Communication Overhead
Communication overhead is computed for both intra-WBAN and inter-WBAN communication. Intra-WBAN communication overhead is very simple as all nodes are in the range of each other and the average messages transmitted by sensor nodes are very less. For both types of communication, each node sends one message in the initial deployment phase. Table 3 shows the average number of messages transmitted by each type of node in initial deployment phase in both of the schemes.
Average number of messages transmitted by each type of nodes in initial deployment.
To refresh
Average number of messages transmitted by each type of nodes in key refreshment phase.
To refresh
Average number of messages transmitted by each type of nodes when administrative key is refreshed.
6.3. Energy Consumption
Energy consumption is computed by calculating the total number of messages transmitted by all types of nodes. Energy is dependent on the distance between the PS and the sensor nodes. As the distance between PS and sensor node increases, its energy consumption also increases. Energy is calculated using the ratio model given in [11, 29, 30]. The following formula is used for the calculation of energy:
In (17),

Energy comparison of all phases in BARI+ and the proposed scheme.
6.4. Node Eviction
Node eviction means that any node in the network leaves the network for some reason, for example, power consumption, node emigration, node capture, and so forth. We assume that the compromised nodes, the energy-exhausted nodes, and the migrated nodes can eventually be detected by most of its neighbors within a certain time period by sending the keep-alive messages. If a certain node does not respond to a keep-alive message, then the neighboring nodes remove that node from its neighbor list.
6.5. Security Analysis
Our proposed technique is analyzed by considering both insider and outsider attacks. WBAN faces both types of attacks. In passive eavesdropping, the attacker records encrypted keys. In replay attacks, the attacker captures legitimate messages and replays these messages in the network. Insider attacks include physical access of the nodes and attacker can launch multiple attacks such as unauthorized access to data, false injection of data, and alteration of health data.
6.5.1. Outsider Attack
Only the authorized sensors can communicate in the network; that is, without proper authorization, sensor nodes cannot communicate in the network. The communication among the sensor nodes is secured by using the keys like
6.5.2. Replay Attacks
In replay attacks, an attacker stores previous messages and then resends those messages to launch the attack. The proposed scheme uses a nonce and timestamps to prevent the replay attacks. The nonce is checked to see if it duplicates a previously presented value. The timestamp allows receivers to limit how long nonces are retained. If an attacker gains some information and then replays it, the attacker will be caught because of the difference in nonce and timestamp.
6.5.3. PS Compromise
The proposed scheme shows a strong resilience against the capture of the PS. Network key

Probability of uniquely generated keys.
6.5.4. Sensor Node Compromise
The probability of sensor node compromise is less in WBANs as compared to WSNs. However, in case of sensor node compromise, new keys are generated by rekeying method in intra-WBAN communication in the proposed technique.
6.5.5. KeyGen Compromise
In inter-WBAN communication, PS serves as KeyGen node for communication in the network and for rekeying. If a KeyGen node is compromised, the responsibility of generating keys is shifted to another PS by the MS.
6.5.6. Confidentiality
In the proposed technique, the network traffic is secured by encrypting all messages using secret keys. Confidentiality is maintained by protecting data against the unintended parties. An attacker cannot overhear the network unless it obtains the secret key. In the proposed technique, we encrypt the data by using keys. Encrypted data ensures the secure communication of intra-WBAN and inter-WBAN communication.
6.5.7. Authentication
To protect network from false injection of data, data authentication is required. An attacker can easily inject false message, so the receiver has to make sure that the data received originates from the relevant sender. MAC is applied on each message between PS and sensor node to achieve authentication in the proposed technique for intra-WBAN and inter-WBAN communications.
6.5.8. Integrity
To ensure the integrity of data, we use MAC authentication in intra-WBAN communication in the proposed technique. Alteration and modification of data can be easily determined by using the MAC. Data integrity ensures the accuracy of data being transmitted.
6.5.9. Freshness
The attacker can capture the data and replay it. Data freshness ensures that the frames transmitted are not reused. Data freshness is guaranteed by using rekeying method in both intra-WBAN and inter-WBAN communications.
6.6. Performance Analysis
For the performance analysis of our proposed scheme, we compare different hashing schemes. According to our comparisons by running HMAC-MD5, SHA1 and MD5 for 2.9 seconds, the data is processed by these algorithms against each block size mentioned in Table 6. The results in Table 6 show that HMAC-MD5 processes more bytes of data as compared to other techniques. The implementation is done on a system with 4GB RAM, 2.20 GHZ processor and Red Hat Enterprise Level 5 operating system.
Memory usage of different schemes.
6.6.1. Randomness
For intra-WBAN communication, the randomness of keys is determined by calculating the entropy of the keys using NIST randomness testing suite. Entropy is calculated for 31 subjects over 100 random start times. Entropy of keys almost reaches to 1 in our case, which means that no data is repeated as shown in Figure 7. The purpose of this test is to compare the frequency of overlapping blocks of two consecutive lengths for a random sequence. In the proposed inter-WBAN technique, the randomness of data is ensured by calculating the average entropy of 31 subjects as shown in Figure 7.

