14
Research Article A Cognitive-Radio-Based Method for Improving Availability in Body Sensor Networks Olga León, 1 Juan Hernández-Serrano, 1 Carles Garrigues, 2 and Helena Rifà-Pous 2 1 Telematics Department, Technical University of Catalonia, 08034 Barcelona, Spain 2 IT, Multimedia and Telecommunications Department, Open University of Catalonia, 08018 Barcelona, Spain Correspondence should be addressed to Olga Le´ on; [email protected] Received 11 July 2015; Accepted 20 September 2015 Academic Editor: Gyanendra P. Joshi Copyright © 2015 Olga Le´ on et al. is is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited. One of the main threats to body sensor networks (BSNs) is Denial of Service attacks that disrupt communications used to transmit patients’ health data. e application of cognitive radio (CR) technology into BSNs can mitigate such a threat and improve network availability, by allowing network nodes to cooperatively agree on a new radio channel whenever the quality of the channel being in use decreases. However, the cooperative spectrum sensing mechanisms used by CRs should also be protected to prevent an attacker from predicting the new channel of operation. In this work, we present a lightweight and robust mechanism that appropriately secures the channel selection process while minimizing resources consumption, thus being suited for resource constrained devices such as body sensor nodes. e proposed method has been analyzed in terms of energy consumption and transmission overhead and it has been shown that it outperforms existing cryptographic approaches. 1. Introduction Sensor and wireless communication technologies are rapidly evolving and spreading to many fields, such as medical services. Body sensor networks (BSNs) [1, 2] are becoming more popular and powerful every day and ongoing efforts, such as the IEEE 802.15.6 standard optimized for low-power BSN devices [3], clearly reflect the increasing importance and potential of these types of networks. A typical BSN is composed of a number of sensors that are placed at various locations on the body or in body, also known as implantable medical devices (IMDs). As depicted in Figure 1, these sensors forward sensed data to a more computationally powerful device or gateway (e.g., a smartphone) that, in its turn, can transmit the gathered data to a medical center. erefore, the professionals can constantly monitor the patient’s state and take the proper actions according to the observed data. us, the use of BSNs can considerably reduce the gap between a medical emergency and the medical response while increasing the autonomy of patients, that is to say, their quality of life. Body sensors exhibit more constraints regarding size, power, battery availability, and transmission (i.e., the human body is a lossy medium) than those sensors that can be found in conventional wireless sensor networks (WSNs) and, therefore, they require specific solutions. Besides the recent IEEE 802.15.6 standard, already supported by a few commercial devices, several low-power wireless technologies [4–7] suitable for BSNs have emerged during the last years. ese technologies define typical transmission rates ranging from several kbps in ANT+ to 6 Mbps in WiFi with the lowest power 802.11b mode. Lately, there has been increasing concern in incorporating security and privacy mechanisms to medical systems in order to preserve patients’ privacy and offer continuous monitoring of their health status. Besides, FDA (Food and Drug Admin- istration) made recently a call for manufacturers to address cybersecurity issues relevant to medical devices for the entire life cycle of the device [8]. us, it is expected that these facts will definitely encourage a number of works in this field. Generally speaking, the following security services should be provided in any medical system. Hindawi Publishing Corporation International Journal of Distributed Sensor Networks Volume 2015, Article ID 272869, 13 pages http://dx.doi.org/10.1155/2015/272869

Research Article A Cognitive-Radio-Based Method for

  • Upload
    others

  • View
    3

  • Download
    0

Embed Size (px)

Citation preview

Page 1: Research Article A Cognitive-Radio-Based Method for

Research ArticleA Cognitive-Radio-Based Method for Improving Availability inBody Sensor Networks

Olga Leoacuten1 Juan Hernaacutendez-Serrano1 Carles Garrigues2 and Helena Rifagrave-Pous2

1Telematics Department Technical University of Catalonia 08034 Barcelona Spain2IT Multimedia and Telecommunications Department Open University of Catalonia 08018 Barcelona Spain

Correspondence should be addressed to Olga Leon olgaentelupcedu

Received 11 July 2015 Accepted 20 September 2015

Academic Editor Gyanendra P Joshi

Copyright copy 2015 Olga Leon et al This is an open access article distributed under the Creative Commons Attribution Licensewhich permits unrestricted use distribution and reproduction in any medium provided the original work is properly cited

One of the main threats to body sensor networks (BSNs) is Denial of Service attacks that disrupt communications used to transmitpatientsrsquo health dataThe application of cognitive radio (CR) technology into BSNs canmitigate such a threat and improve networkavailability by allowing network nodes to cooperatively agree on a new radio channel whenever the quality of the channel being inuse decreases However the cooperative spectrum sensingmechanisms used by CRs should also be protected to prevent an attackerfrom predicting the new channel of operation In this work we present a lightweight and robust mechanism that appropriatelysecures the channel selection process while minimizing resources consumption thus being suited for resource constrained devicessuch as body sensor nodes The proposed method has been analyzed in terms of energy consumption and transmission overheadand it has been shown that it outperforms existing cryptographic approaches

1 Introduction

Sensor and wireless communication technologies are rapidlyevolving and spreading to many fields such as medicalservices Body sensor networks (BSNs) [1 2] are becomingmore popular and powerful every day and ongoing effortssuch as the IEEE 802156 standard optimized for low-powerBSN devices [3] clearly reflect the increasing importance andpotential of these types of networks

A typical BSN is composed of a number of sensors thatare placed at various locations on the body or in bodyalso known as implantable medical devices (IMDs) Asdepicted in Figure 1 these sensors forward sensed data toa more computationally powerful device or gateway (ega smartphone) that in its turn can transmit the gathereddata to a medical center Therefore the professionals canconstantly monitor the patientrsquos state and take the properactions according to the observed data Thus the use ofBSNs can considerably reduce the gap between a medicalemergency and the medical response while increasing theautonomy of patients that is to say their quality of life

Body sensors exhibit more constraints regarding sizepower battery availability and transmission (ie the humanbody is a lossy medium) than those sensors that can befound in conventional wireless sensor networks (WSNs)and therefore they require specific solutions Besides therecent IEEE 802156 standard already supported by a fewcommercial devices several low-power wireless technologies[4ndash7] suitable for BSNs have emerged during the last yearsThese technologies define typical transmission rates rangingfrom several kbps in ANT+ to 6Mbps inWiFi with the lowestpower 80211b mode

Lately there has been increasing concern in incorporatingsecurity and privacymechanisms tomedical systems in orderto preserve patientsrsquo privacy and offer continuousmonitoringof their health status Besides FDA (Food and Drug Admin-istration) made recently a call for manufacturers to addresscybersecurity issues relevant to medical devices for the entirelife cycle of the device [8] Thus it is expected that these factswill definitely encourage a number of works in this field

Generally speaking the following security servicesshould be provided in any medical system

Hindawi Publishing CorporationInternational Journal of Distributed Sensor NetworksVolume 2015 Article ID 272869 13 pageshttpdxdoiorg1011552015272869

2 International Journal of Distributed Sensor Networks

3G4G

BSN

Gateway

Sensor

WiFiBluetooth

Internet Medical center

Figure 1 BSN model

Confidentiality Data regarding patientsrsquo state should be onlyaccessible to authorized entities In this context this impliesthat only the BSNrsquos nodes should be able to interpret thesensed data

Authentication The BSNrsquos nodes should be able to verify thesource of any received data

Integrity Data should not be modified by an unauthorizedentity or at least BSNrsquos nodes should be able to detect thatdata has been altered

Availability Data anddevice information should be accessibleupon request by authorized entities The human body is ahighly dynamic physical environmentwherewireless channelproperties constantly change Besides these communicationscan be severely affected by interferences caused by electronicdevices in the proximity of the BSN

The first three security goals can be easily achievedby means of classical cryptographic tools in conventionalnetworks However the limited capabilities of body sensorsmay prevent from applying them toBSNs Besides traditionalcryptographic tools cannot prevent disruption of the networkservices due to interferences no matter whether they areintentional for example a Denial of Service (DoS) attack ornot Given the relevance of the data sent by body sensorsthere is clearly a need for mechanisms to maximize theavailability of such networks

The integration of CR technology [9ndash11] into BSNs lead-ing to the concept of cognitive body sensor networks (CBSNs)[12] can significantly improve availability by allowing thenodes to select the best channel at any moment and avoidthe harmful effect of interferences CRs exchange sensed dataabout channel availability and jointly agree to switch to a newchannel when the channel being in use becomes unavailable

Note that if an attacker manages to eavesdrop channelavailability data it can take advantage of it to perform a newattack on the new channel of operation thus preventing thenetwork from using an available channel and leading thenetwork to a DoS [13] Channel switching if unpredictablerendersDoS attacksmore difficult since the attackermust jamevery possible transmission channel Traditional encryptionand authentication of exchanged data may help to hide chan-nel switching decisions from external attackers but entail anadditional cost that cannot be assumedby heavily constraineddevices such as IMDs

In this paper we present a protocol to protect the processof channel selection in CR-based BSNs The main goal isto maximize the availability of the network thus ensuringthat patientsrsquo data such as blood pressure heart rate andtemperature will successfully be delivered to a gateway(nonstop monitoring of patients) The protocol makes use oflightweight encryption and authentication primitives specif-ically suited for constrained devices such as body sensors

The main contributions of this paper can be summarizedas follows

(i) We apply CR technology into BSNs in order tomaximize the availability of services in suchnetworksBecause CRs are able to sense the medium and selectthe best transmission channel at any moment theeffect of interferences or DoS attacks can be miti-gated In a conventional network such phenomenawould interrupt communications within the BSNsIn a CBSN the nodes can switch to a new channelwhenever the channel in use becomes unavailable

(ii) We propose a method suited to constrained devicesas body sensors to secure the exchange of channelavailability information and prevent an attacker fromeavesdropping such data thus diminishing the prob-ability of a successful DoS attack

International Journal of Distributed Sensor Networks 3

(iii) We provide a security analysis of the proposedmethod and derive the time period during which thecryptographic material remains secure

(iv) The proposed method is compared to otherapproaches based on traditional cryptographic prim-itives in terms of energy consumption and CPUusage

The rest of this document is structured as follows InSection 2 we review the state of the art on security in BSNsSection 3 describes the BSN model considered in this workand its potential threats A lightweight method to securethe process of channel selection in a BSN is presented inSection 4 Sections 5 and 6 present a security analysis of theproposedmethod and a comparisonwith existing approachesin terms of resources consumption Finally in Section 7 weprovide the conclusions of this work

2 Related Work

To date research on security in BSNs has mainly focused onprotecting data stored at the network nodes from unautho-rized access and providing authentication and confidentialityto the communications among the BSN devices In thefollowing we provide an overview of the proposals that canbe found in the literature

Many proposed authentication methods are based onbiometrics that is relying on measurements of physiologicalvalues (PVs) [14] such as heart rate blood pressure ortemperature in order to establish trust and generate keymaterial The main idea is ensuring access to sensors onlyto those devices in physical contact with the patient Theadvantage of these methods is that the key source is hard foran attacker to predict without physical access to the patientand also ensures forward-security because PVs change overtimeThemain challenge however is how to achieve success-ful authentication among authorized devices when the PVmeasured by each one is not exactly the same either due tomeasurement errors or due to the fact that different devicesmeasure a given PV at different time instants

Authentication by means of distance-bounding protocolswas proposed in several works [15 16] This techniqueprovides a very weak mutual authentication between twodevices based on measuring the transmission time betweenthemThe rationale behind these protocols is that a legitimatedevicemust be closer than a given distanceAs a consequencethey are vulnerable to injection attacks as long as the attackeris close enough to the patient bearing the sensors forexample by means of a hug

In [17] the authors presented a protocol based onidentity-based encryption (IBE) IBE systems are public keycryptosystems that allow any device to generate a publickey from a known identity value such as the sensor IDand require the existence of a trusted third party called theprivate key generator (PKG) to generate the correspondingprivate key To reduce the burden of key generation andencryptiondecryption introduced by traditional public keycryptography the authors proposed to use elliptic curvecryptography (ECC) which provides public key primitives

suitable for constrained devices as sensors in BSNs Despiteit it is still more expensive in terms of resource consumptionthan approaches based on symmetric cryptography

In order to preserve userrsquos privacy a number of worksproposed the use of symmetric encryption based on the AES(Advanced Encryption Standard) algorithm [18ndash20] Manysuch as the one in [19] proposed to use AES with CCMmode of operation that is to say AES counter (CTR) modefor data encryption and AES cipher-block-chaining messageauthentication code (CBC-MAC) formessage authenticationThe main advantage of this mode is that the same keycan be used for authentication and for encryption withoutcompromising security and there is no need for rekeyingas long as the number of devices is fixed As a drawbackthe added cost of encryptiondecryption and especially thecosts due to the transmission overheads cannot be neglectedin BSNs where every step forward in resourcesrsquo saving isof paramount importance In this line the authors in [20]presented an in-network mechanism that mimics the AESalgorithm and greatly reduces the costs of decryption whilethey claim achieving the same level of security

All the above-mentioned proposals approach the prob-lem of protecting patientrsquos data from unauthorized accessmodification or forgery but cannot effectively deal with DoSattacks Such a protection can be achieved by making use ofCR devices that collaboratively switch to another frequencyband [11 21 22] if the signal-to-noise ratio of the current oneis below the required value Furthermore it is also necessaryto protect the exchanged sensing data in order to prevent anattacker from eavesdropping data and get the next channelto be used in the network Note that this information mayallow an attacker to rapidly perform a DoS attack in the newchannel

In this work we present a lightweight and secure methodthat makes use of CR technology for improving the availabil-ity of the system that is ensuring that the communicationbetween the body sensor nodes will be available even underthe presence of unintentional or intentional interferencesThe application of CR technology into body sensor networkswas already proposed in previous works [23 24] However tothe best of our knowledge none of them addressed securitytopics

In [25 26] several methods for securing spectrum sens-ing mechanisms were discussed but they are not suited forheavily constrained devices such as body sensors

In [27] the authors aimed to improve the availability ofa BSN by means of a cross-layer multihop protocol that dealtwith routing of data This scheme however can be appliedonly to multihop BSNs where the path between two givennodes is established according to the connectivity among thenodes In this approach nodes make use of several paths butone single channel and thus are more vulnerable to attackssuch as jamming than CR-based networks

3 Network Model and Threats

In this work we have considered a BSN composed of aset of sensor nodes where all of them can act as sinkscollectingstoring data from other sensors and potentially

4 International Journal of Distributed Sensor Networks

Gateway

Sensor

Sink

Figure 2 Communication between sensors and the gateway

transmitting these data to an external gateway if required (seeFigure 2) Although this approach introduces some overheaddue to the fact that data must be shared among all sensorsit improves network availability and robustness against dataloss and fairly distributes energy consumption among allsensors Also itmakes the process of gathering by the gatewayeasy which can connect to any of the BSN nodes to get all theinformation

As previously mentioned we also assume that sensorshave cognitive capabilities that is they form a CBSN andare able to identify free spectrum bands and adapt theirtransmission parameters accordingly Spectrum sensing canbe performed by each node on an individual basis or cooper-atively As the latter increases the probability of detection dueto space diversity [28] we have adopted such an approach inthis work

In cooperative spectrum sensing each sensor sensesthe medium and exchanges its observations with the othermembers of the network in order to agree on a given channelfor data transmissionreception However these control dataare exposed to many attacks [13] such as packet injectioneavesdropping or Denial of Service (DoS) Next we describethe attacker model and the specific attacks that can beexecuted against CBSNs

31 Attacker Model In this work we focus on outsiders thatis external attackers that do not share any cryptographiccontent with the gateway or the victimrsquos sensor nodes Ifthe attacker nodes are part of the CBSN they will haveaccess to the keying material and therefore will be able tosuccessfully eavesdrop and inject data In any case the designof a mechanism to counteract this threat is out of the scopeof this work

In the context of CBSNs we can classify adversariesaccording to the following criteria

(i) Active or passive a passive attacker can only eavesdropdata thus being able to access patientrsquos data andviolating hisher privacy In its turn an active attackeraims at injecting or modifying data in order to sendfake reports on the state of the patient

(ii) Type of attack includes the following

(a) eavesdropping unauthorized access to storeddata or to transmitted data among the CBSNdevices thus violating the privacy of the patient

(b) modificationinjection an attacker that mayalter the content of a packet transmitted by asensor or impersonate a sensor by forging apacket these attacks can be executed due to lackof authentication and violate the integrity of theCBSN communications

(c) packet replay an attacker that may capture apacket that was previously sent by a sensor ofthe network Regardless of the fact that theCBSN is using authentication mechanisms ornot the packet will be accepted by the networksif antireplay mechanisms are not provided

(d) jamming the adversary that disrupts the CBSNcommunications by generating interfering sig-nals

(iii) Intentional or unintentional the adversary can bean external entity willing to cause damage to thecommunications among sensors and the gateway orcan be an entity that unintentionally is causing inter-ferences to those communications As an examplethe patient of interest could be near another patientwith wearable sensors which could inject fake reportsif data is not properly authenticated Examples ofunintentional attacks could take place in a situationwhere two patients bearing body sensors are huggingand unconsciously exchange data Or the patientcould be near a relative who is visiting himher at thehospital and carries any electronic device that causesinterferences to the CBSN

It is important to remark that in a CBSN where sensornodes establish communications using different channelsover time these attacks can be extended to the control dataexchange among the devices of the CBSN As an example anattacker may forge a report regarding the availability of thechannels thus leading the CBSN to select a channel that issuffering from high interferences or that is currently beingused by another service Note that this attack can lead to aDoS and the failure of the system in monitoring the patientrsquosstatus In its turn eavesdropping of the control channel allowsan attacker to have knowledge of the channels to be usedby the CBSN The attacker could take advantage of thissituation in order to easily disrupt the communications inthe network by performing a new DoS attack every time theCBSN switches to a new channel

The implementation of security mechanisms in a CBSN[12] to counteract these attacks is specially challenging dueto the limited capabilities of CBSNrsquos nodes In the followingsection we describe a simple method to secure the processof channel selection in CBSNs The proposed mechanismis suited for networks with extremely constrained-resourcesdevices since it makes use of lightweight cryptographicfunctions and minimizes the added transmissionreceptionoverhead

International Journal of Distributed Sensor Networks 5

4 Securing Sensing Data andChannel Selection in CBSNs

In the following we present a mechanism for securing theexchange of sensing data and the channel selection processin CBSNs Section 41 outlines the assumptions considered inthiswork regarding the networkmodel and in Section 42 wedescribe the protocol operation For ease of understandingwe present the terminology used along this section as follows

CTR119872 medium-term session counter (119898 bits)

CTR119878 short-term session counter (119898 bits)

119863119906

119894 data sensed by node 119906 during period 119894 (119897 bits)

ID119906 link-layer identifier of node 119906 (119898 bits)119870119906

119894 keystream to encrypt and authenticate data for

node 119906 during period 119894 (119903 bits)KM keying master119897 length of the data sensed by a given node during agiven period119898 length of the hash output and all the secrets119873 number of nodes in the network119901 number of keystreams119870119906

119894obtained from a 119878119906 (119901 =

119898119903) defining the number of sensing periods beforeupdating 119878119906119903 length of the keystreams 119870119906

119894 which must be a

divisor of119898119878119871 long-term globally shared secret (119898-bits)119878119872 medium-term globally shared secret (119898-bits)119878119904119894 long-term secret shared between the KM and

node 119894 it is used to update 119878119871in case it is compro-

mised119878119906 short-term shared secret with node 119906

41 Assumptions Although the proposed protocol isdesigned to be implemented in heavily constrained deviceswe work under the assumption that such devices have at leastthe following capabilities

(i) Compute a hash function with an output length of119898bits

(ii) Temporally store in its randomaccessmemory at least119898 sdot (119873 + 3) bits with 119873 the number of nodes in thenetwork As we detail later in Section 42 each nodemust keep a short-term shared secret for each of theN nodes in the network (including itself) and threemore long-term and medium-term secrets each onewith length of119898 bits

(iii) Sensor nodes use a synchronization protocol that willbe used to share a global short-term session counterand a medium-term session counter among all nodes(see Section 42) Given the low transmission rate ofsensor networks existing synchronization schemes[29] provide enough precision for this purpose Weassume that the chosen protocol provides recovery

methods upon loss of synchronization How syn-chronization is achieved will strongly depend on thechosen protocol but if the latter requires a masternode for providing synchronization the gateway ofthe BSN could play this role

To the best of our knowledge the former requirement canbe assumed even in very constrained devices As shown in[30] there are several lightweight hash functions that canbe integrated into a sensor mote The latter may not beharder to achieve As detailed in Section 42 during everysensing period each node stores one secret per member ofthe network a globally shared secret and two counters allof them with the same length 119898 as the hash output If weconsider a typical hash function with an output of 128 or 256bits and a network with tens to hundreds of sensors the RAMrequirements for sensor nodes are just bounded to a few tensof kilobytes

42 Protocol Operation Before deploying the CBSN everysensor nodemust be preloaded by a keyingmaster (KM)withthe following data

(1) The set of channels that the sensor will have to sensein the cooperative sensing process

(2) A long-term and globally shared secret 119878119871of 119898 bits

(the hash output length)(3) A long-term secret 119878

119904119894shared between the KM and

node 119894 that will be used to update the globally sharedsecret 119878

119871in case it is compromised

The KM is an external device which is not a member oftheBSNTypically this role is played by the device responsiblefor gathering data from the sensors or gateway (eg a smartphone or a tablet)

Upon deployment of the network every node derives amedium-term globally shared secret 119878

119872by hashing the XOR

of the long-term secret 119878119871and a counter The generation

process of 119878119872

is clearly depicted in Figure 3 This process isperiodically repeated with an updated value of the medium-term counter in order to protect the secret against a potentialattacker Details about how often this process should becarried out and the attacker capabilities are provided inSection 5

As shown in Figure 4 each node generates a set ofrandom sequences of 119898 bits one for the node itself and onefor each other node in the networkThese random sequences119878119906 with 119906 the node identifier are obtained by hashing theXOR of the link-layer identifier of the node ID119906 themedium-term shared secret 119878

119872 and a short-term session counter

CTR119878

Therefore our proposalmakes use of three types of sharedsecrets

(i) A short-term per-node shared secret 119878119906 (one per eachnode in the network) used for encryption decryptionand authentication of data

(ii) Amedium-term globally shared secret 119878119872that is used

to derive the short-term per-node shared secrets 119878119906

6 International Journal of Distributed Sensor Networks

Long-term shared secretSLmiddot middot middot

middot middot middot

middot middot middot

Medium-term session counter

Medium-term shared secret

CTRM

HashSM

mbits

mbitsmbits

mbits

Figure 3 Generation of the medium-term globally shared secret 119878119872

middot middot middot

middot middot middot

middot middot middot

middot middot middot

Short-term session counterMedium-term shared secret

node uShort-term shared secret with

Hash

SM

Su

Identifier of node uIDu

CTRS

mbits

mbitsmbits

mbits

mbits

Figure 4 Generation of the short-term shared secret 119878119906 for node 119906

(iii) A long-term globally shared secret that is used toderive a new 119878

119872when the current one is about to

expireAs clearly denoted in Figure 5 each sequence 119878119906 is divided

into 119901 fragments of 119903 bits which we will be denoted as 119870119906119894

each one being used as keystream to encrypt and authenticatedata for node 119906 in period 119894 As per this behavior a new short-term shared secret must be derived every 119901 sensing period

When a node performs spectrum sensing it generates abinary sequence 119863119906

119894of 119897 bits that stores the availability of the

different channels The length of such sequence 119897 will dependon the number of bits used to code the state of each channeland the number of channels As an example the simplest waywould be to use just a single bit for coding each channel withvalue ldquo0rdquo if the channel is occupied and ldquo1rdquo otherwise If moreprecise information about the quality of channels is needed(ie high medium low and very low quality) more bits canbe used to code the channel state

During a sensing period 119894 each node must send toits neighbors its own sensing information but also it mustprocess the information received from its neighbors to reacha joint decision

In order to send its own sensing information node 119906 willmake use of the corresponding keystream 119870119906

119894 the first 119897 bits

of the keystream will be used to encrypt channel information119863119906

119894by means of a XOR addition the remaining 119903 minus 119897 bits are

left unchanged and will be used to provide message authen-tication as illustrated in Figure 5 The resulting sequence 119862119906

119894

will be sent to all the other nodes

To verify the authenticity and decrypt the content of thepackets that have been sent by a given neighbor 119906 a nodewill XOR the sequence 119862119906

119894of the received packet with the

keystream 119870119894119906 as depicted in Figure 6 If the last 119903 minus 119897 bits

of the resulting sequence are not all 0 s the authenticationfails and the entire packet is discarded Otherwise channelinformation can be recovered from the first 119897 bits resultingfrom the XOR addition

The above described process is applied for each neighbor-ing node 119906 Then the channel reported by a larger number ofneighbors will be selected for the operation of the networkNote that because more than one channel may be reported bythe same amount of nodes a tie-break mechanism is neededto guarantee that the process leads to equal results in allnodes One simple approach that could be used is to selectthe channel with the highest identifier However this wouldlead to a lower usage of channels with lower identifiers andtherefore to providing the attacker with valuable informationabout channel usage in the CBSN As a consequence wepropose to use a tie-break method that relies on the formatof119863119906119894

Recall that a fundamental characteristic of this protocolis that there is no central entity that is known and trusted byall sensors This makes the protocol suitable for unattendedscenarios and it also makes it more efficient in terms of datatransmitted through the network because no information issent regarding which channels have to be sensed or whichchannel is finally selected Instead sensors are deployedwith all the information needed to perform the sensing in

International Journal of Distributed Sensor Networks 7

middot middot middot

Short-term shared secret with node u

Keystream pKeystream 2Keystream 1

Su

Encrypted Authdatasensing data

Sensing data

Sensing data

Sensing period 1

Sensing period p

Encrypted Authdatasensing data

Cup

Cu1

Dup

Du1

Ku1 Ku

2 Kup

mbits

rbitsrbitsrbits

lbitslbits

lbitslbits

lbits

lbits

lbitslbits r-lbitsr-lbits

r-lbits

r-lbits

Figure 5 Encrypting and authenticating sensing data

middot middot middot

Short-term shared secret with node u

Keystream pKeystream 2Keystream 1

Su

Sensing dataSensing period 1 True

Accept sensing data

Reject sensing data

Cu1

Du1

Ku1 Ku

2 Kup

If ne 0998400s

rbitsrbitsrbits

rbits lbits

mbits

r-lbits

Figure 6 Decrypting sensing data

a distributed way and make a joint decision autonomouslyThus there is no need for additional mechanisms to be usedwhen a new node joins the network In this case the newnode needs to synchronize with the rest of themembers to getthe proper value of the session counters by making use of thecorresponding protocol However when a node is expelledfrom the network because it has been compromised newcryptographic material must be generated and distributedamong the remaining nodes The KM is responsible fortriggering this process and communicates with each sensornode to update the shared long-term secret 119878

119871 Note that

because the KM shares a different secret 119878119904119894with each node 119894

it can securely distribute the new value of 119878119871 Upon reception

of 119878119871 each node should perform again the initialization

process described at the beginning of this section

5 Security Analysis

The security of the proposed method relies on the sharedsecrets used to derive the keys and perform encryption andauthentication of channel availability data As long as thesesecrets are not compromised data confidentiality can beensured that is an attacker might not be able to get the listof channels to be used in the CBSN Besides the methodmust prevent an attacker from injecting fake data into thesystem These issues are discussed as follows In Section 51we analyze how often the shared secrets should be updated inorder to guarantee a proper protection against cryptanalysisnext in Section 52 we evaluate the packet authenticationmethod used in our proposal in terms of probability ofbypassing the authentication check

8 International Journal of Distributed Sensor Networks

51 Shared Secrets Lifetime As previously mentioned inSection 31 for this analysis we are assuming that attackscome from external entities and therefore attackers are notable to obtain the cryptographic material that is stored in thebody sensors In the context of this proposal the lifetime ofeach of the shared secrets is the interval in which these secretsare considered computationally safe against cryptanalysisthat is their cryptoperiod

The cryptoperiod straightly depends on the chosen cryp-tographic protocols the length of the secrets themselves andthe amount of times they are used The more a given secret isused the shorter its cryptoperiod is as an attacker gets moreinformation about this secret and therefore the probability ofa successful cryptanalysis increases In fact cryptoperiod isdefined more in terms of the number of times a given secretor key is reused (the amount of ciphertext exposed to anattacker for a given secretkey) than as a given time periodwhich strongly depends on the transmission rate of the sensornodes

Recall the three types of shared secrets used in theproposed method

(i) Short-term per-node shared secrets one secret 119878119906 persource node that is used to lightweight encryptdecrypt and authenticate the channelsrsquo sensed data

(ii) Medium-term globally shared secrets globally sharedsecret 119878

119872that is used to derive the short-term per-

node shared secrets 119878119906(iii) Long-term globally shared secret this being the ini-

tially preloaded secret 119878119871that is used to derive a new

medium-term globally shared secret 119878119872

when thecurrent one is about to expire

As clearly denoted in Figure 5 our approach operates insome manner as an additive stream cipher It is well knownthat stream ciphers are considered to be secure as long as thekey is never reused and thus our cipher will be secure if agiven value 119878119906 is not repeated As a result 119878119906must be updatedevery 119901 = 119898119903 sensing period with 119901 the renewal period119898 the length of the shared secret 119878119906 and 119903 the amount oftransmitted bits (sensing data) in a sensing period that areencrypted with 119878119906

Recall that in our proposal the per-node key used forencryption 119878119906 is generated by means of a hash function Asecond requirement is that this function must be crypto-graphically secure Note that if the hash function does notaccomplish it an attackermight be able to reverse it that is toget the input of the hash function given an output meaningthat in our proposal an attacker would be able to recoverthe value of the medium-term globally shared secret 119878

119872(see

Figure 4)A cryptographically secure hash function with an output

of 119898 bits can offer a security level of 2119898 operations againstpreimage attacks and 21198982 against collision attacks Generallyspeaking a minimum output of 128 bits is required in orderto provide a high level of security for most applicationsbut shorter lengths are accepted if the number of generatedmessages in a given period is limited as it is the case of low-rate networks In Section 6 we propose several lightweight

hash candidates with an output of 128 bits that is to saywe can assume that it is computationally unfeasible for anattacker to invert the hash function and thus to predict thevalue of 119878119872 as long as it is updated before exceeding itscryptoperiod which has an upper bound of 21198982 = 264 uses

The long-term globally shared secret 119878119871is only used to

update the current medium-term globally shared secret 119878119872

Because 119878119872is not updated very often it is very unlikely that

an attacker manages to obtain several values of 119878119872to reverse

the hash function and recover 119878119871 As a result we can assume

that the 119878119871cryptoperiod is long enough and there is no need

to update the secret during the nodesrsquo lifetime

52 Authentication A cryptogram 119862119906119894of sensing data con-

tains an authentication field of 16 bits that is checked uponreception (see Figure 6) Consequently an attacker has achance of 1 in 216 of guessing the next authentication fieldwhich allows it to forge a valid authentication field and injectfake data Note that this attack can lead the CBSN to wrongdecisions about the availability of the spectrum

If the attacker repeatedly attempts to send valid cipher-texts it may succeed after 215 attempts in average Becausethe attacker does not know 119878119906 the authentication fieldappears to it as a random stream and therefore it must select afake authentication field at random Besides the attacker can-not determine whether a given ciphertext has been acceptedor rejected because the receiver does not acknowledge thereception of such packets to the emitter Otherwise theattacker could take advantage of this information in order toguess a valid authentication field in a faster way

In conventional networks 215 packets may seem anextremely low number but it may provide an adequate levelof security in CBSNs In these networks the attacker can onlysend fake packets during the sensing periods which is in theorder of a few milliseconds in most cognitive scenarios [31]Moreover as previously stated in Section 1 transmission ratesin BSNs are considerably low with values usually rangingfrom tens to a few hundred of kilobits per second

As an example let us consider a 1Mbps link a sensingperiod of 10ms and a packet size of 10 bytes (which is clearlybigger than the typical packet size in sensor networks) Giventhese parameters an attacker would only be able to send 125packets at most in every sensing period That is to say theattacker would need an average of 262144 sensing periods tosend a fake packet and pass the authentication check

6 Cost Evaluation and Comparisonwith Other Approaches

In this section we evaluate the cost of our proposal interms of energy consumption due to transmission overheadand computational cost and compare its performance withthe most common approach adopted in sensor networks[32] which is providing authentication andor encryption ofthe channel sensing data by means of using standard blockciphers As is well known block ciphers have as input themessage to be encrypted or authenticated which is dividedinto several blocks of fix length and a key Both the block

International Journal of Distributed Sensor Networks 9

length and the key length depend on the algorithm beingused Regardless of the algorithm block ciphers can be usedin several modes of operation depending on the service tobe provided that is encryption only authentication only orencryptionauthentication Generally the followingmodes ofoperation are applied

Authentication CBC-MAC is a block cipher mode for gen-erating message authentication codes The message to beauthenticated is divided into several blocks of equal size andeach block is encrypted so that the value of a given blockdepends on the encryption of the previous block The finaloutput of the cipher that is the message authentication codeor CBC-MAC is the result of encrypting the last block of themessage When the input of the cipher is shorter than theblock size (as it is usually the case in sensor networks) theCBC-MAC can be obtained by directly encrypting a singleblock padded until the block size of the cipher is reached

Encryption CTRmode of operation turns a block cipher intoa stream cipher meaning that the resulting ciphertext has thesame size as the input or plain textThus it does not force theoutput length to be amultiple of the block size as it is the caseof other modes such as CBC-MACThis property makes thismode of operation suitable for encryption in sensor networkswhere devices usually exchange short-length messages

Authentication+Encryption CCM (CTR + CBC-MAC) is acommon choice for providing both encryption (CTR) andauthentication (CBC-MAC) [19] Aminor variation of CCMcalled CCMlowast is used in the ZigBee standard [7]

In this work we assume that Advanced EncryptionStandard (AES) in CTRmode is used for encryption andAESCBC-MAC for authentication as it is the current standardfor symmetric cryptography even in sensor nodes [33]Currently there are efficient hardware implementations ofAES that are highly affordable

Regarding hardware platforms the vast majority of pre-vious works on BSNs have used the 16-bit Texas Instrumentsrsquo(TI) MSP430 and CC2540 families of microcontrollers [34]Built around a 16-bit CPU ultra-low-power MSP430 micro-controllers are designed for low cost and specifically low-power consumption embedded applications As an exampleTIrsquos CC2540 family [35] enable robust Bluetooth low energy(BLE) network nodes to be built with low total bill-of-material (BOM) costs BLE operates in the same spectrumrange (2400GHzndash24835GHz ISM band) as classic Blue-tooth technology but uses a different set of channels insteadof 79 1MHz channels BLE offers 40 2MHz channels 3 foradvertising purposes and 37 for data exchange

61 TransmissionReception Overhead In this section weanalyze the overhead introduced by our proposal in termsof transmissionreception of channel availability data andcompare it with the overhead exhibited when conventionalapproaches are used for data encryptionauthentication asexplained above We assume that all sensors are capable ofsensing a given set of channels and report information abouttheir state

With our proposal the minimum number of transmittedbitswill dependon the number of channels that a given sensoris reporting the number of bits used to code the state ofeach channel and the length of the authentication code Asexplained in Section 52 a length of 16 bits is enough to securemost applications in WSNs and thus we have assumed thisvalue for the authentication fieldThis leads to a total amountof Bits

119905119909= 119897 + 16 of transmitted bits where 119897 represents the

total number of bits used to code all possible channels andBits119905119909= (119899 minus 1)Bits

119905119909received bits representing the number

of bits received by a given sensor from its neighborsAiming to provide a fair comparison we choose the same

key length for block ciphers and for our proposal that is tosay a 128-bit key The transmitted bits overhead added byAES CBC-MAC authentication is 128 bits (for a semanticallysecure implementation also an IV or nonce must be sharedbetween emitter and receiver so that the overhead can behigher) Regarding encryption the number of transmittedbits is equal to the number of bits 119897 used to code the state of thechannels but it also requires the use of a nonce with a lengthequal to half of the key length that is 64 bits per message

During every sensing period every node must transmita packet with sensing information but also must process thepackets received from its neighbors Table 1 and Figure 7respectively show the transmission and reception overheaddue to the secure sharing of sensing information using bothstandard block ciphers and our proposal The values areprovided as a function of the number of bits 119897 used to codethe state of the channels and the number of nodes119873 rangingfrom 5 to 30 Given that the considered scenario is a bodysensor network this is more than a reasonable value sincea patient wearing more than 30 sensors may be an unlikelysituation

The reader may notice that the overhead introducedby this mechanism increases linearly with the number ofnodes for both approaches However with the proposedmethod the transmissionreception overhead is considerablyreduced with respect to the use of standard block cipherswhile still maintaining an acceptable level of security Infact the more the nodes in the CBSN the bigger theimprovement introduced by the former As wewill show laterthe transmissionreception savings lead to a huge saving alsoin energy consumption

62 Computational Cost In this section we provide a com-parison of the CPU cost in cycles due to the implementationof the cryptographic functions

If AES is used the total cryptographic cost per nodefor securing the exchange of sensing data equals the costof one encryption and 119873 minus 1 decryptions Assumingthe Texas Instrumentsrsquo reference AES-implementation forCC2540 microcontrollers [36] AES encryption needs 6600cyclesblock and AES decryption 8400 cyclesblock

With our proposal the energy consumption has threecomponents the computation of the different sequences 119878119906

119894

with the hash function before the sensing period begins theXOR of the keystream 119870119906

119894with the sequence 119863119906

119894that signals

the availability of channels and the XOR of the sequences 119862119906119894

received from neighbors with the precomputed 119878119906119894Therefore

10 International Journal of Distributed Sensor Networks

Table 1 Transmission overhead

119897 (bits) Overhead(bits)

Authentication only (CBC-MAC)16 12832 12864 128

Encryption only (CTR)16 8032 9664 128

Authentication and encryption (CCM)16 20832 22464 256

Authentication and encryption (our proposal)16 3232 4864 80

1000

800

600

400

200

05 10 15 20 25 30

Number of nodes (N)

Rece

ptio

n ov

erhe

ad (b

ytes

)

CBC-MAC l = 16 32 64

CTR l = 16

CTR l = 32

CTR l = 64

CCM l = 16

CCM l = 32

CCM l = 64

Ours l = 16

Ours l = 32

Ours l = 64

Figure 7 Reception overhead for a varying number of nodes119873

a nodemust compute119873 hashes and perform119873XORs to sendchannel information and process the reports received from itsneighbors

As per [37] XORoperationwith aMSP430 accounts for 4-5 cyclesbyte Assuming a 128-bit hash function and the worstcase every XOR in our proposals accounts for 5 sdot 16 = 80cycles As previously explained in Section 51 we suggest theuse of a lightweight cryptographic hash function specificallysuited for low-end devices with an output of 128 bits Table 2depicts the number of CPU cycles per block needed [38]for two potential candidates As clearly seen in the tablecomputing one of these hash functions requires only a fewtens of cyclesblock In the following for this analysis we will

Table 2 Cycles per block for different cryptographic hash functions

Algorithm Hash output size Cyclesblock(Stripped) MAME 128 96H-PRESENT-128 128 32

consider the (stripped) MAME hash function as it is a purehash function that does not rely on a symmetric cipher andrequires more CPU cycles (worst case)

Taking into account the previous data Figure 8 showsthe CPU cycles consumed with both our proposal (with aMAME hash function) and standard AES-128 security It canbe clearly seen that our proposal scales much better withthe number of nodes while still providing an appropriatelevel of security We do not provide values for the processtime that is the time needed for key generation encryptiondecryption and data authentication but the number of CPUcycles required to execute each function In this way timevalues can be obtained for a particular sensor node accordingto its CPU features

