SlideShare uma empresa Scribd logo
1 de 22
Baixar para ler offline
A BIOMETRIC-BASED SECURITY FOR DATA
AUTHENTICATION IN WIRELESS BODY AREA
NETWORK(WBAN)
By
Shreyas S. Tote
Under the guidance
Prof. J.H.Saturwar
Department Of Computer Science and Engineering
Jawaharlal Darda Institute of Engineering & Technology,
Yavatmal, (M.S), India-445001
Session 2014-2015
CONTENTS
 What is Biometric Security?
 What is WBAN?
 Security Issues In WBAN
 Why Biometric based Security Approach for
Data authentication
 Applications of WBAN
 Advantages and Disadvantages of Biometrics
 Conclusion
WHAT IS BIOMETRIC SECURITY?
 It is a security mechanism used to
authenticate.
 Based on Human Characteristic.
 Often used Critical Environment.
BIOMETRIC DEVICES
WHAT IS WBAN?
 Smart biomedical sensor platform
 Analyze the measured signals and
transmit them to user interface
wirelessly.
 Consist of a set of a mobile and small size
intercommunicating sensors.
 Limited Resources
Working of WBAN
SECURITY ISSUES IN WBAN
 Security Problems in WBAN
 Less Extent on Evolving Network Protocol
 Cryptography Techniques are used in WBAN
 Problems in Cryptographic Technique
 Complex and Difficult to use
WHY BIOMETRIC BASED SECURITY
APPROACH FOR DATA AUTHENTICATION
 Universal
 Distinctive
 Permanent
 Collectable
 Effective
 Invulnerable
 Acceptable
HEART RATE VARIABILITY(HRV)
 Unique Characteristics
 Time interval between heart varies
 Autonomic Nervous System comprise two basic
component
*Sympathetic
*Parasympathetic
WHY ELETROCARDIOGRAM(ECG)
PREFERRED
 Universality
 Uniqueness
 Robustness
 Liveness detection
R-PEAK DETECTION
Schematic representation of normal ECG
R-PEAK DETECTION
Fig. Before and After Preprocessing of NOISY ECG signal
R-peak
Detection
HRV
calculation
Binary
Conversion
Sender Receiver
Authentication
Sender Protocol
Fig:- Biometric Feature Used to Calculate MAC
Preprocessing
Message MAC
Likelihood
algorithm
Estimation
Hash
Function
Schematic representation of normal ECG
Biometric Feature
(from medical
database)
Authentication(Yes/No)
Biometric Feature
Fig-Proposed biometric based security for data authentication
|
|
|_ _ _ _ _ _ _ _ _ _ _ _ _ _ __ _ _ _ __ _ _ _ _ __
Original message
APPLICATIONS OF BIOMETRICS
 Biometric Time and Attendance
 Biometric Safe and Locks
 Securing Access To PC‟s
 High End Security
 Identifying Criminals
APPLICATION’S OF WBAN
ADVANTAGES & DISADVANTAGES OF
BIOMETRICS
ADVANTAGES
 Error
 Mistakes
 Fraud,
 Forgery
DISADVANTAGES
 limited by many situations
 Affordability
CONCLUSION
 Secure communications in BANs are strongly
required to preserves a person‟s health, privacy and
safety.
 Senders electrocardiogram feature is selected as the
biometric key for data authentication mechanism.
 The security system implemented with low computational
complexity and high power efficiency instead of
cryptographic key distribution.
REFERENCES
[1]P.Abina, K.Dhivyakala, L.Suganya, S.Mary Praveena
“Biometric Authentication System for Body Area Network Vol.
3, Issue 3, International Journal of Advanced Research in
Electrical, Electronics and Instrumentation Engineering,
Coimbatore, India March 2014
[2] Sofia Najwa Ramlil, Rabiah Ahmad, Mohd Faizal Abdollah,
Eryk Dutkiewicz4 “A Biometric-based Security for Data
Authentication in Wireless Body Area NetworK(WBAN),ICACT
January 27 ,2013
[3]Systems and Network Analysis Center Information Assurance
Directorate by National Security Agency,United states of
America,2013
[5] L. Eschenauer and V. D. Gligor, „A Key Management
Scheme forDistributed Sensor Networks‟, Version: pp.
41–47, November 18–22, 2002
[4] Lin Yao, Bing Liu, GuoweiWu, Kai Yao and
JiaWang1,” A Biometric Key Establishment Protocol for
Body Area Networks”, IJDSN, vol 2011
Biometric-based Security for Data Authentication in Wireless Body Area Network(WBAN)

