Verification of Key Establishment Protocols for a Home Health Care System

View/ Open
Author(s)
Singh, Kalvinder
Muthukkumarasamy, Vallipuram
Griffith University Author(s)
Year published
2008
Metadata
Show full item recordAbstract
A Body Sensor Network can be used in a home health care system to monitor the elderly or patients with chronic diseases. The security and requirements of the home health care system is complex. We show how genetic design methodology models the requirements of the health care system. In our system, physiological data can be used to establish keys amongst body sensors, where the sensors have no other prior secret. We show how the requirements of the key establishment protocol can be placed into a Requirement Behaviour Tree. A model is generated from the behaviour tree, and a model checker is used to formally verify the protocol ...
View more >A Body Sensor Network can be used in a home health care system to monitor the elderly or patients with chronic diseases. The security and requirements of the home health care system is complex. We show how genetic design methodology models the requirements of the health care system. In our system, physiological data can be used to establish keys amongst body sensors, where the sensors have no other prior secret. We show how the requirements of the key establishment protocol can be placed into a Requirement Behaviour Tree. A model is generated from the behaviour tree, and a model checker is used to formally verify the protocol within our system. Implementation of the salient features of each of the protocols is provided. The salient features of the protocols were implemented in TinyOS and run on mica2 motes. The time elapsed, complexity of the code, and memory requirements are analysed in detail.
View less >
View more >A Body Sensor Network can be used in a home health care system to monitor the elderly or patients with chronic diseases. The security and requirements of the home health care system is complex. We show how genetic design methodology models the requirements of the health care system. In our system, physiological data can be used to establish keys amongst body sensors, where the sensors have no other prior secret. We show how the requirements of the key establishment protocol can be placed into a Requirement Behaviour Tree. A model is generated from the behaviour tree, and a model checker is used to formally verify the protocol within our system. Implementation of the salient features of each of the protocols is provided. The salient features of the protocols were implemented in TinyOS and run on mica2 motes. The time elapsed, complexity of the code, and memory requirements are analysed in detail.
View less >
Conference Title
ISSNIP 2008: PROCEEDINGS OF THE 2008 INTERNATIONAL CONFERENCE ON INTELLIGENT SENSORS, SENSOR NETWORKS, AND INFORMATION PROCESSING
Volume
3
Issue
6
Copyright Statement
© 2008 IEEE. Personal use of this material is permitted. However, permission to reprint/republish this material for advertising or promotional purposes or for creating new collective works for resale or redistribution to servers or lists, or to reuse any copyrighted component of this work in other works must be obtained from the IEEE.
Subject
Other information and computing sciences not elsewhere classified