63 Total Energy Cost Table 3 provides the transmission andreception energy consumption of a TIrsquos CC2540 microcon-troller for different modes and values of transmission powerThe displayed values have been tested under 25∘CWe do nothave values for in-body conditions (asymp38∘C) but we presentthese data for reference purposes In any case this fact onlyaffects the energy consumption for receivingtransmittingNote that the total cost in terms of energy is much highersince it should also account for duty cycles state changes andother parameters [39]

There is no single specific ldquoenergy per CPU cyclerdquo valuesince the cycle consumption depends on the type of CPUoperation Anyway in [34] the authors measured that theTIrsquos MSP430F1611 consumes energy at an average of 072 nJper clock cycle and we have adopted such value in our study

Figure 9 shows the total average energy consumption as afunction of the number of neighboring sensor nodes and thenumber 119897 of bits used to code the channels for the proposedmechanism and standard approaches CCM (authenticationand encryption) CTR (encryption only) and CBC-MAC(authentication only) We have assumed standard receptionand short-range transmission of minus6 dBm (see Table 3)

As clearly denoted in the figure ourmethod only requiresa few tens of 120583J regardless of the number of sensor nodeswhile AES-based security requires higher values of energyranging from 35 120583J to almost 240120583J when encryption andauthentication are provided and for 30 sensor nodes Themore the number of sensor nodes the bigger the improve-ment introduced by our proposal

It must be remarked however that the purpose of thisfigure is to provide reference values to be taken into accountfor future implementations Besides the level of security pro-vided by our method is lower than AES-based methods butstill ismore than adequate given the features of CBSNs (trans-mission rate number of sentmessages etc) and given the factthat the data we are trying to protect are just a limited numberof potential channels to be used for operation of the network

International Journal of Distributed Sensor Networks 11

Table 3 Currentenergy consumption for RXTX tested on TexasInstruments CC2540 EMwith 119879

119860= 25∘Cwith no peripherals active

and low MCU activity at 250 kHz

Test conditions Current EnergybyteRX standard 196mA 588 nJRX high gain 221mA 663 nJTX minus23 dBm 211mA 633 nJTX minus6 dBm 238mA 714 nJTX 0 dBm 27mA 81 nJTX 4 dBm 316mA 948 nJ

5 10 15 20 25 30

Number of nodes (N)

AES l = 16 32 64

Ours l = 16 32 64

300000

250000

200000

150000

100000

50000

0

CPU

cycle

s

Figure 8 Added CPU cycles for a secure exchange of sensing data

Indeed thismechanism introduces some overhead due tospectrum sensing and sharing of channel information and aswe pointed out above the overhead increases linearly withthe number of nodes in the network The synchronizationprotocol adds some overhead too but the increase willstrongly depend on the chosen protocol In [29] someprotocols with high energy efficiency are referenced whichcould be used in our proposal

Despite it we claim that it is definitely worth introducingthis overhead to increase the availability of the network andmake it robust to potential interferences and DoS attacksUnder these undesired situations the current channel usedby the CBSN may become unavailable but the proposedmethod allows the nodes to securely agree on a new channelof operation and rapidly resume their transmissions It mustbe remarked that securing channel availability informationmay prevent or at least diminished the effect of further DoSattacks when switching to a new channel

We do not quantify the benefits of applying our methodin terms of attack mitigation because it strongly depends onthe capabilities of the attacker (time required for sensing eachchannel number of channels that can sense etc) As a futurework it would be interesting to estimate the improvementachieved by our approach in terms of throughput of the

5 10 15 20 25 30

Number of nodes (N)

CBC-MAC l = 16 32 64

CTR l = 16

CTR l = 32

CTR l = 64

CCM l = 16

CCM l = 32

CCM l = 64

Ours l = 16

Ours l = 32

Ours l = 64

250

200

150

100

50

0

Ener

gy co

st (120583

J)Figure 9 Added energy costs for a TIrsquos MSP430F1611 with a TIrsquosCC2540 microcontroller

CBSNs connections and the tradeoff between benefits andoverhead

7 Conclusions

Body sensor networks (BSNs) emerge as an optimal solutionfor ensuring constant and remote monitoring of the healthstatus in patients Recent advances in technology have madeit possible to deploy a network of tiny sensors over the humanbody and even in body which can measure vital signs suchas temperature heart rate or the level of glucose and reportthese data to medical personnel

Guaranteeing the availability of such communicationsis a must as long as connectivity losses during emergencysituations may prevent a patient from immediately receivingmedical assistance and may end up in catastrophic results

A new network paradigm known as cognitive body sen-sor networks (CBSNs) could mitigate this threat by allowingbody sensors to operate in a wide range of frequenciesand adapt its transmission parameters according to highlydynamic environment conditions However this would comeat the expense of implementing cooperative spectrum sensingmechanisms that allow sensors to exchange informationabout channel quality and availability As a consequenceCBSNs might become vulnerable to specific attacks that aretargeted to these mechanisms

In this paper we presented a novel and simple methodto secure the sensing process in a CBSN and improve itsavailability The method relies on cryptographic primitivesthat require a minimum amount of memory and low energyconsumption thus beingmore suited for devices with limitedresources than traditional approaches It offers authentication

12 International Journal of Distributed Sensor Networks

and encryption of control data shared by the sensors in theCBSN to agree on a given channel

Our proposal was analyzed in terms of security and weshowed that although it does not provide the same level ofsecurity as AES-based encryption and authentication it isstill sufficient for low packet rate networks such as CBSNsThe provided results also showed that our method outper-forms existing approaches in terms of transmissionreceptionoverhead and number of CPU cycles needed particularly asthe number of sensor nodes increases For typical microcon-trollers as CC2540 and MSP430 the improvement in energyconsumption clearly justifies the use of the proposed methodagainst AES-based mechanisms in constrained networkssuch as CBSNs in which maximizing the network life isextremely important

Conflict of Interests

The authors declare that there is no conflict of interestsregarding the publication of this paper

Acknowledgment

This work has been partially supported by the spanishgovernment under grant TEC2011-22746 ldquoTAMESISrdquo andby the Ministry of Economy and Competitiveness throughthe projects CO-PRIVACY (TIN2011-27076-C03-02) andSMARTGLACIS (TIN2014-57364-C2-2-R)

References

[1] B Latre B Braem I Moerman C Blondia and P DemeesterldquoA survey on wireless body area networksrdquo Wireless Networksvol 17 no 1 pp 1ndash18 2011

[2] S Movassaghi M Abolhasan J Lipman D Smith and AJamalipour ldquoWireless body area networks a surveyrdquo IEEECommunications Surveys amp Tutorials vol 16 no 3 pp 1658ndash1686 2014

[3] 802156-2012mdashIEEE Standard for Local and metropolitanarea networksmdashPart 156 Wireless Body Area Networks2012 httpstandardsieeeorggetieee802download802156-2012pdf

[4] Bluetooth Low Energy (LE) June 2014 httpwwwbluetoothcomPageslow-energy-tech-infoaspx

[5] The ANT+ Alliance 2014 httpwwwthisisantcom

[6] Wi-Fi Alliance June 2014 httpwwwwi-fiorg

[7] Zigbee Alliance June 2014 httpwwwzigbeeorg

[8] M Rushanan A D Rubin D F Kune and C M SwansonldquoSoK security and privacy in implantable medical devices andbody area networksrdquo in Proceedings of the 35th IEEE Symposiumon Security and Privacy (SP rsquo14) pp 524ndash539 San Jose Calif USA May 2014

[9] I F Akyildiz W-Y Lee M C Vuran and S Mohanty ldquoNeXtgenerationdynamic spectrum accesscognitive radio wirelessnetworks a surveyrdquo Computer Networks vol 50 no 13 pp2127ndash2159 2006

[10] BWang and K J R Liu ldquoAdvances in cognitive radio networksa surveyrdquo IEEE Journal of Selected Topics in Signal Processingvol 5 no 1 pp 5ndash23 2011

[11] Y Xu J Wang Q Wu A Anpalagan and Y-D Yao ldquoOppor-tunistic spectrum access in unknown dynamic environment agame-theoretic stochastic learning solutionrdquo IEEE Transactionson Wireless Communications vol 11 no 4 pp 1380ndash1391 2012

[12] D Cavalcanti S Das J Wang and K Challapali ldquoCognitiveradio based wireless sensor networksrdquo in Proceedings of the17th International Conference on Computer Communicationsand Networks (ICCCN rsquo08) pp 1ndash6 August 2008

[13] O Leon J Hernandez-Serrano andM Soriano ldquoSecuring cog-nitive radio networksrdquo International Journal of CommunicationSystems vol 23 no 5 pp 633ndash652 2010

[14] M Rostami A Juels and F Koushanfar ldquoHeart-to-Heart(H2H) authentication for implanted medical devicesrdquo in Pro-ceedings of the ACM SIGSAC Conference on Computer andCommunications Security (CCS rsquo13) pp 1099ndash1111 ACM BerlinGermany November 2013

[15] K B Rasmussen C Castelluccia T S Heydt-Benjamin andS Capkun ldquoProximity-based access control for implantablemedical devicesrdquo in Proceedings of the 16th ACM Conference onComputer and Communications Security (CCS rsquo09) pp 410ndash419Chicago Ill USA November 2009

[16] L Shi M Li S Yu and J Yuan ldquoBANA body area networkauthentication exploiting channel characteristicsrdquo IEEE Journalon Selected Areas in Communications vol 31 no 9 pp 1803ndash1816 2013

[17] C C Tan S Zhong H Wang and Q Li ldquoBody sensornetwork security an identity-based cryptography approachrdquoin Proceedings of the 1st ACM Conference on Wireless NetworkSecurity (WiSec rsquo08) pp 148ndash153 April 2008

[18] O Garcia-Morchon T Falck T Heer and K Wehrle ldquoSecurityfor pervasive medical sensor networksrdquo in Proceedings of the6th Annual International Conference on Mobile and UbiquitousSystems Networking and Services (MobiQuitous rsquo09) pp 1ndash10Toronto Canada July 2009

[19] G Selimis L Huang F Masse et al ldquoA lightweight securityscheme for wireless body area networks design energy evalu-ation and proposed microprocessor designrdquo Journal of MedicalSystems vol 35 no 5 pp 1289ndash1298 2011

[20] Y Yan and T Shu ldquoEnergy-efficient In-network encryp-tiondecryption for wireless body area sensor networksrdquo inProceedings of the IEEE Global Communications Conference(GLOBECOM rsquo14) pp 2442ndash2447 IEEE Austin Tex USADecember 2014

[21] Y Xu A Anpalagan Q Wu L Shen Z Gao and J WangldquoDecision-theoretic distributed channel selection for oppor-tunistic spectrum access strategies challenges and solutionsrdquoIEEE Communications Surveys and Tutorials vol 15 no 4 pp1689ndash1713 2013

[22] Y Xu J Wang Q Wu A Anpalagan and Y-D Yao ldquoOppor-tunistic spectrum access in cognitive radio networks globaloptimization using local interaction gamesrdquo IEEE Journal onSelected Topics in Signal Processing vol 6 no 2 pp 180ndash1942012

[23] R Chavez-Santiago K E Nolan O Holland et al ldquoCognitiveradio for medical body area networks using ultra widebandrdquoIEEE Wireless Communications vol 19 no 4 pp 74ndash81 2012

International Journal of Distributed Sensor Networks 13

[24] A R Syed and K-L A Yau ldquoOn cognitive radio-based wirelessbody area networks for medical applicationsrdquo in Prceedingsof the 1st IEEE Symposium on Computational Intelligence inHealthcare and e-Health (CICARE rsquo13) pp 51ndash57 SingaporeApril 2013

[25] R Chen J-M Park and K Bian ldquoRobust distributed spectrumsensing in cognitive radio networksrdquo in Proceedings of the 27thIEEE Conference on Computer Communications (INFOCOMrsquo08) pp 1876ndash1884 IEEE Phoenix Ariz USA April 2008

[26] H Rifa-Pous M J Blasco and C Garrigues ldquoReview of robustcooperative spectrum sensing techniques for cognitive radionetworksrdquoWireless Personal Communications vol 67 no 2 pp175ndash198 2012

[27] B Braem B Latre C Blondia I Moerman and P DemeesterldquoAnalyzing and improving reliability in multi-hop body sensornetworksrdquo International Journal on Advances in Internet Tech-nology vol 2 no 1 pp 152ndash161 2009

[28] I F Akyildiz B F Lo and R Balakrishnan ldquoCooperative spec-trum sensing in cognitive radio networks a surveyrdquo PhysicalCommunication vol 4 no 1 pp 40ndash62 2011

[29] B Sundararaman U Buy and A D Kshemkalyani ldquoClocksynchronization for wireless sensor networks a surveyrdquoAdHocNetworks vol 3 no 3 pp 281ndash323 2005

[30] A Bogdanov G Leander C Paar A Poschmann M J BRobshaw and Y Seurin ldquoHash functions and RFID tags mindthe gaprdquo in Cryptographic Hardware and Embedded SystemsmdashCHES 2008 10th International Workshop Washington DCUSA August 10ndash13 2008 Proceedings vol 5154 of Lecture Notesin Computer Science pp 283ndash299 Springer Berlin Germany2008

[31] C Cordeiro K Challapali D Birru and N Sai ShankarldquoIEEE 80222 the first worldwide wireless standard based oncognitive radiosrdquo in Proceedings of the 1st IEEE InternationalSymposium on New Frontiers in Dynamic Spectrum AccessNetworks (DySPAN rsquo05) pp 328ndash337 Baltimore Md USANovember 2005

[32] S UllahHHiggins B Braem et al ldquoA comprehensive survey ofwireless body area networks on PHY MAC and network layerssolutionsrdquo Journal of Medical Systems vol 36 no 3 pp 1065ndash1094 2012

[33] N Sastry and D Wagner ldquoSecurity considerations for IEEE802154 networksrdquo in Proceedings of the ACM Workshop onWireless Security (WiSe rsquo04) pp 32ndash42 Philadelphia Pa USAOctober 2004

[34] M Pajic Z Jiang I LeeO Sokolsky andRMangharam ldquoFromverification to implementation a model translation tool and apacemaker case studyrdquo in Proceedings of the 18th IEEE Real Timeand Embedded Technology and Applications Symposium (RTASrsquo12) pp 173ndash184 Beijing China April 2012

[35] CC2540 24-GHz Bluetooth low energy System-on-Chip 2013httpwwwticomlitdssymlinkcc2540pdf

[36] U Kretzschmar ldquoAES128mdasha C implementation for encryp-tion and decryption MSP430 systems ECCN 5E002 TSPAmdashtechnologysoftware publiclyrdquo Application Report SLAA397ATexas Instruments Dallas Tex USA 2009 httpwwwticomcncnlitanslaa397aslaa397apdf

[37] El Barquero Aqueronte MSP430 Cycles and Instructionsedited by Aqueronte 2011 httpunbarqueroblogspotcomes201105msp430-cycles-and-instructionshtml

[38] A Bogdanov G Leander C Paar A Poschmann M J BRobshaw and Y Seurin ldquoHash functions and RFID tags mindthe gaprdquo in Cryptographic Hardware and Embedded SystemsmdashHES 2008 vol 5154 of Lecture Notes in Computer Science pp283ndash299 Springer Berlin Germany 2008

[39] S Kamath and J Lindh ldquoMeasuring bluetooth low energypower consumptionrdquo Application Note AN092 Texas Instru-ments Dallas TEx USA 2012 Version SWRA347a httpwwwticomlitanswra347aswra347apdf

International Journal of

AerospaceEngineeringHindawi Publishing Corporationhttpwwwhindawicom Volume 2014

RoboticsJournal of

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Active and Passive Electronic Components

Control Scienceand Engineering

Journal of

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

International Journal of

RotatingMachinery

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Hindawi Publishing Corporation httpwwwhindawicom

Journal ofEngineeringVolume 2014

Submit your manuscripts athttpwwwhindawicom

VLSI Design

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Shock and Vibration

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Civil EngineeringAdvances in

Acoustics and VibrationAdvances in

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Electrical and Computer Engineering

Journal of

Advances inOptoElectronics

Hindawi Publishing Corporation httpwwwhindawicom

Volume 2014

The Scientific World JournalHindawi Publishing Corporation httpwwwhindawicom Volume 2014

SensorsJournal of

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Modelling amp Simulation in EngineeringHindawi Publishing Corporation httpwwwhindawicom Volume 2014

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Chemical EngineeringInternational Journal of Antennas and

Propagation

International Journal of

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Navigation and Observation

International Journal of

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

DistributedSensor Networks

International Journal of

Page 2: Research Article A Cognitive-Radio-Based Method for

2 International Journal of Distributed Sensor Networks

3G4G

BSN

Gateway

Sensor

WiFiBluetooth

Internet Medical center

Figure 1 BSN model

Confidentiality Data regarding patientsrsquo state should be onlyaccessible to authorized entities In this context this impliesthat only the BSNrsquos nodes should be able to interpret thesensed data

Authentication The BSNrsquos nodes should be able to verify thesource of any received data

Integrity Data should not be modified by an unauthorizedentity or at least BSNrsquos nodes should be able to detect thatdata has been altered

Availability Data anddevice information should be accessibleupon request by authorized entities The human body is ahighly dynamic physical environmentwherewireless channelproperties constantly change Besides these communicationscan be severely affected by interferences caused by electronicdevices in the proximity of the BSN

The first three security goals can be easily achievedby means of classical cryptographic tools in conventionalnetworks However the limited capabilities of body sensorsmay prevent from applying them toBSNs Besides traditionalcryptographic tools cannot prevent disruption of the networkservices due to interferences no matter whether they areintentional for example a Denial of Service (DoS) attack ornot Given the relevance of the data sent by body sensorsthere is clearly a need for mechanisms to maximize theavailability of such networks

The integration of CR technology [9ndash11] into BSNs lead-ing to the concept of cognitive body sensor networks (CBSNs)[12] can significantly improve availability by allowing thenodes to select the best channel at any moment and avoidthe harmful effect of interferences CRs exchange sensed dataabout channel availability and jointly agree to switch to a newchannel when the channel being in use becomes unavailable

Note that if an attacker manages to eavesdrop channelavailability data it can take advantage of it to perform a newattack on the new channel of operation thus preventing thenetwork from using an available channel and leading thenetwork to a DoS [13] Channel switching if unpredictablerendersDoS attacksmore difficult since the attackermust jamevery possible transmission channel Traditional encryptionand authentication of exchanged data may help to hide chan-nel switching decisions from external attackers but entail anadditional cost that cannot be assumedby heavily constraineddevices such as IMDs

In this paper we present a protocol to protect the processof channel selection in CR-based BSNs The main goal isto maximize the availability of the network thus ensuringthat patientsrsquo data such as blood pressure heart rate andtemperature will successfully be delivered to a gateway(nonstop monitoring of patients) The protocol makes use oflightweight encryption and authentication primitives specif-ically suited for constrained devices such as body sensors

The main contributions of this paper can be summarizedas follows

(i) We apply CR technology into BSNs in order tomaximize the availability of services in suchnetworksBecause CRs are able to sense the medium and selectthe best transmission channel at any moment theeffect of interferences or DoS attacks can be miti-gated In a conventional network such phenomenawould interrupt communications within the BSNsIn a CBSN the nodes can switch to a new channelwhenever the channel in use becomes unavailable

(ii) We propose a method suited to constrained devicesas body sensors to secure the exchange of channelavailability information and prevent an attacker fromeavesdropping such data thus diminishing the prob-ability of a successful DoS attack

International Journal of Distributed Sensor Networks 3

(iii) We provide a security analysis of the proposedmethod and derive the time period during which thecryptographic material remains secure

(iv) The proposed method is compared to otherapproaches based on traditional cryptographic prim-itives in terms of energy consumption and CPUusage

The rest of this document is structured as follows InSection 2 we review the state of the art on security in BSNsSection 3 describes the BSN model considered in this workand its potential threats A lightweight method to securethe process of channel selection in a BSN is presented inSection 4 Sections 5 and 6 present a security analysis of theproposedmethod and a comparisonwith existing approachesin terms of resources consumption Finally in Section 7 weprovide the conclusions of this work

2 Related Work

To date research on security in BSNs has mainly focused onprotecting data stored at the network nodes from unautho-rized access and providing authentication and confidentialityto the communications among the BSN devices In thefollowing we provide an overview of the proposals that canbe found in the literature

Many proposed authentication methods are based onbiometrics that is relying on measurements of physiologicalvalues (PVs) [14] such as heart rate blood pressure ortemperature in order to establish trust and generate keymaterial The main idea is ensuring access to sensors onlyto those devices in physical contact with the patient Theadvantage of these methods is that the key source is hard foran attacker to predict without physical access to the patientand also ensures forward-security because PVs change overtimeThemain challenge however is how to achieve success-ful authentication among authorized devices when the PVmeasured by each one is not exactly the same either due tomeasurement errors or due to the fact that different devicesmeasure a given PV at different time instants

Authentication by means of distance-bounding protocolswas proposed in several works [15 16] This techniqueprovides a very weak mutual authentication between twodevices based on measuring the transmission time betweenthemThe rationale behind these protocols is that a legitimatedevicemust be closer than a given distanceAs a consequencethey are vulnerable to injection attacks as long as the attackeris close enough to the patient bearing the sensors forexample by means of a hug

In [17] the authors presented a protocol based onidentity-based encryption (IBE) IBE systems are public keycryptosystems that allow any device to generate a publickey from a known identity value such as the sensor IDand require the existence of a trusted third party called theprivate key generator (PKG) to generate the correspondingprivate key To reduce the burden of key generation andencryptiondecryption introduced by traditional public keycryptography the authors proposed to use elliptic curvecryptography (ECC) which provides public key primitives

suitable for constrained devices as sensors in BSNs Despiteit it is still more expensive in terms of resource consumptionthan approaches based on symmetric cryptography

In order to preserve userrsquos privacy a number of worksproposed the use of symmetric encryption based on the AES(Advanced Encryption Standard) algorithm [18ndash20] Manysuch as the one in [19] proposed to use AES with CCMmode of operation that is to say AES counter (CTR) modefor data encryption and AES cipher-block-chaining messageauthentication code (CBC-MAC) formessage authenticationThe main advantage of this mode is that the same keycan be used for authentication and for encryption withoutcompromising security and there is no need for rekeyingas long as the number of devices is fixed As a drawbackthe added cost of encryptiondecryption and especially thecosts due to the transmission overheads cannot be neglectedin BSNs where every step forward in resourcesrsquo saving isof paramount importance In this line the authors in [20]presented an in-network mechanism that mimics the AESalgorithm and greatly reduces the costs of decryption whilethey claim achieving the same level of security

All the above-mentioned proposals approach the prob-lem of protecting patientrsquos data from unauthorized accessmodification or forgery but cannot effectively deal with DoSattacks Such a protection can be achieved by making use ofCR devices that collaboratively switch to another frequencyband [11 21 22] if the signal-to-noise ratio of the current oneis below the required value Furthermore it is also necessaryto protect the exchanged sensing data in order to prevent anattacker from eavesdropping data and get the next channelto be used in the network Note that this information mayallow an attacker to rapidly perform a DoS attack in the newchannel

In this work we present a lightweight and secure methodthat makes use of CR technology for improving the availabil-ity of the system that is ensuring that the communicationbetween the body sensor nodes will be available even underthe presence of unintentional or intentional interferencesThe application of CR technology into body sensor networkswas already proposed in previous works [23 24] However tothe best of our knowledge none of them addressed securitytopics

In [25 26] several methods for securing spectrum sens-ing mechanisms were discussed but they are not suited forheavily constrained devices such as body sensors

In [27] the authors aimed to improve the availability ofa BSN by means of a cross-layer multihop protocol that dealtwith routing of data This scheme however can be appliedonly to multihop BSNs where the path between two givennodes is established according to the connectivity among thenodes In this approach nodes make use of several paths butone single channel and thus are more vulnerable to attackssuch as jamming than CR-based networks

3 Network Model and Threats

In this work we have considered a BSN composed of aset of sensor nodes where all of them can act as sinkscollectingstoring data from other sensors and potentially

4 International Journal of Distributed Sensor Networks

Gateway

Sensor

Sink

Figure 2 Communication between sensors and the gateway

transmitting these data to an external gateway if required (seeFigure 2) Although this approach introduces some overheaddue to the fact that data must be shared among all sensorsit improves network availability and robustness against dataloss and fairly distributes energy consumption among allsensors Also itmakes the process of gathering by the gatewayeasy which can connect to any of the BSN nodes to get all theinformation

As previously mentioned we also assume that sensorshave cognitive capabilities that is they form a CBSN andare able to identify free spectrum bands and adapt theirtransmission parameters accordingly Spectrum sensing canbe performed by each node on an individual basis or cooper-atively As the latter increases the probability of detection dueto space diversity [28] we have adopted such an approach inthis work

In cooperative spectrum sensing each sensor sensesthe medium and exchanges its observations with the othermembers of the network in order to agree on a given channelfor data transmissionreception However these control dataare exposed to many attacks [13] such as packet injectioneavesdropping or Denial of Service (DoS) Next we describethe attacker model and the specific attacks that can beexecuted against CBSNs

31 Attacker Model In this work we focus on outsiders thatis external attackers that do not share any cryptographiccontent with the gateway or the victimrsquos sensor nodes Ifthe attacker nodes are part of the CBSN they will haveaccess to the keying material and therefore will be able tosuccessfully eavesdrop and inject data In any case the designof a mechanism to counteract this threat is out of the scopeof this work

In the context of CBSNs we can classify adversariesaccording to the following criteria

(i) Active or passive a passive attacker can only eavesdropdata thus being able to access patientrsquos data andviolating hisher privacy In its turn an active attackeraims at injecting or modifying data in order to sendfake reports on the state of the patient

(ii) Type of attack includes the following

(a) eavesdropping unauthorized access to storeddata or to transmitted data among the CBSNdevices thus violating the privacy of the patient

(b) modificationinjection an attacker that mayalter the content of a packet transmitted by asensor or impersonate a sensor by forging apacket these attacks can be executed due to lackof authentication and violate the integrity of theCBSN communications

(c) packet replay an attacker that may capture apacket that was previously sent by a sensor ofthe network Regardless of the fact that theCBSN is using authentication mechanisms ornot the packet will be accepted by the networksif antireplay mechanisms are not provided

(d) jamming the adversary that disrupts the CBSNcommunications by generating interfering sig-nals

(iii) Intentional or unintentional the adversary can bean external entity willing to cause damage to thecommunications among sensors and the gateway orcan be an entity that unintentionally is causing inter-ferences to those communications As an examplethe patient of interest could be near another patientwith wearable sensors which could inject fake reportsif data is not properly authenticated Examples ofunintentional attacks could take place in a situationwhere two patients bearing body sensors are huggingand unconsciously exchange data Or the patientcould be near a relative who is visiting himher at thehospital and carries any electronic device that causesinterferences to the CBSN

It is important to remark that in a CBSN where sensornodes establish communications using different channelsover time these attacks can be extended to the control dataexchange among the devices of the CBSN As an example anattacker may forge a report regarding the availability of thechannels thus leading the CBSN to select a channel that issuffering from high interferences or that is currently beingused by another service Note that this attack can lead to aDoS and the failure of the system in monitoring the patientrsquosstatus In its turn eavesdropping of the control channel allowsan attacker to have knowledge of the channels to be usedby the CBSN The attacker could take advantage of thissituation in order to easily disrupt the communications inthe network by performing a new DoS attack every time theCBSN switches to a new channel

The implementation of security mechanisms in a CBSN[12] to counteract these attacks is specially challenging dueto the limited capabilities of CBSNrsquos nodes In the followingsection we describe a simple method to secure the processof channel selection in CBSNs The proposed mechanismis suited for networks with extremely constrained-resourcesdevices since it makes use of lightweight cryptographicfunctions and minimizes the added transmissionreceptionoverhead

International Journal of Distributed Sensor Networks 5

4 Securing Sensing Data andChannel Selection in CBSNs

In the following we present a mechanism for securing theexchange of sensing data and the channel selection processin CBSNs Section 41 outlines the assumptions considered inthiswork regarding the networkmodel and in Section 42 wedescribe the protocol operation For ease of understandingwe present the terminology used along this section as follows

CTR119872 medium-term session counter (119898 bits)

CTR119878 short-term session counter (119898 bits)

119863119906

119894 data sensed by node 119906 during period 119894 (119897 bits)

ID119906 link-layer identifier of node 119906 (119898 bits)119870119906

119894 keystream to encrypt and authenticate data for

node 119906 during period 119894 (119903 bits)KM keying master119897 length of the data sensed by a given node during agiven period119898 length of the hash output and all the secrets119873 number of nodes in the network119901 number of keystreams119870119906

119894obtained from a 119878119906 (119901 =

119898119903) defining the number of sensing periods beforeupdating 119878119906119903 length of the keystreams 119870119906

119894 which must be a

divisor of119898119878119871 long-term globally shared secret (119898-bits)119878119872 medium-term globally shared secret (119898-bits)119878119904119894 long-term secret shared between the KM and

node 119894 it is used to update 119878119871in case it is compro-

mised119878119906 short-term shared secret with node 119906

41 Assumptions Although the proposed protocol isdesigned to be implemented in heavily constrained deviceswe work under the assumption that such devices have at leastthe following capabilities

(i) Compute a hash function with an output length of119898bits

(ii) Temporally store in its randomaccessmemory at least119898 sdot (119873 + 3) bits with 119873 the number of nodes in thenetwork As we detail later in Section 42 each nodemust keep a short-term shared secret for each of theN nodes in the network (including itself) and threemore long-term and medium-term secrets each onewith length of119898 bits

(iii) Sensor nodes use a synchronization protocol that willbe used to share a global short-term session counterand a medium-term session counter among all nodes(see Section 42) Given the low transmission rate ofsensor networks existing synchronization schemes[29] provide enough precision for this purpose Weassume that the chosen protocol provides recovery

methods upon loss of synchronization How syn-chronization is achieved will strongly depend on thechosen protocol but if the latter requires a masternode for providing synchronization the gateway ofthe BSN could play this role

To the best of our knowledge the former requirement canbe assumed even in very constrained devices As shown in[30] there are several lightweight hash functions that canbe integrated into a sensor mote The latter may not beharder to achieve As detailed in Section 42 during everysensing period each node stores one secret per member ofthe network a globally shared secret and two counters allof them with the same length 119898 as the hash output If weconsider a typical hash function with an output of 128 or 256bits and a network with tens to hundreds of sensors the RAMrequirements for sensor nodes are just bounded to a few tensof kilobytes

42 Protocol Operation Before deploying the CBSN everysensor nodemust be preloaded by a keyingmaster (KM)withthe following data

(1) The set of channels that the sensor will have to sensein the cooperative sensing process

(2) A long-term and globally shared secret 119878119871of 119898 bits

(the hash output length)(3) A long-term secret 119878

119904119894shared between the KM and

node 119894 that will be used to update the globally sharedsecret 119878

119871in case it is compromised

The KM is an external device which is not a member oftheBSNTypically this role is played by the device responsiblefor gathering data from the sensors or gateway (eg a smartphone or a tablet)

Upon deployment of the network every node derives amedium-term globally shared secret 119878

119872by hashing the XOR

of the long-term secret 119878119871and a counter The generation

process of 119878119872

is clearly depicted in Figure 3 This process isperiodically repeated with an updated value of the medium-term counter in order to protect the secret against a potentialattacker Details about how often this process should becarried out and the attacker capabilities are provided inSection 5

As shown in Figure 4 each node generates a set ofrandom sequences of 119898 bits one for the node itself and onefor each other node in the networkThese random sequences119878119906 with 119906 the node identifier are obtained by hashing theXOR of the link-layer identifier of the node ID119906 themedium-term shared secret 119878

119872 and a short-term session counter

CTR119878

Therefore our proposalmakes use of three types of sharedsecrets

(i) A short-term per-node shared secret 119878119906 (one per eachnode in the network) used for encryption decryptionand authentication of data

(ii) Amedium-term globally shared secret 119878119872that is used

to derive the short-term per-node shared secrets 119878119906

6 International Journal of Distributed Sensor Networks

Long-term shared secretSLmiddot middot middot

middot middot middot

middot middot middot

Medium-term session counter

Medium-term shared secret

CTRM

HashSM

mbits

mbitsmbits

mbits

Figure 3 Generation of the medium-term globally shared secret 119878119872

middot middot middot

middot middot middot

middot middot middot

middot middot middot

Short-term session counterMedium-term shared secret

node uShort-term shared secret with

Hash

SM

Su

Identifier of node uIDu

CTRS

mbits

mbitsmbits

mbits

mbits

Figure 4 Generation of the short-term shared secret 119878119906 for node 119906

(iii) A long-term globally shared secret that is used toderive a new 119878

119872when the current one is about to

expireAs clearly denoted in Figure 5 each sequence 119878119906 is divided

into 119901 fragments of 119903 bits which we will be denoted as 119870119906119894

each one being used as keystream to encrypt and authenticatedata for node 119906 in period 119894 As per this behavior a new short-term shared secret must be derived every 119901 sensing period

When a node performs spectrum sensing it generates abinary sequence 119863119906

119894of 119897 bits that stores the availability of the

different channels The length of such sequence 119897 will dependon the number of bits used to code the state of each channeland the number of channels As an example the simplest waywould be to use just a single bit for coding each channel withvalue ldquo0rdquo if the channel is occupied and ldquo1rdquo otherwise If moreprecise information about the quality of channels is needed(ie high medium low and very low quality) more bits canbe used to code the channel state

During a sensing period 119894 each node must send toits neighbors its own sensing information but also it mustprocess the information received from its neighbors to reacha joint decision

In order to send its own sensing information node 119906 willmake use of the corresponding keystream 119870119906

119894 the first 119897 bits

of the keystream will be used to encrypt channel information119863119906

119894by means of a XOR addition the remaining 119903 minus 119897 bits are

left unchanged and will be used to provide message authen-tication as illustrated in Figure 5 The resulting sequence 119862119906

119894

will be sent to all the other nodes

To verify the authenticity and decrypt the content of thepackets that have been sent by a given neighbor 119906 a nodewill XOR the sequence 119862119906

119894of the received packet with the

keystream 119870119894119906 as depicted in Figure 6 If the last 119903 minus 119897 bits

of the resulting sequence are not all 0 s the authenticationfails and the entire packet is discarded Otherwise channelinformation can be recovered from the first 119897 bits resultingfrom the XOR addition

The above described process is applied for each neighbor-ing node 119906 Then the channel reported by a larger number ofneighbors will be selected for the operation of the networkNote that because more than one channel may be reported bythe same amount of nodes a tie-break mechanism is neededto guarantee that the process leads to equal results in allnodes One simple approach that could be used is to selectthe channel with the highest identifier However this wouldlead to a lower usage of channels with lower identifiers andtherefore to providing the attacker with valuable informationabout channel usage in the CBSN As a consequence wepropose to use a tie-break method that relies on the formatof119863119906119894

Recall that a fundamental characteristic of this protocolis that there is no central entity that is known and trusted byall sensors This makes the protocol suitable for unattendedscenarios and it also makes it more efficient in terms of datatransmitted through the network because no information issent regarding which channels have to be sensed or whichchannel is finally selected Instead sensors are deployedwith all the information needed to perform the sensing in

International Journal of Distributed Sensor Networks 7

middot middot middot

Short-term shared secret with node u

Keystream pKeystream 2Keystream 1

Su

Encrypted Authdatasensing data

Sensing data

Sensing data

Sensing period 1

Sensing period p

Encrypted Authdatasensing data

Cup

Cu1

Dup

Du1

Ku1 Ku

2 Kup

mbits

rbitsrbitsrbits

lbitslbits

lbitslbits

lbits

lbits

lbitslbits r-lbitsr-lbits

r-lbits

r-lbits

Figure 5 Encrypting and authenticating sensing data

middot middot middot

Short-term shared secret with node u

Keystream pKeystream 2Keystream 1

Su

Sensing dataSensing period 1 True

Accept sensing data

Reject sensing data

Cu1

Du1

Ku1 Ku

2 Kup

If ne 0998400s

rbitsrbitsrbits

rbits lbits

mbits

r-lbits

Figure 6 Decrypting sensing data

a distributed way and make a joint decision autonomouslyThus there is no need for additional mechanisms to be usedwhen a new node joins the network In this case the newnode needs to synchronize with the rest of themembers to getthe proper value of the session counters by making use of thecorresponding protocol However when a node is expelledfrom the network because it has been compromised newcryptographic material must be generated and distributedamong the remaining nodes The KM is responsible fortriggering this process and communicates with each sensornode to update the shared long-term secret 119878

119871 Note that

because the KM shares a different secret 119878119904119894with each node 119894

it can securely distribute the new value of 119878119871 Upon reception

of 119878119871 each node should perform again the initialization

process described at the beginning of this section

5 Security Analysis

The security of the proposed method relies on the sharedsecrets used to derive the keys and perform encryption andauthentication of channel availability data As long as thesesecrets are not compromised data confidentiality can beensured that is an attacker might not be able to get the listof channels to be used in the CBSN Besides the methodmust prevent an attacker from injecting fake data into thesystem These issues are discussed as follows In Section 51we analyze how often the shared secrets should be updated inorder to guarantee a proper protection against cryptanalysisnext in Section 52 we evaluate the packet authenticationmethod used in our proposal in terms of probability ofbypassing the authentication check

8 International Journal of Distributed Sensor Networks

51 Shared Secrets Lifetime As previously mentioned inSection 31 for this analysis we are assuming that attackscome from external entities and therefore attackers are notable to obtain the cryptographic material that is stored in thebody sensors In the context of this proposal the lifetime ofeach of the shared secrets is the interval in which these secretsare considered computationally safe against cryptanalysisthat is their cryptoperiod

The cryptoperiod straightly depends on the chosen cryp-tographic protocols the length of the secrets themselves andthe amount of times they are used The more a given secret isused the shorter its cryptoperiod is as an attacker gets moreinformation about this secret and therefore the probability ofa successful cryptanalysis increases In fact cryptoperiod isdefined more in terms of the number of times a given secretor key is reused (the amount of ciphertext exposed to anattacker for a given secretkey) than as a given time periodwhich strongly depends on the transmission rate of the sensornodes

Recall the three types of shared secrets used in theproposed method

(i) Short-term per-node shared secrets one secret 119878119906 persource node that is used to lightweight encryptdecrypt and authenticate the channelsrsquo sensed data

(ii) Medium-term globally shared secrets globally sharedsecret 119878

119872that is used to derive the short-term per-

node shared secrets 119878119906(iii) Long-term globally shared secret this being the ini-

tially preloaded secret 119878119871that is used to derive a new

medium-term globally shared secret 119878119872

when thecurrent one is about to expire

As clearly denoted in Figure 5 our approach operates insome manner as an additive stream cipher It is well knownthat stream ciphers are considered to be secure as long as thekey is never reused and thus our cipher will be secure if agiven value 119878119906 is not repeated As a result 119878119906must be updatedevery 119901 = 119898119903 sensing period with 119901 the renewal period119898 the length of the shared secret 119878119906 and 119903 the amount oftransmitted bits (sensing data) in a sensing period that areencrypted with 119878119906

Recall that in our proposal the per-node key used forencryption 119878119906 is generated by means of a hash function Asecond requirement is that this function must be crypto-graphically secure Note that if the hash function does notaccomplish it an attackermight be able to reverse it that is toget the input of the hash function given an output meaningthat in our proposal an attacker would be able to recoverthe value of the medium-term globally shared secret 119878