Mais conteúdo relacionado

Mais procurados

wireless body area networks(WBAN)
wireless body area networks(WBAN)wireless body area networks(WBAN)
wireless body area networks(WBAN)kramsheeda
 
Wireless body area network
Wireless body area networkWireless body area network
Wireless body area networkPratik Gondaliya
 
WIRELESS BODY AREA NETWORK
WIRELESS BODY AREA NETWORKWIRELESS BODY AREA NETWORK
WIRELESS BODY AREA NETWORKmadhushreek
 
ANALYSIS OF VARIOUS PROTOCOLS IN WIRELESS BODY AREA NETWORKS (WBAN)
ANALYSIS OF VARIOUS PROTOCOLS IN WIRELESS BODY AREA NETWORKS (WBAN) ANALYSIS OF VARIOUS PROTOCOLS IN WIRELESS BODY AREA NETWORKS (WBAN)
ANALYSIS OF VARIOUS PROTOCOLS IN WIRELESS BODY AREA NETWORKS (WBAN) IAEME Publication
 
Wireless body area network
Wireless body area networkWireless body area network
Wireless body area networkashish patil
 
Body Area Network Presentation
Body Area Network PresentationBody Area Network Presentation
Body Area Network PresentationNishant Kumar
 
Seminar on Body Area Networks
Seminar on Body Area NetworksSeminar on Body Area Networks
Seminar on Body Area NetworksVinayak Narayanan
 
Wireless Body Area Networks
Wireless Body Area Networks Wireless Body Area Networks
Wireless Body Area Networks Musfiqur Rahman
 
Wireless Body Area Network (WBAN) by Rayhan Khoka
Wireless Body Area Network (WBAN) by Rayhan KhokaWireless Body Area Network (WBAN) by Rayhan Khoka
Wireless Body Area Network (WBAN) by Rayhan Khokarayhankhoka1
 
Wireless Body Area Network (WBAN)
Wireless Body Area Network (WBAN)Wireless Body Area Network (WBAN)
Wireless Body Area Network (WBAN)RAJKAMALKUMAR2
 
A SURVEY ON WIRELESS BODY AREA NETWORK
A SURVEY ON WIRELESS BODY AREA NETWORKA SURVEY ON WIRELESS BODY AREA NETWORK
A SURVEY ON WIRELESS BODY AREA NETWORKijsrd.com
 
A review of security protocols in m health wireless body area networks (wban)...
A review of security protocols in m health wireless body area networks (wban)...A review of security protocols in m health wireless body area networks (wban)...
A review of security protocols in m health wireless body area networks (wban)...James Kang
 
Cloud based wireless Body Area Network for Health management
Cloud based wireless Body Area Network for Health management Cloud based wireless Body Area Network for Health management
Cloud based wireless Body Area Network for Health management Fantahun Yersaw
 
Wireless body area network
Wireless body area network Wireless body area network
Wireless body area network subhradeep mitra
 

Mais procurados (20)

WSN IN BODY AREA NETWORK BASED ON EGERGY CONSERVATION
WSN IN BODY AREA NETWORK BASED ON EGERGY CONSERVATIONWSN IN BODY AREA NETWORK BASED ON EGERGY CONSERVATION
WSN IN BODY AREA NETWORK BASED ON EGERGY CONSERVATION
 
wireless body area networks(WBAN)
wireless body area networks(WBAN)wireless body area networks(WBAN)
wireless body area networks(WBAN)
 
Wireless body area network
Wireless body area networkWireless body area network
Wireless body area network
 
WIRELESS BODY AREA NETWORK
WIRELESS BODY AREA NETWORKWIRELESS BODY AREA NETWORK
WIRELESS BODY AREA NETWORK
 
ANALYSIS OF VARIOUS PROTOCOLS IN WIRELESS BODY AREA NETWORKS (WBAN)
ANALYSIS OF VARIOUS PROTOCOLS IN WIRELESS BODY AREA NETWORKS (WBAN) ANALYSIS OF VARIOUS PROTOCOLS IN WIRELESS BODY AREA NETWORKS (WBAN)
ANALYSIS OF VARIOUS PROTOCOLS IN WIRELESS BODY AREA NETWORKS (WBAN)
 
