Abstract
The emergence of body area networks (BANs) has paved the way for real-time sensing of human biometrics in addition to remote control of smart wireless medical devices, which in turn are beginning to revolutionize the smart healthcare industry. However, due to their limited power and computational capabilities, they are vulnerable to a myriad of security attacks. To secure BAN sensors against these threats processor-intensive cryptographic techniques need to be avoided as they are not suitable in this context. This article focuses on authentication service for BAN sensors and proposes an original scheme named RAFV: Rotational Assisted Fuzzy Vaults to harden the security of any authentication solution using the fuzzy vault construction approach. The evaluation results have shown that RAFV can successfully conceal the secret of the vault even if the locking elements are known to the adversary. Also, RAFV may improve upon communication overhead by enabling a reduction in the size of the vault without compromising its security. It has achieved all of this while remaining competitive with regards to additional computational overhead.
Original language | English |
---|---|
Pages (from-to) | 6-16 |
Number of pages | 11 |
Journal | IEEE Consumer Electronics Magazine |
Volume | 11 |
Issue number | 1 |
Early online date | 7 May 2020 |
DOIs | |
Publication status | Published - 1 Jan 2022 |
Externally published | Yes |
Bibliographical note
© 2023 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising or promotional purposes, creating new collective works, for resale or redistribution to servers or lists, or reuse of any copyrighted component of this work in other works.Copyright © and Moral Rights are retained by the author(s) and/ or other copyright owners. A copy can be downloaded for personal non-commercial research or study, without prior permission or charge. This item cannot be reproduced or quoted extensively from without first obtaining permission in writing from the copyright holder(s). The content must not be changed in any way or sold commercially in any format or medium without the formal permission of the copyright holders.
This document is the author’s post-print version, incorporating any revisions agreed during the peer-review process. Some differences between the published version and this version may remain and you are advised to consult the published version if you wish to cite from it.