119872(see

Figure 4)A cryptographically secure hash function with an output

of 119898 bits can offer a security level of 2119898 operations againstpreimage attacks and 21198982 against collision attacks Generallyspeaking a minimum output of 128 bits is required in orderto provide a high level of security for most applicationsbut shorter lengths are accepted if the number of generatedmessages in a given period is limited as it is the case of low-rate networks In Section 6 we propose several lightweight

hash candidates with an output of 128 bits that is to saywe can assume that it is computationally unfeasible for anattacker to invert the hash function and thus to predict thevalue of 119878119872 as long as it is updated before exceeding itscryptoperiod which has an upper bound of 21198982 = 264 uses

The long-term globally shared secret 119878119871is only used to

update the current medium-term globally shared secret 119878119872

Because 119878119872is not updated very often it is very unlikely that

an attacker manages to obtain several values of 119878119872to reverse

the hash function and recover 119878119871 As a result we can assume

that the 119878119871cryptoperiod is long enough and there is no need

to update the secret during the nodesrsquo lifetime

52 Authentication A cryptogram 119862119906119894of sensing data con-

tains an authentication field of 16 bits that is checked uponreception (see Figure 6) Consequently an attacker has achance of 1 in 216 of guessing the next authentication fieldwhich allows it to forge a valid authentication field and injectfake data Note that this attack can lead the CBSN to wrongdecisions about the availability of the spectrum

If the attacker repeatedly attempts to send valid cipher-texts it may succeed after 215 attempts in average Becausethe attacker does not know 119878119906 the authentication fieldappears to it as a random stream and therefore it must select afake authentication field at random Besides the attacker can-not determine whether a given ciphertext has been acceptedor rejected because the receiver does not acknowledge thereception of such packets to the emitter Otherwise theattacker could take advantage of this information in order toguess a valid authentication field in a faster way

In conventional networks 215 packets may seem anextremely low number but it may provide an adequate levelof security in CBSNs In these networks the attacker can onlysend fake packets during the sensing periods which is in theorder of a few milliseconds in most cognitive scenarios [31]Moreover as previously stated in Section 1 transmission ratesin BSNs are considerably low with values usually rangingfrom tens to a few hundred of kilobits per second

As an example let us consider a 1Mbps link a sensingperiod of 10ms and a packet size of 10 bytes (which is clearlybigger than the typical packet size in sensor networks) Giventhese parameters an attacker would only be able to send 125packets at most in every sensing period That is to say theattacker would need an average of 262144 sensing periods tosend a fake packet and pass the authentication check

6 Cost Evaluation and Comparisonwith Other Approaches

In this section we evaluate the cost of our proposal interms of energy consumption due to transmission overheadand computational cost and compare its performance withthe most common approach adopted in sensor networks[32] which is providing authentication andor encryption ofthe channel sensing data by means of using standard blockciphers As is well known block ciphers have as input themessage to be encrypted or authenticated which is dividedinto several blocks of fix length and a key Both the block

International Journal of Distributed Sensor Networks 9

length and the key length depend on the algorithm beingused Regardless of the algorithm block ciphers can be usedin several modes of operation depending on the service tobe provided that is encryption only authentication only orencryptionauthentication Generally the followingmodes ofoperation are applied

Authentication CBC-MAC is a block cipher mode for gen-erating message authentication codes The message to beauthenticated is divided into several blocks of equal size andeach block is encrypted so that the value of a given blockdepends on the encryption of the previous block The finaloutput of the cipher that is the message authentication codeor CBC-MAC is the result of encrypting the last block of themessage When the input of the cipher is shorter than theblock size (as it is usually the case in sensor networks) theCBC-MAC can be obtained by directly encrypting a singleblock padded until the block size of the cipher is reached

Encryption CTRmode of operation turns a block cipher intoa stream cipher meaning that the resulting ciphertext has thesame size as the input or plain textThus it does not force theoutput length to be amultiple of the block size as it is the caseof other modes such as CBC-MACThis property makes thismode of operation suitable for encryption in sensor networkswhere devices usually exchange short-length messages

Authentication+Encryption CCM (CTR + CBC-MAC) is acommon choice for providing both encryption (CTR) andauthentication (CBC-MAC) [19] Aminor variation of CCMcalled CCMlowast is used in the ZigBee standard [7]

In this work we assume that Advanced EncryptionStandard (AES) in CTRmode is used for encryption andAESCBC-MAC for authentication as it is the current standardfor symmetric cryptography even in sensor nodes [33]Currently there are efficient hardware implementations ofAES that are highly affordable

Regarding hardware platforms the vast majority of pre-vious works on BSNs have used the 16-bit Texas Instrumentsrsquo(TI) MSP430 and CC2540 families of microcontrollers [34]Built around a 16-bit CPU ultra-low-power MSP430 micro-controllers are designed for low cost and specifically low-power consumption embedded applications As an exampleTIrsquos CC2540 family [35] enable robust Bluetooth low energy(BLE) network nodes to be built with low total bill-of-material (BOM) costs BLE operates in the same spectrumrange (2400GHzndash24835GHz ISM band) as classic Blue-tooth technology but uses a different set of channels insteadof 79 1MHz channels BLE offers 40 2MHz channels 3 foradvertising purposes and 37 for data exchange

61 TransmissionReception Overhead In this section weanalyze the overhead introduced by our proposal in termsof transmissionreception of channel availability data andcompare it with the overhead exhibited when conventionalapproaches are used for data encryptionauthentication asexplained above We assume that all sensors are capable ofsensing a given set of channels and report information abouttheir state

With our proposal the minimum number of transmittedbitswill dependon the number of channels that a given sensoris reporting the number of bits used to code the state ofeach channel and the length of the authentication code Asexplained in Section 52 a length of 16 bits is enough to securemost applications in WSNs and thus we have assumed thisvalue for the authentication fieldThis leads to a total amountof Bits

119905119909= 119897 + 16 of transmitted bits where 119897 represents the

total number of bits used to code all possible channels andBits119905119909= (119899 minus 1)Bits

119905119909received bits representing the number

of bits received by a given sensor from its neighborsAiming to provide a fair comparison we choose the same

key length for block ciphers and for our proposal that is tosay a 128-bit key The transmitted bits overhead added byAES CBC-MAC authentication is 128 bits (for a semanticallysecure implementation also an IV or nonce must be sharedbetween emitter and receiver so that the overhead can behigher) Regarding encryption the number of transmittedbits is equal to the number of bits 119897 used to code the state of thechannels but it also requires the use of a nonce with a lengthequal to half of the key length that is 64 bits per message

During every sensing period every node must transmita packet with sensing information but also must process thepackets received from its neighbors Table 1 and Figure 7respectively show the transmission and reception overheaddue to the secure sharing of sensing information using bothstandard block ciphers and our proposal The values areprovided as a function of the number of bits 119897 used to codethe state of the channels and the number of nodes119873 rangingfrom 5 to 30 Given that the considered scenario is a bodysensor network this is more than a reasonable value sincea patient wearing more than 30 sensors may be an unlikelysituation

The reader may notice that the overhead introducedby this mechanism increases linearly with the number ofnodes for both approaches However with the proposedmethod the transmissionreception overhead is considerablyreduced with respect to the use of standard block cipherswhile still maintaining an acceptable level of security Infact the more the nodes in the CBSN the bigger theimprovement introduced by the former As wewill show laterthe transmissionreception savings lead to a huge saving alsoin energy consumption

62 Computational Cost In this section we provide a com-parison of the CPU cost in cycles due to the implementationof the cryptographic functions

If AES is used the total cryptographic cost per nodefor securing the exchange of sensing data equals the costof one encryption and 119873 minus 1 decryptions Assumingthe Texas Instrumentsrsquo reference AES-implementation forCC2540 microcontrollers [36] AES encryption needs 6600cyclesblock and AES decryption 8400 cyclesblock

With our proposal the energy consumption has threecomponents the computation of the different sequences 119878119906

119894

with the hash function before the sensing period begins theXOR of the keystream 119870119906

119894with the sequence 119863119906

119894that signals

the availability of channels and the XOR of the sequences 119862119906119894

received from neighbors with the precomputed 119878119906119894Therefore

10 International Journal of Distributed Sensor Networks

Table 1 Transmission overhead

119897 (bits) Overhead(bits)

Authentication only (CBC-MAC)16 12832 12864 128

Encryption only (CTR)16 8032 9664 128

Authentication and encryption (CCM)16 20832 22464 256

Authentication and encryption (our proposal)16 3232 4864 80

1000

800

600

400

200

05 10 15 20 25 30

Number of nodes (N)

Rece

ptio

n ov

erhe

ad (b

ytes

)

CBC-MAC l = 16 32 64

CTR l = 16

CTR l = 32

CTR l = 64

CCM l = 16

CCM l = 32

CCM l = 64

Ours l = 16

Ours l = 32

Ours l = 64

Figure 7 Reception overhead for a varying number of nodes119873

a nodemust compute119873 hashes and perform119873XORs to sendchannel information and process the reports received from itsneighbors

As per [37] XORoperationwith aMSP430 accounts for 4-5 cyclesbyte Assuming a 128-bit hash function and the worstcase every XOR in our proposals accounts for 5 sdot 16 = 80cycles As previously explained in Section 51 we suggest theuse of a lightweight cryptographic hash function specificallysuited for low-end devices with an output of 128 bits Table 2depicts the number of CPU cycles per block needed [38]for two potential candidates As clearly seen in the tablecomputing one of these hash functions requires only a fewtens of cyclesblock In the following for this analysis we will

Table 2 Cycles per block for different cryptographic hash functions

Algorithm Hash output size Cyclesblock(Stripped) MAME 128 96H-PRESENT-128 128 32

consider the (stripped) MAME hash function as it is a purehash function that does not rely on a symmetric cipher andrequires more CPU cycles (worst case)

Taking into account the previous data Figure 8 showsthe CPU cycles consumed with both our proposal (with aMAME hash function) and standard AES-128 security It canbe clearly seen that our proposal scales much better withthe number of nodes while still providing an appropriatelevel of security We do not provide values for the processtime that is the time needed for key generation encryptiondecryption and data authentication but the number of CPUcycles required to execute each function In this way timevalues can be obtained for a particular sensor node accordingto its CPU features

63 Total Energy Cost Table 3 provides the transmission andreception energy consumption of a TIrsquos CC2540 microcon-troller for different modes and values of transmission powerThe displayed values have been tested under 25∘CWe do nothave values for in-body conditions (asymp38∘C) but we presentthese data for reference purposes In any case this fact onlyaffects the energy consumption for receivingtransmittingNote that the total cost in terms of energy is much highersince it should also account for duty cycles state changes andother parameters [39]

There is no single specific ldquoenergy per CPU cyclerdquo valuesince the cycle consumption depends on the type of CPUoperation Anyway in [34] the authors measured that theTIrsquos MSP430F1611 consumes energy at an average of 072 nJper clock cycle and we have adopted such value in our study

Figure 9 shows the total average energy consumption as afunction of the number of neighboring sensor nodes and thenumber 119897 of bits used to code the channels for the proposedmechanism and standard approaches CCM (authenticationand encryption) CTR (encryption only) and CBC-MAC(authentication only) We have assumed standard receptionand short-range transmission of minus6 dBm (see Table 3)

As clearly denoted in the figure ourmethod only requiresa few tens of 120583J regardless of the number of sensor nodeswhile AES-based security requires higher values of energyranging from 35 120583J to almost 240120583J when encryption andauthentication are provided and for 30 sensor nodes Themore the number of sensor nodes the bigger the improve-ment introduced by our proposal

It must be remarked however that the purpose of thisfigure is to provide reference values to be taken into accountfor future implementations Besides the level of security pro-vided by our method is lower than AES-based methods butstill ismore than adequate given the features of CBSNs (trans-mission rate number of sentmessages etc) and given the factthat the data we are trying to protect are just a limited numberof potential channels to be used for operation of the network

International Journal of Distributed Sensor Networks 11

Table 3 Currentenergy consumption for RXTX tested on TexasInstruments CC2540 EMwith 119879

119860= 25∘Cwith no peripherals active

and low MCU activity at 250 kHz

Test conditions Current EnergybyteRX standard 196mA 588 nJRX high gain 221mA 663 nJTX minus23 dBm 211mA 633 nJTX minus6 dBm 238mA 714 nJTX 0 dBm 27mA 81 nJTX 4 dBm 316mA 948 nJ

5 10 15 20 25 30

Number of nodes (N)

AES l = 16 32 64

Ours l = 16 32 64

300000

250000

200000

150000

100000

50000

0

CPU

cycle

s

Figure 8 Added CPU cycles for a secure exchange of sensing data

Indeed thismechanism introduces some overhead due tospectrum sensing and sharing of channel information and aswe pointed out above the overhead increases linearly withthe number of nodes in the network The synchronizationprotocol adds some overhead too but the increase willstrongly depend on the chosen protocol In [29] someprotocols with high energy efficiency are referenced whichcould be used in our proposal

Despite it we claim that it is definitely worth introducingthis overhead to increase the availability of the network andmake it robust to potential interferences and DoS attacksUnder these undesired situations the current channel usedby the CBSN may become unavailable but the proposedmethod allows the nodes to securely agree on a new channelof operation and rapidly resume their transmissions It mustbe remarked that securing channel availability informationmay prevent or at least diminished the effect of further DoSattacks when switching to a new channel

We do not quantify the benefits of applying our methodin terms of attack mitigation because it strongly depends onthe capabilities of the attacker (time required for sensing eachchannel number of channels that can sense etc) As a futurework it would be interesting to estimate the improvementachieved by our approach in terms of throughput of the

5 10 15 20 25 30

Number of nodes (N)

CBC-MAC l = 16 32 64

CTR l = 16

CTR l = 32

CTR l = 64

CCM l = 16

CCM l = 32

CCM l = 64

Ours l = 16

Ours l = 32

Ours l = 64

250

200

150

100

50

0

Ener

gy co

st (120583

J)Figure 9 Added energy costs for a TIrsquos MSP430F1611 with a TIrsquosCC2540 microcontroller

CBSNs connections and the tradeoff between benefits andoverhead

7 Conclusions

Body sensor networks (BSNs) emerge as an optimal solutionfor ensuring constant and remote monitoring of the healthstatus in patients Recent advances in technology have madeit possible to deploy a network of tiny sensors over the humanbody and even in body which can measure vital signs suchas temperature heart rate or the level of glucose and reportthese data to medical personnel

Guaranteeing the availability of such communicationsis a must as long as connectivity losses during emergencysituations may prevent a patient from immediately receivingmedical assistance and may end up in catastrophic results

A new network paradigm known as cognitive body sen-sor networks (CBSNs) could mitigate this threat by allowingbody sensors to operate in a wide range of frequenciesand adapt its transmission parameters according to highlydynamic environment conditions However this would comeat the expense of implementing cooperative spectrum sensingmechanisms that allow sensors to exchange informationabout channel quality and availability As a consequenceCBSNs might become vulnerable to specific attacks that aretargeted to these mechanisms

In this paper we presented a novel and simple methodto secure the sensing process in a CBSN and improve itsavailability The method relies on cryptographic primitivesthat require a minimum amount of memory and low energyconsumption thus beingmore suited for devices with limitedresources than traditional approaches It offers authentication

12 International Journal of Distributed Sensor Networks

and encryption of control data shared by the sensors in theCBSN to agree on a given channel

Our proposal was analyzed in terms of security and weshowed that although it does not provide the same level ofsecurity as AES-based encryption and authentication it isstill sufficient for low packet rate networks such as CBSNsThe provided results also showed that our method outper-forms existing approaches in terms of transmissionreceptionoverhead and number of CPU cycles needed particularly asthe number of sensor nodes increases For typical microcon-trollers as CC2540 and MSP430 the improvement in energyconsumption clearly justifies the use of the proposed methodagainst AES-based mechanisms in constrained networkssuch as CBSNs in which maximizing the network life isextremely important

Conflict of Interests

The authors declare that there is no conflict of interestsregarding the publication of this paper

Acknowledgment

This work has been partially supported by the spanishgovernment under grant TEC2011-22746 ldquoTAMESISrdquo andby the Ministry of Economy and Competitiveness throughthe projects CO-PRIVACY (TIN2011-27076-C03-02) andSMARTGLACIS (TIN2014-57364-C2-2-R)

References

[1] B Latre B Braem I Moerman C Blondia and P DemeesterldquoA survey on wireless body area networksrdquo Wireless Networksvol 17 no 1 pp 1ndash18 2011

[2] S Movassaghi M Abolhasan J Lipman D Smith and AJamalipour ldquoWireless body area networks a surveyrdquo IEEECommunications Surveys amp Tutorials vol 16 no 3 pp 1658ndash1686 2014

[3] 802156-2012mdashIEEE Standard for Local and metropolitanarea networksmdashPart 156 Wireless Body Area Networks2012 httpstandardsieeeorggetieee802download802156-2012pdf

[4] Bluetooth Low Energy (LE) June 2014 httpwwwbluetoothcomPageslow-energy-tech-infoaspx

[5] The ANT+ Alliance 2014 httpwwwthisisantcom

[6] Wi-Fi Alliance June 2014 httpwwwwi-fiorg

[7] Zigbee Alliance June 2014 httpwwwzigbeeorg

[8] M Rushanan A D Rubin D F Kune and C M SwansonldquoSoK security and privacy in implantable medical devices andbody area networksrdquo in Proceedings of the 35th IEEE Symposiumon Security and Privacy (SP rsquo14) pp 524ndash539 San Jose Calif USA May 2014

[9] I F Akyildiz W-Y Lee M C Vuran and S Mohanty ldquoNeXtgenerationdynamic spectrum accesscognitive radio wirelessnetworks a surveyrdquo Computer Networks vol 50 no 13 pp2127ndash2159 2006

[10] BWang and K J R Liu ldquoAdvances in cognitive radio networksa surveyrdquo IEEE Journal of Selected Topics in Signal Processingvol 5 no 1 pp 5ndash23 2011

[11] Y Xu J Wang Q Wu A Anpalagan and Y-D Yao ldquoOppor-tunistic spectrum access in unknown dynamic environment agame-theoretic stochastic learning solutionrdquo IEEE Transactionson Wireless Communications vol 11 no 4 pp 1380ndash1391 2012

[12] D Cavalcanti S Das J Wang and K Challapali ldquoCognitiveradio based wireless sensor networksrdquo in Proceedings of the17th International Conference on Computer Communicationsand Networks (ICCCN rsquo08) pp 1ndash6 August 2008

[13] O Leon J Hernandez-Serrano andM Soriano ldquoSecuring cog-nitive radio networksrdquo International Journal of CommunicationSystems vol 23 no 5 pp 633ndash652 2010

[14] M Rostami A Juels and F Koushanfar ldquoHeart-to-Heart(H2H) authentication for implanted medical devicesrdquo in Pro-ceedings of the ACM SIGSAC Conference on Computer andCommunications Security (CCS rsquo13) pp 1099ndash1111 ACM BerlinGermany November 2013

[15] K B Rasmussen C Castelluccia T S Heydt-Benjamin andS Capkun ldquoProximity-based access control for implantablemedical devicesrdquo in Proceedings of the 16th ACM Conference onComputer and Communications Security (CCS rsquo09) pp 410ndash419Chicago Ill USA November 2009

[16] L Shi M Li S Yu and J Yuan ldquoBANA body area networkauthentication exploiting channel characteristicsrdquo IEEE Journalon Selected Areas in Communications vol 31 no 9 pp 1803ndash1816 2013

[17] C C Tan S Zhong H Wang and Q Li ldquoBody sensornetwork security an identity-based cryptography approachrdquoin Proceedings of the 1st ACM Conference on Wireless NetworkSecurity (WiSec rsquo08) pp 148ndash153 April 2008

[18] O Garcia-Morchon T Falck T Heer and K Wehrle ldquoSecurityfor pervasive medical sensor networksrdquo in Proceedings of the6th Annual International Conference on Mobile and UbiquitousSystems Networking and Services (MobiQuitous rsquo09) pp 1ndash10Toronto Canada July 2009

[19] G Selimis L Huang F Masse et al ldquoA lightweight securityscheme for wireless body area networks design energy evalu-ation and proposed microprocessor designrdquo Journal of MedicalSystems vol 35 no 5 pp 1289ndash1298 2011

[20] Y Yan and T Shu ldquoEnergy-efficient In-network encryp-tiondecryption for wireless body area sensor networksrdquo inProceedings of the IEEE Global Communications Conference(GLOBECOM rsquo14) pp 2442ndash2447 IEEE Austin Tex USADecember 2014

[21] Y Xu A Anpalagan Q Wu L Shen Z Gao and J WangldquoDecision-theoretic distributed channel selection for oppor-tunistic spectrum access strategies challenges and solutionsrdquoIEEE Communications Surveys and Tutorials vol 15 no 4 pp1689ndash1713 2013

[22] Y Xu J Wang Q Wu A Anpalagan and Y-D Yao ldquoOppor-tunistic spectrum access in cognitive radio networks globaloptimization using local interaction gamesrdquo IEEE Journal onSelected Topics in Signal Processing vol 6 no 2 pp 180ndash1942012

[23] R Chavez-Santiago K E Nolan O Holland et al ldquoCognitiveradio for medical body area networks using ultra widebandrdquoIEEE Wireless Communications vol 19 no 4 pp 74ndash81 2012

International Journal of Distributed Sensor Networks 13

[24] A R Syed and K-L A Yau ldquoOn cognitive radio-based wirelessbody area networks for medical applicationsrdquo in Prceedingsof the 1st IEEE Symposium on Computational Intelligence inHealthcare and e-Health (CICARE rsquo13) pp 51ndash57 SingaporeApril 2013

[25] R Chen J-M Park and K Bian ldquoRobust distributed spectrumsensing in cognitive radio networksrdquo in Proceedings of the 27thIEEE Conference on Computer Communications (INFOCOMrsquo08) pp 1876ndash1884 IEEE Phoenix Ariz USA April 2008

[26] H Rifa-Pous M J Blasco and C Garrigues ldquoReview of robustcooperative spectrum sensing techniques for cognitive radionetworksrdquoWireless Personal Communications vol 67 no 2 pp175ndash198 2012

[27] B Braem B Latre C Blondia I Moerman and P DemeesterldquoAnalyzing and improving reliability in multi-hop body sensornetworksrdquo International Journal on Advances in Internet Tech-nology vol 2 no 1 pp 152ndash161 2009

[28] I F Akyildiz B F Lo and R Balakrishnan ldquoCooperative spec-trum sensing in cognitive radio networks a surveyrdquo PhysicalCommunication vol 4 no 1 pp 40ndash62 2011

[29] B Sundararaman U Buy and A D Kshemkalyani ldquoClocksynchronization for wireless sensor networks a surveyrdquoAdHocNetworks vol 3 no 3 pp 281ndash323 2005

[30] A Bogdanov G Leander C Paar A Poschmann M J BRobshaw and Y Seurin ldquoHash functions and RFID tags mindthe gaprdquo in Cryptographic Hardware and Embedded SystemsmdashCHES 2008 10th International Workshop Washington DCUSA August 10ndash13 2008 Proceedings vol 5154 of Lecture Notesin Computer Science pp 283ndash299 Springer Berlin Germany2008

[31] C Cordeiro K Challapali D Birru and N Sai ShankarldquoIEEE 80222 the first worldwide wireless standard based oncognitive radiosrdquo in Proceedings of the 1st IEEE InternationalSymposium on New Frontiers in Dynamic Spectrum AccessNetworks (DySPAN rsquo05) pp 328ndash337 Baltimore Md USANovember 2005

[32] S UllahHHiggins B Braem et al ldquoA comprehensive survey ofwireless body area networks on PHY MAC and network layerssolutionsrdquo Journal of Medical Systems vol 36 no 3 pp 1065ndash1094 2012

[33] N Sastry and D Wagner ldquoSecurity considerations for IEEE802154 networksrdquo in Proceedings of the ACM Workshop onWireless Security (WiSe rsquo04) pp 32ndash42 Philadelphia Pa USAOctober 2004

[34] M Pajic Z Jiang I LeeO Sokolsky andRMangharam ldquoFromverification to implementation a model translation tool and apacemaker case studyrdquo in Proceedings of the 18th IEEE Real Timeand Embedded Technology and Applications Symposium (RTASrsquo12) pp 173ndash184 Beijing China April 2012

[35] CC2540 24-GHz Bluetooth low energy System-on-Chip 2013httpwwwticomlitdssymlinkcc2540pdf

[36] U Kretzschmar ldquoAES128mdasha C implementation for encryp-tion and decryption MSP430 systems ECCN 5E002 TSPAmdashtechnologysoftware publiclyrdquo Application Report SLAA397ATexas Instruments Dallas Tex USA 2009 httpwwwticomcncnlitanslaa397aslaa397apdf

[37] El Barquero Aqueronte MSP430 Cycles and Instructionsedited by Aqueronte 2011 httpunbarqueroblogspotcomes201105msp430-cycles-and-instructionshtml

[38] A Bogdanov G Leander C Paar A Poschmann M J BRobshaw and Y Seurin ldquoHash functions and RFID tags mindthe gaprdquo in Cryptographic Hardware and Embedded SystemsmdashHES 2008 vol 5154 of Lecture Notes in Computer Science pp283ndash299 Springer Berlin Germany 2008

[39] S Kamath and J Lindh ldquoMeasuring bluetooth low energypower consumptionrdquo Application Note AN092 Texas Instru-ments Dallas TEx USA 2012 Version SWRA347a httpwwwticomlitanswra347aswra347apdf

International Journal of

AerospaceEngineeringHindawi Publishing Corporationhttpwwwhindawicom Volume 2014

RoboticsJournal of

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Active and Passive Electronic Components

Control Scienceand Engineering

Journal of

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

International Journal of

RotatingMachinery

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Hindawi Publishing Corporation httpwwwhindawicom

Journal ofEngineeringVolume 2014

Submit your manuscripts athttpwwwhindawicom

VLSI Design

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Shock and Vibration

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Civil EngineeringAdvances in

Acoustics and VibrationAdvances in

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Electrical and Computer Engineering

Journal of

Advances inOptoElectronics

Hindawi Publishing Corporation httpwwwhindawicom

Volume 2014

The Scientific World JournalHindawi Publishing Corporation httpwwwhindawicom Volume 2014

SensorsJournal of

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Modelling amp Simulation in EngineeringHindawi Publishing Corporation httpwwwhindawicom Volume 2014

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Chemical EngineeringInternational Journal of Antennas and

Propagation

International Journal of

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Navigation and Observation

International Journal of

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

DistributedSensor Networks

International Journal of

Page 3: Research Article A Cognitive-Radio-Based Method for

International Journal of Distributed Sensor Networks 3

(iii) We provide a security analysis of the proposedmethod and derive the time period during which thecryptographic material remains secure

(iv) The proposed method is compared to otherapproaches based on traditional cryptographic prim-itives in terms of energy consumption and CPUusage

The rest of this document is structured as follows InSection 2 we review the state of the art on security in BSNsSection 3 describes the BSN model considered in this workand its potential threats A lightweight method to securethe process of channel selection in a BSN is presented inSection 4 Sections 5 and 6 present a security analysis of theproposedmethod and a comparisonwith existing approachesin terms of resources consumption Finally in Section 7 weprovide the conclusions of this work

2 Related Work

To date research on security in BSNs has mainly focused onprotecting data stored at the network nodes from unautho-rized access and providing authentication and confidentialityto the communications among the BSN devices In thefollowing we provide an overview of the proposals that canbe found in the literature

Many proposed authentication methods are based onbiometrics that is relying on measurements of physiologicalvalues (PVs) [14] such as heart rate blood pressure ortemperature in order to establish trust and generate keymaterial The main idea is ensuring access to sensors onlyto those devices in physical contact with the patient Theadvantage of these methods is that the key source is hard foran attacker to predict without physical access to the patientand also ensures forward-security because PVs change overtimeThemain challenge however is how to achieve success-ful authentication among authorized devices when the PVmeasured by each one is not exactly the same either due tomeasurement errors or due to the fact that different devicesmeasure a given PV at different time instants

Authentication by means of distance-bounding protocolswas proposed in several works [15 16] This techniqueprovides a very weak mutual authentication between twodevices based on measuring the transmission time betweenthemThe rationale behind these protocols is that a legitimatedevicemust be closer than a given distanceAs a consequencethey are vulnerable to injection attacks as long as the attackeris close enough to the patient bearing the sensors forexample by means of a hug

In [17] the authors presented a protocol based onidentity-based encryption (IBE) IBE systems are public keycryptosystems that allow any device to generate a publickey from a known identity value such as the sensor IDand require the existence of a trusted third party called theprivate key generator (PKG) to generate the correspondingprivate key To reduce the burden of key generation andencryptiondecryption introduced by traditional public keycryptography the authors proposed to use elliptic curvecryptography (ECC) which provides public key primitives

suitable for constrained devices as sensors in BSNs Despiteit it is still more expensive in terms of resource consumptionthan approaches based on symmetric cryptography

In order to preserve userrsquos privacy a number of worksproposed the use of symmetric encryption based on the AES(Advanced Encryption Standard) algorithm [18ndash20] Manysuch as the one in [19] proposed to use AES with CCMmode of operation that is to say AES counter (CTR) modefor data encryption and AES cipher-block-chaining messageauthentication code (CBC-MAC) formessage authenticationThe main advantage of this mode is that the same keycan be used for authentication and for encryption withoutcompromising security and there is no need for rekeyingas long as the number of devices is fixed As a drawbackthe added cost of encryptiondecryption and especially thecosts due to the transmission overheads cannot be neglectedin BSNs where every step forward in resourcesrsquo saving isof paramount importance In this line the authors in [20]presented an in-network mechanism that mimics the AESalgorithm and greatly reduces the costs of decryption whilethey claim achieving the same level of security

All the above-mentioned proposals approach the prob-lem of protecting patientrsquos data from unauthorized accessmodification or forgery but cannot effectively deal with DoSattacks Such a protection can be achieved by making use ofCR devices that collaboratively switch to another frequencyband [11 21 22] if the signal-to-noise ratio of the current oneis below the required value Furthermore it is also necessaryto protect the exchanged sensing data in order to prevent anattacker from eavesdropping data and get the next channelto be used in the network Note that this information mayallow an attacker to rapidly perform a DoS attack in the newchannel

In this work we present a lightweight and secure methodthat makes use of CR technology for improving the availabil-ity of the system that is ensuring that the communicationbetween the body sensor nodes will be available even underthe presence of unintentional or intentional interferencesThe application of CR technology into body sensor networkswas already proposed in previous works [23 24] However tothe best of our knowledge none of them addressed securitytopics

In [25 26] several methods for securing spectrum sens-ing mechanisms were discussed but they are not suited forheavily constrained devices such as body sensors

In [27] the authors aimed to improve the availability ofa BSN by means of a cross-layer multihop protocol that dealtwith routing of data This scheme however can be appliedonly to multihop BSNs where the path between two givennodes is established according to the connectivity among thenodes In this approach nodes make use of several paths butone single channel and thus are more vulnerable to attackssuch as jamming than CR-based networks

3 Network Model and Threats

In this work we have considered a BSN composed of aset of sensor nodes where all of them can act as sinkscollectingstoring data from other sensors and potentially

4 International Journal of Distributed Sensor Networks

Gateway

Sensor

Sink

Figure 2 Communication between sensors and the gateway

transmitting these data to an external gateway if required (seeFigure 2) Although this approach introduces some overheaddue to the fact that data must be shared among all sensorsit improves network availability and robustness against dataloss and fairly distributes energy consumption among allsensors Also itmakes the process of gathering by the gatewayeasy which can connect to any of the BSN nodes to get all theinformation

As previously mentioned we also assume that sensorshave cognitive capabilities that is they form a CBSN andare able to identify free spectrum bands and adapt theirtransmission parameters accordingly Spectrum sensing canbe performed by each node on an individual basis or cooper-atively As the latter increases the probability of detection dueto space diversity [28] we have adopted such an approach inthis work

In cooperative spectrum sensing each sensor sensesthe medium and exchanges its observations with the othermembers of the network in order to agree on a given channelfor data transmissionreception However these control dataare exposed to many attacks [13] such as packet injectioneavesdropping or Denial of Service (DoS) Next we describethe attacker model and the specific attacks that can beexecuted against CBSNs

31 Attacker Model In this work we focus on outsiders thatis external attackers that do not share any cryptographiccontent with the gateway or the victimrsquos sensor nodes Ifthe attacker nodes are part of the CBSN they will haveaccess to the keying material and therefore will be able tosuccessfully eavesdrop and inject data In any case the designof a mechanism to counteract this threat is out of the scopeof this work

In the context of CBSNs we can classify adversariesaccording to the following criteria

(i) Active or passive a passive attacker can only eavesdropdata thus being able to access patientrsquos data andviolating hisher privacy In its turn an active attackeraims at injecting or modifying data in order to sendfake reports on the state of the patient

(ii) Type of attack includes the following

(a) eavesdropping unauthorized access to storeddata or to transmitted data among the CBSNdevices thus violating the privacy of the patient

(b) modificationinjection an attacker that mayalter the content of a packet transmitted by asensor or impersonate a sensor by forging apacket these attacks can be executed due to lackof authentication and violate the integrity of theCBSN communications

(c) packet replay an attacker that may capture apacket that was previously sent by a sensor ofthe network Regardless of the fact that theCBSN is using authentication mechanisms ornot the packet will be accepted by the networksif antireplay mechanisms are not provided

(d) jamming the adversary that disrupts the CBSNcommunications by generating interfering sig-nals

(iii) Intentional or unintentional the adversary can bean external entity willing to cause damage to thecommunications among sensors and the gateway orcan be an entity that unintentionally is causing inter-ferences to those communications As an examplethe patient of interest could be near another patientwith wearable sensors which could inject fake reportsif data is not properly authenticated Examples ofunintentional attacks could take place in a situationwhere two patients bearing body sensors are huggingand unconsciously exchange data Or the patientcould be near a relative who is visiting himher at thehospital and carries any electronic device that causesinterferences to the CBSN

It is important to remark that in a CBSN where sensornodes establish communications using different channelsover time these attacks can be extended to the control dataexchange among the devices of the CBSN As an example anattacker may forge a report regarding the availability of thechannels thus leading the CBSN to select a channel that issuffering from high interferences or that is currently beingused by another service Note that this attack can lead to aDoS and the failure of the system in monitoring the patientrsquosstatus In its turn eavesdropping of the control channel allowsan attacker to have knowledge of the channels to be usedby the CBSN The attacker could take advantage of thissituation in order to easily disrupt the communications inthe network by performing a new DoS attack every time theCBSN switches to a new channel

The implementation of security mechanisms in a CBSN[12] to counteract these attacks is specially challenging dueto the limited capabilities of CBSNrsquos nodes In the followingsection we describe a simple method to secure the processof channel selection in CBSNs The proposed mechanismis suited for networks with extremely constrained-resourcesdevices since it makes use of lightweight cryptographicfunctions and minimizes the added transmissionreceptionoverhead

International Journal of Distributed Sensor Networks 5

4 Securing Sensing Data andChannel Selection in CBSNs

In the following we present a mechanism for securing theexchange of sensing data and the channel selection processin CBSNs Section 41 outlines the assumptions considered inthiswork regarding the networkmodel and in Section 42 wedescribe the protocol operation For ease of understandingwe present the terminology used along this section as follows

CTR119872 medium-term session counter (119898 bits)

CTR119878 short-term session counter (119898 bits)

119863119906

119894 data sensed by node 119906 during period 119894 (119897 bits)

ID119906 link-layer identifier of node 119906 (119898 bits)119870119906

119894 keystream to encrypt and authenticate data for

node 119906 during period 119894 (119903 bits)KM keying master119897 length of the data sensed by a given node during agiven period119898 length of the hash output and all the secrets119873 number of nodes in the network119901 number of keystreams119870119906

119894obtained from a 119878119906 (119901 =

119898119903) defining the number of sensing periods beforeupdating 119878119906119903 length of the keystreams 119870119906

119894 which must be a

divisor of119898119878119871 long-term globally shared secret (119898-bits)119878119872 medium-term globally shared secret (119898-bits)119878119904119894 long-term secret shared between the KM and

node 119894 it is used to update 119878119871in case it is compro-

mised119878119906 short-term shared secret with node 119906

41 Assumptions Although the proposed protocol isdesigned to be implemented in heavily constrained deviceswe work under the assumption that such devices have at leastthe following capabilities

(i) Compute a hash function with an output length of119898bits

(ii) Temporally store in its randomaccessmemory at least119898 sdot (119873 + 3) bits with 119873 the number of nodes in thenetwork As we detail later in Section 42 each nodemust keep a short-term shared secret for each of theN nodes in the network (including itself) and threemore long-term and medium-term secrets each onewith length of119898 bits

(iii) Sensor nodes use a synchronization protocol that willbe used to share a global short-term session counterand a medium-term session counter among all nodes(see Section 42) Given the low transmission rate ofsensor networks existing synchronization schemes[29] provide enough precision for this purpose Weassume that the chosen protocol provides recovery

methods upon loss of synchronization How syn-chronization is achieved will strongly depend on thechosen protocol but if the latter requires a masternode for providing synchronization the gateway ofthe BSN could play this role

To the best of our knowledge the former requirement canbe assumed even in very constrained devices As shown in[30] there are several lightweight hash functions that canbe integrated into a sensor mote The latter may not beharder to achieve As detailed in Section 42 during everysensing period each node stores one secret per member ofthe network a globally shared secret and two counters allof them with the same length 119898 as the hash output If weconsider a typical hash function with an output of 128 or 256bits and a network with tens to hundreds of sensors the RAMrequirements for sensor nodes are just bounded to a few tensof kilobytes

42 Protocol Operation Before deploying the CBSN everysensor nodemust be preloaded by a keyingmaster (KM)withthe following data

(1) The set of channels that the sensor will have to sensein the cooperative sensing process

(2) A long-term and globally shared secret 119878119871of 119898 bits

(the hash output length)(3) A long-term secret 119878

119904119894shared between the KM and

node 119894 that will be used to update the globally sharedsecret 119878

119871in case it is compromised

The KM is an external device which is not a member oftheBSNTypically this role is played by the device responsiblefor gathering data from the sensors or gateway (eg a smartphone or a tablet)

Upon deployment of the network every node derives amedium-term globally shared secret 119878

119872by hashing the XOR

of the long-term secret 119878119871and a counter The generation

process of 119878119872

is clearly depicted in Figure 3 This process isperiodically repeated with an updated value of the medium-term counter in order to protect the secret against a potentialattacker Details about how often this process should becarried out and the attacker capabilities are provided inSection 5

As shown in Figure 4 each node generates a set ofrandom sequences of 119898 bits one for the node itself and onefor each other node in the networkThese random sequences119878119906 with 119906 the node identifier are obtained by hashing theXOR of the link-layer identifier of the node ID119906 themedium-term shared secret 119878

119872 and a short-term session counter

CTR119878

Therefore our proposalmakes use of three types of sharedsecrets

(i) A short-term per-node shared secret 119878119906 (one per eachnode in the network) used for encryption decryptionand authentication of data

(ii) Amedium-term globally shared secret 119878119872that is used

to derive the short-term per-node shared secrets 119878119906

6 International Journal of Distributed Sensor Networks

Long-term shared secretSLmiddot middot middot

middot middot middot

middot middot middot

Medium-term session counter

Medium-term shared secret

CTRM

HashSM

mbits

mbitsmbits

mbits

Figure 3 Generation of the medium-term globally shared secret 119878119872

middot middot middot

middot middot middot

middot middot middot

middot middot middot

Short-term session counterMedium-term shared secret

node uShort-term shared secret with

Hash

SM

Su

Identifier of node uIDu

CTRS

mbits

mbitsmbits

mbits

mbits

Figure 4 Generation of the short-term shared secret 119878119906 for node 119906

(iii) A long-term globally shared secret that is used toderive a new 119878

119872when the current one is about to

expireAs clearly denoted in Figure 5 each sequence 119878119906 is divided

into 119901 fragments of 119903 bits which we will be denoted as 119870119906119894

each one being used as keystream to encrypt and authenticatedata for node 119906 in period 119894 As per this behavior a new short-term shared secret must be derived every 119901 sensing period