Body Area Networks (BANs) - PPT (By Study PPT)
Body Area Networks (BANs) - PPT (By Study PPT)Body Area Networks (BANs) - PPT (By Study PPT)
Body Area Networks (BANs) - PPT (By Study PPT)
 
Wireless body area network
Wireless body area networkWireless body area network
Wireless body area network
 
Body Area Network Presentation
Body Area Network PresentationBody Area Network Presentation
Body Area Network Presentation
 
Seminar on Body Area Networks
Seminar on Body Area NetworksSeminar on Body Area Networks
Seminar on Body Area Networks
 
Wireless Body Area Networks
Wireless Body Area Networks Wireless Body Area Networks
Wireless Body Area Networks
 
Wban, kavya
Wban,    kavyaWban,    kavya
Wban, kavya
 
WBAN
WBANWBAN
WBAN
 
Wireless Body Area Network (WBAN) by Rayhan Khoka
Wireless Body Area Network (WBAN) by Rayhan KhokaWireless Body Area Network (WBAN) by Rayhan Khoka
Wireless Body Area Network (WBAN) by Rayhan Khoka
 
Wireless Body Area Network
Wireless Body Area NetworkWireless Body Area Network
Wireless Body Area Network
 
Wireless Body Area Network (WBAN)
Wireless Body Area Network (WBAN)Wireless Body Area Network (WBAN)
Wireless Body Area Network (WBAN)
 
A SURVEY ON WIRELESS BODY AREA NETWORK
A SURVEY ON WIRELESS BODY AREA NETWORKA SURVEY ON WIRELESS BODY AREA NETWORK
A SURVEY ON WIRELESS BODY AREA NETWORK
 
A review of security protocols in m health wireless body area networks (wban)...
A review of security protocols in m health wireless body area networks (wban)...A review of security protocols in m health wireless body area networks (wban)...
A review of security protocols in m health wireless body area networks (wban)...
 
Cloud based wireless Body Area Network for Health management
Cloud based wireless Body Area Network for Health management Cloud based wireless Body Area Network for Health management
Cloud based wireless Body Area Network for Health management
 
Wireless body area network
Wireless body area network Wireless body area network
Wireless body area network
 
Wireless Body Sensor Networks
Wireless Body Sensor Networks Wireless Body Sensor Networks
Wireless Body Sensor Networks
 

Destaque

Student biometric identification srs
Student biometric identification srsStudent biometric identification srs
Student biometric identification srsHassaan Afzal
 
Pendrive to pendrive data transfer without pc
Pendrive to pendrive data transfer without pcPendrive to pendrive data transfer without pc
Pendrive to pendrive data transfer without pcVishnu Kudumula
 
Biometric security Presentation
Biometric security PresentationBiometric security Presentation
Biometric security PresentationPrabh Jeet
 
Software Requirement Specification For Smart Internet Cafe
Software Requirement Specification For Smart Internet CafeSoftware Requirement Specification For Smart Internet Cafe
Software Requirement Specification For Smart Internet CafeHari
 
Final Report Biometrics
Final Report BiometricsFinal Report Biometrics
Final Report Biometricsanoop80686
 
Biometrics Technology Seminar Report.
Biometrics Technology Seminar Report.Biometrics Technology Seminar Report.
Biometrics Technology Seminar Report.Pavan Kumar MT
 
Face recognition ppt
Face recognition pptFace recognition ppt
Face recognition pptSantosh Kumar
 
Biometric's final ppt
Biometric's final pptBiometric's final ppt
Biometric's final pptAnkita Vanage
 
W-LAN (Wireless Local Area Network)
W-LAN (Wireless Local Area Network)W-LAN (Wireless Local Area Network)
W-LAN (Wireless Local Area Network)Parvesh Taneja
 
Biometric Security advantages and disadvantages
Biometric Security advantages and disadvantagesBiometric Security advantages and disadvantages
Biometric Security advantages and disadvantagesPrabh Jeet
 
LinkedIn SlideShare: Knowledge, Well-Presented
LinkedIn SlideShare: Knowledge, Well-PresentedLinkedIn SlideShare: Knowledge, Well-Presented
LinkedIn SlideShare: Knowledge, Well-PresentedSlideShare
 

Destaque (16)

Seminar
SeminarSeminar
Seminar
 
becan
becanbecan
becan
 
Student biometric identification srs
Student biometric identification srsStudent biometric identification srs
Student biometric identification srs
 