Average entropy of keys for 31 subjects.
Several tests are performed such as frequency, block frequency, cumulative sums, runs, nonoverlapping template, and linear complexity in NIST randomness testing suite as shown in Figure 8. These algorithms are used to test the randomness of the data. By using these algorithms, deviations of a binary sequence from randomness are detected. These tests detect whether the pattern is repeated in the sequence. By these tests, critical value is determined. If the test exceeds the critical value, it means that the data is not random. Results of these tests can be determined by checking the P value of these algorithms. If P value is greater than 0.01, it means that the test is successful and the sequence is random. Simulation is performed on all the above tests for EKG-based data. Figure 8 shows the NIST randomness testing suite results for randomness of the generated keys.

NIST randomness testing suite results for the generated keys.
6.6.2. Distinctiveness
In intra-WBAN communication, distinctiveness or uniqueness of keys is determined by calculating the hamming distance of 31 subject keys. Hamming distance is a measure of calculating the difference between two vectors. Distinctiveness of 31 subject keys means that the keys are identical for the same subject and different for other subjects. The results are shown in Figure 9 at random start time. The figure shows that the values at the diagonal are zero, which means that same subject keys are similar and others are different.

Hamming distance between keys generated from different subjects.
6.6.3. Computational Cost
In the proposed technique, we use only one key for the security of intra-WBAN communication and minimum keys are used for inter-WBAN communication. In intra-WBAN communication, discrete wavelet transform- (DWT-) based solution is used as its computational cost is
7. Conclusion
Wireless body area networks (WBANs) have numerous applications, including patients monitoring and assisted living. In case of patients monitoring, the human personal data is communicated over an unreliable wireless media, exposing the WBANs to a variety of attacks. Providing a security solution for WBANs will increase the user confidence, which will eventually cause increase in its usability and applicability. The technique presented in this paper is a hybrid security technique for intra-WBAN and inter-WBAN communications. The hybrid technique uses both autogeneration of keys as well as the preloading which makes it efficient in terms of both storage and security. The work presented is twofold; in the first phase, the communication is made secure in intra-WBAN communication by automatically generating keys in sensor nodes and preloading of only one key. In the second phase, the technique is extended to the security of inter-WBAN communication. Security in intra-WBAN is ensured by eliminating key exchange between sensor nodes and the PS. A preloading-based technique is presented for the security of inter-WBAN communication. We analyzed the security, storage requirements, and also its running time by comparing it with an existing technique known as BARI+. The comparison shows that the proposed technique is efficient in terms of all these parameters. Due to its hybrid security mechanism, the technique has a good tradeoff between security and resource constraints.
Footnotes
Abbreviations
Acknowledgment
The authors would like to extend their sincere appreciation to the Deanship of Scientific Research at King Saud University for its funding of this research through the Research Group Project no. RGP-VPP-214.