When a node performs spectrum sensing it generates abinary sequence 119863119906

119894of 119897 bits that stores the availability of the

different channels The length of such sequence 119897 will dependon the number of bits used to code the state of each channeland the number of channels As an example the simplest waywould be to use just a single bit for coding each channel withvalue ldquo0rdquo if the channel is occupied and ldquo1rdquo otherwise If moreprecise information about the quality of channels is needed(ie high medium low and very low quality) more bits canbe used to code the channel state

During a sensing period 119894 each node must send toits neighbors its own sensing information but also it mustprocess the information received from its neighbors to reacha joint decision

In order to send its own sensing information node 119906 willmake use of the corresponding keystream 119870119906

119894 the first 119897 bits

of the keystream will be used to encrypt channel information119863119906

119894by means of a XOR addition the remaining 119903 minus 119897 bits are

left unchanged and will be used to provide message authen-tication as illustrated in Figure 5 The resulting sequence 119862119906

119894

will be sent to all the other nodes

To verify the authenticity and decrypt the content of thepackets that have been sent by a given neighbor 119906 a nodewill XOR the sequence 119862119906

119894of the received packet with the

keystream 119870119894119906 as depicted in Figure 6 If the last 119903 minus 119897 bits

of the resulting sequence are not all 0 s the authenticationfails and the entire packet is discarded Otherwise channelinformation can be recovered from the first 119897 bits resultingfrom the XOR addition

The above described process is applied for each neighbor-ing node 119906 Then the channel reported by a larger number ofneighbors will be selected for the operation of the networkNote that because more than one channel may be reported bythe same amount of nodes a tie-break mechanism is neededto guarantee that the process leads to equal results in allnodes One simple approach that could be used is to selectthe channel with the highest identifier However this wouldlead to a lower usage of channels with lower identifiers andtherefore to providing the attacker with valuable informationabout channel usage in the CBSN As a consequence wepropose to use a tie-break method that relies on the formatof119863119906119894

Recall that a fundamental characteristic of this protocolis that there is no central entity that is known and trusted byall sensors This makes the protocol suitable for unattendedscenarios and it also makes it more efficient in terms of datatransmitted through the network because no information issent regarding which channels have to be sensed or whichchannel is finally selected Instead sensors are deployedwith all the information needed to perform the sensing in

International Journal of Distributed Sensor Networks 7

middot middot middot

Short-term shared secret with node u

Keystream pKeystream 2Keystream 1

Su

Encrypted Authdatasensing data

Sensing data

Sensing data

Sensing period 1

Sensing period p

Encrypted Authdatasensing data

Cup

Cu1

Dup

Du1

Ku1 Ku

2 Kup

mbits

rbitsrbitsrbits

lbitslbits

lbitslbits

lbits

lbits

lbitslbits r-lbitsr-lbits

r-lbits

r-lbits

Figure 5 Encrypting and authenticating sensing data

middot middot middot

Short-term shared secret with node u

Keystream pKeystream 2Keystream 1

Su

Sensing dataSensing period 1 True

Accept sensing data

Reject sensing data

Cu1

Du1

Ku1 Ku

2 Kup

If ne 0998400s

rbitsrbitsrbits

rbits lbits

mbits

r-lbits

Figure 6 Decrypting sensing data

a distributed way and make a joint decision autonomouslyThus there is no need for additional mechanisms to be usedwhen a new node joins the network In this case the newnode needs to synchronize with the rest of themembers to getthe proper value of the session counters by making use of thecorresponding protocol However when a node is expelledfrom the network because it has been compromised newcryptographic material must be generated and distributedamong the remaining nodes The KM is responsible fortriggering this process and communicates with each sensornode to update the shared long-term secret 119878

119871 Note that

because the KM shares a different secret 119878119904119894with each node 119894

it can securely distribute the new value of 119878119871 Upon reception

of 119878119871 each node should perform again the initialization

process described at the beginning of this section

5 Security Analysis

The security of the proposed method relies on the sharedsecrets used to derive the keys and perform encryption andauthentication of channel availability data As long as thesesecrets are not compromised data confidentiality can beensured that is an attacker might not be able to get the listof channels to be used in the CBSN Besides the methodmust prevent an attacker from injecting fake data into thesystem These issues are discussed as follows In Section 51we analyze how often the shared secrets should be updated inorder to guarantee a proper protection against cryptanalysisnext in Section 52 we evaluate the packet authenticationmethod used in our proposal in terms of probability ofbypassing the authentication check

8 International Journal of Distributed Sensor Networks

51 Shared Secrets Lifetime As previously mentioned inSection 31 for this analysis we are assuming that attackscome from external entities and therefore attackers are notable to obtain the cryptographic material that is stored in thebody sensors In the context of this proposal the lifetime ofeach of the shared secrets is the interval in which these secretsare considered computationally safe against cryptanalysisthat is their cryptoperiod

The cryptoperiod straightly depends on the chosen cryp-tographic protocols the length of the secrets themselves andthe amount of times they are used The more a given secret isused the shorter its cryptoperiod is as an attacker gets moreinformation about this secret and therefore the probability ofa successful cryptanalysis increases In fact cryptoperiod isdefined more in terms of the number of times a given secretor key is reused (the amount of ciphertext exposed to anattacker for a given secretkey) than as a given time periodwhich strongly depends on the transmission rate of the sensornodes

Recall the three types of shared secrets used in theproposed method

(i) Short-term per-node shared secrets one secret 119878119906 persource node that is used to lightweight encryptdecrypt and authenticate the channelsrsquo sensed data

(ii) Medium-term globally shared secrets globally sharedsecret 119878

119872that is used to derive the short-term per-

node shared secrets 119878119906(iii) Long-term globally shared secret this being the ini-

tially preloaded secret 119878119871that is used to derive a new

medium-term globally shared secret 119878119872

when thecurrent one is about to expire

As clearly denoted in Figure 5 our approach operates insome manner as an additive stream cipher It is well knownthat stream ciphers are considered to be secure as long as thekey is never reused and thus our cipher will be secure if agiven value 119878119906 is not repeated As a result 119878119906must be updatedevery 119901 = 119898119903 sensing period with 119901 the renewal period119898 the length of the shared secret 119878119906 and 119903 the amount oftransmitted bits (sensing data) in a sensing period that areencrypted with 119878119906

Recall that in our proposal the per-node key used forencryption 119878119906 is generated by means of a hash function Asecond requirement is that this function must be crypto-graphically secure Note that if the hash function does notaccomplish it an attackermight be able to reverse it that is toget the input of the hash function given an output meaningthat in our proposal an attacker would be able to recoverthe value of the medium-term globally shared secret 119878

119872(see

Figure 4)A cryptographically secure hash function with an output

of 119898 bits can offer a security level of 2119898 operations againstpreimage attacks and 21198982 against collision attacks Generallyspeaking a minimum output of 128 bits is required in orderto provide a high level of security for most applicationsbut shorter lengths are accepted if the number of generatedmessages in a given period is limited as it is the case of low-rate networks In Section 6 we propose several lightweight

hash candidates with an output of 128 bits that is to saywe can assume that it is computationally unfeasible for anattacker to invert the hash function and thus to predict thevalue of 119878119872 as long as it is updated before exceeding itscryptoperiod which has an upper bound of 21198982 = 264 uses

The long-term globally shared secret 119878119871is only used to

update the current medium-term globally shared secret 119878119872

Because 119878119872is not updated very often it is very unlikely that

an attacker manages to obtain several values of 119878119872to reverse

the hash function and recover 119878119871 As a result we can assume

that the 119878119871cryptoperiod is long enough and there is no need

to update the secret during the nodesrsquo lifetime

52 Authentication A cryptogram 119862119906119894of sensing data con-

tains an authentication field of 16 bits that is checked uponreception (see Figure 6) Consequently an attacker has achance of 1 in 216 of guessing the next authentication fieldwhich allows it to forge a valid authentication field and injectfake data Note that this attack can lead the CBSN to wrongdecisions about the availability of the spectrum

If the attacker repeatedly attempts to send valid cipher-texts it may succeed after 215 attempts in average Becausethe attacker does not know 119878119906 the authentication fieldappears to it as a random stream and therefore it must select afake authentication field at random Besides the attacker can-not determine whether a given ciphertext has been acceptedor rejected because the receiver does not acknowledge thereception of such packets to the emitter Otherwise theattacker could take advantage of this information in order toguess a valid authentication field in a faster way

In conventional networks 215 packets may seem anextremely low number but it may provide an adequate levelof security in CBSNs In these networks the attacker can onlysend fake packets during the sensing periods which is in theorder of a few milliseconds in most cognitive scenarios [31]Moreover as previously stated in Section 1 transmission ratesin BSNs are considerably low with values usually rangingfrom tens to a few hundred of kilobits per second

As an example let us consider a 1Mbps link a sensingperiod of 10ms and a packet size of 10 bytes (which is clearlybigger than the typical packet size in sensor networks) Giventhese parameters an attacker would only be able to send 125packets at most in every sensing period That is to say theattacker would need an average of 262144 sensing periods tosend a fake packet and pass the authentication check

6 Cost Evaluation and Comparisonwith Other Approaches

In this section we evaluate the cost of our proposal interms of energy consumption due to transmission overheadand computational cost and compare its performance withthe most common approach adopted in sensor networks[32] which is providing authentication andor encryption ofthe channel sensing data by means of using standard blockciphers As is well known block ciphers have as input themessage to be encrypted or authenticated which is dividedinto several blocks of fix length and a key Both the block

International Journal of Distributed Sensor Networks 9

length and the key length depend on the algorithm beingused Regardless of the algorithm block ciphers can be usedin several modes of operation depending on the service tobe provided that is encryption only authentication only orencryptionauthentication Generally the followingmodes ofoperation are applied

Authentication CBC-MAC is a block cipher mode for gen-erating message authentication codes The message to beauthenticated is divided into several blocks of equal size andeach block is encrypted so that the value of a given blockdepends on the encryption of the previous block The finaloutput of the cipher that is the message authentication codeor CBC-MAC is the result of encrypting the last block of themessage When the input of the cipher is shorter than theblock size (as it is usually the case in sensor networks) theCBC-MAC can be obtained by directly encrypting a singleblock padded until the block size of the cipher is reached

Encryption CTRmode of operation turns a block cipher intoa stream cipher meaning that the resulting ciphertext has thesame size as the input or plain textThus it does not force theoutput length to be amultiple of the block size as it is the caseof other modes such as CBC-MACThis property makes thismode of operation suitable for encryption in sensor networkswhere devices usually exchange short-length messages

Authentication+Encryption CCM (CTR + CBC-MAC) is acommon choice for providing both encryption (CTR) andauthentication (CBC-MAC) [19] Aminor variation of CCMcalled CCMlowast is used in the ZigBee standard [7]

In this work we assume that Advanced EncryptionStandard (AES) in CTRmode is used for encryption andAESCBC-MAC for authentication as it is the current standardfor symmetric cryptography even in sensor nodes [33]Currently there are efficient hardware implementations ofAES that are highly affordable

Regarding hardware platforms the vast majority of pre-vious works on BSNs have used the 16-bit Texas Instrumentsrsquo(TI) MSP430 and CC2540 families of microcontrollers [34]Built around a 16-bit CPU ultra-low-power MSP430 micro-controllers are designed for low cost and specifically low-power consumption embedded applications As an exampleTIrsquos CC2540 family [35] enable robust Bluetooth low energy(BLE) network nodes to be built with low total bill-of-material (BOM) costs BLE operates in the same spectrumrange (2400GHzndash24835GHz ISM band) as classic Blue-tooth technology but uses a different set of channels insteadof 79 1MHz channels BLE offers 40 2MHz channels 3 foradvertising purposes and 37 for data exchange

61 TransmissionReception Overhead In this section weanalyze the overhead introduced by our proposal in termsof transmissionreception of channel availability data andcompare it with the overhead exhibited when conventionalapproaches are used for data encryptionauthentication asexplained above We assume that all sensors are capable ofsensing a given set of channels and report information abouttheir state

With our proposal the minimum number of transmittedbitswill dependon the number of channels that a given sensoris reporting the number of bits used to code the state ofeach channel and the length of the authentication code Asexplained in Section 52 a length of 16 bits is enough to securemost applications in WSNs and thus we have assumed thisvalue for the authentication fieldThis leads to a total amountof Bits

119905119909= 119897 + 16 of transmitted bits where 119897 represents the

total number of bits used to code all possible channels andBits119905119909= (119899 minus 1)Bits

119905119909received bits representing the number

of bits received by a given sensor from its neighborsAiming to provide a fair comparison we choose the same

key length for block ciphers and for our proposal that is tosay a 128-bit key The transmitted bits overhead added byAES CBC-MAC authentication is 128 bits (for a semanticallysecure implementation also an IV or nonce must be sharedbetween emitter and receiver so that the overhead can behigher) Regarding encryption the number of transmittedbits is equal to the number of bits 119897 used to code the state of thechannels but it also requires the use of a nonce with a lengthequal to half of the key length that is 64 bits per message

During every sensing period every node must transmita packet with sensing information but also must process thepackets received from its neighbors Table 1 and Figure 7respectively show the transmission and reception overheaddue to the secure sharing of sensing information using bothstandard block ciphers and our proposal The values areprovided as a function of the number of bits 119897 used to codethe state of the channels and the number of nodes119873 rangingfrom 5 to 30 Given that the considered scenario is a bodysensor network this is more than a reasonable value sincea patient wearing more than 30 sensors may be an unlikelysituation

The reader may notice that the overhead introducedby this mechanism increases linearly with the number ofnodes for both approaches However with the proposedmethod the transmissionreception overhead is considerablyreduced with respect to the use of standard block cipherswhile still maintaining an acceptable level of security Infact the more the nodes in the CBSN the bigger theimprovement introduced by the former As wewill show laterthe transmissionreception savings lead to a huge saving alsoin energy consumption

62 Computational Cost In this section we provide a com-parison of the CPU cost in cycles due to the implementationof the cryptographic functions

If AES is used the total cryptographic cost per nodefor securing the exchange of sensing data equals the costof one encryption and 119873 minus 1 decryptions Assumingthe Texas Instrumentsrsquo reference AES-implementation forCC2540 microcontrollers [36] AES encryption needs 6600cyclesblock and AES decryption 8400 cyclesblock

With our proposal the energy consumption has threecomponents the computation of the different sequences 119878119906

119894

with the hash function before the sensing period begins theXOR of the keystream 119870119906

119894with the sequence 119863119906

119894that signals

the availability of channels and the XOR of the sequences 119862119906119894

received from neighbors with the precomputed 119878119906119894Therefore

10 International Journal of Distributed Sensor Networks

Table 1 Transmission overhead

119897 (bits) Overhead(bits)

Authentication only (CBC-MAC)16 12832 12864 128

Encryption only (CTR)16 8032 9664 128

Authentication and encryption (CCM)16 20832 22464 256

Authentication and encryption (our proposal)16 3232 4864 80

1000

800

600

400

200

05 10 15 20 25 30

Number of nodes (N)

Rece

ptio

n ov

erhe

ad (b

ytes

)

CBC-MAC l = 16 32 64

CTR l = 16

CTR l = 32

CTR l = 64

CCM l = 16

CCM l = 32

CCM l = 64

Ours l = 16

Ours l = 32

Ours l = 64

Figure 7 Reception overhead for a varying number of nodes119873

a nodemust compute119873 hashes and perform119873XORs to sendchannel information and process the reports received from itsneighbors

As per [37] XORoperationwith aMSP430 accounts for 4-5 cyclesbyte Assuming a 128-bit hash function and the worstcase every XOR in our proposals accounts for 5 sdot 16 = 80cycles As previously explained in Section 51 we suggest theuse of a lightweight cryptographic hash function specificallysuited for low-end devices with an output of 128 bits Table 2depicts the number of CPU cycles per block needed [38]for two potential candidates As clearly seen in the tablecomputing one of these hash functions requires only a fewtens of cyclesblock In the following for this analysis we will

Table 2 Cycles per block for different cryptographic hash functions

Algorithm Hash output size Cyclesblock(Stripped) MAME 128 96H-PRESENT-128 128 32

consider the (stripped) MAME hash function as it is a purehash function that does not rely on a symmetric cipher andrequires more CPU cycles (worst case)

Taking into account the previous data Figure 8 showsthe CPU cycles consumed with both our proposal (with aMAME hash function) and standard AES-128 security It canbe clearly seen that our proposal scales much better withthe number of nodes while still providing an appropriatelevel of security We do not provide values for the processtime that is the time needed for key generation encryptiondecryption and data authentication but the number of CPUcycles required to execute each function In this way timevalues can be obtained for a particular sensor node accordingto its CPU features

63 Total Energy Cost Table 3 provides the transmission andreception energy consumption of a TIrsquos CC2540 microcon-troller for different modes and values of transmission powerThe displayed values have been tested under 25∘CWe do nothave values for in-body conditions (asymp38∘C) but we presentthese data for reference purposes In any case this fact onlyaffects the energy consumption for receivingtransmittingNote that the total cost in terms of energy is much highersince it should also account for duty cycles state changes andother parameters [39]

There is no single specific ldquoenergy per CPU cyclerdquo valuesince the cycle consumption depends on the type of CPUoperation Anyway in [34] the authors measured that theTIrsquos MSP430F1611 consumes energy at an average of 072 nJper clock cycle and we have adopted such value in our study

Figure 9 shows the total average energy consumption as afunction of the number of neighboring sensor nodes and thenumber 119897 of bits used to code the channels for the proposedmechanism and standard approaches CCM (authenticationand encryption) CTR (encryption only) and CBC-MAC(authentication only) We have assumed standard receptionand short-range transmission of minus6 dBm (see Table 3)

As clearly denoted in the figure ourmethod only requiresa few tens of 120583J regardless of the number of sensor nodeswhile AES-based security requires higher values of energyranging from 35 120583J to almost 240120583J when encryption andauthentication are provided and for 30 sensor nodes Themore the number of sensor nodes the bigger the improve-ment introduced by our proposal

It must be remarked however that the purpose of thisfigure is to provide reference values to be taken into accountfor future implementations Besides the level of security pro-vided by our method is lower than AES-based methods butstill ismore than adequate given the features of CBSNs (trans-mission rate number of sentmessages etc) and given the factthat the data we are trying to protect are just a limited numberof potential channels to be used for operation of the network

International Journal of Distributed Sensor Networks 11

Table 3 Currentenergy consumption for RXTX tested on TexasInstruments CC2540 EMwith 119879

119860= 25∘Cwith no peripherals active

and low MCU activity at 250 kHz

Test conditions Current EnergybyteRX standard 196mA 588 nJRX high gain 221mA 663 nJTX minus23 dBm 211mA 633 nJTX minus6 dBm 238mA 714 nJTX 0 dBm 27mA 81 nJTX 4 dBm 316mA 948 nJ

5 10 15 20 25 30

Number of nodes (N)

AES l = 16 32 64

Ours l = 16 32 64

300000

250000

200000

150000

100000

50000

0

CPU

cycle

s

Figure 8 Added CPU cycles for a secure exchange of sensing data

Indeed thismechanism introduces some overhead due tospectrum sensing and sharing of channel information and aswe pointed out above the overhead increases linearly withthe number of nodes in the network The synchronizationprotocol adds some overhead too but the increase willstrongly depend on the chosen protocol In [29] someprotocols with high energy efficiency are referenced whichcould be used in our proposal

Despite it we claim that it is definitely worth introducingthis overhead to increase the availability of the network andmake it robust to potential interferences and DoS attacksUnder these undesired situations the current channel usedby the CBSN may become unavailable but the proposedmethod allows the nodes to securely agree on a new channelof operation and rapidly resume their transmissions It mustbe remarked that securing channel availability informationmay prevent or at least diminished the effect of further DoSattacks when switching to a new channel

We do not quantify the benefits of applying our methodin terms of attack mitigation because it strongly depends onthe capabilities of the attacker (time required for sensing eachchannel number of channels that can sense etc) As a futurework it would be interesting to estimate the improvementachieved by our approach in terms of throughput of the

5 10 15 20 25 30

Number of nodes (N)

CBC-MAC l = 16 32 64

CTR l = 16

CTR l = 32

CTR l = 64

CCM l = 16

CCM l = 32

CCM l = 64

Ours l = 16

Ours l = 32

Ours l = 64

250

200

150

100

50

0

Ener

gy co

st (120583

J)Figure 9 Added energy costs for a TIrsquos MSP430F1611 with a TIrsquosCC2540 microcontroller

CBSNs connections and the tradeoff between benefits andoverhead

7 Conclusions

Body sensor networks (BSNs) emerge as an optimal solutionfor ensuring constant and remote monitoring of the healthstatus in patients Recent advances in technology have madeit possible to deploy a network of tiny sensors over the humanbody and even in body which can measure vital signs suchas temperature heart rate or the level of glucose and reportthese data to medical personnel

Guaranteeing the availability of such communicationsis a must as long as connectivity losses during emergencysituations may prevent a patient from immediately receivingmedical assistance and may end up in catastrophic results

A new network paradigm known as cognitive body sen-sor networks (CBSNs) could mitigate this threat by allowingbody sensors to operate in a wide range of frequenciesand adapt its transmission parameters according to highlydynamic environment conditions However this would comeat the expense of implementing cooperative spectrum sensingmechanisms that allow sensors to exchange informationabout channel quality and availability As a consequenceCBSNs might become vulnerable to specific attacks that aretargeted to these mechanisms

In this paper we presented a novel and simple methodto secure the sensing process in a CBSN and improve itsavailability The method relies on cryptographic primitivesthat require a minimum amount of memory and low energyconsumption thus beingmore suited for devices with limitedresources than traditional approaches It offers authentication

12 International Journal of Distributed Sensor Networks

and encryption of control data shared by the sensors in theCBSN to agree on a given channel

Our proposal was analyzed in terms of security and weshowed that although it does not provide the same level ofsecurity as AES-based encryption and authentication it isstill sufficient for low packet rate networks such as CBSNsThe provided results also showed that our method outper-forms existing approaches in terms of transmissionreceptionoverhead and number of CPU cycles needed particularly asthe number of sensor nodes increases For typical microcon-trollers as CC2540 and MSP430 the improvement in energyconsumption clearly justifies the use of the proposed methodagainst AES-based mechanisms in constrained networkssuch as CBSNs in which maximizing the network life isextremely important

Conflict of Interests

The authors declare that there is no conflict of interestsregarding the publication of this paper

Acknowledgment

This work has been partially supported by the spanishgovernment under grant TEC2011-22746 ldquoTAMESISrdquo andby the Ministry of Economy and Competitiveness throughthe projects CO-PRIVACY (TIN2011-27076-C03-02) andSMARTGLACIS (TIN2014-57364-C2-2-R)

References

[1] B Latre B Braem I Moerman C Blondia and P DemeesterldquoA survey on wireless body area networksrdquo Wireless Networksvol 17 no 1 pp 1ndash18 2011

[2] S Movassaghi M Abolhasan J Lipman D Smith and AJamalipour ldquoWireless body area networks a surveyrdquo IEEECommunications Surveys amp Tutorials vol 16 no 3 pp 1658ndash1686 2014

[3] 802156-2012mdashIEEE Standard for Local and metropolitanarea networksmdashPart 156 Wireless Body Area Networks2012 httpstandardsieeeorggetieee802download802156-2012pdf

[4] Bluetooth Low Energy (LE) June 2014 httpwwwbluetoothcomPageslow-energy-tech-infoaspx

[5] The ANT+ Alliance 2014 httpwwwthisisantcom

[6] Wi-Fi Alliance June 2014 httpwwwwi-fiorg

[7] Zigbee Alliance June 2014 httpwwwzigbeeorg

[8] M Rushanan A D Rubin D F Kune and C M SwansonldquoSoK security and privacy in implantable medical devices andbody area networksrdquo in Proceedings of the 35th IEEE Symposiumon Security and Privacy (SP rsquo14) pp 524ndash539 San Jose Calif USA May 2014

[9] I F Akyildiz W-Y Lee M C Vuran and S Mohanty ldquoNeXtgenerationdynamic spectrum accesscognitive radio wirelessnetworks a surveyrdquo Computer Networks vol 50 no 13 pp2127ndash2159 2006

[10] BWang and K J R Liu ldquoAdvances in cognitive radio networksa surveyrdquo IEEE Journal of Selected Topics in Signal Processingvol 5 no 1 pp 5ndash23 2011

[11] Y Xu J Wang Q Wu A Anpalagan and Y-D Yao ldquoOppor-tunistic spectrum access in unknown dynamic environment agame-theoretic stochastic learning solutionrdquo IEEE Transactionson Wireless Communications vol 11 no 4 pp 1380ndash1391 2012

[12] D Cavalcanti S Das J Wang and K Challapali ldquoCognitiveradio based wireless sensor networksrdquo in Proceedings of the17th International Conference on Computer Communicationsand Networks (ICCCN rsquo08) pp 1ndash6 August 2008

[13] O Leon J Hernandez-Serrano andM Soriano ldquoSecuring cog-nitive radio networksrdquo International Journal of CommunicationSystems vol 23 no 5 pp 633ndash652 2010

[14] M Rostami A Juels and F Koushanfar ldquoHeart-to-Heart(H2H) authentication for implanted medical devicesrdquo in Pro-ceedings of the ACM SIGSAC Conference on Computer andCommunications Security (CCS rsquo13) pp 1099ndash1111 ACM BerlinGermany November 2013

[15] K B Rasmussen C Castelluccia T S Heydt-Benjamin andS Capkun ldquoProximity-based access control for implantablemedical devicesrdquo in Proceedings of the 16th ACM Conference onComputer and Communications Security (CCS rsquo09) pp 410ndash419Chicago Ill USA November 2009

[16] L Shi M Li S Yu and J Yuan ldquoBANA body area networkauthentication exploiting channel characteristicsrdquo IEEE Journalon Selected Areas in Communications vol 31 no 9 pp 1803ndash1816 2013

[17] C C Tan S Zhong H Wang and Q Li ldquoBody sensornetwork security an identity-based cryptography approachrdquoin Proceedings of the 1st ACM Conference on Wireless NetworkSecurity (WiSec rsquo08) pp 148ndash153 April 2008

[18] O Garcia-Morchon T Falck T Heer and K Wehrle ldquoSecurityfor pervasive medical sensor networksrdquo in Proceedings of the6th Annual International Conference on Mobile and UbiquitousSystems Networking and Services (MobiQuitous rsquo09) pp 1ndash10Toronto Canada July 2009

[19] G Selimis L Huang F Masse et al ldquoA lightweight securityscheme for wireless body area networks design energy evalu-ation and proposed microprocessor designrdquo Journal of MedicalSystems vol 35 no 5 pp 1289ndash1298 2011

[20] Y Yan and T Shu ldquoEnergy-efficient In-network encryp-tiondecryption for wireless body area sensor networksrdquo inProceedings of the IEEE Global Communications Conference(GLOBECOM rsquo14) pp 2442ndash2447 IEEE Austin Tex USADecember 2014

[21] Y Xu A Anpalagan Q Wu L Shen Z Gao and J WangldquoDecision-theoretic distributed channel selection for oppor-tunistic spectrum access strategies challenges and solutionsrdquoIEEE Communications Surveys and Tutorials vol 15 no 4 pp1689ndash1713 2013

[22] Y Xu J Wang Q Wu A Anpalagan and Y-D Yao ldquoOppor-tunistic spectrum access in cognitive radio networks globaloptimization using local interaction gamesrdquo IEEE Journal onSelected Topics in Signal Processing vol 6 no 2 pp 180ndash1942012

[23] R Chavez-Santiago K E Nolan O Holland et al ldquoCognitiveradio for medical body area networks using ultra widebandrdquoIEEE Wireless Communications vol 19 no 4 pp 74ndash81 2012

International Journal of Distributed Sensor Networks 13

[24] A R Syed and K-L A Yau ldquoOn cognitive radio-based wirelessbody area networks for medical applicationsrdquo in Prceedingsof the 1st IEEE Symposium on Computational Intelligence inHealthcare and e-Health (CICARE rsquo13) pp 51ndash57 SingaporeApril 2013

[25] R Chen J-M Park and K Bian ldquoRobust distributed spectrumsensing in cognitive radio networksrdquo in Proceedings of the 27thIEEE Conference on Computer Communications (INFOCOMrsquo08) pp 1876ndash1884 IEEE Phoenix Ariz USA April 2008

[26] H Rifa-Pous M J Blasco and C Garrigues ldquoReview of robustcooperative spectrum sensing techniques for cognitive radionetworksrdquoWireless Personal Communications vol 67 no 2 pp175ndash198 2012

[27] B Braem B Latre C Blondia I Moerman and P DemeesterldquoAnalyzing and improving reliability in multi-hop body sensornetworksrdquo International Journal on Advances in Internet Tech-nology vol 2 no 1 pp 152ndash161 2009

[28] I F Akyildiz B F Lo and R Balakrishnan ldquoCooperative spec-trum sensing in cognitive radio networks a surveyrdquo PhysicalCommunication vol 4 no 1 pp 40ndash62 2011

[29] B Sundararaman U Buy and A D Kshemkalyani ldquoClocksynchronization for wireless sensor networks a surveyrdquoAdHocNetworks vol 3 no 3 pp 281ndash323 2005

[30] A Bogdanov G Leander C Paar A Poschmann M J BRobshaw and Y Seurin ldquoHash functions and RFID tags mindthe gaprdquo in Cryptographic Hardware and Embedded SystemsmdashCHES 2008 10th International Workshop Washington DCUSA August 10ndash13 2008 Proceedings vol 5154 of Lecture Notesin Computer Science pp 283ndash299 Springer Berlin Germany2008

[31] C Cordeiro K Challapali D Birru and N Sai ShankarldquoIEEE 80222 the first worldwide wireless standard based oncognitive radiosrdquo in Proceedings of the 1st IEEE InternationalSymposium on New Frontiers in Dynamic Spectrum AccessNetworks (DySPAN rsquo05) pp 328ndash337 Baltimore Md USANovember 2005

[32] S UllahHHiggins B Braem et al ldquoA comprehensive survey ofwireless body area networks on PHY MAC and network layerssolutionsrdquo Journal of Medical Systems vol 36 no 3 pp 1065ndash1094 2012

[33] N Sastry and D Wagner ldquoSecurity considerations for IEEE802154 networksrdquo in Proceedings of the ACM Workshop onWireless Security (WiSe rsquo04) pp 32ndash42 Philadelphia Pa USAOctober 2004

[34] M Pajic Z Jiang I LeeO Sokolsky andRMangharam ldquoFromverification to implementation a model translation tool and apacemaker case studyrdquo in Proceedings of the 18th IEEE Real Timeand Embedded Technology and Applications Symposium (RTASrsquo12) pp 173ndash184 Beijing China April 2012

[35] CC2540 24-GHz Bluetooth low energy System-on-Chip 2013httpwwwticomlitdssymlinkcc2540pdf

[36] U Kretzschmar ldquoAES128mdasha C implementation for encryp-tion and decryption MSP430 systems ECCN 5E002 TSPAmdashtechnologysoftware publiclyrdquo Application Report SLAA397ATexas Instruments Dallas Tex USA 2009 httpwwwticomcncnlitanslaa397aslaa397apdf

[37] El Barquero Aqueronte MSP430 Cycles and Instructionsedited by Aqueronte 2011 httpunbarqueroblogspotcomes201105msp430-cycles-and-instructionshtml

[38] A Bogdanov G Leander C Paar A Poschmann M J BRobshaw and Y Seurin ldquoHash functions and RFID tags mindthe gaprdquo in Cryptographic Hardware and Embedded SystemsmdashHES 2008 vol 5154 of Lecture Notes in Computer Science pp283ndash299 Springer Berlin Germany 2008

[39] S Kamath and J Lindh ldquoMeasuring bluetooth low energypower consumptionrdquo Application Note AN092 Texas Instru-ments Dallas TEx USA 2012 Version SWRA347a httpwwwticomlitanswra347aswra347apdf

International Journal of

AerospaceEngineeringHindawi Publishing Corporationhttpwwwhindawicom Volume 2014

RoboticsJournal of

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Active and Passive Electronic Components

Control Scienceand Engineering

Journal of

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

International Journal of

RotatingMachinery

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Hindawi Publishing Corporation httpwwwhindawicom

Journal ofEngineeringVolume 2014

Submit your manuscripts athttpwwwhindawicom

VLSI Design

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Shock and Vibration

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Civil EngineeringAdvances in

Acoustics and VibrationAdvances in

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Electrical and Computer Engineering

Journal of

Advances inOptoElectronics

Hindawi Publishing Corporation httpwwwhindawicom

Volume 2014

The Scientific World JournalHindawi Publishing Corporation httpwwwhindawicom Volume 2014

SensorsJournal of

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Modelling amp Simulation in EngineeringHindawi Publishing Corporation httpwwwhindawicom Volume 2014

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Chemical EngineeringInternational Journal of Antennas and

Propagation

International Journal of

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Navigation and Observation

International Journal of

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

DistributedSensor Networks

International Journal of

Page 4: Research Article A Cognitive-Radio-Based Method for

4 International Journal of Distributed Sensor Networks

Gateway

Sensor

Sink

Figure 2 Communication between sensors and the gateway

transmitting these data to an external gateway if required (seeFigure 2) Although this approach introduces some overheaddue to the fact that data must be shared among all sensorsit improves network availability and robustness against dataloss and fairly distributes energy consumption among allsensors Also itmakes the process of gathering by the gatewayeasy which can connect to any of the BSN nodes to get all theinformation

As previously mentioned we also assume that sensorshave cognitive capabilities that is they form a CBSN andare able to identify free spectrum bands and adapt theirtransmission parameters accordingly Spectrum sensing canbe performed by each node on an individual basis or cooper-atively As the latter increases the probability of detection dueto space diversity [28] we have adopted such an approach inthis work

In cooperative spectrum sensing each sensor sensesthe medium and exchanges its observations with the othermembers of the network in order to agree on a given channelfor data transmissionreception However these control dataare exposed to many attacks [13] such as packet injectioneavesdropping or Denial of Service (DoS) Next we describethe attacker model and the specific attacks that can beexecuted against CBSNs

31 Attacker Model In this work we focus on outsiders thatis external attackers that do not share any cryptographiccontent with the gateway or the victimrsquos sensor nodes Ifthe attacker nodes are part of the CBSN they will haveaccess to the keying material and therefore will be able tosuccessfully eavesdrop and inject data In any case the designof a mechanism to counteract this threat is out of the scopeof this work

In the context of CBSNs we can classify adversariesaccording to the following criteria

(i) Active or passive a passive attacker can only eavesdropdata thus being able to access patientrsquos data andviolating hisher privacy In its turn an active attackeraims at injecting or modifying data in order to sendfake reports on the state of the patient

(ii) Type of attack includes the following

(a) eavesdropping unauthorized access to storeddata or to transmitted data among the CBSNdevices thus violating the privacy of the patient

(b) modificationinjection an attacker that mayalter the content of a packet transmitted by asensor or impersonate a sensor by forging apacket these attacks can be executed due to lackof authentication and violate the integrity of theCBSN communications

(c) packet replay an attacker that may capture apacket that was previously sent by a sensor ofthe network Regardless of the fact that theCBSN is using authentication mechanisms ornot the packet will be accepted by the networksif antireplay mechanisms are not provided

(d) jamming the adversary that disrupts the CBSNcommunications by generating interfering sig-nals

(iii) Intentional or unintentional the adversary can bean external entity willing to cause damage to thecommunications among sensors and the gateway orcan be an entity that unintentionally is causing inter-ferences to those communications As an examplethe patient of interest could be near another patientwith wearable sensors which could inject fake reportsif data is not properly authenticated Examples ofunintentional attacks could take place in a situationwhere two patients bearing body sensors are huggingand unconsciously exchange data Or the patientcould be near a relative who is visiting himher at thehospital and carries any electronic device that causesinterferences to the CBSN

It is important to remark that in a CBSN where sensornodes establish communications using different channelsover time these attacks can be extended to the control dataexchange among the devices of the CBSN As an example anattacker may forge a report regarding the availability of thechannels thus leading the CBSN to select a channel that issuffering from high interferences or that is currently beingused by another service Note that this attack can lead to aDoS and the failure of the system in monitoring the patientrsquosstatus In its turn eavesdropping of the control channel allowsan attacker to have knowledge of the channels to be usedby the CBSN The attacker could take advantage of thissituation in order to easily disrupt the communications inthe network by performing a new DoS attack every time theCBSN switches to a new channel

The implementation of security mechanisms in a CBSN[12] to counteract these attacks is specially challenging dueto the limited capabilities of CBSNrsquos nodes In the followingsection we describe a simple method to secure the processof channel selection in CBSNs The proposed mechanismis suited for networks with extremely constrained-resourcesdevices since it makes use of lightweight cryptographicfunctions and minimizes the added transmissionreceptionoverhead

International Journal of Distributed Sensor Networks 5

4 Securing Sensing Data andChannel Selection in CBSNs

In the following we present a mechanism for securing theexchange of sensing data and the channel selection processin CBSNs Section 41 outlines the assumptions considered inthiswork regarding the networkmodel and in Section 42 wedescribe the protocol operation For ease of understandingwe present the terminology used along this section as follows

CTR119872 medium-term session counter (119898 bits)

CTR119878 short-term session counter (119898 bits)

119863119906

119894 data sensed by node 119906 during period 119894 (119897 bits)

ID119906 link-layer identifier of node 119906 (119898 bits)119870119906

119894 keystream to encrypt and authenticate data for

node 119906 during period 119894 (119903 bits)KM keying master119897 length of the data sensed by a given node during agiven period119898 length of the hash output and all the secrets119873 number of nodes in the network119901 number of keystreams119870119906

119894obtained from a 119878119906 (119901 =

119898119903) defining the number of sensing periods beforeupdating 119878119906119903 length of the keystreams 119870119906

119894 which must be a

divisor of119898119878119871 long-term globally shared secret (119898-bits)119878119872 medium-term globally shared secret (119898-bits)119878119904119894 long-term secret shared between the KM and

node 119894 it is used to update 119878119871in case it is compro-

mised119878119906 short-term shared secret with node 119906

41 Assumptions Although the proposed protocol isdesigned to be implemented in heavily constrained deviceswe work under the assumption that such devices have at leastthe following capabilities

(i) Compute a hash function with an output length of119898bits

(ii) Temporally store in its randomaccessmemory at least119898 sdot (119873 + 3) bits with 119873 the number of nodes in thenetwork As we detail later in Section 42 each nodemust keep a short-term shared secret for each of theN nodes in the network (including itself) and threemore long-term and medium-term secrets each onewith length of119898 bits

(iii) Sensor nodes use a synchronization protocol that willbe used to share a global short-term session counterand a medium-term session counter among all nodes(see Section 42) Given the low transmission rate ofsensor networks existing synchronization schemes[29] provide enough precision for this purpose Weassume that the chosen protocol provides recovery

methods upon loss of synchronization How syn-chronization is achieved will strongly depend on thechosen protocol but if the latter requires a masternode for providing synchronization the gateway ofthe BSN could play this role

To the best of our knowledge the former requirement canbe assumed even in very constrained devices As shown in[30] there are several lightweight hash functions that canbe integrated into a sensor mote The latter may not beharder to achieve As detailed in Section 42 during everysensing period each node stores one secret per member ofthe network a globally shared secret and two counters allof them with the same length 119898 as the hash output If weconsider a typical hash function with an output of 128 or 256bits and a network with tens to hundreds of sensors the RAMrequirements for sensor nodes are just bounded to a few tensof kilobytes