DFD
DFDDFD
DFD
 
Biometrics poster
Biometrics posterBiometrics poster
Biometrics poster
 
Pendrive to pendrive data transfer without pc
Pendrive to pendrive data transfer without pcPendrive to pendrive data transfer without pc
Pendrive to pendrive data transfer without pc
 
Biometric security Presentation
Biometric security PresentationBiometric security Presentation
Biometric security Presentation
 
Software Requirement Specification For Smart Internet Cafe
Software Requirement Specification For Smart Internet CafeSoftware Requirement Specification For Smart Internet Cafe
Software Requirement Specification For Smart Internet Cafe
 
Final Report Biometrics
Final Report BiometricsFinal Report Biometrics
Final Report Biometrics
 
Biometrics Technology Seminar Report.
Biometrics Technology Seminar Report.Biometrics Technology Seminar Report.
Biometrics Technology Seminar Report.
 
Biometrics
BiometricsBiometrics
Biometrics
 
Face recognition ppt
Face recognition pptFace recognition ppt
Face recognition ppt
 
Biometric's final ppt
Biometric's final pptBiometric's final ppt
Biometric's final ppt
 
W-LAN (Wireless Local Area Network)
W-LAN (Wireless Local Area Network)W-LAN (Wireless Local Area Network)
W-LAN (Wireless Local Area Network)
 
Biometric Security advantages and disadvantages
Biometric Security advantages and disadvantagesBiometric Security advantages and disadvantages
Biometric Security advantages and disadvantages
 
LinkedIn SlideShare: Knowledge, Well-Presented
LinkedIn SlideShare: Knowledge, Well-PresentedLinkedIn SlideShare: Knowledge, Well-Presented
LinkedIn SlideShare: Knowledge, Well-Presented
 

Semelhante a Biometric-based Security for Data Authentication in Wireless Body Area Network(WBAN)

Machine Learning -Based Security Authentication for Wireless Multimedia Network
Machine Learning -Based Security Authentication for Wireless Multimedia NetworkMachine Learning -Based Security Authentication for Wireless Multimedia Network
Machine Learning -Based Security Authentication for Wireless Multimedia NetworkGauthamSK4
 
IRJET- Secured Mind Uploading Method in Wireless Body Area Network
IRJET-  	  Secured Mind Uploading Method in Wireless Body Area NetworkIRJET-  	  Secured Mind Uploading Method in Wireless Body Area Network
IRJET- Secured Mind Uploading Method in Wireless Body Area NetworkIRJET Journal
 
SECURITY ARCHITECTURE FOR AT-HOME MEDICAL CARE USING BODY SENSOR NETWORK
SECURITY ARCHITECTURE FOR AT-HOME MEDICAL CARE USING BODY SENSOR NETWORKSECURITY ARCHITECTURE FOR AT-HOME MEDICAL CARE USING BODY SENSOR NETWORK
SECURITY ARCHITECTURE FOR AT-HOME MEDICAL CARE USING BODY SENSOR NETWORKijasuc
 
A NOVEL SECURITY PROTOCOL FOR WIRELESS SENSOR NETWORKS BASED ON ELLIPTIC CURV...
A NOVEL SECURITY PROTOCOL FOR WIRELESS SENSOR NETWORKS BASED ON ELLIPTIC CURV...A NOVEL SECURITY PROTOCOL FOR WIRELESS SENSOR NETWORKS BASED ON ELLIPTIC CURV...
A NOVEL SECURITY PROTOCOL FOR WIRELESS SENSOR NETWORKS BASED ON ELLIPTIC CURV...IJCNCJournal
 
A lightweight and secure multilayer authentication scheme for wireless body a...
A lightweight and secure multilayer authentication scheme for wireless body a...A lightweight and secure multilayer authentication scheme for wireless body a...
A lightweight and secure multilayer authentication scheme for wireless body a...IJECEIAES
 
A SECURITY SUITE FOR WIRELESS BODY AREA NETWORKS
A SECURITY SUITE FOR WIRELESS BODY AREA NETWORKSA SECURITY SUITE FOR WIRELESS BODY AREA NETWORKS
A SECURITY SUITE FOR WIRELESS BODY AREA NETWORKSIJNSA Journal
 
DEBJIT Doira ......... ..................
DEBJIT Doira ......... ..................DEBJIT Doira ......... ..................
DEBJIT Doira ......... ..................ARKARAJSAHA1
 
