By Topic

A biometric-based security for data authentication in Wireless Body Area Network (WBAN)

Sign In

Cookies must be enabled to login.After enabling cookies , please use refresh or reload or ctrl+f5 on the browser for the login options.

Formats Non-Member Member
$33 $13
Learn how you can qualify for the best price for this item!
Become an IEEE Member or Subscribe to
IEEE Xplore for exclusive pricing!
close button

puzzle piece

IEEE membership options for an individual and IEEE Xplore subscriptions for an organization offer the most affordable access to essential journal articles, conference papers, standards, eBooks, and eLearning courses.

Learn more about:

IEEE membership

IEEE Xplore subscriptions

4 Author(s)
Sofia Najwa Ramli ; Center for Advanced Computing Technology, Faculty of Information Technology and Communication, Universiti Teknikal Malaysia Melaka, Malaysia ; Rabiah Ahmad ; Mohd Faizal Abdollah ; Eryk Dutkiewicz

The empowerment in wireless communication technologies and sensors have developed the Wireless Body Area Network (WBAN). In the past few years, many researchers have been focusing on building system architecture of health monitoring to improve the technical requirement specifically designed for WBAN. Less research was found in providing the strong security system. As part of communication medium, WBAN faced various security issues such as loss of data, authentication and access control. Implementing high security system leads to inconsistency in computational performance. It is recommended that the security system for WBAN must be implemented with low computational complexity and high power efficiency. None of previous researches successfully identified solution to the above problem. This study explores the use of biometric characteristics in securing data communication within WBAN and reducing computational complexity as well as power efficiency. Hybrid authentication model is used as a conceptual framework for the system. Precisely, the proposed framework requires a unique feature of human body regarded as the authentication identity, while the other techniques use hardware and software to achieve the same purpose. In addition, an authentication process is provided by using this unique feature of the body as a key to develop a security system under the resource-constrained of WBAN sensor challenges.

Published in:

Advanced Communication Technology (ICACT), 2013 15th International Conference on

Date of Conference:

27-30 Jan. 2013