42 Protocol Operation Before deploying the CBSN everysensor nodemust be preloaded by a keyingmaster (KM)withthe following data

(1) The set of channels that the sensor will have to sensein the cooperative sensing process

(2) A long-term and globally shared secret 119878119871of 119898 bits

(the hash output length)(3) A long-term secret 119878

119904119894shared between the KM and

node 119894 that will be used to update the globally sharedsecret 119878

119871in case it is compromised

The KM is an external device which is not a member oftheBSNTypically this role is played by the device responsiblefor gathering data from the sensors or gateway (eg a smartphone or a tablet)

Upon deployment of the network every node derives amedium-term globally shared secret 119878

119872by hashing the XOR

of the long-term secret 119878119871and a counter The generation

process of 119878119872

is clearly depicted in Figure 3 This process isperiodically repeated with an updated value of the medium-term counter in order to protect the secret against a potentialattacker Details about how often this process should becarried out and the attacker capabilities are provided inSection 5

As shown in Figure 4 each node generates a set ofrandom sequences of 119898 bits one for the node itself and onefor each other node in the networkThese random sequences119878119906 with 119906 the node identifier are obtained by hashing theXOR of the link-layer identifier of the node ID119906 themedium-term shared secret 119878

119872 and a short-term session counter

CTR119878

Therefore our proposalmakes use of three types of sharedsecrets

(i) A short-term per-node shared secret 119878119906 (one per eachnode in the network) used for encryption decryptionand authentication of data

(ii) Amedium-term globally shared secret 119878119872that is used

to derive the short-term per-node shared secrets 119878119906

6 International Journal of Distributed Sensor Networks

Long-term shared secretSLmiddot middot middot

middot middot middot

middot middot middot

Medium-term session counter

Medium-term shared secret

CTRM

HashSM

mbits

mbitsmbits

mbits

Figure 3 Generation of the medium-term globally shared secret 119878119872

middot middot middot

middot middot middot

middot middot middot

middot middot middot

Short-term session counterMedium-term shared secret

node uShort-term shared secret with

Hash

SM

Su

Identifier of node uIDu

CTRS

mbits

mbitsmbits

mbits

mbits

Figure 4 Generation of the short-term shared secret 119878119906 for node 119906

(iii) A long-term globally shared secret that is used toderive a new 119878

119872when the current one is about to

expireAs clearly denoted in Figure 5 each sequence 119878119906 is divided

into 119901 fragments of 119903 bits which we will be denoted as 119870119906119894

each one being used as keystream to encrypt and authenticatedata for node 119906 in period 119894 As per this behavior a new short-term shared secret must be derived every 119901 sensing period

When a node performs spectrum sensing it generates abinary sequence 119863119906

119894of 119897 bits that stores the availability of the

different channels The length of such sequence 119897 will dependon the number of bits used to code the state of each channeland the number of channels As an example the simplest waywould be to use just a single bit for coding each channel withvalue ldquo0rdquo if the channel is occupied and ldquo1rdquo otherwise If moreprecise information about the quality of channels is needed(ie high medium low and very low quality) more bits canbe used to code the channel state

During a sensing period 119894 each node must send toits neighbors its own sensing information but also it mustprocess the information received from its neighbors to reacha joint decision

In order to send its own sensing information node 119906 willmake use of the corresponding keystream 119870119906

119894 the first 119897 bits

of the keystream will be used to encrypt channel information119863119906

119894by means of a XOR addition the remaining 119903 minus 119897 bits are

left unchanged and will be used to provide message authen-tication as illustrated in Figure 5 The resulting sequence 119862119906

119894

will be sent to all the other nodes

To verify the authenticity and decrypt the content of thepackets that have been sent by a given neighbor 119906 a nodewill XOR the sequence 119862119906

119894of the received packet with the

keystream 119870119894119906 as depicted in Figure 6 If the last 119903 minus 119897 bits

of the resulting sequence are not all 0 s the authenticationfails and the entire packet is discarded Otherwise channelinformation can be recovered from the first 119897 bits resultingfrom the XOR addition

The above described process is applied for each neighbor-ing node 119906 Then the channel reported by a larger number ofneighbors will be selected for the operation of the networkNote that because more than one channel may be reported bythe same amount of nodes a tie-break mechanism is neededto guarantee that the process leads to equal results in allnodes One simple approach that could be used is to selectthe channel with the highest identifier However this wouldlead to a lower usage of channels with lower identifiers andtherefore to providing the attacker with valuable informationabout channel usage in the CBSN As a consequence wepropose to use a tie-break method that relies on the formatof119863119906119894

Recall that a fundamental characteristic of this protocolis that there is no central entity that is known and trusted byall sensors This makes the protocol suitable for unattendedscenarios and it also makes it more efficient in terms of datatransmitted through the network because no information issent regarding which channels have to be sensed or whichchannel is finally selected Instead sensors are deployedwith all the information needed to perform the sensing in

International Journal of Distributed Sensor Networks 7

middot middot middot

Short-term shared secret with node u

Keystream pKeystream 2Keystream 1

Su

Encrypted Authdatasensing data

Sensing data

Sensing data

Sensing period 1

Sensing period p

Encrypted Authdatasensing data

Cup

Cu1

Dup

Du1

Ku1 Ku

2 Kup

mbits

rbitsrbitsrbits

lbitslbits

lbitslbits

lbits

lbits

lbitslbits r-lbitsr-lbits

r-lbits

r-lbits

Figure 5 Encrypting and authenticating sensing data

middot middot middot

Short-term shared secret with node u

Keystream pKeystream 2Keystream 1

Su

Sensing dataSensing period 1 True

Accept sensing data

Reject sensing data

Cu1

Du1

Ku1 Ku

2 Kup

If ne 0998400s

rbitsrbitsrbits

rbits lbits

mbits

r-lbits

Figure 6 Decrypting sensing data

a distributed way and make a joint decision autonomouslyThus there is no need for additional mechanisms to be usedwhen a new node joins the network In this case the newnode needs to synchronize with the rest of themembers to getthe proper value of the session counters by making use of thecorresponding protocol However when a node is expelledfrom the network because it has been compromised newcryptographic material must be generated and distributedamong the remaining nodes The KM is responsible fortriggering this process and communicates with each sensornode to update the shared long-term secret 119878

119871 Note that

because the KM shares a different secret 119878119904119894with each node 119894

it can securely distribute the new value of 119878119871 Upon reception

of 119878119871 each node should perform again the initialization

process described at the beginning of this section

5 Security Analysis

The security of the proposed method relies on the sharedsecrets used to derive the keys and perform encryption andauthentication of channel availability data As long as thesesecrets are not compromised data confidentiality can beensured that is an attacker might not be able to get the listof channels to be used in the CBSN Besides the methodmust prevent an attacker from injecting fake data into thesystem These issues are discussed as follows In Section 51we analyze how often the shared secrets should be updated inorder to guarantee a proper protection against cryptanalysisnext in Section 52 we evaluate the packet authenticationmethod used in our proposal in terms of probability ofbypassing the authentication check

8 International Journal of Distributed Sensor Networks

51 Shared Secrets Lifetime As previously mentioned inSection 31 for this analysis we are assuming that attackscome from external entities and therefore attackers are notable to obtain the cryptographic material that is stored in thebody sensors In the context of this proposal the lifetime ofeach of the shared secrets is the interval in which these secretsare considered computationally safe against cryptanalysisthat is their cryptoperiod

The cryptoperiod straightly depends on the chosen cryp-tographic protocols the length of the secrets themselves andthe amount of times they are used The more a given secret isused the shorter its cryptoperiod is as an attacker gets moreinformation about this secret and therefore the probability ofa successful cryptanalysis increases In fact cryptoperiod isdefined more in terms of the number of times a given secretor key is reused (the amount of ciphertext exposed to anattacker for a given secretkey) than as a given time periodwhich strongly depends on the transmission rate of the sensornodes

Recall the three types of shared secrets used in theproposed method

(i) Short-term per-node shared secrets one secret 119878119906 persource node that is used to lightweight encryptdecrypt and authenticate the channelsrsquo sensed data

(ii) Medium-term globally shared secrets globally sharedsecret 119878

119872that is used to derive the short-term per-

node shared secrets 119878119906(iii) Long-term globally shared secret this being the ini-

tially preloaded secret 119878119871that is used to derive a new

medium-term globally shared secret 119878119872

when thecurrent one is about to expire

As clearly denoted in Figure 5 our approach operates insome manner as an additive stream cipher It is well knownthat stream ciphers are considered to be secure as long as thekey is never reused and thus our cipher will be secure if agiven value 119878119906 is not repeated As a result 119878119906must be updatedevery 119901 = 119898119903 sensing period with 119901 the renewal period119898 the length of the shared secret 119878119906 and 119903 the amount oftransmitted bits (sensing data) in a sensing period that areencrypted with 119878119906

Recall that in our proposal the per-node key used forencryption 119878119906 is generated by means of a hash function Asecond requirement is that this function must be crypto-graphically secure Note that if the hash function does notaccomplish it an attackermight be able to reverse it that is toget the input of the hash function given an output meaningthat in our proposal an attacker would be able to recoverthe value of the medium-term globally shared secret 119878

119872(see

Figure 4)A cryptographically secure hash function with an output

of 119898 bits can offer a security level of 2119898 operations againstpreimage attacks and 21198982 against collision attacks Generallyspeaking a minimum output of 128 bits is required in orderto provide a high level of security for most applicationsbut shorter lengths are accepted if the number of generatedmessages in a given period is limited as it is the case of low-rate networks In Section 6 we propose several lightweight

hash candidates with an output of 128 bits that is to saywe can assume that it is computationally unfeasible for anattacker to invert the hash function and thus to predict thevalue of 119878119872 as long as it is updated before exceeding itscryptoperiod which has an upper bound of 21198982 = 264 uses

The long-term globally shared secret 119878119871is only used to

update the current medium-term globally shared secret 119878119872

Because 119878119872is not updated very often it is very unlikely that

an attacker manages to obtain several values of 119878119872to reverse

the hash function and recover 119878119871 As a result we can assume

that the 119878119871cryptoperiod is long enough and there is no need

to update the secret during the nodesrsquo lifetime

52 Authentication A cryptogram 119862119906119894of sensing data con-

tains an authentication field of 16 bits that is checked uponreception (see Figure 6) Consequently an attacker has achance of 1 in 216 of guessing the next authentication fieldwhich allows it to forge a valid authentication field and injectfake data Note that this attack can lead the CBSN to wrongdecisions about the availability of the spectrum

If the attacker repeatedly attempts to send valid cipher-texts it may succeed after 215 attempts in average Becausethe attacker does not know 119878119906 the authentication fieldappears to it as a random stream and therefore it must select afake authentication field at random Besides the attacker can-not determine whether a given ciphertext has been acceptedor rejected because the receiver does not acknowledge thereception of such packets to the emitter Otherwise theattacker could take advantage of this information in order toguess a valid authentication field in a faster way

In conventional networks 215 packets may seem anextremely low number but it may provide an adequate levelof security in CBSNs In these networks the attacker can onlysend fake packets during the sensing periods which is in theorder of a few milliseconds in most cognitive scenarios [31]Moreover as previously stated in Section 1 transmission ratesin BSNs are considerably low with values usually rangingfrom tens to a few hundred of kilobits per second

As an example let us consider a 1Mbps link a sensingperiod of 10ms and a packet size of 10 bytes (which is clearlybigger than the typical packet size in sensor networks) Giventhese parameters an attacker would only be able to send 125packets at most in every sensing period That is to say theattacker would need an average of 262144 sensing periods tosend a fake packet and pass the authentication check

6 Cost Evaluation and Comparisonwith Other Approaches

In this section we evaluate the cost of our proposal interms of energy consumption due to transmission overheadand computational cost and compare its performance withthe most common approach adopted in sensor networks[32] which is providing authentication andor encryption ofthe channel sensing data by means of using standard blockciphers As is well known block ciphers have as input themessage to be encrypted or authenticated which is dividedinto several blocks of fix length and a key Both the block

International Journal of Distributed Sensor Networks 9

length and the key length depend on the algorithm beingused Regardless of the algorithm block ciphers can be usedin several modes of operation depending on the service tobe provided that is encryption only authentication only orencryptionauthentication Generally the followingmodes ofoperation are applied

Authentication CBC-MAC is a block cipher mode for gen-erating message authentication codes The message to beauthenticated is divided into several blocks of equal size andeach block is encrypted so that the value of a given blockdepends on the encryption of the previous block The finaloutput of the cipher that is the message authentication codeor CBC-MAC is the result of encrypting the last block of themessage When the input of the cipher is shorter than theblock size (as it is usually the case in sensor networks) theCBC-MAC can be obtained by directly encrypting a singleblock padded until the block size of the cipher is reached

Encryption CTRmode of operation turns a block cipher intoa stream cipher meaning that the resulting ciphertext has thesame size as the input or plain textThus it does not force theoutput length to be amultiple of the block size as it is the caseof other modes such as CBC-MACThis property makes thismode of operation suitable for encryption in sensor networkswhere devices usually exchange short-length messages

Authentication+Encryption CCM (CTR + CBC-MAC) is acommon choice for providing both encryption (CTR) andauthentication (CBC-MAC) [19] Aminor variation of CCMcalled CCMlowast is used in the ZigBee standard [7]

In this work we assume that Advanced EncryptionStandard (AES) in CTRmode is used for encryption andAESCBC-MAC for authentication as it is the current standardfor symmetric cryptography even in sensor nodes [33]Currently there are efficient hardware implementations ofAES that are highly affordable

Regarding hardware platforms the vast majority of pre-vious works on BSNs have used the 16-bit Texas Instrumentsrsquo(TI) MSP430 and CC2540 families of microcontrollers [34]Built around a 16-bit CPU ultra-low-power MSP430 micro-controllers are designed for low cost and specifically low-power consumption embedded applications As an exampleTIrsquos CC2540 family [35] enable robust Bluetooth low energy(BLE) network nodes to be built with low total bill-of-material (BOM) costs BLE operates in the same spectrumrange (2400GHzndash24835GHz ISM band) as classic Blue-tooth technology but uses a different set of channels insteadof 79 1MHz channels BLE offers 40 2MHz channels 3 foradvertising purposes and 37 for data exchange

61 TransmissionReception Overhead In this section weanalyze the overhead introduced by our proposal in termsof transmissionreception of channel availability data andcompare it with the overhead exhibited when conventionalapproaches are used for data encryptionauthentication asexplained above We assume that all sensors are capable ofsensing a given set of channels and report information abouttheir state

With our proposal the minimum number of transmittedbitswill dependon the number of channels that a given sensoris reporting the number of bits used to code the state ofeach channel and the length of the authentication code Asexplained in Section 52 a length of 16 bits is enough to securemost applications in WSNs and thus we have assumed thisvalue for the authentication fieldThis leads to a total amountof Bits

119905119909= 119897 + 16 of transmitted bits where 119897 represents the

total number of bits used to code all possible channels andBits119905119909= (119899 minus 1)Bits

119905119909received bits representing the number

of bits received by a given sensor from its neighborsAiming to provide a fair comparison we choose the same

key length for block ciphers and for our proposal that is tosay a 128-bit key The transmitted bits overhead added byAES CBC-MAC authentication is 128 bits (for a semanticallysecure implementation also an IV or nonce must be sharedbetween emitter and receiver so that the overhead can behigher) Regarding encryption the number of transmittedbits is equal to the number of bits 119897 used to code the state of thechannels but it also requires the use of a nonce with a lengthequal to half of the key length that is 64 bits per message

During every sensing period every node must transmita packet with sensing information but also must process thepackets received from its neighbors Table 1 and Figure 7respectively show the transmission and reception overheaddue to the secure sharing of sensing information using bothstandard block ciphers and our proposal The values areprovided as a function of the number of bits 119897 used to codethe state of the channels and the number of nodes119873 rangingfrom 5 to 30 Given that the considered scenario is a bodysensor network this is more than a reasonable value sincea patient wearing more than 30 sensors may be an unlikelysituation

The reader may notice that the overhead introducedby this mechanism increases linearly with the number ofnodes for both approaches However with the proposedmethod the transmissionreception overhead is considerablyreduced with respect to the use of standard block cipherswhile still maintaining an acceptable level of security Infact the more the nodes in the CBSN the bigger theimprovement introduced by the former As wewill show laterthe transmissionreception savings lead to a huge saving alsoin energy consumption

62 Computational Cost In this section we provide a com-parison of the CPU cost in cycles due to the implementationof the cryptographic functions

If AES is used the total cryptographic cost per nodefor securing the exchange of sensing data equals the costof one encryption and 119873 minus 1 decryptions Assumingthe Texas Instrumentsrsquo reference AES-implementation forCC2540 microcontrollers [36] AES encryption needs 6600cyclesblock and AES decryption 8400 cyclesblock

With our proposal the energy consumption has threecomponents the computation of the different sequences 119878119906

119894

with the hash function before the sensing period begins theXOR of the keystream 119870119906

119894with the sequence 119863119906

119894that signals

the availability of channels and the XOR of the sequences 119862119906119894

received from neighbors with the precomputed 119878119906119894Therefore

10 International Journal of Distributed Sensor Networks

Table 1 Transmission overhead

119897 (bits) Overhead(bits)

Authentication only (CBC-MAC)16 12832 12864 128

Encryption only (CTR)16 8032 9664 128

Authentication and encryption (CCM)16 20832 22464 256

Authentication and encryption (our proposal)16 3232 4864 80

1000

800

600

400

200

05 10 15 20 25 30

Number of nodes (N)

Rece

ptio

n ov

erhe

ad (b

ytes

)

CBC-MAC l = 16 32 64

CTR l = 16

CTR l = 32

CTR l = 64

CCM l = 16

CCM l = 32

CCM l = 64

Ours l = 16

Ours l = 32

Ours l = 64

Figure 7 Reception overhead for a varying number of nodes119873

a nodemust compute119873 hashes and perform119873XORs to sendchannel information and process the reports received from itsneighbors

As per [37] XORoperationwith aMSP430 accounts for 4-5 cyclesbyte Assuming a 128-bit hash function and the worstcase every XOR in our proposals accounts for 5 sdot 16 = 80cycles As previously explained in Section 51 we suggest theuse of a lightweight cryptographic hash function specificallysuited for low-end devices with an output of 128 bits Table 2depicts the number of CPU cycles per block needed [38]for two potential candidates As clearly seen in the tablecomputing one of these hash functions requires only a fewtens of cyclesblock In the following for this analysis we will

Table 2 Cycles per block for different cryptographic hash functions

Algorithm Hash output size Cyclesblock(Stripped) MAME 128 96H-PRESENT-128 128 32

consider the (stripped) MAME hash function as it is a purehash function that does not rely on a symmetric cipher andrequires more CPU cycles (worst case)

Taking into account the previous data Figure 8 showsthe CPU cycles consumed with both our proposal (with aMAME hash function) and standard AES-128 security It canbe clearly seen that our proposal scales much better withthe number of nodes while still providing an appropriatelevel of security We do not provide values for the processtime that is the time needed for key generation encryptiondecryption and data authentication but the number of CPUcycles required to execute each function In this way timevalues can be obtained for a particular sensor node accordingto its CPU features

63 Total Energy Cost Table 3 provides the transmission andreception energy consumption of a TIrsquos CC2540 microcon-troller for different modes and values of transmission powerThe displayed values have been tested under 25∘CWe do nothave values for in-body conditions (asymp38∘C) but we presentthese data for reference purposes In any case this fact onlyaffects the energy consumption for receivingtransmittingNote that the total cost in terms of energy is much highersince it should also account for duty cycles state changes andother parameters [39]

There is no single specific ldquoenergy per CPU cyclerdquo valuesince the cycle consumption depends on the type of CPUoperation Anyway in [34] the authors measured that theTIrsquos MSP430F1611 consumes energy at an average of 072 nJper clock cycle and we have adopted such value in our study

Figure 9 shows the total average energy consumption as afunction of the number of neighboring sensor nodes and thenumber 119897 of bits used to code the channels for the proposedmechanism and standard approaches CCM (authenticationand encryption) CTR (encryption only) and CBC-MAC(authentication only) We have assumed standard receptionand short-range transmission of minus6 dBm (see Table 3)

As clearly denoted in the figure ourmethod only requiresa few tens of 120583J regardless of the number of sensor nodeswhile AES-based security requires higher values of energyranging from 35 120583J to almost 240120583J when encryption andauthentication are provided and for 30 sensor nodes Themore the number of sensor nodes the bigger the improve-ment introduced by our proposal

It must be remarked however that the purpose of thisfigure is to provide reference values to be taken into accountfor future implementations Besides the level of security pro-vided by our method is lower than AES-based methods butstill ismore than adequate given the features of CBSNs (trans-mission rate number of sentmessages etc) and given the factthat the data we are trying to protect are just a limited numberof potential channels to be used for operation of the network

International Journal of Distributed Sensor Networks 11

Table 3 Currentenergy consumption for RXTX tested on TexasInstruments CC2540 EMwith 119879

119860= 25∘Cwith no peripherals active

and low MCU activity at 250 kHz

Test conditions Current EnergybyteRX standard 196mA 588 nJRX high gain 221mA 663 nJTX minus23 dBm 211mA 633 nJTX minus6 dBm 238mA 714 nJTX 0 dBm 27mA 81 nJTX 4 dBm 316mA 948 nJ

5 10 15 20 25 30

Number of nodes (N)

AES l = 16 32 64

Ours l = 16 32 64

300000

250000

200000

150000

100000

50000

0

CPU

cycle

s

Figure 8 Added CPU cycles for a secure exchange of sensing data

Indeed thismechanism introduces some overhead due tospectrum sensing and sharing of channel information and aswe pointed out above the overhead increases linearly withthe number of nodes in the network The synchronizationprotocol adds some overhead too but the increase willstrongly depend on the chosen protocol In [29] someprotocols with high energy efficiency are referenced whichcould be used in our proposal

Despite it we claim that it is definitely worth introducingthis overhead to increase the availability of the network andmake it robust to potential interferences and DoS attacksUnder these undesired situations the current channel usedby the CBSN may become unavailable but the proposedmethod allows the nodes to securely agree on a new channelof operation and rapidly resume their transmissions It mustbe remarked that securing channel availability informationmay prevent or at least diminished the effect of further DoSattacks when switching to a new channel

We do not quantify the benefits of applying our methodin terms of attack mitigation because it strongly depends onthe capabilities of the attacker (time required for sensing eachchannel number of channels that can sense etc) As a futurework it would be interesting to estimate the improvementachieved by our approach in terms of throughput of the

5 10 15 20 25 30

Number of nodes (N)

CBC-MAC l = 16 32 64

CTR l = 16

CTR l = 32

CTR l = 64

CCM l = 16

CCM l = 32

CCM l = 64

Ours l = 16

Ours l = 32

Ours l = 64

250

200

150

100

50

0

Ener

gy co

st (120583

J)Figure 9 Added energy costs for a TIrsquos MSP430F1611 with a TIrsquosCC2540 microcontroller

CBSNs connections and the tradeoff between benefits andoverhead

7 Conclusions

Body sensor networks (BSNs) emerge as an optimal solutionfor ensuring constant and remote monitoring of the healthstatus in patients Recent advances in technology have madeit possible to deploy a network of tiny sensors over the humanbody and even in body which can measure vital signs suchas temperature heart rate or the level of glucose and reportthese data to medical personnel

Guaranteeing the availability of such communicationsis a must as long as connectivity losses during emergencysituations may prevent a patient from immediately receivingmedical assistance and may end up in catastrophic results

A new network paradigm known as cognitive body sen-sor networks (CBSNs) could mitigate this threat by allowingbody sensors to operate in a wide range of frequenciesand adapt its transmission parameters according to highlydynamic environment conditions However this would comeat the expense of implementing cooperative spectrum sensingmechanisms that allow sensors to exchange informationabout channel quality and availability As a consequenceCBSNs might become vulnerable to specific attacks that aretargeted to these mechanisms

In this paper we presented a novel and simple methodto secure the sensing process in a CBSN and improve itsavailability The method relies on cryptographic primitivesthat require a minimum amount of memory and low energyconsumption thus beingmore suited for devices with limitedresources than traditional approaches It offers authentication

12 International Journal of Distributed Sensor Networks

and encryption of control data shared by the sensors in theCBSN to agree on a given channel

Our proposal was analyzed in terms of security and weshowed that although it does not provide the same level ofsecurity as AES-based encryption and authentication it isstill sufficient for low packet rate networks such as CBSNsThe provided results also showed that our method outper-forms existing approaches in terms of transmissionreceptionoverhead and number of CPU cycles needed particularly asthe number of sensor nodes increases For typical microcon-trollers as CC2540 and MSP430 the improvement in energyconsumption clearly justifies the use of the proposed methodagainst AES-based mechanisms in constrained networkssuch as CBSNs in which maximizing the network life isextremely important

Conflict of Interests

The authors declare that there is no conflict of interestsregarding the publication of this paper

Acknowledgment

This work has been partially supported by the spanishgovernment under grant TEC2011-22746 ldquoTAMESISrdquo andby the Ministry of Economy and Competitiveness throughthe projects CO-PRIVACY (TIN2011-27076-C03-02) andSMARTGLACIS (TIN2014-57364-C2-2-R)

References

[1] B Latre B Braem I Moerman C Blondia and P DemeesterldquoA survey on wireless body area networksrdquo Wireless Networksvol 17 no 1 pp 1ndash18 2011

[2] S Movassaghi M Abolhasan J Lipman D Smith and AJamalipour ldquoWireless body area networks a surveyrdquo IEEECommunications Surveys amp Tutorials vol 16 no 3 pp 1658ndash1686 2014

[3] 802156-2012mdashIEEE Standard for Local and metropolitanarea networksmdashPart 156 Wireless Body Area Networks2012 httpstandardsieeeorggetieee802download802156-2012pdf

[4] Bluetooth Low Energy (LE) June 2014 httpwwwbluetoothcomPageslow-energy-tech-infoaspx

[5] The ANT+ Alliance 2014 httpwwwthisisantcom

[6] Wi-Fi Alliance June 2014 httpwwwwi-fiorg

[7] Zigbee Alliance June 2014 httpwwwzigbeeorg

[8] M Rushanan A D Rubin D F Kune and C M SwansonldquoSoK security and privacy in implantable medical devices andbody area networksrdquo in Proceedings of the 35th IEEE Symposiumon Security and Privacy (SP rsquo14) pp 524ndash539 San Jose Calif USA May 2014

[9] I F Akyildiz W-Y Lee M C Vuran and S Mohanty ldquoNeXtgenerationdynamic spectrum accesscognitive radio wirelessnetworks a surveyrdquo Computer Networks vol 50 no 13 pp2127ndash2159 2006

[10] BWang and K J R Liu ldquoAdvances in cognitive radio networksa surveyrdquo IEEE Journal of Selected Topics in Signal Processingvol 5 no 1 pp 5ndash23 2011

[11] Y Xu J Wang Q Wu A Anpalagan and Y-D Yao ldquoOppor-tunistic spectrum access in unknown dynamic environment agame-theoretic stochastic learning solutionrdquo IEEE Transactionson Wireless Communications vol 11 no 4 pp 1380ndash1391 2012

[12] D Cavalcanti S Das J Wang and K Challapali ldquoCognitiveradio based wireless sensor networksrdquo in Proceedings of the17th International Conference on Computer Communicationsand Networks (ICCCN rsquo08) pp 1ndash6 August 2008

[13] O Leon J Hernandez-Serrano andM Soriano ldquoSecuring cog-nitive radio networksrdquo International Journal of CommunicationSystems vol 23 no 5 pp 633ndash652 2010

[14] M Rostami A Juels and F Koushanfar ldquoHeart-to-Heart(H2H) authentication for implanted medical devicesrdquo in Pro-ceedings of the ACM SIGSAC Conference on Computer andCommunications Security (CCS rsquo13) pp 1099ndash1111 ACM BerlinGermany November 2013

[15] K B Rasmussen C Castelluccia T S Heydt-Benjamin andS Capkun ldquoProximity-based access control for implantablemedical devicesrdquo in Proceedings of the 16th ACM Conference onComputer and Communications Security (CCS rsquo09) pp 410ndash419Chicago Ill USA November 2009

[16] L Shi M Li S Yu and J Yuan ldquoBANA body area networkauthentication exploiting channel characteristicsrdquo IEEE Journalon Selected Areas in Communications vol 31 no 9 pp 1803ndash1816 2013

[17] C C Tan S Zhong H Wang and Q Li ldquoBody sensornetwork security an identity-based cryptography approachrdquoin Proceedings of the 1st ACM Conference on Wireless NetworkSecurity (WiSec rsquo08) pp 148ndash153 April 2008

[18] O Garcia-Morchon T Falck T Heer and K Wehrle ldquoSecurityfor pervasive medical sensor networksrdquo in Proceedings of the6th Annual International Conference on Mobile and UbiquitousSystems Networking and Services (MobiQuitous rsquo09) pp 1ndash10Toronto Canada July 2009

[19] G Selimis L Huang F Masse et al ldquoA lightweight securityscheme for wireless body area networks design energy evalu-ation and proposed microprocessor designrdquo Journal of MedicalSystems vol 35 no 5 pp 1289ndash1298 2011

[20] Y Yan and T Shu ldquoEnergy-efficient In-network encryp-tiondecryption for wireless body area sensor networksrdquo inProceedings of the IEEE Global Communications Conference(GLOBECOM rsquo14) pp 2442ndash2447 IEEE Austin Tex USADecember 2014

[21] Y Xu A Anpalagan Q Wu L Shen Z Gao and J WangldquoDecision-theoretic distributed channel selection for oppor-tunistic spectrum access strategies challenges and solutionsrdquoIEEE Communications Surveys and Tutorials vol 15 no 4 pp1689ndash1713 2013

[22] Y Xu J Wang Q Wu A Anpalagan and Y-D Yao ldquoOppor-tunistic spectrum access in cognitive radio networks globaloptimization using local interaction gamesrdquo IEEE Journal onSelected Topics in Signal Processing vol 6 no 2 pp 180ndash1942012

[23] R Chavez-Santiago K E Nolan O Holland et al ldquoCognitiveradio for medical body area networks using ultra widebandrdquoIEEE Wireless Communications vol 19 no 4 pp 74ndash81 2012

International Journal of Distributed Sensor Networks 13

[24] A R Syed and K-L A Yau ldquoOn cognitive radio-based wirelessbody area networks for medical applicationsrdquo in Prceedingsof the 1st IEEE Symposium on Computational Intelligence inHealthcare and e-Health (CICARE rsquo13) pp 51ndash57 SingaporeApril 2013

[25] R Chen J-M Park and K Bian ldquoRobust distributed spectrumsensing in cognitive radio networksrdquo in Proceedings of the 27thIEEE Conference on Computer Communications (INFOCOMrsquo08) pp 1876ndash1884 IEEE Phoenix Ariz USA April 2008

[26] H Rifa-Pous M J Blasco and C Garrigues ldquoReview of robustcooperative spectrum sensing techniques for cognitive radionetworksrdquoWireless Personal Communications vol 67 no 2 pp175ndash198 2012

[27] B Braem B Latre C Blondia I Moerman and P DemeesterldquoAnalyzing and improving reliability in multi-hop body sensornetworksrdquo International Journal on Advances in Internet Tech-nology vol 2 no 1 pp 152ndash161 2009

[28] I F Akyildiz B F Lo and R Balakrishnan ldquoCooperative spec-trum sensing in cognitive radio networks a surveyrdquo PhysicalCommunication vol 4 no 1 pp 40ndash62 2011

[29] B Sundararaman U Buy and A D Kshemkalyani ldquoClocksynchronization for wireless sensor networks a surveyrdquoAdHocNetworks vol 3 no 3 pp 281ndash323 2005

[30] A Bogdanov G Leander C Paar A Poschmann M J BRobshaw and Y Seurin ldquoHash functions and RFID tags mindthe gaprdquo in Cryptographic Hardware and Embedded SystemsmdashCHES 2008 10th International Workshop Washington DCUSA August 10ndash13 2008 Proceedings vol 5154 of Lecture Notesin Computer Science pp 283ndash299 Springer Berlin Germany2008

[31] C Cordeiro K Challapali D Birru and N Sai ShankarldquoIEEE 80222 the first worldwide wireless standard based oncognitive radiosrdquo in Proceedings of the 1st IEEE InternationalSymposium on New Frontiers in Dynamic Spectrum AccessNetworks (DySPAN rsquo05) pp 328ndash337 Baltimore Md USANovember 2005

[32] S UllahHHiggins B Braem et al ldquoA comprehensive survey ofwireless body area networks on PHY MAC and network layerssolutionsrdquo Journal of Medical Systems vol 36 no 3 pp 1065ndash1094 2012

[33] N Sastry and D Wagner ldquoSecurity considerations for IEEE802154 networksrdquo in Proceedings of the ACM Workshop onWireless Security (WiSe rsquo04) pp 32ndash42 Philadelphia Pa USAOctober 2004

[34] M Pajic Z Jiang I LeeO Sokolsky andRMangharam ldquoFromverification to implementation a model translation tool and apacemaker case studyrdquo in Proceedings of the 18th IEEE Real Timeand Embedded Technology and Applications Symposium (RTASrsquo12) pp 173ndash184 Beijing China April 2012

[35] CC2540 24-GHz Bluetooth low energy System-on-Chip 2013httpwwwticomlitdssymlinkcc2540pdf

[36] U Kretzschmar ldquoAES128mdasha C implementation for encryp-tion and decryption MSP430 systems ECCN 5E002 TSPAmdashtechnologysoftware publiclyrdquo Application Report SLAA397ATexas Instruments Dallas Tex USA 2009 httpwwwticomcncnlitanslaa397aslaa397apdf

[37] El Barquero Aqueronte MSP430 Cycles and Instructionsedited by Aqueronte 2011 httpunbarqueroblogspotcomes201105msp430-cycles-and-instructionshtml

[38] A Bogdanov G Leander C Paar A Poschmann M J BRobshaw and Y Seurin ldquoHash functions and RFID tags mindthe gaprdquo in Cryptographic Hardware and Embedded SystemsmdashHES 2008 vol 5154 of Lecture Notes in Computer Science pp283ndash299 Springer Berlin Germany 2008

[39] S Kamath and J Lindh ldquoMeasuring bluetooth low energypower consumptionrdquo Application Note AN092 Texas Instru-ments Dallas TEx USA 2012 Version SWRA347a httpwwwticomlitanswra347aswra347apdf

International Journal of

AerospaceEngineeringHindawi Publishing Corporationhttpwwwhindawicom Volume 2014

RoboticsJournal of

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Active and Passive Electronic Components

Control Scienceand Engineering

Journal of

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

International Journal of

RotatingMachinery

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Hindawi Publishing Corporation httpwwwhindawicom

Journal ofEngineeringVolume 2014

Submit your manuscripts athttpwwwhindawicom

VLSI Design

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Shock and Vibration

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Civil EngineeringAdvances in

Acoustics and VibrationAdvances in

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Electrical and Computer Engineering

Journal of

Advances inOptoElectronics

Hindawi Publishing Corporation httpwwwhindawicom

Volume 2014

The Scientific World JournalHindawi Publishing Corporation httpwwwhindawicom Volume 2014

SensorsJournal of

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Modelling amp Simulation in EngineeringHindawi Publishing Corporation httpwwwhindawicom Volume 2014

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Chemical EngineeringInternational Journal of Antennas and

Propagation

International Journal of

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Navigation and Observation

International Journal of

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

DistributedSensor Networks

International Journal of

Page 5: Research Article A Cognitive-Radio-Based Method for

International Journal of Distributed Sensor Networks 5

4 Securing Sensing Data andChannel Selection in CBSNs

In the following we present a mechanism for securing theexchange of sensing data and the channel selection processin CBSNs Section 41 outlines the assumptions considered inthiswork regarding the networkmodel and in Section 42 wedescribe the protocol operation For ease of understandingwe present the terminology used along this section as follows

CTR119872 medium-term session counter (119898 bits)

CTR119878 short-term session counter (119898 bits)

119863119906

119894 data sensed by node 119906 during period 119894 (119897 bits)

ID119906 link-layer identifier of node 119906 (119898 bits)119870119906

119894 keystream to encrypt and authenticate data for

node 119906 during period 119894 (119903 bits)KM keying master119897 length of the data sensed by a given node during agiven period119898 length of the hash output and all the secrets119873 number of nodes in the network119901 number of keystreams119870119906

119894obtained from a 119878119906 (119901 =

119898119903) defining the number of sensing periods beforeupdating 119878119906119903 length of the keystreams 119870119906

119894 which must be a

divisor of119898119878119871 long-term globally shared secret (119898-bits)119878119872 medium-term globally shared secret (119898-bits)119878119904119894 long-term secret shared between the KM and

node 119894 it is used to update 119878119871in case it is compro-

mised119878119906 short-term shared secret with node 119906

41 Assumptions Although the proposed protocol isdesigned to be implemented in heavily constrained deviceswe work under the assumption that such devices have at leastthe following capabilities

(i) Compute a hash function with an output length of119898bits

(ii) Temporally store in its randomaccessmemory at least119898 sdot (119873 + 3) bits with 119873 the number of nodes in thenetwork As we detail later in Section 42 each nodemust keep a short-term shared secret for each of theN nodes in the network (including itself) and threemore long-term and medium-term secrets each onewith length of119898 bits

(iii) Sensor nodes use a synchronization protocol that willbe used to share a global short-term session counterand a medium-term session counter among all nodes(see Section 42) Given the low transmission rate ofsensor networks existing synchronization schemes[29] provide enough precision for this purpose Weassume that the chosen protocol provides recovery

methods upon loss of synchronization How syn-chronization is achieved will strongly depend on thechosen protocol but if the latter requires a masternode for providing synchronization the gateway ofthe BSN could play this role

To the best of our knowledge the former requirement canbe assumed even in very constrained devices As shown in[30] there are several lightweight hash functions that canbe integrated into a sensor mote The latter may not beharder to achieve As detailed in Section 42 during everysensing period each node stores one secret per member ofthe network a globally shared secret and two counters allof them with the same length 119898 as the hash output If weconsider a typical hash function with an output of 128 or 256bits and a network with tens to hundreds of sensors the RAMrequirements for sensor nodes are just bounded to a few tensof kilobytes

42 Protocol Operation Before deploying the CBSN everysensor nodemust be preloaded by a keyingmaster (KM)withthe following data

(1) The set of channels that the sensor will have to sensein the cooperative sensing process

(2) A long-term and globally shared secret 119878119871of 119898 bits

(the hash output length)(3) A long-term secret 119878

119904119894shared between the KM and

node 119894 that will be used to update the globally sharedsecret 119878

119871in case it is compromised

The KM is an external device which is not a member oftheBSNTypically this role is played by the device responsiblefor gathering data from the sensors or gateway (eg a smartphone or a tablet)

Upon deployment of the network every node derives amedium-term globally shared secret 119878

119872by hashing the XOR

of the long-term secret 119878119871and a counter The generation

process of 119878119872

is clearly depicted in Figure 3 This process isperiodically repeated with an updated value of the medium-term counter in order to protect the secret against a potentialattacker Details about how often this process should becarried out and the attacker capabilities are provided inSection 5

As shown in Figure 4 each node generates a set ofrandom sequences of 119898 bits one for the node itself and onefor each other node in the networkThese random sequences119878119906 with 119906 the node identifier are obtained by hashing theXOR of the link-layer identifier of the node ID119906 themedium-term shared secret 119878

119872 and a short-term session counter

CTR119878

Therefore our proposalmakes use of three types of sharedsecrets

(i) A short-term per-node shared secret 119878119906 (one per eachnode in the network) used for encryption decryptionand authentication of data