A secure Crypto-biometric verification protocol
A secure Crypto-biometric verification protocol A secure Crypto-biometric verification protocol
A secure Crypto-biometric verification protocol Nishmitha B
 
Three Tire Proxy Re - Encryption Secret Key (PRESK) Generation for Secure Tr...
Three Tire Proxy Re - Encryption Secret Key (PRESK)  Generation for Secure Tr...Three Tire Proxy Re - Encryption Secret Key (PRESK)  Generation for Secure Tr...
Three Tire Proxy Re - Encryption Secret Key (PRESK) Generation for Secure Tr...Karthikeyan Ece venkatesan
 
Integrated Framework for Secure and Energy Efficient Communication System in ...
Integrated Framework for Secure and Energy Efficient Communication System in ...Integrated Framework for Secure and Energy Efficient Communication System in ...
Integrated Framework for Secure and Energy Efficient Communication System in ...IJECEIAES
 
HISTOGRAM OF NEIGHBORHOOD TRIPARTITE AUTHENTICATION WITH FINGERPRINT-BASED BI...
HISTOGRAM OF NEIGHBORHOOD TRIPARTITE AUTHENTICATION WITH FINGERPRINT-BASED BI...HISTOGRAM OF NEIGHBORHOOD TRIPARTITE AUTHENTICATION WITH FINGERPRINT-BASED BI...
HISTOGRAM OF NEIGHBORHOOD TRIPARTITE AUTHENTICATION WITH FINGERPRINT-BASED BI...IJCNCJournal
 
Tutorial on Wirless Security in Medical Devices
Tutorial on Wirless Security in Medical DevicesTutorial on Wirless Security in Medical Devices
Tutorial on Wirless Security in Medical Devicesgvrangaraj
 
A Study of Approaches and Measures aimed at Securing Biometric Fingerprint Te...
A Study of Approaches and Measures aimed at Securing Biometric Fingerprint Te...A Study of Approaches and Measures aimed at Securing Biometric Fingerprint Te...
A Study of Approaches and Measures aimed at Securing Biometric Fingerprint Te...Editor IJCATR
 
Tutorial Dr G V Rangaraj Wireless Security in Medical Devices
Tutorial Dr G V Rangaraj Wireless Security in Medical DevicesTutorial Dr G V Rangaraj Wireless Security in Medical Devices
Tutorial Dr G V Rangaraj Wireless Security in Medical Devicesgvrangaraj
 
Tutorial on Wireless Security in Medical Devices
Tutorial on Wireless Security in Medical DevicesTutorial on Wireless Security in Medical Devices
Tutorial on Wireless Security in Medical Devicesgvrangaraj
 
Secure and Efficient Data Transmission for Cluster-based Wireless Sensor Netw...
Secure and Efficient Data Transmission forCluster-based Wireless Sensor Netw...Secure and Efficient Data Transmission forCluster-based Wireless Sensor Netw...
Secure and Efficient Data Transmission for Cluster-based Wireless Sensor Netw...AJIT M KARANJKAR
 

Semelhante a Biometric-based Security for Data Authentication in Wireless Body Area Network(WBAN) (20)

Machine Learning -Based Security Authentication for Wireless Multimedia Network
Machine Learning -Based Security Authentication for Wireless Multimedia NetworkMachine Learning -Based Security Authentication for Wireless Multimedia Network
Machine Learning -Based Security Authentication for Wireless Multimedia Network
 
IRJET- Secured Mind Uploading Method in Wireless Body Area Network
IRJET-  	  Secured Mind Uploading Method in Wireless Body Area NetworkIRJET-  	  Secured Mind Uploading Method in Wireless Body Area Network
IRJET- Secured Mind Uploading Method in Wireless Body Area Network
 
SECURITY ARCHITECTURE FOR AT-HOME MEDICAL CARE USING BODY SENSOR NETWORK
SECURITY ARCHITECTURE FOR AT-HOME MEDICAL CARE USING BODY SENSOR NETWORKSECURITY ARCHITECTURE FOR AT-HOME MEDICAL CARE USING BODY SENSOR NETWORK
SECURITY ARCHITECTURE FOR AT-HOME MEDICAL CARE USING BODY SENSOR NETWORK
 
(2006) Wireless and Biometrics
(2006) Wireless and Biometrics(2006) Wireless and Biometrics
(2006) Wireless and Biometrics
 
A NOVEL SECURITY PROTOCOL FOR WIRELESS SENSOR NETWORKS BASED ON ELLIPTIC CURV...
A NOVEL SECURITY PROTOCOL FOR WIRELESS SENSOR NETWORKS BASED ON ELLIPTIC CURV...A NOVEL SECURITY PROTOCOL FOR WIRELESS SENSOR NETWORKS BASED ON ELLIPTIC CURV...
A NOVEL SECURITY PROTOCOL FOR WIRELESS SENSOR NETWORKS BASED ON ELLIPTIC CURV...
 