(ii) Amedium-term globally shared secret 119878119872that is used

to derive the short-term per-node shared secrets 119878119906

6 International Journal of Distributed Sensor Networks

Long-term shared secretSLmiddot middot middot

middot middot middot

middot middot middot

Medium-term session counter

Medium-term shared secret

CTRM

HashSM

mbits

mbitsmbits

mbits

Figure 3 Generation of the medium-term globally shared secret 119878119872

middot middot middot

middot middot middot

middot middot middot

middot middot middot

Short-term session counterMedium-term shared secret

node uShort-term shared secret with

Hash

SM

Su

Identifier of node uIDu

CTRS

mbits

mbitsmbits

mbits

mbits

Figure 4 Generation of the short-term shared secret 119878119906 for node 119906

(iii) A long-term globally shared secret that is used toderive a new 119878

119872when the current one is about to

expireAs clearly denoted in Figure 5 each sequence 119878119906 is divided

into 119901 fragments of 119903 bits which we will be denoted as 119870119906119894

each one being used as keystream to encrypt and authenticatedata for node 119906 in period 119894 As per this behavior a new short-term shared secret must be derived every 119901 sensing period

When a node performs spectrum sensing it generates abinary sequence 119863119906

119894of 119897 bits that stores the availability of the

different channels The length of such sequence 119897 will dependon the number of bits used to code the state of each channeland the number of channels As an example the simplest waywould be to use just a single bit for coding each channel withvalue ldquo0rdquo if the channel is occupied and ldquo1rdquo otherwise If moreprecise information about the quality of channels is needed(ie high medium low and very low quality) more bits canbe used to code the channel state

During a sensing period 119894 each node must send toits neighbors its own sensing information but also it mustprocess the information received from its neighbors to reacha joint decision

In order to send its own sensing information node 119906 willmake use of the corresponding keystream 119870119906

119894 the first 119897 bits

of the keystream will be used to encrypt channel information119863119906

119894by means of a XOR addition the remaining 119903 minus 119897 bits are

left unchanged and will be used to provide message authen-tication as illustrated in Figure 5 The resulting sequence 119862119906

119894

will be sent to all the other nodes

To verify the authenticity and decrypt the content of thepackets that have been sent by a given neighbor 119906 a nodewill XOR the sequence 119862119906

119894of the received packet with the

keystream 119870119894119906 as depicted in Figure 6 If the last 119903 minus 119897 bits

of the resulting sequence are not all 0 s the authenticationfails and the entire packet is discarded Otherwise channelinformation can be recovered from the first 119897 bits resultingfrom the XOR addition

The above described process is applied for each neighbor-ing node 119906 Then the channel reported by a larger number ofneighbors will be selected for the operation of the networkNote that because more than one channel may be reported bythe same amount of nodes a tie-break mechanism is neededto guarantee that the process leads to equal results in allnodes One simple approach that could be used is to selectthe channel with the highest identifier However this wouldlead to a lower usage of channels with lower identifiers andtherefore to providing the attacker with valuable informationabout channel usage in the CBSN As a consequence wepropose to use a tie-break method that relies on the formatof119863119906119894

Recall that a fundamental characteristic of this protocolis that there is no central entity that is known and trusted byall sensors This makes the protocol suitable for unattendedscenarios and it also makes it more efficient in terms of datatransmitted through the network because no information issent regarding which channels have to be sensed or whichchannel is finally selected Instead sensors are deployedwith all the information needed to perform the sensing in

International Journal of Distributed Sensor Networks 7

middot middot middot

Short-term shared secret with node u

Keystream pKeystream 2Keystream 1

Su

Encrypted Authdatasensing data

Sensing data

Sensing data

Sensing period 1

Sensing period p

Encrypted Authdatasensing data

Cup

Cu1

Dup

Du1

Ku1 Ku

2 Kup

mbits

rbitsrbitsrbits

lbitslbits

lbitslbits

lbits

lbits

lbitslbits r-lbitsr-lbits

r-lbits

r-lbits

Figure 5 Encrypting and authenticating sensing data

middot middot middot

Short-term shared secret with node u

Keystream pKeystream 2Keystream 1

Su

Sensing dataSensing period 1 True

Accept sensing data

Reject sensing data

Cu1

Du1

Ku1 Ku

2 Kup

If ne 0998400s

rbitsrbitsrbits

rbits lbits

mbits

r-lbits

Figure 6 Decrypting sensing data

a distributed way and make a joint decision autonomouslyThus there is no need for additional mechanisms to be usedwhen a new node joins the network In this case the newnode needs to synchronize with the rest of themembers to getthe proper value of the session counters by making use of thecorresponding protocol However when a node is expelledfrom the network because it has been compromised newcryptographic material must be generated and distributedamong the remaining nodes The KM is responsible fortriggering this process and communicates with each sensornode to update the shared long-term secret 119878

119871 Note that

because the KM shares a different secret 119878119904119894with each node 119894

it can securely distribute the new value of 119878119871 Upon reception

of 119878119871 each node should perform again the initialization

process described at the beginning of this section

5 Security Analysis

The security of the proposed method relies on the sharedsecrets used to derive the keys and perform encryption andauthentication of channel availability data As long as thesesecrets are not compromised data confidentiality can beensured that is an attacker might not be able to get the listof channels to be used in the CBSN Besides the methodmust prevent an attacker from injecting fake data into thesystem These issues are discussed as follows In Section 51we analyze how often the shared secrets should be updated inorder to guarantee a proper protection against cryptanalysisnext in Section 52 we evaluate the packet authenticationmethod used in our proposal in terms of probability ofbypassing the authentication check

8 International Journal of Distributed Sensor Networks

51 Shared Secrets Lifetime As previously mentioned inSection 31 for this analysis we are assuming that attackscome from external entities and therefore attackers are notable to obtain the cryptographic material that is stored in thebody sensors In the context of this proposal the lifetime ofeach of the shared secrets is the interval in which these secretsare considered computationally safe against cryptanalysisthat is their cryptoperiod

The cryptoperiod straightly depends on the chosen cryp-tographic protocols the length of the secrets themselves andthe amount of times they are used The more a given secret isused the shorter its cryptoperiod is as an attacker gets moreinformation about this secret and therefore the probability ofa successful cryptanalysis increases In fact cryptoperiod isdefined more in terms of the number of times a given secretor key is reused (the amount of ciphertext exposed to anattacker for a given secretkey) than as a given time periodwhich strongly depends on the transmission rate of the sensornodes

Recall the three types of shared secrets used in theproposed method

(i) Short-term per-node shared secrets one secret 119878119906 persource node that is used to lightweight encryptdecrypt and authenticate the channelsrsquo sensed data

(ii) Medium-term globally shared secrets globally sharedsecret 119878

119872that is used to derive the short-term per-

node shared secrets 119878119906(iii) Long-term globally shared secret this being the ini-

tially preloaded secret 119878119871that is used to derive a new

medium-term globally shared secret 119878119872

when thecurrent one is about to expire

As clearly denoted in Figure 5 our approach operates insome manner as an additive stream cipher It is well knownthat stream ciphers are considered to be secure as long as thekey is never reused and thus our cipher will be secure if agiven value 119878119906 is not repeated As a result 119878119906must be updatedevery 119901 = 119898119903 sensing period with 119901 the renewal period119898 the length of the shared secret 119878119906 and 119903 the amount oftransmitted bits (sensing data) in a sensing period that areencrypted with 119878119906

Recall that in our proposal the per-node key used forencryption 119878119906 is generated by means of a hash function Asecond requirement is that this function must be crypto-graphically secure Note that if the hash function does notaccomplish it an attackermight be able to reverse it that is toget the input of the hash function given an output meaningthat in our proposal an attacker would be able to recoverthe value of the medium-term globally shared secret 119878

119872(see

Figure 4)A cryptographically secure hash function with an output

of 119898 bits can offer a security level of 2119898 operations againstpreimage attacks and 21198982 against collision attacks Generallyspeaking a minimum output of 128 bits is required in orderto provide a high level of security for most applicationsbut shorter lengths are accepted if the number of generatedmessages in a given period is limited as it is the case of low-rate networks In Section 6 we propose several lightweight

hash candidates with an output of 128 bits that is to saywe can assume that it is computationally unfeasible for anattacker to invert the hash function and thus to predict thevalue of 119878119872 as long as it is updated before exceeding itscryptoperiod which has an upper bound of 21198982 = 264 uses

The long-term globally shared secret 119878119871is only used to

update the current medium-term globally shared secret 119878119872

Because 119878119872is not updated very often it is very unlikely that

an attacker manages to obtain several values of 119878119872to reverse

the hash function and recover 119878119871 As a result we can assume

that the 119878119871cryptoperiod is long enough and there is no need

to update the secret during the nodesrsquo lifetime

52 Authentication A cryptogram 119862119906119894of sensing data con-

tains an authentication field of 16 bits that is checked uponreception (see Figure 6) Consequently an attacker has achance of 1 in 216 of guessing the next authentication fieldwhich allows it to forge a valid authentication field and injectfake data Note that this attack can lead the CBSN to wrongdecisions about the availability of the spectrum

If the attacker repeatedly attempts to send valid cipher-texts it may succeed after 215 attempts in average Becausethe attacker does not know 119878119906 the authentication fieldappears to it as a random stream and therefore it must select afake authentication field at random Besides the attacker can-not determine whether a given ciphertext has been acceptedor rejected because the receiver does not acknowledge thereception of such packets to the emitter Otherwise theattacker could take advantage of this information in order toguess a valid authentication field in a faster way

In conventional networks 215 packets may seem anextremely low number but it may provide an adequate levelof security in CBSNs In these networks the attacker can onlysend fake packets during the sensing periods which is in theorder of a few milliseconds in most cognitive scenarios [31]Moreover as previously stated in Section 1 transmission ratesin BSNs are considerably low with values usually rangingfrom tens to a few hundred of kilobits per second

As an example let us consider a 1Mbps link a sensingperiod of 10ms and a packet size of 10 bytes (which is clearlybigger than the typical packet size in sensor networks) Giventhese parameters an attacker would only be able to send 125packets at most in every sensing period That is to say theattacker would need an average of 262144 sensing periods tosend a fake packet and pass the authentication check

6 Cost Evaluation and Comparisonwith Other Approaches

In this section we evaluate the cost of our proposal interms of energy consumption due to transmission overheadand computational cost and compare its performance withthe most common approach adopted in sensor networks[32] which is providing authentication andor encryption ofthe channel sensing data by means of using standard blockciphers As is well known block ciphers have as input themessage to be encrypted or authenticated which is dividedinto several blocks of fix length and a key Both the block

International Journal of Distributed Sensor Networks 9

length and the key length depend on the algorithm beingused Regardless of the algorithm block ciphers can be usedin several modes of operation depending on the service tobe provided that is encryption only authentication only orencryptionauthentication Generally the followingmodes ofoperation are applied

Authentication CBC-MAC is a block cipher mode for gen-erating message authentication codes The message to beauthenticated is divided into several blocks of equal size andeach block is encrypted so that the value of a given blockdepends on the encryption of the previous block The finaloutput of the cipher that is the message authentication codeor CBC-MAC is the result of encrypting the last block of themessage When the input of the cipher is shorter than theblock size (as it is usually the case in sensor networks) theCBC-MAC can be obtained by directly encrypting a singleblock padded until the block size of the cipher is reached

Encryption CTRmode of operation turns a block cipher intoa stream cipher meaning that the resulting ciphertext has thesame size as the input or plain textThus it does not force theoutput length to be amultiple of the block size as it is the caseof other modes such as CBC-MACThis property makes thismode of operation suitable for encryption in sensor networkswhere devices usually exchange short-length messages

Authentication+Encryption CCM (CTR + CBC-MAC) is acommon choice for providing both encryption (CTR) andauthentication (CBC-MAC) [19] Aminor variation of CCMcalled CCMlowast is used in the ZigBee standard [7]

In this work we assume that Advanced EncryptionStandard (AES) in CTRmode is used for encryption andAESCBC-MAC for authentication as it is the current standardfor symmetric cryptography even in sensor nodes [33]Currently there are efficient hardware implementations ofAES that are highly affordable

Regarding hardware platforms the vast majority of pre-vious works on BSNs have used the 16-bit Texas Instrumentsrsquo(TI) MSP430 and CC2540 families of microcontrollers [34]Built around a 16-bit CPU ultra-low-power MSP430 micro-controllers are designed for low cost and specifically low-power consumption embedded applications As an exampleTIrsquos CC2540 family [35] enable robust Bluetooth low energy(BLE) network nodes to be built with low total bill-of-material (BOM) costs BLE operates in the same spectrumrange (2400GHzndash24835GHz ISM band) as classic Blue-tooth technology but uses a different set of channels insteadof 79 1MHz channels BLE offers 40 2MHz channels 3 foradvertising purposes and 37 for data exchange

61 TransmissionReception Overhead In this section weanalyze the overhead introduced by our proposal in termsof transmissionreception of channel availability data andcompare it with the overhead exhibited when conventionalapproaches are used for data encryptionauthentication asexplained above We assume that all sensors are capable ofsensing a given set of channels and report information abouttheir state

With our proposal the minimum number of transmittedbitswill dependon the number of channels that a given sensoris reporting the number of bits used to code the state ofeach channel and the length of the authentication code Asexplained in Section 52 a length of 16 bits is enough to securemost applications in WSNs and thus we have assumed thisvalue for the authentication fieldThis leads to a total amountof Bits

119905119909= 119897 + 16 of transmitted bits where 119897 represents the

total number of bits used to code all possible channels andBits119905119909= (119899 minus 1)Bits

119905119909received bits representing the number

of bits received by a given sensor from its neighborsAiming to provide a fair comparison we choose the same

key length for block ciphers and for our proposal that is tosay a 128-bit key The transmitted bits overhead added byAES CBC-MAC authentication is 128 bits (for a semanticallysecure implementation also an IV or nonce must be sharedbetween emitter and receiver so that the overhead can behigher) Regarding encryption the number of transmittedbits is equal to the number of bits 119897 used to code the state of thechannels but it also requires the use of a nonce with a lengthequal to half of the key length that is 64 bits per message

During every sensing period every node must transmita packet with sensing information but also must process thepackets received from its neighbors Table 1 and Figure 7respectively show the transmission and reception overheaddue to the secure sharing of sensing information using bothstandard block ciphers and our proposal The values areprovided as a function of the number of bits 119897 used to codethe state of the channels and the number of nodes119873 rangingfrom 5 to 30 Given that the considered scenario is a bodysensor network this is more than a reasonable value sincea patient wearing more than 30 sensors may be an unlikelysituation

The reader may notice that the overhead introducedby this mechanism increases linearly with the number ofnodes for both approaches However with the proposedmethod the transmissionreception overhead is considerablyreduced with respect to the use of standard block cipherswhile still maintaining an acceptable level of security Infact the more the nodes in the CBSN the bigger theimprovement introduced by the former As wewill show laterthe transmissionreception savings lead to a huge saving alsoin energy consumption

62 Computational Cost In this section we provide a com-parison of the CPU cost in cycles due to the implementationof the cryptographic functions

If AES is used the total cryptographic cost per nodefor securing the exchange of sensing data equals the costof one encryption and 119873 minus 1 decryptions Assumingthe Texas Instrumentsrsquo reference AES-implementation forCC2540 microcontrollers [36] AES encryption needs 6600cyclesblock and AES decryption 8400 cyclesblock

With our proposal the energy consumption has threecomponents the computation of the different sequences 119878119906

119894

with the hash function before the sensing period begins theXOR of the keystream 119870119906

119894with the sequence 119863119906

119894that signals

the availability of channels and the XOR of the sequences 119862119906119894

received from neighbors with the precomputed 119878119906119894Therefore

10 International Journal of Distributed Sensor Networks

Table 1 Transmission overhead

119897 (bits) Overhead(bits)

Authentication only (CBC-MAC)16 12832 12864 128

Encryption only (CTR)16 8032 9664 128

Authentication and encryption (CCM)16 20832 22464 256

Authentication and encryption (our proposal)16 3232 4864 80

1000

800

600

400

200

05 10 15 20 25 30

Number of nodes (N)

Rece

ptio

n ov

erhe

ad (b

ytes

)

CBC-MAC l = 16 32 64

CTR l = 16

CTR l = 32

CTR l = 64

CCM l = 16

CCM l = 32

CCM l = 64

Ours l = 16

Ours l = 32

Ours l = 64

Figure 7 Reception overhead for a varying number of nodes119873

a nodemust compute119873 hashes and perform119873XORs to sendchannel information and process the reports received from itsneighbors

As per [37] XORoperationwith aMSP430 accounts for 4-5 cyclesbyte Assuming a 128-bit hash function and the worstcase every XOR in our proposals accounts for 5 sdot 16 = 80cycles As previously explained in Section 51 we suggest theuse of a lightweight cryptographic hash function specificallysuited for low-end devices with an output of 128 bits Table 2depicts the number of CPU cycles per block needed [38]for two potential candidates As clearly seen in the tablecomputing one of these hash functions requires only a fewtens of cyclesblock In the following for this analysis we will

Table 2 Cycles per block for different cryptographic hash functions

Algorithm Hash output size Cyclesblock(Stripped) MAME 128 96H-PRESENT-128 128 32

consider the (stripped) MAME hash function as it is a purehash function that does not rely on a symmetric cipher andrequires more CPU cycles (worst case)

Taking into account the previous data Figure 8 showsthe CPU cycles consumed with both our proposal (with aMAME hash function) and standard AES-128 security It canbe clearly seen that our proposal scales much better withthe number of nodes while still providing an appropriatelevel of security We do not provide values for the processtime that is the time needed for key generation encryptiondecryption and data authentication but the number of CPUcycles required to execute each function In this way timevalues can be obtained for a particular sensor node accordingto its CPU features

63 Total Energy Cost Table 3 provides the transmission andreception energy consumption of a TIrsquos CC2540 microcon-troller for different modes and values of transmission powerThe displayed values have been tested under 25∘CWe do nothave values for in-body conditions (asymp38∘C) but we presentthese data for reference purposes In any case this fact onlyaffects the energy consumption for receivingtransmittingNote that the total cost in terms of energy is much highersince it should also account for duty cycles state changes andother parameters [39]

There is no single specific ldquoenergy per CPU cyclerdquo valuesince the cycle consumption depends on the type of CPUoperation Anyway in [34] the authors measured that theTIrsquos MSP430F1611 consumes energy at an average of 072 nJper clock cycle and we have adopted such value in our study

Figure 9 shows the total average energy consumption as afunction of the number of neighboring sensor nodes and thenumber 119897 of bits used to code the channels for the proposedmechanism and standard approaches CCM (authenticationand encryption) CTR (encryption only) and CBC-MAC(authentication only) We have assumed standard receptionand short-range transmission of minus6 dBm (see Table 3)

As clearly denoted in the figure ourmethod only requiresa few tens of 120583J regardless of the number of sensor nodeswhile AES-based security requires higher values of energyranging from 35 120583J to almost 240120583J when encryption andauthentication are provided and for 30 sensor nodes Themore the number of sensor nodes the bigger the improve-ment introduced by our proposal

It must be remarked however that the purpose of thisfigure is to provide reference values to be taken into accountfor future implementations Besides the level of security pro-vided by our method is lower than AES-based methods butstill ismore than adequate given the features of CBSNs (trans-mission rate number of sentmessages etc) and given the factthat the data we are trying to protect are just a limited numberof potential channels to be used for operation of the network

International Journal of Distributed Sensor Networks 11

Table 3 Currentenergy consumption for RXTX tested on TexasInstruments CC2540 EMwith 119879

119860= 25∘Cwith no peripherals active

and low MCU activity at 250 kHz

Test conditions Current EnergybyteRX standard 196mA 588 nJRX high gain 221mA 663 nJTX minus23 dBm 211mA 633 nJTX minus6 dBm 238mA 714 nJTX 0 dBm 27mA 81 nJTX 4 dBm 316mA 948 nJ

5 10 15 20 25 30

Number of nodes (N)

AES l = 16 32 64

Ours l = 16 32 64

300000

250000

200000

150000

100000

50000

0

CPU

cycle

s

Figure 8 Added CPU cycles for a secure exchange of sensing data

Indeed thismechanism introduces some overhead due tospectrum sensing and sharing of channel information and aswe pointed out above the overhead increases linearly withthe number of nodes in the network The synchronizationprotocol adds some overhead too but the increase willstrongly depend on the chosen protocol In [29] someprotocols with high energy efficiency are referenced whichcould be used in our proposal

Despite it we claim that it is definitely worth introducingthis overhead to increase the availability of the network andmake it robust to potential interferences and DoS attacksUnder these undesired situations the current channel usedby the CBSN may become unavailable but the proposedmethod allows the nodes to securely agree on a new channelof operation and rapidly resume their transmissions It mustbe remarked that securing channel availability informationmay prevent or at least diminished the effect of further DoSattacks when switching to a new channel

We do not quantify the benefits of applying our methodin terms of attack mitigation because it strongly depends onthe capabilities of the attacker (time required for sensing eachchannel number of channels that can sense etc) As a futurework it would be interesting to estimate the improvementachieved by our approach in terms of throughput of the

5 10 15 20 25 30

Number of nodes (N)

CBC-MAC l = 16 32 64

CTR l = 16

CTR l = 32

CTR l = 64

CCM l = 16

CCM l = 32

CCM l = 64

Ours l = 16

Ours l = 32

Ours l = 64

250

200

150

100

50

0

Ener

gy co

st (120583

J)Figure 9 Added energy costs for a TIrsquos MSP430F1611 with a TIrsquosCC2540 microcontroller

CBSNs connections and the tradeoff between benefits andoverhead

7 Conclusions

Body sensor networks (BSNs) emerge as an optimal solutionfor ensuring constant and remote monitoring of the healthstatus in patients Recent advances in technology have madeit possible to deploy a network of tiny sensors over the humanbody and even in body which can measure vital signs suchas temperature heart rate or the level of glucose and reportthese data to medical personnel

Guaranteeing the availability of such communicationsis a must as long as connectivity losses during emergencysituations may prevent a patient from immediately receivingmedical assistance and may end up in catastrophic results

A new network paradigm known as cognitive body sen-sor networks (CBSNs) could mitigate this threat by allowingbody sensors to operate in a wide range of frequenciesand adapt its transmission parameters according to highlydynamic environment conditions However this would comeat the expense of implementing cooperative spectrum sensingmechanisms that allow sensors to exchange informationabout channel quality and availability As a consequenceCBSNs might become vulnerable to specific attacks that aretargeted to these mechanisms

In this paper we presented a novel and simple methodto secure the sensing process in a CBSN and improve itsavailability The method relies on cryptographic primitivesthat require a minimum amount of memory and low energyconsumption thus beingmore suited for devices with limitedresources than traditional approaches It offers authentication

12 International Journal of Distributed Sensor Networks

and encryption of control data shared by the sensors in theCBSN to agree on a given channel

Our proposal was analyzed in terms of security and weshowed that although it does not provide the same level ofsecurity as AES-based encryption and authentication it isstill sufficient for low packet rate networks such as CBSNsThe provided results also showed that our method outper-forms existing approaches in terms of transmissionreceptionoverhead and number of CPU cycles needed particularly asthe number of sensor nodes increases For typical microcon-trollers as CC2540 and MSP430 the improvement in energyconsumption clearly justifies the use of the proposed methodagainst AES-based mechanisms in constrained networkssuch as CBSNs in which maximizing the network life isextremely important

Conflict of Interests

The authors declare that there is no conflict of interestsregarding the publication of this paper

Acknowledgment

This work has been partially supported by the spanishgovernment under grant TEC2011-22746 ldquoTAMESISrdquo andby the Ministry of Economy and Competitiveness throughthe projects CO-PRIVACY (TIN2011-27076-C03-02) andSMARTGLACIS (TIN2014-57364-C2-2-R)

References

[1] B Latre B Braem I Moerman C Blondia and P DemeesterldquoA survey on wireless body area networksrdquo Wireless Networksvol 17 no 1 pp 1ndash18 2011

[2] S Movassaghi M Abolhasan J Lipman D Smith and AJamalipour ldquoWireless body area networks a surveyrdquo IEEECommunications Surveys amp Tutorials vol 16 no 3 pp 1658ndash1686 2014

[3] 802156-2012mdashIEEE Standard for Local and metropolitanarea networksmdashPart 156 Wireless Body Area Networks2012 httpstandardsieeeorggetieee802download802156-2012pdf

[4] Bluetooth Low Energy (LE) June 2014 httpwwwbluetoothcomPageslow-energy-tech-infoaspx

[5] The ANT+ Alliance 2014 httpwwwthisisantcom

[6] Wi-Fi Alliance June 2014 httpwwwwi-fiorg

[7] Zigbee Alliance June 2014 httpwwwzigbeeorg

[8] M Rushanan A D Rubin D F Kune and C M SwansonldquoSoK security and privacy in implantable medical devices andbody area networksrdquo in Proceedings of the 35th IEEE Symposiumon Security and Privacy (SP rsquo14) pp 524ndash539 San Jose Calif USA May 2014

[9] I F Akyildiz W-Y Lee M C Vuran and S Mohanty ldquoNeXtgenerationdynamic spectrum accesscognitive radio wirelessnetworks a surveyrdquo Computer Networks vol 50 no 13 pp2127ndash2159 2006

[10] BWang and K J R Liu ldquoAdvances in cognitive radio networksa surveyrdquo IEEE Journal of Selected Topics in Signal Processingvol 5 no 1 pp 5ndash23 2011

[11] Y Xu J Wang Q Wu A Anpalagan and Y-D Yao ldquoOppor-tunistic spectrum access in unknown dynamic environment agame-theoretic stochastic learning solutionrdquo IEEE Transactionson Wireless Communications vol 11 no 4 pp 1380ndash1391 2012

[12] D Cavalcanti S Das J Wang and K Challapali ldquoCognitiveradio based wireless sensor networksrdquo in Proceedings of the17th International Conference on Computer Communicationsand Networks (ICCCN rsquo08) pp 1ndash6 August 2008

[13] O Leon J Hernandez-Serrano andM Soriano ldquoSecuring cog-nitive radio networksrdquo International Journal of CommunicationSystems vol 23 no 5 pp 633ndash652 2010

[14] M Rostami A Juels and F Koushanfar ldquoHeart-to-Heart(H2H) authentication for implanted medical devicesrdquo in Pro-ceedings of the ACM SIGSAC Conference on Computer andCommunications Security (CCS rsquo13) pp 1099ndash1111 ACM BerlinGermany November 2013

[15] K B Rasmussen C Castelluccia T S Heydt-Benjamin andS Capkun ldquoProximity-based access control for implantablemedical devicesrdquo in Proceedings of the 16th ACM Conference onComputer and Communications Security (CCS rsquo09) pp 410ndash419Chicago Ill USA November 2009

[16] L Shi M Li S Yu and J Yuan ldquoBANA body area networkauthentication exploiting channel characteristicsrdquo IEEE Journalon Selected Areas in Communications vol 31 no 9 pp 1803ndash1816 2013

[17] C C Tan S Zhong H Wang and Q Li ldquoBody sensornetwork security an identity-based cryptography approachrdquoin Proceedings of the 1st ACM Conference on Wireless NetworkSecurity (WiSec rsquo08) pp 148ndash153 April 2008

[18] O Garcia-Morchon T Falck T Heer and K Wehrle ldquoSecurityfor pervasive medical sensor networksrdquo in Proceedings of the6th Annual International Conference on Mobile and UbiquitousSystems Networking and Services (MobiQuitous rsquo09) pp 1ndash10Toronto Canada July 2009

[19] G Selimis L Huang F Masse et al ldquoA lightweight securityscheme for wireless body area networks design energy evalu-ation and proposed microprocessor designrdquo Journal of MedicalSystems vol 35 no 5 pp 1289ndash1298 2011

[20] Y Yan and T Shu ldquoEnergy-efficient In-network encryp-tiondecryption for wireless body area sensor networksrdquo inProceedings of the IEEE Global Communications Conference(GLOBECOM rsquo14) pp 2442ndash2447 IEEE Austin Tex USADecember 2014

[21] Y Xu A Anpalagan Q Wu L Shen Z Gao and J WangldquoDecision-theoretic distributed channel selection for oppor-tunistic spectrum access strategies challenges and solutionsrdquoIEEE Communications Surveys and Tutorials vol 15 no 4 pp1689ndash1713 2013

[22] Y Xu J Wang Q Wu A Anpalagan and Y-D Yao ldquoOppor-tunistic spectrum access in cognitive radio networks globaloptimization using local interaction gamesrdquo IEEE Journal onSelected Topics in Signal Processing vol 6 no 2 pp 180ndash1942012

[23] R Chavez-Santiago K E Nolan O Holland et al ldquoCognitiveradio for medical body area networks using ultra widebandrdquoIEEE Wireless Communications vol 19 no 4 pp 74ndash81 2012

International Journal of Distributed Sensor Networks 13

[24] A R Syed and K-L A Yau ldquoOn cognitive radio-based wirelessbody area networks for medical applicationsrdquo in Prceedingsof the 1st IEEE Symposium on Computational Intelligence inHealthcare and e-Health (CICARE rsquo13) pp 51ndash57 SingaporeApril 2013

[25] R Chen J-M Park and K Bian ldquoRobust distributed spectrumsensing in cognitive radio networksrdquo in Proceedings of the 27thIEEE Conference on Computer Communications (INFOCOMrsquo08) pp 1876ndash1884 IEEE Phoenix Ariz USA April 2008

[26] H Rifa-Pous M J Blasco and C Garrigues ldquoReview of robustcooperative spectrum sensing techniques for cognitive radionetworksrdquoWireless Personal Communications vol 67 no 2 pp175ndash198 2012

[27] B Braem B Latre C Blondia I Moerman and P DemeesterldquoAnalyzing and improving reliability in multi-hop body sensornetworksrdquo International Journal on Advances in Internet Tech-nology vol 2 no 1 pp 152ndash161 2009

[28] I F Akyildiz B F Lo and R Balakrishnan ldquoCooperative spec-trum sensing in cognitive radio networks a surveyrdquo PhysicalCommunication vol 4 no 1 pp 40ndash62 2011

[29] B Sundararaman U Buy and A D Kshemkalyani ldquoClocksynchronization for wireless sensor networks a surveyrdquoAdHocNetworks vol 3 no 3 pp 281ndash323 2005

[30] A Bogdanov G Leander C Paar A Poschmann M J BRobshaw and Y Seurin ldquoHash functions and RFID tags mindthe gaprdquo in Cryptographic Hardware and Embedded SystemsmdashCHES 2008 10th International Workshop Washington DCUSA August 10ndash13 2008 Proceedings vol 5154 of Lecture Notesin Computer Science pp 283ndash299 Springer Berlin Germany2008

[31] C Cordeiro K Challapali D Birru and N Sai ShankarldquoIEEE 80222 the first worldwide wireless standard based oncognitive radiosrdquo in Proceedings of the 1st IEEE InternationalSymposium on New Frontiers in Dynamic Spectrum AccessNetworks (DySPAN rsquo05) pp 328ndash337 Baltimore Md USANovember 2005

[32] S UllahHHiggins B Braem et al ldquoA comprehensive survey ofwireless body area networks on PHY MAC and network layerssolutionsrdquo Journal of Medical Systems vol 36 no 3 pp 1065ndash1094 2012

[33] N Sastry and D Wagner ldquoSecurity considerations for IEEE802154 networksrdquo in Proceedings of the ACM Workshop onWireless Security (WiSe rsquo04) pp 32ndash42 Philadelphia Pa USAOctober 2004

[34] M Pajic Z Jiang I LeeO Sokolsky andRMangharam ldquoFromverification to implementation a model translation tool and apacemaker case studyrdquo in Proceedings of the 18th IEEE Real Timeand Embedded Technology and Applications Symposium (RTASrsquo12) pp 173ndash184 Beijing China April 2012

[35] CC2540 24-GHz Bluetooth low energy System-on-Chip 2013httpwwwticomlitdssymlinkcc2540pdf

[36] U Kretzschmar ldquoAES128mdasha C implementation for encryp-tion and decryption MSP430 systems ECCN 5E002 TSPAmdashtechnologysoftware publiclyrdquo Application Report SLAA397ATexas Instruments Dallas Tex USA 2009 httpwwwticomcncnlitanslaa397aslaa397apdf

[37] El Barquero Aqueronte MSP430 Cycles and Instructionsedited by Aqueronte 2011 httpunbarqueroblogspotcomes201105msp430-cycles-and-instructionshtml

[38] A Bogdanov G Leander C Paar A Poschmann M J BRobshaw and Y Seurin ldquoHash functions and RFID tags mindthe gaprdquo in Cryptographic Hardware and Embedded SystemsmdashHES 2008 vol 5154 of Lecture Notes in Computer Science pp283ndash299 Springer Berlin Germany 2008

[39] S Kamath and J Lindh ldquoMeasuring bluetooth low energypower consumptionrdquo Application Note AN092 Texas Instru-ments Dallas TEx USA 2012 Version SWRA347a httpwwwticomlitanswra347aswra347apdf

International Journal of

AerospaceEngineeringHindawi Publishing Corporationhttpwwwhindawicom Volume 2014

RoboticsJournal of

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Active and Passive Electronic Components

Control Scienceand Engineering

Journal of

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

International Journal of

RotatingMachinery

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Hindawi Publishing Corporation httpwwwhindawicom

Journal ofEngineeringVolume 2014

Submit your manuscripts athttpwwwhindawicom

VLSI Design

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Shock and Vibration

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Civil EngineeringAdvances in

Acoustics and VibrationAdvances in

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Electrical and Computer Engineering

Journal of

Advances inOptoElectronics

Hindawi Publishing Corporation httpwwwhindawicom

Volume 2014

The Scientific World JournalHindawi Publishing Corporation httpwwwhindawicom Volume 2014

SensorsJournal of

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Modelling amp Simulation in EngineeringHindawi Publishing Corporation httpwwwhindawicom Volume 2014

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Chemical EngineeringInternational Journal of Antennas and

Propagation

International Journal of

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Navigation and Observation

International Journal of

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

DistributedSensor Networks

International Journal of

Page 6: Research Article A Cognitive-Radio-Based Method for

6 International Journal of Distributed Sensor Networks

Long-term shared secretSLmiddot middot middot

middot middot middot

middot middot middot

Medium-term session counter

Medium-term shared secret

CTRM

HashSM

mbits

mbitsmbits

mbits

Figure 3 Generation of the medium-term globally shared secret 119878119872

middot middot middot

middot middot middot

middot middot middot

middot middot middot

Short-term session counterMedium-term shared secret

node uShort-term shared secret with

Hash

SM

Su

Identifier of node uIDu

CTRS

mbits

mbitsmbits

mbits

mbits

Figure 4 Generation of the short-term shared secret 119878119906 for node 119906

(iii) A long-term globally shared secret that is used toderive a new 119878

119872when the current one is about to

expireAs clearly denoted in Figure 5 each sequence 119878119906 is divided

into 119901 fragments of 119903 bits which we will be denoted as 119870119906119894

each one being used as keystream to encrypt and authenticatedata for node 119906 in period 119894 As per this behavior a new short-term shared secret must be derived every 119901 sensing period

When a node performs spectrum sensing it generates abinary sequence 119863119906

119894of 119897 bits that stores the availability of the

different channels The length of such sequence 119897 will dependon the number of bits used to code the state of each channeland the number of channels As an example the simplest waywould be to use just a single bit for coding each channel withvalue ldquo0rdquo if the channel is occupied and ldquo1rdquo otherwise If moreprecise information about the quality of channels is needed(ie high medium low and very low quality) more bits canbe used to code the channel state

During a sensing period 119894 each node must send toits neighbors its own sensing information but also it mustprocess the information received from its neighbors to reacha joint decision

In order to send its own sensing information node 119906 willmake use of the corresponding keystream 119870119906

119894 the first 119897 bits

of the keystream will be used to encrypt channel information119863119906

119894by means of a XOR addition the remaining 119903 minus 119897 bits are

left unchanged and will be used to provide message authen-tication as illustrated in Figure 5 The resulting sequence 119862119906

119894

will be sent to all the other nodes

To verify the authenticity and decrypt the content of thepackets that have been sent by a given neighbor 119906 a nodewill XOR the sequence 119862119906

119894of the received packet with the

keystream 119870119894119906 as depicted in Figure 6 If the last 119903 minus 119897 bits

of the resulting sequence are not all 0 s the authenticationfails and the entire packet is discarded Otherwise channelinformation can be recovered from the first 119897 bits resultingfrom the XOR addition

The above described process is applied for each neighbor-ing node 119906 Then the channel reported by a larger number ofneighbors will be selected for the operation of the networkNote that because more than one channel may be reported bythe same amount of nodes a tie-break mechanism is neededto guarantee that the process leads to equal results in allnodes One simple approach that could be used is to selectthe channel with the highest identifier However this wouldlead to a lower usage of channels with lower identifiers andtherefore to providing the attacker with valuable informationabout channel usage in the CBSN As a consequence wepropose to use a tie-break method that relies on the formatof119863119906119894

Recall that a fundamental characteristic of this protocolis that there is no central entity that is known and trusted byall sensors This makes the protocol suitable for unattendedscenarios and it also makes it more efficient in terms of datatransmitted through the network because no information issent regarding which channels have to be sensed or whichchannel is finally selected Instead sensors are deployedwith all the information needed to perform the sensing in

International Journal of Distributed Sensor Networks 7

middot middot middot

Short-term shared secret with node u

Keystream pKeystream 2Keystream 1

Su

Encrypted Authdatasensing data

Sensing data

Sensing data

Sensing period 1

Sensing period p

Encrypted Authdatasensing data

Cup

Cu1

Dup

Du1

Ku1 Ku

2 Kup

mbits

rbitsrbitsrbits

lbitslbits

lbitslbits

lbits

lbits

lbitslbits r-lbitsr-lbits

r-lbits

r-lbits

Figure 5 Encrypting and authenticating sensing data

middot middot middot

Short-term shared secret with node u

Keystream pKeystream 2Keystream 1

Su

Sensing dataSensing period 1 True

Accept sensing data

Reject sensing data

Cu1

Du1

Ku1 Ku

2 Kup

If ne 0998400s

rbitsrbitsrbits

rbits lbits

mbits

r-lbits

Figure 6 Decrypting sensing data

a distributed way and make a joint decision autonomouslyThus there is no need for additional mechanisms to be usedwhen a new node joins the network In this case the newnode needs to synchronize with the rest of themembers to getthe proper value of the session counters by making use of thecorresponding protocol However when a node is expelledfrom the network because it has been compromised newcryptographic material must be generated and distributedamong the remaining nodes The KM is responsible fortriggering this process and communicates with each sensornode to update the shared long-term secret 119878

119871 Note that

because the KM shares a different secret 119878119904119894with each node 119894

it can securely distribute the new value of 119878119871 Upon reception

of 119878119871 each node should perform again the initialization

process described at the beginning of this section

5 Security Analysis

The security of the proposed method relies on the sharedsecrets used to derive the keys and perform encryption andauthentication of channel availability data As long as thesesecrets are not compromised data confidentiality can beensured that is an attacker might not be able to get the listof channels to be used in the CBSN Besides the methodmust prevent an attacker from injecting fake data into thesystem These issues are discussed as follows In Section 51we analyze how often the shared secrets should be updated inorder to guarantee a proper protection against cryptanalysisnext in Section 52 we evaluate the packet authenticationmethod used in our proposal in terms of probability ofbypassing the authentication check

8 International Journal of Distributed Sensor Networks

51 Shared Secrets Lifetime As previously mentioned inSection 31 for this analysis we are assuming that attackscome from external entities and therefore attackers are notable to obtain the cryptographic material that is stored in thebody sensors In the context of this proposal the lifetime ofeach of the shared secrets is the interval in which these secretsare considered computationally safe against cryptanalysisthat is their cryptoperiod