A lightweight and secure multilayer authentication scheme for wireless body a...
A lightweight and secure multilayer authentication scheme for wireless body a...A lightweight and secure multilayer authentication scheme for wireless body a...
A lightweight and secure multilayer authentication scheme for wireless body a...
 
A SECURITY SUITE FOR WIRELESS BODY AREA NETWORKS
A SECURITY SUITE FOR WIRELESS BODY AREA NETWORKSA SECURITY SUITE FOR WIRELESS BODY AREA NETWORKS
A SECURITY SUITE FOR WIRELESS BODY AREA NETWORKS
 
DEBJIT Doira ......... ..................
DEBJIT Doira ......... ..................DEBJIT Doira ......... ..................
DEBJIT Doira ......... ..................
 
A secure Crypto-biometric verification protocol
A secure Crypto-biometric verification protocol A secure Crypto-biometric verification protocol
A secure Crypto-biometric verification protocol
 
Three Tire Proxy Re - Encryption Secret Key (PRESK) Generation for Secure Tr...
Three Tire Proxy Re - Encryption Secret Key (PRESK)  Generation for Secure Tr...Three Tire Proxy Re - Encryption Secret Key (PRESK)  Generation for Secure Tr...
Three Tire Proxy Re - Encryption Secret Key (PRESK) Generation for Secure Tr...
 
d6 major project.pptx
d6 major project.pptxd6 major project.pptx
d6 major project.pptx
 
Veena kakati
Veena kakatiVeena kakati
Veena kakati
 
Integrated Framework for Secure and Energy Efficient Communication System in ...
Integrated Framework for Secure and Energy Efficient Communication System in ...Integrated Framework for Secure and Energy Efficient Communication System in ...
Integrated Framework for Secure and Energy Efficient Communication System in ...
 
HISTOGRAM OF NEIGHBORHOOD TRIPARTITE AUTHENTICATION WITH FINGERPRINT-BASED BI...
HISTOGRAM OF NEIGHBORHOOD TRIPARTITE AUTHENTICATION WITH FINGERPRINT-BASED BI...HISTOGRAM OF NEIGHBORHOOD TRIPARTITE AUTHENTICATION WITH FINGERPRINT-BASED BI...
HISTOGRAM OF NEIGHBORHOOD TRIPARTITE AUTHENTICATION WITH FINGERPRINT-BASED BI...
 
Kr3618261830
Kr3618261830Kr3618261830
Kr3618261830
 
Tutorial on Wirless Security in Medical Devices
Tutorial on Wirless Security in Medical DevicesTutorial on Wirless Security in Medical Devices
Tutorial on Wirless Security in Medical Devices
 
A Study of Approaches and Measures aimed at Securing Biometric Fingerprint Te...
A Study of Approaches and Measures aimed at Securing Biometric Fingerprint Te...A Study of Approaches and Measures aimed at Securing Biometric Fingerprint Te...
A Study of Approaches and Measures aimed at Securing Biometric Fingerprint Te...
 
Tutorial Dr G V Rangaraj Wireless Security in Medical Devices
Tutorial Dr G V Rangaraj Wireless Security in Medical DevicesTutorial Dr G V Rangaraj Wireless Security in Medical Devices
Tutorial Dr G V Rangaraj Wireless Security in Medical Devices
 
Tutorial on Wireless Security in Medical Devices
Tutorial on Wireless Security in Medical DevicesTutorial on Wireless Security in Medical Devices
Tutorial on Wireless Security in Medical Devices
 
Secure and Efficient Data Transmission for Cluster-based Wireless Sensor Netw...
Secure and Efficient Data Transmission forCluster-based Wireless Sensor Netw...Secure and Efficient Data Transmission forCluster-based Wireless Sensor Netw...
Secure and Efficient Data Transmission for Cluster-based Wireless Sensor Netw...
 

Último

Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoffsammart93
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?Igalia
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProduct Anonymous
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdflior mazor
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024The Digital Insurer
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAndrey Devyatkin
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?Antenna Manufacturer Coco
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century educationjfdjdjcjdnsjd
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobeapidays
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CVKhem
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 

Último (20)

Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 

Biometric-based Security for Data Authentication in Wireless Body Area Network(WBAN)

  • 1. A BIOMETRIC-BASED SECURITY FOR DATA AUTHENTICATION IN WIRELESS BODY AREA NETWORK(WBAN) By Shreyas S. Tote Under the guidance Prof. J.H.Saturwar Department Of Computer Science and Engineering Jawaharlal Darda Institute of Engineering & Technology, Yavatmal, (M.S), India-445001 Session 2014-2015
  • 2. CONTENTS  What is Biometric Security?  What is WBAN?  Security Issues In WBAN  Why Biometric based Security Approach for Data authentication  Applications of WBAN  Advantages and Disadvantages of Biometrics  Conclusion
  • 3. WHAT IS BIOMETRIC SECURITY?  It is a security mechanism used to authenticate.  Based on Human Characteristic.  Often used Critical Environment.
  • 4.
  • 6. WHAT IS WBAN?  Smart biomedical sensor platform  Analyze the measured signals and transmit them to user interface wirelessly.  Consist of a set of a mobile and small size intercommunicating sensors.  Limited Resources
  • 8. SECURITY ISSUES IN WBAN  Security Problems in WBAN  Less Extent on Evolving Network Protocol  Cryptography Techniques are used in WBAN  Problems in Cryptographic Technique  Complex and Difficult to use
  • 9. WHY BIOMETRIC BASED SECURITY APPROACH FOR DATA AUTHENTICATION  Universal  Distinctive  Permanent  Collectable  Effective  Invulnerable  Acceptable
  • 10. HEART RATE VARIABILITY(HRV)  Unique Characteristics  Time interval between heart varies  Autonomic Nervous System comprise two basic component *Sympathetic *Parasympathetic
  • 11. WHY ELETROCARDIOGRAM(ECG) PREFERRED  Universality  Uniqueness  Robustness  Liveness detection
  • 13. R-PEAK DETECTION Fig. Before and After Preprocessing of NOISY ECG signal
  • 15. Preprocessing Message MAC Likelihood algorithm Estimation Hash Function Schematic representation of normal ECG Biometric Feature (from medical database) Authentication(Yes/No) Biometric Feature Fig-Proposed biometric based security for data authentication | | |_ _ _ _ _ _ _ _ _ _ _ _ _ _ __ _ _ _ __ _ _ _ _ __ Original message
  • 16. APPLICATIONS OF BIOMETRICS  Biometric Time and Attendance  Biometric Safe and Locks  Securing Access To PC‟s  High End Security  Identifying Criminals
  • 18. ADVANTAGES & DISADVANTAGES OF BIOMETRICS ADVANTAGES  Error  Mistakes  Fraud,  Forgery DISADVANTAGES  limited by many situations  Affordability
  • 19. CONCLUSION  Secure communications in BANs are strongly required to preserves a person‟s health, privacy and safety.  Senders electrocardiogram feature is selected as the biometric key for data authentication mechanism.  The security system implemented with low computational complexity and high power efficiency instead of cryptographic key distribution.
  • 20. REFERENCES [1]P.Abina, K.Dhivyakala, L.Suganya, S.Mary Praveena “Biometric Authentication System for Body Area Network Vol. 3, Issue 3, International Journal of Advanced Research in Electrical, Electronics and Instrumentation Engineering, Coimbatore, India March 2014 [2] Sofia Najwa Ramlil, Rabiah Ahmad, Mohd Faizal Abdollah, Eryk Dutkiewicz4 “A Biometric-based Security for Data Authentication in Wireless Body Area NetworK(WBAN),ICACT January 27 ,2013 [3]Systems and Network Analysis Center Information Assurance Directorate by National Security Agency,United states of America,2013
  • 21. [5] L. Eschenauer and V. D. Gligor, „A Key Management Scheme forDistributed Sensor Networks‟, Version: pp. 41–47, November 18–22, 2002 [4] Lin Yao, Bing Liu, GuoweiWu, Kai Yao and JiaWang1,” A Biometric Key Establishment Protocol for Body Area Networks”, IJDSN, vol 2011