The cryptoperiod straightly depends on the chosen cryp-tographic protocols the length of the secrets themselves andthe amount of times they are used The more a given secret isused the shorter its cryptoperiod is as an attacker gets moreinformation about this secret and therefore the probability ofa successful cryptanalysis increases In fact cryptoperiod isdefined more in terms of the number of times a given secretor key is reused (the amount of ciphertext exposed to anattacker for a given secretkey) than as a given time periodwhich strongly depends on the transmission rate of the sensornodes

Recall the three types of shared secrets used in theproposed method

(i) Short-term per-node shared secrets one secret 119878119906 persource node that is used to lightweight encryptdecrypt and authenticate the channelsrsquo sensed data

(ii) Medium-term globally shared secrets globally sharedsecret 119878

119872that is used to derive the short-term per-

node shared secrets 119878119906(iii) Long-term globally shared secret this being the ini-

tially preloaded secret 119878119871that is used to derive a new

medium-term globally shared secret 119878119872

when thecurrent one is about to expire

As clearly denoted in Figure 5 our approach operates insome manner as an additive stream cipher It is well knownthat stream ciphers are considered to be secure as long as thekey is never reused and thus our cipher will be secure if agiven value 119878119906 is not repeated As a result 119878119906must be updatedevery 119901 = 119898119903 sensing period with 119901 the renewal period119898 the length of the shared secret 119878119906 and 119903 the amount oftransmitted bits (sensing data) in a sensing period that areencrypted with 119878119906

Recall that in our proposal the per-node key used forencryption 119878119906 is generated by means of a hash function Asecond requirement is that this function must be crypto-graphically secure Note that if the hash function does notaccomplish it an attackermight be able to reverse it that is toget the input of the hash function given an output meaningthat in our proposal an attacker would be able to recoverthe value of the medium-term globally shared secret 119878

119872(see

Figure 4)A cryptographically secure hash function with an output

of 119898 bits can offer a security level of 2119898 operations againstpreimage attacks and 21198982 against collision attacks Generallyspeaking a minimum output of 128 bits is required in orderto provide a high level of security for most applicationsbut shorter lengths are accepted if the number of generatedmessages in a given period is limited as it is the case of low-rate networks In Section 6 we propose several lightweight

hash candidates with an output of 128 bits that is to saywe can assume that it is computationally unfeasible for anattacker to invert the hash function and thus to predict thevalue of 119878119872 as long as it is updated before exceeding itscryptoperiod which has an upper bound of 21198982 = 264 uses

The long-term globally shared secret 119878119871is only used to

update the current medium-term globally shared secret 119878119872

Because 119878119872is not updated very often it is very unlikely that

an attacker manages to obtain several values of 119878119872to reverse

the hash function and recover 119878119871 As a result we can assume

that the 119878119871cryptoperiod is long enough and there is no need

to update the secret during the nodesrsquo lifetime

52 Authentication A cryptogram 119862119906119894of sensing data con-

tains an authentication field of 16 bits that is checked uponreception (see Figure 6) Consequently an attacker has achance of 1 in 216 of guessing the next authentication fieldwhich allows it to forge a valid authentication field and injectfake data Note that this attack can lead the CBSN to wrongdecisions about the availability of the spectrum

If the attacker repeatedly attempts to send valid cipher-texts it may succeed after 215 attempts in average Becausethe attacker does not know 119878119906 the authentication fieldappears to it as a random stream and therefore it must select afake authentication field at random Besides the attacker can-not determine whether a given ciphertext has been acceptedor rejected because the receiver does not acknowledge thereception of such packets to the emitter Otherwise theattacker could take advantage of this information in order toguess a valid authentication field in a faster way

In conventional networks 215 packets may seem anextremely low number but it may provide an adequate levelof security in CBSNs In these networks the attacker can onlysend fake packets during the sensing periods which is in theorder of a few milliseconds in most cognitive scenarios [31]Moreover as previously stated in Section 1 transmission ratesin BSNs are considerably low with values usually rangingfrom tens to a few hundred of kilobits per second

As an example let us consider a 1Mbps link a sensingperiod of 10ms and a packet size of 10 bytes (which is clearlybigger than the typical packet size in sensor networks) Giventhese parameters an attacker would only be able to send 125packets at most in every sensing period That is to say theattacker would need an average of 262144 sensing periods tosend a fake packet and pass the authentication check

6 Cost Evaluation and Comparisonwith Other Approaches

In this section we evaluate the cost of our proposal interms of energy consumption due to transmission overheadand computational cost and compare its performance withthe most common approach adopted in sensor networks[32] which is providing authentication andor encryption ofthe channel sensing data by means of using standard blockciphers As is well known block ciphers have as input themessage to be encrypted or authenticated which is dividedinto several blocks of fix length and a key Both the block

International Journal of Distributed Sensor Networks 9

length and the key length depend on the algorithm beingused Regardless of the algorithm block ciphers can be usedin several modes of operation depending on the service tobe provided that is encryption only authentication only orencryptionauthentication Generally the followingmodes ofoperation are applied

Authentication CBC-MAC is a block cipher mode for gen-erating message authentication codes The message to beauthenticated is divided into several blocks of equal size andeach block is encrypted so that the value of a given blockdepends on the encryption of the previous block The finaloutput of the cipher that is the message authentication codeor CBC-MAC is the result of encrypting the last block of themessage When the input of the cipher is shorter than theblock size (as it is usually the case in sensor networks) theCBC-MAC can be obtained by directly encrypting a singleblock padded until the block size of the cipher is reached

Encryption CTRmode of operation turns a block cipher intoa stream cipher meaning that the resulting ciphertext has thesame size as the input or plain textThus it does not force theoutput length to be amultiple of the block size as it is the caseof other modes such as CBC-MACThis property makes thismode of operation suitable for encryption in sensor networkswhere devices usually exchange short-length messages

Authentication+Encryption CCM (CTR + CBC-MAC) is acommon choice for providing both encryption (CTR) andauthentication (CBC-MAC) [19] Aminor variation of CCMcalled CCMlowast is used in the ZigBee standard [7]

In this work we assume that Advanced EncryptionStandard (AES) in CTRmode is used for encryption andAESCBC-MAC for authentication as it is the current standardfor symmetric cryptography even in sensor nodes [33]Currently there are efficient hardware implementations ofAES that are highly affordable

Regarding hardware platforms the vast majority of pre-vious works on BSNs have used the 16-bit Texas Instrumentsrsquo(TI) MSP430 and CC2540 families of microcontrollers [34]Built around a 16-bit CPU ultra-low-power MSP430 micro-controllers are designed for low cost and specifically low-power consumption embedded applications As an exampleTIrsquos CC2540 family [35] enable robust Bluetooth low energy(BLE) network nodes to be built with low total bill-of-material (BOM) costs BLE operates in the same spectrumrange (2400GHzndash24835GHz ISM band) as classic Blue-tooth technology but uses a different set of channels insteadof 79 1MHz channels BLE offers 40 2MHz channels 3 foradvertising purposes and 37 for data exchange

61 TransmissionReception Overhead In this section weanalyze the overhead introduced by our proposal in termsof transmissionreception of channel availability data andcompare it with the overhead exhibited when conventionalapproaches are used for data encryptionauthentication asexplained above We assume that all sensors are capable ofsensing a given set of channels and report information abouttheir state

With our proposal the minimum number of transmittedbitswill dependon the number of channels that a given sensoris reporting the number of bits used to code the state ofeach channel and the length of the authentication code Asexplained in Section 52 a length of 16 bits is enough to securemost applications in WSNs and thus we have assumed thisvalue for the authentication fieldThis leads to a total amountof Bits

119905119909= 119897 + 16 of transmitted bits where 119897 represents the

total number of bits used to code all possible channels andBits119905119909= (119899 minus 1)Bits

119905119909received bits representing the number

of bits received by a given sensor from its neighborsAiming to provide a fair comparison we choose the same

key length for block ciphers and for our proposal that is tosay a 128-bit key The transmitted bits overhead added byAES CBC-MAC authentication is 128 bits (for a semanticallysecure implementation also an IV or nonce must be sharedbetween emitter and receiver so that the overhead can behigher) Regarding encryption the number of transmittedbits is equal to the number of bits 119897 used to code the state of thechannels but it also requires the use of a nonce with a lengthequal to half of the key length that is 64 bits per message

During every sensing period every node must transmita packet with sensing information but also must process thepackets received from its neighbors Table 1 and Figure 7respectively show the transmission and reception overheaddue to the secure sharing of sensing information using bothstandard block ciphers and our proposal The values areprovided as a function of the number of bits 119897 used to codethe state of the channels and the number of nodes119873 rangingfrom 5 to 30 Given that the considered scenario is a bodysensor network this is more than a reasonable value sincea patient wearing more than 30 sensors may be an unlikelysituation

The reader may notice that the overhead introducedby this mechanism increases linearly with the number ofnodes for both approaches However with the proposedmethod the transmissionreception overhead is considerablyreduced with respect to the use of standard block cipherswhile still maintaining an acceptable level of security Infact the more the nodes in the CBSN the bigger theimprovement introduced by the former As wewill show laterthe transmissionreception savings lead to a huge saving alsoin energy consumption

62 Computational Cost In this section we provide a com-parison of the CPU cost in cycles due to the implementationof the cryptographic functions

If AES is used the total cryptographic cost per nodefor securing the exchange of sensing data equals the costof one encryption and 119873 minus 1 decryptions Assumingthe Texas Instrumentsrsquo reference AES-implementation forCC2540 microcontrollers [36] AES encryption needs 6600cyclesblock and AES decryption 8400 cyclesblock

With our proposal the energy consumption has threecomponents the computation of the different sequences 119878119906

119894

with the hash function before the sensing period begins theXOR of the keystream 119870119906

119894with the sequence 119863119906

119894that signals

the availability of channels and the XOR of the sequences 119862119906119894

received from neighbors with the precomputed 119878119906119894Therefore

10 International Journal of Distributed Sensor Networks

Table 1 Transmission overhead

119897 (bits) Overhead(bits)

Authentication only (CBC-MAC)16 12832 12864 128

Encryption only (CTR)16 8032 9664 128

Authentication and encryption (CCM)16 20832 22464 256

Authentication and encryption (our proposal)16 3232 4864 80

1000

800

600

400

200

05 10 15 20 25 30

Number of nodes (N)

Rece

ptio

n ov

erhe

ad (b

ytes

)

CBC-MAC l = 16 32 64

CTR l = 16

CTR l = 32

CTR l = 64

CCM l = 16

CCM l = 32

CCM l = 64

Ours l = 16

Ours l = 32

Ours l = 64

Figure 7 Reception overhead for a varying number of nodes119873

a nodemust compute119873 hashes and perform119873XORs to sendchannel information and process the reports received from itsneighbors

As per [37] XORoperationwith aMSP430 accounts for 4-5 cyclesbyte Assuming a 128-bit hash function and the worstcase every XOR in our proposals accounts for 5 sdot 16 = 80cycles As previously explained in Section 51 we suggest theuse of a lightweight cryptographic hash function specificallysuited for low-end devices with an output of 128 bits Table 2depicts the number of CPU cycles per block needed [38]for two potential candidates As clearly seen in the tablecomputing one of these hash functions requires only a fewtens of cyclesblock In the following for this analysis we will

Table 2 Cycles per block for different cryptographic hash functions

Algorithm Hash output size Cyclesblock(Stripped) MAME 128 96H-PRESENT-128 128 32

consider the (stripped) MAME hash function as it is a purehash function that does not rely on a symmetric cipher andrequires more CPU cycles (worst case)

Taking into account the previous data Figure 8 showsthe CPU cycles consumed with both our proposal (with aMAME hash function) and standard AES-128 security It canbe clearly seen that our proposal scales much better withthe number of nodes while still providing an appropriatelevel of security We do not provide values for the processtime that is the time needed for key generation encryptiondecryption and data authentication but the number of CPUcycles required to execute each function In this way timevalues can be obtained for a particular sensor node accordingto its CPU features

63 Total Energy Cost Table 3 provides the transmission andreception energy consumption of a TIrsquos CC2540 microcon-troller for different modes and values of transmission powerThe displayed values have been tested under 25∘CWe do nothave values for in-body conditions (asymp38∘C) but we presentthese data for reference purposes In any case this fact onlyaffects the energy consumption for receivingtransmittingNote that the total cost in terms of energy is much highersince it should also account for duty cycles state changes andother parameters [39]

There is no single specific ldquoenergy per CPU cyclerdquo valuesince the cycle consumption depends on the type of CPUoperation Anyway in [34] the authors measured that theTIrsquos MSP430F1611 consumes energy at an average of 072 nJper clock cycle and we have adopted such value in our study

Figure 9 shows the total average energy consumption as afunction of the number of neighboring sensor nodes and thenumber 119897 of bits used to code the channels for the proposedmechanism and standard approaches CCM (authenticationand encryption) CTR (encryption only) and CBC-MAC(authentication only) We have assumed standard receptionand short-range transmission of minus6 dBm (see Table 3)

As clearly denoted in the figure ourmethod only requiresa few tens of 120583J regardless of the number of sensor nodeswhile AES-based security requires higher values of energyranging from 35 120583J to almost 240120583J when encryption andauthentication are provided and for 30 sensor nodes Themore the number of sensor nodes the bigger the improve-ment introduced by our proposal

It must be remarked however that the purpose of thisfigure is to provide reference values to be taken into accountfor future implementations Besides the level of security pro-vided by our method is lower than AES-based methods butstill ismore than adequate given the features of CBSNs (trans-mission rate number of sentmessages etc) and given the factthat the data we are trying to protect are just a limited numberof potential channels to be used for operation of the network

International Journal of Distributed Sensor Networks 11

Table 3 Currentenergy consumption for RXTX tested on TexasInstruments CC2540 EMwith 119879

119860= 25∘Cwith no peripherals active

and low MCU activity at 250 kHz

Test conditions Current EnergybyteRX standard 196mA 588 nJRX high gain 221mA 663 nJTX minus23 dBm 211mA 633 nJTX minus6 dBm 238mA 714 nJTX 0 dBm 27mA 81 nJTX 4 dBm 316mA 948 nJ

5 10 15 20 25 30

Number of nodes (N)

AES l = 16 32 64

Ours l = 16 32 64

300000

250000

200000

150000

100000

50000

0

CPU

cycle

s

Figure 8 Added CPU cycles for a secure exchange of sensing data

Indeed thismechanism introduces some overhead due tospectrum sensing and sharing of channel information and aswe pointed out above the overhead increases linearly withthe number of nodes in the network The synchronizationprotocol adds some overhead too but the increase willstrongly depend on the chosen protocol In [29] someprotocols with high energy efficiency are referenced whichcould be used in our proposal

Despite it we claim that it is definitely worth introducingthis overhead to increase the availability of the network andmake it robust to potential interferences and DoS attacksUnder these undesired situations the current channel usedby the CBSN may become unavailable but the proposedmethod allows the nodes to securely agree on a new channelof operation and rapidly resume their transmissions It mustbe remarked that securing channel availability informationmay prevent or at least diminished the effect of further DoSattacks when switching to a new channel

We do not quantify the benefits of applying our methodin terms of attack mitigation because it strongly depends onthe capabilities of the attacker (time required for sensing eachchannel number of channels that can sense etc) As a futurework it would be interesting to estimate the improvementachieved by our approach in terms of throughput of the

5 10 15 20 25 30

Number of nodes (N)

CBC-MAC l = 16 32 64

CTR l = 16

CTR l = 32

CTR l = 64

CCM l = 16

CCM l = 32

CCM l = 64

Ours l = 16

Ours l = 32

Ours l = 64

250

200

150

100

50

0

Ener

gy co

st (120583

J)Figure 9 Added energy costs for a TIrsquos MSP430F1611 with a TIrsquosCC2540 microcontroller

CBSNs connections and the tradeoff between benefits andoverhead

7 Conclusions

Body sensor networks (BSNs) emerge as an optimal solutionfor ensuring constant and remote monitoring of the healthstatus in patients Recent advances in technology have madeit possible to deploy a network of tiny sensors over the humanbody and even in body which can measure vital signs suchas temperature heart rate or the level of glucose and reportthese data to medical personnel

Guaranteeing the availability of such communicationsis a must as long as connectivity losses during emergencysituations may prevent a patient from immediately receivingmedical assistance and may end up in catastrophic results

A new network paradigm known as cognitive body sen-sor networks (CBSNs) could mitigate this threat by allowingbody sensors to operate in a wide range of frequenciesand adapt its transmission parameters according to highlydynamic environment conditions However this would comeat the expense of implementing cooperative spectrum sensingmechanisms that allow sensors to exchange informationabout channel quality and availability As a consequenceCBSNs might become vulnerable to specific attacks that aretargeted to these mechanisms

In this paper we presented a novel and simple methodto secure the sensing process in a CBSN and improve itsavailability The method relies on cryptographic primitivesthat require a minimum amount of memory and low energyconsumption thus beingmore suited for devices with limitedresources than traditional approaches It offers authentication

12 International Journal of Distributed Sensor Networks

and encryption of control data shared by the sensors in theCBSN to agree on a given channel

Our proposal was analyzed in terms of security and weshowed that although it does not provide the same level ofsecurity as AES-based encryption and authentication it isstill sufficient for low packet rate networks such as CBSNsThe provided results also showed that our method outper-forms existing approaches in terms of transmissionreceptionoverhead and number of CPU cycles needed particularly asthe number of sensor nodes increases For typical microcon-trollers as CC2540 and MSP430 the improvement in energyconsumption clearly justifies the use of the proposed methodagainst AES-based mechanisms in constrained networkssuch as CBSNs in which maximizing the network life isextremely important

Conflict of Interests

The authors declare that there is no conflict of interestsregarding the publication of this paper

Acknowledgment

This work has been partially supported by the spanishgovernment under grant TEC2011-22746 ldquoTAMESISrdquo andby the Ministry of Economy and Competitiveness throughthe projects CO-PRIVACY (TIN2011-27076-C03-02) andSMARTGLACIS (TIN2014-57364-C2-2-R)

References

[1] B Latre B Braem I Moerman C Blondia and P DemeesterldquoA survey on wireless body area networksrdquo Wireless Networksvol 17 no 1 pp 1ndash18 2011

[2] S Movassaghi M Abolhasan J Lipman D Smith and AJamalipour ldquoWireless body area networks a surveyrdquo IEEECommunications Surveys amp Tutorials vol 16 no 3 pp 1658ndash1686 2014

[3] 802156-2012mdashIEEE Standard for Local and metropolitanarea networksmdashPart 156 Wireless Body Area Networks2012 httpstandardsieeeorggetieee802download802156-2012pdf

[4] Bluetooth Low Energy (LE) June 2014 httpwwwbluetoothcomPageslow-energy-tech-infoaspx

[5] The ANT+ Alliance 2014 httpwwwthisisantcom

[6] Wi-Fi Alliance June 2014 httpwwwwi-fiorg

[7] Zigbee Alliance June 2014 httpwwwzigbeeorg

[8] M Rushanan A D Rubin D F Kune and C M SwansonldquoSoK security and privacy in implantable medical devices andbody area networksrdquo in Proceedings of the 35th IEEE Symposiumon Security and Privacy (SP rsquo14) pp 524ndash539 San Jose Calif USA May 2014

[9] I F Akyildiz W-Y Lee M C Vuran and S Mohanty ldquoNeXtgenerationdynamic spectrum accesscognitive radio wirelessnetworks a surveyrdquo Computer Networks vol 50 no 13 pp2127ndash2159 2006

[10] BWang and K J R Liu ldquoAdvances in cognitive radio networksa surveyrdquo IEEE Journal of Selected Topics in Signal Processingvol 5 no 1 pp 5ndash23 2011

[11] Y Xu J Wang Q Wu A Anpalagan and Y-D Yao ldquoOppor-tunistic spectrum access in unknown dynamic environment agame-theoretic stochastic learning solutionrdquo IEEE Transactionson Wireless Communications vol 11 no 4 pp 1380ndash1391 2012

[12] D Cavalcanti S Das J Wang and K Challapali ldquoCognitiveradio based wireless sensor networksrdquo in Proceedings of the17th International Conference on Computer Communicationsand Networks (ICCCN rsquo08) pp 1ndash6 August 2008

[13] O Leon J Hernandez-Serrano andM Soriano ldquoSecuring cog-nitive radio networksrdquo International Journal of CommunicationSystems vol 23 no 5 pp 633ndash652 2010

[14] M Rostami A Juels and F Koushanfar ldquoHeart-to-Heart(H2H) authentication for implanted medical devicesrdquo in Pro-ceedings of the ACM SIGSAC Conference on Computer andCommunications Security (CCS rsquo13) pp 1099ndash1111 ACM BerlinGermany November 2013

[15] K B Rasmussen C Castelluccia T S Heydt-Benjamin andS Capkun ldquoProximity-based access control for implantablemedical devicesrdquo in Proceedings of the 16th ACM Conference onComputer and Communications Security (CCS rsquo09) pp 410ndash419Chicago Ill USA November 2009

[16] L Shi M Li S Yu and J Yuan ldquoBANA body area networkauthentication exploiting channel characteristicsrdquo IEEE Journalon Selected Areas in Communications vol 31 no 9 pp 1803ndash1816 2013

[17] C C Tan S Zhong H Wang and Q Li ldquoBody sensornetwork security an identity-based cryptography approachrdquoin Proceedings of the 1st ACM Conference on Wireless NetworkSecurity (WiSec rsquo08) pp 148ndash153 April 2008

[18] O Garcia-Morchon T Falck T Heer and K Wehrle ldquoSecurityfor pervasive medical sensor networksrdquo in Proceedings of the6th Annual International Conference on Mobile and UbiquitousSystems Networking and Services (MobiQuitous rsquo09) pp 1ndash10Toronto Canada July 2009

[19] G Selimis L Huang F Masse et al ldquoA lightweight securityscheme for wireless body area networks design energy evalu-ation and proposed microprocessor designrdquo Journal of MedicalSystems vol 35 no 5 pp 1289ndash1298 2011

[20] Y Yan and T Shu ldquoEnergy-efficient In-network encryp-tiondecryption for wireless body area sensor networksrdquo inProceedings of the IEEE Global Communications Conference(GLOBECOM rsquo14) pp 2442ndash2447 IEEE Austin Tex USADecember 2014

[21] Y Xu A Anpalagan Q Wu L Shen Z Gao and J WangldquoDecision-theoretic distributed channel selection for oppor-tunistic spectrum access strategies challenges and solutionsrdquoIEEE Communications Surveys and Tutorials vol 15 no 4 pp1689ndash1713 2013

[22] Y Xu J Wang Q Wu A Anpalagan and Y-D Yao ldquoOppor-tunistic spectrum access in cognitive radio networks globaloptimization using local interaction gamesrdquo IEEE Journal onSelected Topics in Signal Processing vol 6 no 2 pp 180ndash1942012

[23] R Chavez-Santiago K E Nolan O Holland et al ldquoCognitiveradio for medical body area networks using ultra widebandrdquoIEEE Wireless Communications vol 19 no 4 pp 74ndash81 2012

International Journal of Distributed Sensor Networks 13

[24] A R Syed and K-L A Yau ldquoOn cognitive radio-based wirelessbody area networks for medical applicationsrdquo in Prceedingsof the 1st IEEE Symposium on Computational Intelligence inHealthcare and e-Health (CICARE rsquo13) pp 51ndash57 SingaporeApril 2013

[25] R Chen J-M Park and K Bian ldquoRobust distributed spectrumsensing in cognitive radio networksrdquo in Proceedings of the 27thIEEE Conference on Computer Communications (INFOCOMrsquo08) pp 1876ndash1884 IEEE Phoenix Ariz USA April 2008

[26] H Rifa-Pous M J Blasco and C Garrigues ldquoReview of robustcooperative spectrum sensing techniques for cognitive radionetworksrdquoWireless Personal Communications vol 67 no 2 pp175ndash198 2012

[27] B Braem B Latre C Blondia I Moerman and P DemeesterldquoAnalyzing and improving reliability in multi-hop body sensornetworksrdquo International Journal on Advances in Internet Tech-nology vol 2 no 1 pp 152ndash161 2009

[28] I F Akyildiz B F Lo and R Balakrishnan ldquoCooperative spec-trum sensing in cognitive radio networks a surveyrdquo PhysicalCommunication vol 4 no 1 pp 40ndash62 2011

[29] B Sundararaman U Buy and A D Kshemkalyani ldquoClocksynchronization for wireless sensor networks a surveyrdquoAdHocNetworks vol 3 no 3 pp 281ndash323 2005

[30] A Bogdanov G Leander C Paar A Poschmann M J BRobshaw and Y Seurin ldquoHash functions and RFID tags mindthe gaprdquo in Cryptographic Hardware and Embedded SystemsmdashCHES 2008 10th International Workshop Washington DCUSA August 10ndash13 2008 Proceedings vol 5154 of Lecture Notesin Computer Science pp 283ndash299 Springer Berlin Germany2008

[31] C Cordeiro K Challapali D Birru and N Sai ShankarldquoIEEE 80222 the first worldwide wireless standard based oncognitive radiosrdquo in Proceedings of the 1st IEEE InternationalSymposium on New Frontiers in Dynamic Spectrum AccessNetworks (DySPAN rsquo05) pp 328ndash337 Baltimore Md USANovember 2005

[32] S UllahHHiggins B Braem et al ldquoA comprehensive survey ofwireless body area networks on PHY MAC and network layerssolutionsrdquo Journal of Medical Systems vol 36 no 3 pp 1065ndash1094 2012

[33] N Sastry and D Wagner ldquoSecurity considerations for IEEE802154 networksrdquo in Proceedings of the ACM Workshop onWireless Security (WiSe rsquo04) pp 32ndash42 Philadelphia Pa USAOctober 2004

[34] M Pajic Z Jiang I LeeO Sokolsky andRMangharam ldquoFromverification to implementation a model translation tool and apacemaker case studyrdquo in Proceedings of the 18th IEEE Real Timeand Embedded Technology and Applications Symposium (RTASrsquo12) pp 173ndash184 Beijing China April 2012

[35] CC2540 24-GHz Bluetooth low energy System-on-Chip 2013httpwwwticomlitdssymlinkcc2540pdf

[36] U Kretzschmar ldquoAES128mdasha C implementation for encryp-tion and decryption MSP430 systems ECCN 5E002 TSPAmdashtechnologysoftware publiclyrdquo Application Report SLAA397ATexas Instruments Dallas Tex USA 2009 httpwwwticomcncnlitanslaa397aslaa397apdf

[37] El Barquero Aqueronte MSP430 Cycles and Instructionsedited by Aqueronte 2011 httpunbarqueroblogspotcomes201105msp430-cycles-and-instructionshtml

[38] A Bogdanov G Leander C Paar A Poschmann M J BRobshaw and Y Seurin ldquoHash functions and RFID tags mindthe gaprdquo in Cryptographic Hardware and Embedded SystemsmdashHES 2008 vol 5154 of Lecture Notes in Computer Science pp283ndash299 Springer Berlin Germany 2008

[39] S Kamath and J Lindh ldquoMeasuring bluetooth low energypower consumptionrdquo Application Note AN092 Texas Instru-ments Dallas TEx USA 2012 Version SWRA347a httpwwwticomlitanswra347aswra347apdf

International Journal of

AerospaceEngineeringHindawi Publishing Corporationhttpwwwhindawicom Volume 2014

RoboticsJournal of

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Active and Passive Electronic Components

Control Scienceand Engineering

Journal of

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

International Journal of

RotatingMachinery

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Hindawi Publishing Corporation httpwwwhindawicom

Journal ofEngineeringVolume 2014

Submit your manuscripts athttpwwwhindawicom

VLSI Design

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Shock and Vibration

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Civil EngineeringAdvances in

Acoustics and VibrationAdvances in

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Electrical and Computer Engineering

Journal of

Advances inOptoElectronics

Hindawi Publishing Corporation httpwwwhindawicom

Volume 2014

The Scientific World JournalHindawi Publishing Corporation httpwwwhindawicom Volume 2014

SensorsJournal of

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Modelling amp Simulation in EngineeringHindawi Publishing Corporation httpwwwhindawicom Volume 2014

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Chemical EngineeringInternational Journal of Antennas and

Propagation

International Journal of

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Navigation and Observation

International Journal of

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

DistributedSensor Networks

International Journal of

Page 7: Research Article A Cognitive-Radio-Based Method for

International Journal of Distributed Sensor Networks 7

middot middot middot

Short-term shared secret with node u

Keystream pKeystream 2Keystream 1

Su

Encrypted Authdatasensing data

Sensing data

Sensing data

Sensing period 1

Sensing period p

Encrypted Authdatasensing data

Cup

Cu1

Dup

Du1

Ku1 Ku

2 Kup

mbits

rbitsrbitsrbits

lbitslbits

lbitslbits

lbits

lbits

lbitslbits r-lbitsr-lbits

r-lbits

r-lbits

Figure 5 Encrypting and authenticating sensing data

middot middot middot

Short-term shared secret with node u

Keystream pKeystream 2Keystream 1

Su

Sensing dataSensing period 1 True

Accept sensing data

Reject sensing data

Cu1

Du1

Ku1 Ku

2 Kup

If ne 0998400s

rbitsrbitsrbits

rbits lbits

mbits

r-lbits

Figure 6 Decrypting sensing data

a distributed way and make a joint decision autonomouslyThus there is no need for additional mechanisms to be usedwhen a new node joins the network In this case the newnode needs to synchronize with the rest of themembers to getthe proper value of the session counters by making use of thecorresponding protocol However when a node is expelledfrom the network because it has been compromised newcryptographic material must be generated and distributedamong the remaining nodes The KM is responsible fortriggering this process and communicates with each sensornode to update the shared long-term secret 119878

119871 Note that

because the KM shares a different secret 119878119904119894with each node 119894

it can securely distribute the new value of 119878119871 Upon reception

of 119878119871 each node should perform again the initialization

process described at the beginning of this section

5 Security Analysis

The security of the proposed method relies on the sharedsecrets used to derive the keys and perform encryption andauthentication of channel availability data As long as thesesecrets are not compromised data confidentiality can beensured that is an attacker might not be able to get the listof channels to be used in the CBSN Besides the methodmust prevent an attacker from injecting fake data into thesystem These issues are discussed as follows In Section 51we analyze how often the shared secrets should be updated inorder to guarantee a proper protection against cryptanalysisnext in Section 52 we evaluate the packet authenticationmethod used in our proposal in terms of probability ofbypassing the authentication check

8 International Journal of Distributed Sensor Networks

51 Shared Secrets Lifetime As previously mentioned inSection 31 for this analysis we are assuming that attackscome from external entities and therefore attackers are notable to obtain the cryptographic material that is stored in thebody sensors In the context of this proposal the lifetime ofeach of the shared secrets is the interval in which these secretsare considered computationally safe against cryptanalysisthat is their cryptoperiod

The cryptoperiod straightly depends on the chosen cryp-tographic protocols the length of the secrets themselves andthe amount of times they are used The more a given secret isused the shorter its cryptoperiod is as an attacker gets moreinformation about this secret and therefore the probability ofa successful cryptanalysis increases In fact cryptoperiod isdefined more in terms of the number of times a given secretor key is reused (the amount of ciphertext exposed to anattacker for a given secretkey) than as a given time periodwhich strongly depends on the transmission rate of the sensornodes

Recall the three types of shared secrets used in theproposed method

(i) Short-term per-node shared secrets one secret 119878119906 persource node that is used to lightweight encryptdecrypt and authenticate the channelsrsquo sensed data

(ii) Medium-term globally shared secrets globally sharedsecret 119878

119872that is used to derive the short-term per-

node shared secrets 119878119906(iii) Long-term globally shared secret this being the ini-

tially preloaded secret 119878119871that is used to derive a new

medium-term globally shared secret 119878119872

when thecurrent one is about to expire

As clearly denoted in Figure 5 our approach operates insome manner as an additive stream cipher It is well knownthat stream ciphers are considered to be secure as long as thekey is never reused and thus our cipher will be secure if agiven value 119878119906 is not repeated As a result 119878119906must be updatedevery 119901 = 119898119903 sensing period with 119901 the renewal period119898 the length of the shared secret 119878119906 and 119903 the amount oftransmitted bits (sensing data) in a sensing period that areencrypted with 119878119906

Recall that in our proposal the per-node key used forencryption 119878119906 is generated by means of a hash function Asecond requirement is that this function must be crypto-graphically secure Note that if the hash function does notaccomplish it an attackermight be able to reverse it that is toget the input of the hash function given an output meaningthat in our proposal an attacker would be able to recoverthe value of the medium-term globally shared secret 119878

119872(see

Figure 4)A cryptographically secure hash function with an output

of 119898 bits can offer a security level of 2119898 operations againstpreimage attacks and 21198982 against collision attacks Generallyspeaking a minimum output of 128 bits is required in orderto provide a high level of security for most applicationsbut shorter lengths are accepted if the number of generatedmessages in a given period is limited as it is the case of low-rate networks In Section 6 we propose several lightweight

hash candidates with an output of 128 bits that is to saywe can assume that it is computationally unfeasible for anattacker to invert the hash function and thus to predict thevalue of 119878119872 as long as it is updated before exceeding itscryptoperiod which has an upper bound of 21198982 = 264 uses

The long-term globally shared secret 119878119871is only used to

update the current medium-term globally shared secret 119878119872

Because 119878119872is not updated very often it is very unlikely that

an attacker manages to obtain several values of 119878119872to reverse

the hash function and recover 119878119871 As a result we can assume

that the 119878119871cryptoperiod is long enough and there is no need

to update the secret during the nodesrsquo lifetime

52 Authentication A cryptogram 119862119906119894of sensing data con-

tains an authentication field of 16 bits that is checked uponreception (see Figure 6) Consequently an attacker has achance of 1 in 216 of guessing the next authentication fieldwhich allows it to forge a valid authentication field and injectfake data Note that this attack can lead the CBSN to wrongdecisions about the availability of the spectrum

If the attacker repeatedly attempts to send valid cipher-texts it may succeed after 215 attempts in average Becausethe attacker does not know 119878119906 the authentication fieldappears to it as a random stream and therefore it must select afake authentication field at random Besides the attacker can-not determine whether a given ciphertext has been acceptedor rejected because the receiver does not acknowledge thereception of such packets to the emitter Otherwise theattacker could take advantage of this information in order toguess a valid authentication field in a faster way

In conventional networks 215 packets may seem anextremely low number but it may provide an adequate levelof security in CBSNs In these networks the attacker can onlysend fake packets during the sensing periods which is in theorder of a few milliseconds in most cognitive scenarios [31]Moreover as previously stated in Section 1 transmission ratesin BSNs are considerably low with values usually rangingfrom tens to a few hundred of kilobits per second

As an example let us consider a 1Mbps link a sensingperiod of 10ms and a packet size of 10 bytes (which is clearlybigger than the typical packet size in sensor networks) Giventhese parameters an attacker would only be able to send 125packets at most in every sensing period That is to say theattacker would need an average of 262144 sensing periods tosend a fake packet and pass the authentication check

6 Cost Evaluation and Comparisonwith Other Approaches

In this section we evaluate the cost of our proposal interms of energy consumption due to transmission overheadand computational cost and compare its performance withthe most common approach adopted in sensor networks[32] which is providing authentication andor encryption ofthe channel sensing data by means of using standard blockciphers As is well known block ciphers have as input themessage to be encrypted or authenticated which is dividedinto several blocks of fix length and a key Both the block

International Journal of Distributed Sensor Networks 9

length and the key length depend on the algorithm beingused Regardless of the algorithm block ciphers can be usedin several modes of operation depending on the service tobe provided that is encryption only authentication only orencryptionauthentication Generally the followingmodes ofoperation are applied

Authentication CBC-MAC is a block cipher mode for gen-erating message authentication codes The message to beauthenticated is divided into several blocks of equal size andeach block is encrypted so that the value of a given blockdepends on the encryption of the previous block The finaloutput of the cipher that is the message authentication codeor CBC-MAC is the result of encrypting the last block of themessage When the input of the cipher is shorter than theblock size (as it is usually the case in sensor networks) theCBC-MAC can be obtained by directly encrypting a singleblock padded until the block size of the cipher is reached

Encryption CTRmode of operation turns a block cipher intoa stream cipher meaning that the resulting ciphertext has thesame size as the input or plain textThus it does not force theoutput length to be amultiple of the block size as it is the caseof other modes such as CBC-MACThis property makes thismode of operation suitable for encryption in sensor networkswhere devices usually exchange short-length messages

Authentication+Encryption CCM (CTR + CBC-MAC) is acommon choice for providing both encryption (CTR) andauthentication (CBC-MAC) [19] Aminor variation of CCMcalled CCMlowast is used in the ZigBee standard [7]

In this work we assume that Advanced EncryptionStandard (AES) in CTRmode is used for encryption andAESCBC-MAC for authentication as it is the current standardfor symmetric cryptography even in sensor nodes [33]Currently there are efficient hardware implementations ofAES that are highly affordable

Regarding hardware platforms the vast majority of pre-vious works on BSNs have used the 16-bit Texas Instrumentsrsquo(TI) MSP430 and CC2540 families of microcontrollers [34]Built around a 16-bit CPU ultra-low-power MSP430 micro-controllers are designed for low cost and specifically low-power consumption embedded applications As an exampleTIrsquos CC2540 family [35] enable robust Bluetooth low energy(BLE) network nodes to be built with low total bill-of-material (BOM) costs BLE operates in the same spectrumrange (2400GHzndash24835GHz ISM band) as classic Blue-tooth technology but uses a different set of channels insteadof 79 1MHz channels BLE offers 40 2MHz channels 3 foradvertising purposes and 37 for data exchange

61 TransmissionReception Overhead In this section weanalyze the overhead introduced by our proposal in termsof transmissionreception of channel availability data andcompare it with the overhead exhibited when conventionalapproaches are used for data encryptionauthentication asexplained above We assume that all sensors are capable ofsensing a given set of channels and report information abouttheir state

With our proposal the minimum number of transmittedbitswill dependon the number of channels that a given sensoris reporting the number of bits used to code the state ofeach channel and the length of the authentication code Asexplained in Section 52 a length of 16 bits is enough to securemost applications in WSNs and thus we have assumed thisvalue for the authentication fieldThis leads to a total amountof Bits

119905119909= 119897 + 16 of transmitted bits where 119897 represents the

total number of bits used to code all possible channels andBits119905119909= (119899 minus 1)Bits

119905119909received bits representing the number

of bits received by a given sensor from its neighborsAiming to provide a fair comparison we choose the same

key length for block ciphers and for our proposal that is tosay a 128-bit key The transmitted bits overhead added byAES CBC-MAC authentication is 128 bits (for a semanticallysecure implementation also an IV or nonce must be sharedbetween emitter and receiver so that the overhead can behigher) Regarding encryption the number of transmittedbits is equal to the number of bits 119897 used to code the state of thechannels but it also requires the use of a nonce with a lengthequal to half of the key length that is 64 bits per message

During every sensing period every node must transmita packet with sensing information but also must process thepackets received from its neighbors Table 1 and Figure 7respectively show the transmission and reception overheaddue to the secure sharing of sensing information using bothstandard block ciphers and our proposal The values areprovided as a function of the number of bits 119897 used to codethe state of the channels and the number of nodes119873 rangingfrom 5 to 30 Given that the considered scenario is a bodysensor network this is more than a reasonable value sincea patient wearing more than 30 sensors may be an unlikelysituation

The reader may notice that the overhead introducedby this mechanism increases linearly with the number ofnodes for both approaches However with the proposedmethod the transmissionreception overhead is considerablyreduced with respect to the use of standard block cipherswhile still maintaining an acceptable level of security Infact the more the nodes in the CBSN the bigger theimprovement introduced by the former As wewill show laterthe transmissionreception savings lead to a huge saving alsoin energy consumption

62 Computational Cost In this section we provide a com-parison of the CPU cost in cycles due to the implementationof the cryptographic functions

If AES is used the total cryptographic cost per nodefor securing the exchange of sensing data equals the costof one encryption and 119873 minus 1 decryptions Assumingthe Texas Instrumentsrsquo reference AES-implementation forCC2540 microcontrollers [36] AES encryption needs 6600cyclesblock and AES decryption 8400 cyclesblock

With our proposal the energy consumption has threecomponents the computation of the different sequences 119878119906

119894

with the hash function before the sensing period begins theXOR of the keystream 119870119906

119894with the sequence 119863119906

119894that signals

the availability of channels and the XOR of the sequences 119862119906119894

received from neighbors with the precomputed 119878119906119894Therefore

10 International Journal of Distributed Sensor Networks

Table 1 Transmission overhead

119897 (bits) Overhead(bits)

Authentication only (CBC-MAC)16 12832 12864 128

Encryption only (CTR)16 8032 9664 128

Authentication and encryption (CCM)16 20832 22464 256

Authentication and encryption (our proposal)16 3232 4864 80

1000

800

600

400

200

05 10 15 20 25 30

Number of nodes (N)

Rece

ptio

n ov

erhe

ad (b

ytes

)

CBC-MAC l = 16 32 64

CTR l = 16

CTR l = 32

CTR l = 64

CCM l = 16

CCM l = 32

CCM l = 64

Ours l = 16

Ours l = 32

Ours l = 64

Figure 7 Reception overhead for a varying number of nodes119873

a nodemust compute119873 hashes and perform119873XORs to sendchannel information and process the reports received from itsneighbors

As per [37] XORoperationwith aMSP430 accounts for 4-5 cyclesbyte Assuming a 128-bit hash function and the worstcase every XOR in our proposals accounts for 5 sdot 16 = 80cycles As previously explained in Section 51 we suggest theuse of a lightweight cryptographic hash function specificallysuited for low-end devices with an output of 128 bits Table 2depicts the number of CPU cycles per block needed [38]for two potential candidates As clearly seen in the tablecomputing one of these hash functions requires only a fewtens of cyclesblock In the following for this analysis we will

Table 2 Cycles per block for different cryptographic hash functions

Algorithm Hash output size Cyclesblock(Stripped) MAME 128 96H-PRESENT-128 128 32

consider the (stripped) MAME hash function as it is a purehash function that does not rely on a symmetric cipher andrequires more CPU cycles (worst case)

Taking into account the previous data Figure 8 showsthe CPU cycles consumed with both our proposal (with aMAME hash function) and standard AES-128 security It canbe clearly seen that our proposal scales much better withthe number of nodes while still providing an appropriatelevel of security We do not provide values for the processtime that is the time needed for key generation encryptiondecryption and data authentication but the number of CPUcycles required to execute each function In this way timevalues can be obtained for a particular sensor node accordingto its CPU features

63 Total Energy Cost Table 3 provides the transmission andreception energy consumption of a TIrsquos CC2540 microcon-troller for different modes and values of transmission powerThe displayed values have been tested under 25∘CWe do nothave values for in-body conditions (asymp38∘C) but we presentthese data for reference purposes In any case this fact onlyaffects the energy consumption for receivingtransmittingNote that the total cost in terms of energy is much highersince it should also account for duty cycles state changes andother parameters [39]

There is no single specific ldquoenergy per CPU cyclerdquo valuesince the cycle consumption depends on the type of CPUoperation Anyway in [34] the authors measured that theTIrsquos MSP430F1611 consumes energy at an average of 072 nJper clock cycle and we have adopted such value in our study

Figure 9 shows the total average energy consumption as afunction of the number of neighboring sensor nodes and thenumber 119897 of bits used to code the channels for the proposedmechanism and standard approaches CCM (authenticationand encryption) CTR (encryption only) and CBC-MAC(authentication only) We have assumed standard receptionand short-range transmission of minus6 dBm (see Table 3)

As clearly denoted in the figure ourmethod only requiresa few tens of 120583J regardless of the number of sensor nodeswhile AES-based security requires higher values of energyranging from 35 120583J to almost 240120583J when encryption andauthentication are provided and for 30 sensor nodes Themore the number of sensor nodes the bigger the improve-ment introduced by our proposal

It must be remarked however that the purpose of thisfigure is to provide reference values to be taken into accountfor future implementations Besides the level of security pro-vided by our method is lower than AES-based methods butstill ismore than adequate given the features of CBSNs (trans-mission rate number of sentmessages etc) and given the factthat the data we are trying to protect are just a limited numberof potential channels to be used for operation of the network

International Journal of Distributed Sensor Networks 11

Table 3 Currentenergy consumption for RXTX tested on TexasInstruments CC2540 EMwith 119879

119860= 25∘Cwith no peripherals active

and low MCU activity at 250 kHz

Test conditions Current EnergybyteRX standard 196mA 588 nJRX high gain 221mA 663 nJTX minus23 dBm 211mA 633 nJTX minus6 dBm 238mA 714 nJTX 0 dBm 27mA 81 nJTX 4 dBm 316mA 948 nJ

5 10 15 20 25 30

Number of nodes (N)

AES l = 16 32 64

Ours l = 16 32 64

300000

250000

200000

150000

100000

50000

0

CPU

cycle

s

Figure 8 Added CPU cycles for a secure exchange of sensing data

Indeed thismechanism introduces some overhead due tospectrum sensing and sharing of channel information and aswe pointed out above the overhead increases linearly withthe number of nodes in the network The synchronizationprotocol adds some overhead too but the increase willstrongly depend on the chosen protocol In [29] someprotocols with high energy efficiency are referenced whichcould be used in our proposal

Despite it we claim that it is definitely worth introducingthis overhead to increase the availability of the network andmake it robust to potential interferences and DoS attacksUnder these undesired situations the current channel usedby the CBSN may become unavailable but the proposedmethod allows the nodes to securely agree on a new channelof operation and rapidly resume their transmissions It mustbe remarked that securing channel availability informationmay prevent or at least diminished the effect of further DoSattacks when switching to a new channel

We do not quantify the benefits of applying our methodin terms of attack mitigation because it strongly depends onthe capabilities of the attacker (time required for sensing eachchannel number of channels that can sense etc) As a futurework it would be interesting to estimate the improvementachieved by our approach in terms of throughput of the

5 10 15 20 25 30

Number of nodes (N)

CBC-MAC l = 16 32 64

CTR l = 16

CTR l = 32

CTR l = 64

CCM l = 16

CCM l = 32

CCM l = 64

Ours l = 16

Ours l = 32

Ours l = 64

250

200

150

100

50

0

Ener

gy co

st (120583

J)Figure 9 Added energy costs for a TIrsquos MSP430F1611 with a TIrsquosCC2540 microcontroller

CBSNs connections and the tradeoff between benefits andoverhead

7 Conclusions

Body sensor networks (BSNs) emerge as an optimal solutionfor ensuring constant and remote monitoring of the healthstatus in patients Recent advances in technology have madeit possible to deploy a network of tiny sensors over the humanbody and even in body which can measure vital signs suchas temperature heart rate or the level of glucose and reportthese data to medical personnel

Guaranteeing the availability of such communicationsis a must as long as connectivity losses during emergencysituations may prevent a patient from immediately receivingmedical assistance and may end up in catastrophic results

A new network paradigm known as cognitive body sen-sor networks (CBSNs) could mitigate this threat by allowingbody sensors to operate in a wide range of frequenciesand adapt its transmission parameters according to highlydynamic environment conditions However this would comeat the expense of implementing cooperative spectrum sensingmechanisms that allow sensors to exchange informationabout channel quality and availability As a consequenceCBSNs might become vulnerable to specific attacks that aretargeted to these mechanisms

In this paper we presented a novel and simple methodto secure the sensing process in a CBSN and improve itsavailability The method relies on cryptographic primitivesthat require a minimum amount of memory and low energyconsumption thus beingmore suited for devices with limitedresources than traditional approaches It offers authentication

12 International Journal of Distributed Sensor Networks

and encryption of control data shared by the sensors in theCBSN to agree on a given channel

Our proposal was analyzed in terms of security and weshowed that although it does not provide the same level ofsecurity as AES-based encryption and authentication it isstill sufficient for low packet rate networks such as CBSNsThe provided results also showed that our method outper-forms existing approaches in terms of transmissionreceptionoverhead and number of CPU cycles needed particularly asthe number of sensor nodes increases For typical microcon-trollers as CC2540 and MSP430 the improvement in energyconsumption clearly justifies the use of the proposed methodagainst AES-based mechanisms in constrained networkssuch as CBSNs in which maximizing the network life isextremely important

Conflict of Interests

The authors declare that there is no conflict of interestsregarding the publication of this paper

Acknowledgment

This work has been partially supported by the spanishgovernment under grant TEC2011-22746 ldquoTAMESISrdquo andby the Ministry of Economy and Competitiveness throughthe projects CO-PRIVACY (TIN2011-27076-C03-02) andSMARTGLACIS (TIN2014-57364-C2-2-R)

References

[1] B Latre B Braem I Moerman C Blondia and P DemeesterldquoA survey on wireless body area networksrdquo Wireless Networksvol 17 no 1 pp 1ndash18 2011

[2] S Movassaghi M Abolhasan J Lipman D Smith and AJamalipour ldquoWireless body area networks a surveyrdquo IEEECommunications Surveys amp Tutorials vol 16 no 3 pp 1658ndash1686 2014

[3] 802156-2012mdashIEEE Standard for Local and metropolitanarea networksmdashPart 156 Wireless Body Area Networks2012 httpstandardsieeeorggetieee802download802156-2012pdf

[4] Bluetooth Low Energy (LE) June 2014 httpwwwbluetoothcomPageslow-energy-tech-infoaspx

[5] The ANT+ Alliance 2014 httpwwwthisisantcom

[6] Wi-Fi Alliance June 2014 httpwwwwi-fiorg

[7] Zigbee Alliance June 2014 httpwwwzigbeeorg

[8] M Rushanan A D Rubin D F Kune and C M SwansonldquoSoK security and privacy in implantable medical devices andbody area networksrdquo in Proceedings of the 35th IEEE Symposiumon Security and Privacy (SP rsquo14) pp 524ndash539 San Jose Calif USA May 2014

[9] I F Akyildiz W-Y Lee M C Vuran and S Mohanty ldquoNeXtgenerationdynamic spectrum accesscognitive radio wirelessnetworks a surveyrdquo Computer Networks vol 50 no 13 pp2127ndash2159 2006

[10] BWang and K J R Liu ldquoAdvances in cognitive radio networksa surveyrdquo IEEE Journal of Selected Topics in Signal Processingvol 5 no 1 pp 5ndash23 2011

[11] Y Xu J Wang Q Wu A Anpalagan and Y-D Yao ldquoOppor-tunistic spectrum access in unknown dynamic environment agame-theoretic stochastic learning solutionrdquo IEEE Transactionson Wireless Communications vol 11 no 4 pp 1380ndash1391 2012

[12] D Cavalcanti S Das J Wang and K Challapali ldquoCognitiveradio based wireless sensor networksrdquo in Proceedings of the17th International Conference on Computer Communicationsand Networks (ICCCN rsquo08) pp 1ndash6 August 2008

[13] O Leon J Hernandez-Serrano andM Soriano ldquoSecuring cog-nitive radio networksrdquo International Journal of CommunicationSystems vol 23 no 5 pp 633ndash652 2010

[14] M Rostami A Juels and F Koushanfar ldquoHeart-to-Heart(H2H) authentication for implanted medical devicesrdquo in Pro-ceedings of the ACM SIGSAC Conference on Computer andCommunications Security (CCS rsquo13) pp 1099ndash1111 ACM BerlinGermany November 2013

[15] K B Rasmussen C Castelluccia T S Heydt-Benjamin andS Capkun ldquoProximity-based access control for implantablemedical devicesrdquo in Proceedings of the 16th ACM Conference onComputer and Communications Security (CCS rsquo09) pp 410ndash419Chicago Ill USA November 2009

[16] L Shi M Li S Yu and J Yuan ldquoBANA body area networkauthentication exploiting channel characteristicsrdquo IEEE Journalon Selected Areas in Communications vol 31 no 9 pp 1803ndash1816 2013

[17] C C Tan S Zhong H Wang and Q Li ldquoBody sensornetwork security an identity-based cryptography approachrdquoin Proceedings of the 1st ACM Conference on Wireless NetworkSecurity (WiSec rsquo08) pp 148ndash153 April 2008

[18] O Garcia-Morchon T Falck T Heer and K Wehrle ldquoSecurityfor pervasive medical sensor networksrdquo in Proceedings of the6th Annual International Conference on Mobile and UbiquitousSystems Networking and Services (MobiQuitous rsquo09) pp 1ndash10Toronto Canada July 2009

[19] G Selimis L Huang F Masse et al ldquoA lightweight securityscheme for wireless body area networks design energy evalu-ation and proposed microprocessor designrdquo Journal of MedicalSystems vol 35 no 5 pp 1289ndash1298 2011

[20] Y Yan and T Shu ldquoEnergy-efficient In-network encryp-tiondecryption for wireless body area sensor networksrdquo inProceedings of the IEEE Global Communications Conference(GLOBECOM rsquo14) pp 2442ndash2447 IEEE Austin Tex USADecember 2014

[21] Y Xu A Anpalagan Q Wu L Shen Z Gao and J WangldquoDecision-theoretic distributed channel selection for oppor-tunistic spectrum access strategies challenges and solutionsrdquoIEEE Communications Surveys and Tutorials vol 15 no 4 pp1689ndash1713 2013

[22] Y Xu J Wang Q Wu A Anpalagan and Y-D Yao ldquoOppor-tunistic spectrum access in cognitive radio networks globaloptimization using local interaction gamesrdquo IEEE Journal onSelected Topics in Signal Processing vol 6 no 2 pp 180ndash1942012

[23] R Chavez-Santiago K E Nolan O Holland et al ldquoCognitiveradio for medical body area networks using ultra widebandrdquoIEEE Wireless Communications vol 19 no 4 pp 74ndash81 2012

International Journal of Distributed Sensor Networks 13

[24] A R Syed and K-L A Yau ldquoOn cognitive radio-based wirelessbody area networks for medical applicationsrdquo in Prceedingsof the 1st IEEE Symposium on Computational Intelligence inHealthcare and e-Health (CICARE rsquo13) pp 51ndash57 SingaporeApril 2013

[25] R Chen J-M Park and K Bian ldquoRobust distributed spectrumsensing in cognitive radio networksrdquo in Proceedings of the 27thIEEE Conference on Computer Communications (INFOCOMrsquo08) pp 1876ndash1884 IEEE Phoenix Ariz USA April 2008

[26] H Rifa-Pous M J Blasco and C Garrigues ldquoReview of robustcooperative spectrum sensing techniques for cognitive radionetworksrdquoWireless Personal Communications vol 67 no 2 pp175ndash198 2012

[27] B Braem B Latre C Blondia I Moerman and P DemeesterldquoAnalyzing and improving reliability in multi-hop body sensornetworksrdquo International Journal on Advances in Internet Tech-nology vol 2 no 1 pp 152ndash161 2009

[28] I F Akyildiz B F Lo and R Balakrishnan ldquoCooperative spec-trum sensing in cognitive radio networks a surveyrdquo PhysicalCommunication vol 4 no 1 pp 40ndash62 2011

[29] B Sundararaman U Buy and A D Kshemkalyani ldquoClocksynchronization for wireless sensor networks a surveyrdquoAdHocNetworks vol 3 no 3 pp 281ndash323 2005

[30] A Bogdanov G Leander C Paar A Poschmann M J BRobshaw and Y Seurin ldquoHash functions and RFID tags mindthe gaprdquo in Cryptographic Hardware and Embedded SystemsmdashCHES 2008 10th International Workshop Washington DCUSA August 10ndash13 2008 Proceedings vol 5154 of Lecture Notesin Computer Science pp 283ndash299 Springer Berlin Germany2008

[31] C Cordeiro K Challapali D Birru and N Sai ShankarldquoIEEE 80222 the first worldwide wireless standard based oncognitive radiosrdquo in Proceedings of the 1st IEEE InternationalSymposium on New Frontiers in Dynamic Spectrum AccessNetworks (DySPAN rsquo05) pp 328ndash337 Baltimore Md USANovember 2005

[32] S UllahHHiggins B Braem et al ldquoA comprehensive survey ofwireless body area networks on PHY MAC and network layerssolutionsrdquo Journal of Medical Systems vol 36 no 3 pp 1065ndash1094 2012

[33] N Sastry and D Wagner ldquoSecurity considerations for IEEE802154 networksrdquo in Proceedings of the ACM Workshop onWireless Security (WiSe rsquo04) pp 32ndash42 Philadelphia Pa USAOctober 2004

[34] M Pajic Z Jiang I LeeO Sokolsky andRMangharam ldquoFromverification to implementation a model translation tool and apacemaker case studyrdquo in Proceedings of the 18th IEEE Real Timeand Embedded Technology and Applications Symposium (RTASrsquo12) pp 173ndash184 Beijing China April 2012

[35] CC2540 24-GHz Bluetooth low energy System-on-Chip 2013httpwwwticomlitdssymlinkcc2540pdf

[36] U Kretzschmar ldquoAES128mdasha C implementation for encryp-tion and decryption MSP430 systems ECCN 5E002 TSPAmdashtechnologysoftware publiclyrdquo Application Report SLAA397ATexas Instruments Dallas Tex USA 2009 httpwwwticomcncnlitanslaa397aslaa397apdf

[37] El Barquero Aqueronte MSP430 Cycles and Instructionsedited by Aqueronte 2011 httpunbarqueroblogspotcomes201105msp430-cycles-and-instructionshtml

[38] A Bogdanov G Leander C Paar A Poschmann M J BRobshaw and Y Seurin ldquoHash functions and RFID tags mindthe gaprdquo in Cryptographic Hardware and Embedded SystemsmdashHES 2008 vol 5154 of Lecture Notes in Computer Science pp283ndash299 Springer Berlin Germany 2008

[39] S Kamath and J Lindh ldquoMeasuring bluetooth low energypower consumptionrdquo Application Note AN092 Texas Instru-ments Dallas TEx USA 2012 Version SWRA347a httpwwwticomlitanswra347aswra347apdf

International Journal of

AerospaceEngineeringHindawi Publishing Corporationhttpwwwhindawicom Volume 2014

RoboticsJournal of

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Active and Passive Electronic Components

Control Scienceand Engineering

Journal of

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

International Journal of

RotatingMachinery

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Hindawi Publishing Corporation httpwwwhindawicom

Journal ofEngineeringVolume 2014

Submit your manuscripts athttpwwwhindawicom

VLSI Design

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Shock and Vibration

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Civil EngineeringAdvances in

Acoustics and VibrationAdvances in

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Electrical and Computer Engineering

Journal of

Advances inOptoElectronics

Hindawi Publishing Corporation httpwwwhindawicom

Volume 2014

The Scientific World JournalHindawi Publishing Corporation httpwwwhindawicom Volume 2014

SensorsJournal of

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Modelling amp Simulation in EngineeringHindawi Publishing Corporation httpwwwhindawicom Volume 2014

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Chemical EngineeringInternational Journal of Antennas and

Propagation

International Journal of

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Navigation and Observation

International Journal of

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

DistributedSensor Networks

International Journal of

Page 8: Research Article A Cognitive-Radio-Based Method for

8 International Journal of Distributed Sensor Networks

51 Shared Secrets Lifetime As previously mentioned inSection 31 for this analysis we are assuming that attackscome from external entities and therefore attackers are notable to obtain the cryptographic material that is stored in thebody sensors In the context of this proposal the lifetime ofeach of the shared secrets is the interval in which these secretsare considered computationally safe against cryptanalysisthat is their cryptoperiod

The cryptoperiod straightly depends on the chosen cryp-tographic protocols the length of the secrets themselves andthe amount of times they are used The more a given secret isused the shorter its cryptoperiod is as an attacker gets moreinformation about this secret and therefore the probability ofa successful cryptanalysis increases In fact cryptoperiod isdefined more in terms of the number of times a given secretor key is reused (the amount of ciphertext exposed to anattacker for a given secretkey) than as a given time periodwhich strongly depends on the transmission rate of the sensornodes

Recall the three types of shared secrets used in theproposed method

(i) Short-term per-node shared secrets one secret 119878119906 persource node that is used to lightweight encryptdecrypt and authenticate the channelsrsquo sensed data

(ii) Medium-term globally shared secrets globally sharedsecret 119878

119872that is used to derive the short-term per-

node shared secrets 119878119906(iii) Long-term globally shared secret this being the ini-

tially preloaded secret 119878119871that is used to derive a new

medium-term globally shared secret 119878119872

when thecurrent one is about to expire

As clearly denoted in Figure 5 our approach operates insome manner as an additive stream cipher It is well knownthat stream ciphers are considered to be secure as long as thekey is never reused and thus our cipher will be secure if agiven value 119878119906 is not repeated As a result 119878119906must be updatedevery 119901 = 119898119903 sensing period with 119901 the renewal period119898 the length of the shared secret 119878119906 and 119903 the amount oftransmitted bits (sensing data) in a sensing period that areencrypted with 119878119906

Recall that in our proposal the per-node key used forencryption 119878119906 is generated by means of a hash function Asecond requirement is that this function must be crypto-graphically secure Note that if the hash function does notaccomplish it an attackermight be able to reverse it that is toget the input of the hash function given an output meaningthat in our proposal an attacker would be able to recoverthe value of the medium-term globally shared secret 119878

119872(see

Figure 4)A cryptographically secure hash function with an output

of 119898 bits can offer a security level of 2119898 operations againstpreimage attacks and 21198982 against collision attacks Generallyspeaking a minimum output of 128 bits is required in orderto provide a high level of security for most applicationsbut shorter lengths are accepted if the number of generatedmessages in a given period is limited as it is the case of low-rate networks In Section 6 we propose several lightweight

hash candidates with an output of 128 bits that is to saywe can assume that it is computationally unfeasible for anattacker to invert the hash function and thus to predict thevalue of 119878119872 as long as it is updated before exceeding itscryptoperiod which has an upper bound of 21198982 = 264 uses

The long-term globally shared secret 119878119871is only used to

update the current medium-term globally shared secret 119878119872

Because 119878119872is not updated very often it is very unlikely that

an attacker manages to obtain several values of 119878119872to reverse

the hash function and recover 119878119871 As a result we can assume

that the 119878119871cryptoperiod is long enough and there is no need

to update the secret during the nodesrsquo lifetime

52 Authentication A cryptogram 119862119906119894of sensing data con-

tains an authentication field of 16 bits that is checked uponreception (see Figure 6) Consequently an attacker has achance of 1 in 216 of guessing the next authentication fieldwhich allows it to forge a valid authentication field and injectfake data Note that this attack can lead the CBSN to wrongdecisions about the availability of the spectrum

If the attacker repeatedly attempts to send valid cipher-texts it may succeed after 215 attempts in average Becausethe attacker does not know 119878119906 the authentication fieldappears to it as a random stream and therefore it must select afake authentication field at random Besides the attacker can-not determine whether a given ciphertext has been acceptedor rejected because the receiver does not acknowledge thereception of such packets to the emitter Otherwise theattacker could take advantage of this information in order toguess a valid authentication field in a faster way

In conventional networks 215 packets may seem anextremely low number but it may provide an adequate levelof security in CBSNs In these networks the attacker can onlysend fake packets during the sensing periods which is in theorder of a few milliseconds in most cognitive scenarios [31]Moreover as previously stated in Section 1 transmission ratesin BSNs are considerably low with values usually rangingfrom tens to a few hundred of kilobits per second

As an example let us consider a 1Mbps link a sensingperiod of 10ms and a packet size of 10 bytes (which is clearlybigger than the typical packet size in sensor networks) Giventhese parameters an attacker would only be able to send 125packets at most in every sensing period That is to say theattacker would need an average of 262144 sensing periods tosend a fake packet and pass the authentication check

6 Cost Evaluation and Comparisonwith Other Approaches

In this section we evaluate the cost of our proposal interms of energy consumption due to transmission overheadand computational cost and compare its performance withthe most common approach adopted in sensor networks[32] which is providing authentication andor encryption ofthe channel sensing data by means of using standard blockciphers As is well known block ciphers have as input themessage to be encrypted or authenticated which is dividedinto several blocks of fix length and a key Both the block

International Journal of Distributed Sensor Networks 9

length and the key length depend on the algorithm beingused Regardless of the algorithm block ciphers can be usedin several modes of operation depending on the service tobe provided that is encryption only authentication only orencryptionauthentication Generally the followingmodes ofoperation are applied

Authentication CBC-MAC is a block cipher mode for gen-erating message authentication codes The message to beauthenticated is divided into several blocks of equal size andeach block is encrypted so that the value of a given blockdepends on the encryption of the previous block The finaloutput of the cipher that is the message authentication codeor CBC-MAC is the result of encrypting the last block of themessage When the input of the cipher is shorter than theblock size (as it is usually the case in sensor networks) theCBC-MAC can be obtained by directly encrypting a singleblock padded until the block size of the cipher is reached

Encryption CTRmode of operation turns a block cipher intoa stream cipher meaning that the resulting ciphertext has thesame size as the input or plain textThus it does not force theoutput length to be amultiple of the block size as it is the caseof other modes such as CBC-MACThis property makes thismode of operation suitable for encryption in sensor networkswhere devices usually exchange short-length messages

Authentication+Encryption CCM (CTR + CBC-MAC) is acommon choice for providing both encryption (CTR) andauthentication (CBC-MAC) [19] Aminor variation of CCMcalled CCMlowast is used in the ZigBee standard [7]

In this work we assume that Advanced EncryptionStandard (AES) in CTRmode is used for encryption andAESCBC-MAC for authentication as it is the current standardfor symmetric cryptography even in sensor nodes [33]Currently there are efficient hardware implementations ofAES that are highly affordable

Regarding hardware platforms the vast majority of pre-vious works on BSNs have used the 16-bit Texas Instrumentsrsquo(TI) MSP430 and CC2540 families of microcontrollers [34]Built around a 16-bit CPU ultra-low-power MSP430 micro-controllers are designed for low cost and specifically low-power consumption embedded applications As an exampleTIrsquos CC2540 family [35] enable robust Bluetooth low energy(BLE) network nodes to be built with low total bill-of-material (BOM) costs BLE operates in the same spectrumrange (2400GHzndash24835GHz ISM band) as classic Blue-tooth technology but uses a different set of channels insteadof 79 1MHz channels BLE offers 40 2MHz channels 3 foradvertising purposes and 37 for data exchange

61 TransmissionReception Overhead In this section weanalyze the overhead introduced by our proposal in termsof transmissionreception of channel availability data andcompare it with the overhead exhibited when conventionalapproaches are used for data encryptionauthentication asexplained above We assume that all sensors are capable ofsensing a given set of channels and report information abouttheir state

With our proposal the minimum number of transmittedbitswill dependon the number of channels that a given sensoris reporting the number of bits used to code the state ofeach channel and the length of the authentication code Asexplained in Section 52 a length of 16 bits is enough to securemost applications in WSNs and thus we have assumed thisvalue for the authentication fieldThis leads to a total amountof Bits

119905119909= 119897 + 16 of transmitted bits where 119897 represents the

total number of bits used to code all possible channels andBits119905119909= (119899 minus 1)Bits

119905119909received bits representing the number

of bits received by a given sensor from its neighborsAiming to provide a fair comparison we choose the same

key length for block ciphers and for our proposal that is tosay a 128-bit key The transmitted bits overhead added byAES CBC-MAC authentication is 128 bits (for a semanticallysecure implementation also an IV or nonce must be sharedbetween emitter and receiver so that the overhead can behigher) Regarding encryption the number of transmittedbits is equal to the number of bits 119897 used to code the state of thechannels but it also requires the use of a nonce with a lengthequal to half of the key length that is 64 bits per message

During every sensing period every node must transmita packet with sensing information but also must process thepackets received from its neighbors Table 1 and Figure 7respectively show the transmission and reception overheaddue to the secure sharing of sensing information using bothstandard block ciphers and our proposal The values areprovided as a function of the number of bits 119897 used to codethe state of the channels and the number of nodes119873 rangingfrom 5 to 30 Given that the considered scenario is a bodysensor network this is more than a reasonable value sincea patient wearing more than 30 sensors may be an unlikelysituation

The reader may notice that the overhead introducedby this mechanism increases linearly with the number ofnodes for both approaches However with the proposedmethod the transmissionreception overhead is considerablyreduced with respect to the use of standard block cipherswhile still maintaining an acceptable level of security Infact the more the nodes in the CBSN the bigger theimprovement introduced by the former As wewill show laterthe transmissionreception savings lead to a huge saving alsoin energy consumption

62 Computational Cost In this section we provide a com-parison of the CPU cost in cycles due to the implementationof the cryptographic functions

If AES is used the total cryptographic cost per nodefor securing the exchange of sensing data equals the costof one encryption and 119873 minus 1 decryptions Assumingthe Texas Instrumentsrsquo reference AES-implementation forCC2540 microcontrollers [36] AES encryption needs 6600cyclesblock and AES decryption 8400 cyclesblock

With our proposal the energy consumption has threecomponents the computation of the different sequences 119878119906

119894

with the hash function before the sensing period begins theXOR of the keystream 119870119906

119894with the sequence 119863119906

119894that signals

the availability of channels and the XOR of the sequences 119862119906119894

received from neighbors with the precomputed 119878119906119894Therefore

10 International Journal of Distributed Sensor Networks

Table 1 Transmission overhead

119897 (bits) Overhead(bits)

Authentication only (CBC-MAC)16 12832 12864 128

Encryption only (CTR)16 8032 9664 128

Authentication and encryption (CCM)16 20832 22464 256

Authentication and encryption (our proposal)16 3232 4864 80

1000

800

600

400

200

05 10 15 20 25 30

Number of nodes (N)

Rece

ptio

n ov

erhe

ad (b

ytes

)

CBC-MAC l = 16 32 64

CTR l = 16

CTR l = 32

CTR l = 64

CCM l = 16

CCM l = 32

CCM l = 64

Ours l = 16

Ours l = 32

Ours l = 64

Figure 7 Reception overhead for a varying number of nodes119873

a nodemust compute119873 hashes and perform119873XORs to sendchannel information and process the reports received from itsneighbors

As per [37] XORoperationwith aMSP430 accounts for 4-5 cyclesbyte Assuming a 128-bit hash function and the worstcase every XOR in our proposals accounts for 5 sdot 16 = 80cycles As previously explained in Section 51 we suggest theuse of a lightweight cryptographic hash function specificallysuited for low-end devices with an output of 128 bits Table 2depicts the number of CPU cycles per block needed [38]for two potential candidates As clearly seen in the tablecomputing one of these hash functions requires only a fewtens of cyclesblock In the following for this analysis we will

Table 2 Cycles per block for different cryptographic hash functions

Algorithm Hash output size Cyclesblock(Stripped) MAME 128 96H-PRESENT-128 128 32

consider the (stripped) MAME hash function as it is a purehash function that does not rely on a symmetric cipher andrequires more CPU cycles (worst case)

Taking into account the previous data Figure 8 showsthe CPU cycles consumed with both our proposal (with aMAME hash function) and standard AES-128 security It canbe clearly seen that our proposal scales much better withthe number of nodes while still providing an appropriatelevel of security We do not provide values for the processtime that is the time needed for key generation encryptiondecryption and data authentication but the number of CPUcycles required to execute each function In this way timevalues can be obtained for a particular sensor node accordingto its CPU features

63 Total Energy Cost Table 3 provides the transmission andreception energy consumption of a TIrsquos CC2540 microcon-troller for different modes and values of transmission powerThe displayed values have been tested under 25∘CWe do nothave values for in-body conditions (asymp38∘C) but we presentthese data for reference purposes In any case this fact onlyaffects the energy consumption for receivingtransmittingNote that the total cost in terms of energy is much highersince it should also account for duty cycles state changes andother parameters [39]

There is no single specific ldquoenergy per CPU cyclerdquo valuesince the cycle consumption depends on the type of CPUoperation Anyway in [34] the authors measured that theTIrsquos MSP430F1611 consumes energy at an average of 072 nJper clock cycle and we have adopted such value in our study

Figure 9 shows the total average energy consumption as afunction of the number of neighboring sensor nodes and thenumber 119897 of bits used to code the channels for the proposedmechanism and standard approaches CCM (authenticationand encryption) CTR (encryption only) and CBC-MAC(authentication only) We have assumed standard receptionand short-range transmission of minus6 dBm (see Table 3)

As clearly denoted in the figure ourmethod only requiresa few tens of 120583J regardless of the number of sensor nodeswhile AES-based security requires higher values of energyranging from 35 120583J to almost 240120583J when encryption andauthentication are provided and for 30 sensor nodes Themore the number of sensor nodes the bigger the improve-ment introduced by our proposal

It must be remarked however that the purpose of thisfigure is to provide reference values to be taken into accountfor future implementations Besides the level of security pro-vided by our method is lower than AES-based methods butstill ismore than adequate given the features of CBSNs (trans-mission rate number of sentmessages etc) and given the factthat the data we are trying to protect are just a limited numberof potential channels to be used for operation of the network

International Journal of Distributed Sensor Networks 11

Table 3 Currentenergy consumption for RXTX tested on TexasInstruments CC2540 EMwith 119879

119860= 25∘Cwith no peripherals active

and low MCU activity at 250 kHz

Test conditions Current EnergybyteRX standard 196mA 588 nJRX high gain 221mA 663 nJTX minus23 dBm 211mA 633 nJTX minus6 dBm 238mA 714 nJTX 0 dBm 27mA 81 nJTX 4 dBm 316mA 948 nJ

5 10 15 20 25 30

Number of nodes (N)

AES l = 16 32 64

Ours l = 16 32 64

300000

250000

200000

150000

100000

50000

0

CPU

cycle

s

Figure 8 Added CPU cycles for a secure exchange of sensing data

Indeed thismechanism introduces some overhead due tospectrum sensing and sharing of channel information and aswe pointed out above the overhead increases linearly withthe number of nodes in the network The synchronizationprotocol adds some overhead too but the increase willstrongly depend on the chosen protocol In [29] someprotocols with high energy efficiency are referenced whichcould be used in our proposal

Despite it we claim that it is definitely worth introducingthis overhead to increase the availability of the network andmake it robust to potential interferences and DoS attacksUnder these undesired situations the current channel usedby the CBSN may become unavailable but the proposedmethod allows the nodes to securely agree on a new channelof operation and rapidly resume their transmissions It mustbe remarked that securing channel availability informationmay prevent or at least diminished the effect of further DoSattacks when switching to a new channel

We do not quantify the benefits of applying our methodin terms of attack mitigation because it strongly depends onthe capabilities of the attacker (time required for sensing eachchannel number of channels that can sense etc) As a futurework it would be interesting to estimate the improvementachieved by our approach in terms of throughput of the

5 10 15 20 25 30

Number of nodes (N)

CBC-MAC l = 16 32 64

CTR l = 16

CTR l = 32

CTR l = 64

CCM l = 16

CCM l = 32

CCM l = 64

Ours l = 16

Ours l = 32

Ours l = 64

250

200

150

100

50

0

Ener

gy co

st (120583

J)Figure 9 Added energy costs for a TIrsquos MSP430F1611 with a TIrsquosCC2540 microcontroller

CBSNs connections and the tradeoff between benefits andoverhead

7 Conclusions

Body sensor networks (BSNs) emerge as an optimal solutionfor ensuring constant and remote monitoring of the healthstatus in patients Recent advances in technology have madeit possible to deploy a network of tiny sensors over the humanbody and even in body which can measure vital signs suchas temperature heart rate or the level of glucose and reportthese data to medical personnel

Guaranteeing the availability of such communicationsis a must as long as connectivity losses during emergencysituations may prevent a patient from immediately receivingmedical assistance and may end up in catastrophic results

A new network paradigm known as cognitive body sen-sor networks (CBSNs) could mitigate this threat by allowingbody sensors to operate in a wide range of frequenciesand adapt its transmission parameters according to highlydynamic environment conditions However this would comeat the expense of implementing cooperative spectrum sensingmechanisms that allow sensors to exchange informationabout channel quality and availability As a consequenceCBSNs might become vulnerable to specific attacks that aretargeted to these mechanisms

In this paper we presented a novel and simple methodto secure the sensing process in a CBSN and improve itsavailability The method relies on cryptographic primitivesthat require a minimum amount of memory and low energyconsumption thus beingmore suited for devices with limitedresources than traditional approaches It offers authentication

12 International Journal of Distributed Sensor Networks

and encryption of control data shared by the sensors in theCBSN to agree on a given channel

Our proposal was analyzed in terms of security and weshowed that although it does not provide the same level ofsecurity as AES-based encryption and authentication it isstill sufficient for low packet rate networks such as CBSNsThe provided results also showed that our method outper-forms existing approaches in terms of transmissionreceptionoverhead and number of CPU cycles needed particularly asthe number of sensor nodes increases For typical microcon-trollers as CC2540 and MSP430 the improvement in energyconsumption clearly justifies the use of the proposed methodagainst AES-based mechanisms in constrained networkssuch as CBSNs in which maximizing the network life isextremely important

Conflict of Interests

The authors declare that there is no conflict of interestsregarding the publication of this paper

Acknowledgment

This work has been partially supported by the spanishgovernment under grant TEC2011-22746 ldquoTAMESISrdquo andby the Ministry of Economy and Competitiveness throughthe projects CO-PRIVACY (TIN2011-27076-C03-02) andSMARTGLACIS (TIN2014-57364-C2-2-R)

References

[1] B Latre B Braem I Moerman C Blondia and P DemeesterldquoA survey on wireless body area networksrdquo Wireless Networksvol 17 no 1 pp 1ndash18 2011

[2] S Movassaghi M Abolhasan J Lipman D Smith and AJamalipour ldquoWireless body area networks a surveyrdquo IEEECommunications Surveys amp Tutorials vol 16 no 3 pp 1658ndash1686 2014

[3] 802156-2012mdashIEEE Standard for Local and metropolitanarea networksmdashPart 156 Wireless Body Area Networks2012 httpstandardsieeeorggetieee802download802156-2012pdf

[4] Bluetooth Low Energy (LE) June 2014 httpwwwbluetoothcomPageslow-energy-tech-infoaspx

[5] The ANT+ Alliance 2014 httpwwwthisisantcom

[6] Wi-Fi Alliance June 2014 httpwwwwi-fiorg

[7] Zigbee Alliance June 2014 httpwwwzigbeeorg

[8] M Rushanan A D Rubin D F Kune and C M SwansonldquoSoK security and privacy in implantable medical devices andbody area networksrdquo in Proceedings of the 35th IEEE Symposiumon Security and Privacy (SP rsquo14) pp 524ndash539 San Jose Calif USA May 2014

[9] I F Akyildiz W-Y Lee M C Vuran and S Mohanty ldquoNeXtgenerationdynamic spectrum accesscognitive radio wirelessnetworks a surveyrdquo Computer Networks vol 50 no 13 pp2127ndash2159 2006

[10] BWang and K J R Liu ldquoAdvances in cognitive radio networksa surveyrdquo IEEE Journal of Selected Topics in Signal Processingvol 5 no 1 pp 5ndash23 2011

[11] Y Xu J Wang Q Wu A Anpalagan and Y-D Yao ldquoOppor-tunistic spectrum access in unknown dynamic environment agame-theoretic stochastic learning solutionrdquo IEEE Transactionson Wireless Communications vol 11 no 4 pp 1380ndash1391 2012

[12] D Cavalcanti S Das J Wang and K Challapali ldquoCognitiveradio based wireless sensor networksrdquo in Proceedings of the17th International Conference on Computer Communicationsand Networks (ICCCN rsquo08) pp 1ndash6 August 2008

[13] O Leon J Hernandez-Serrano andM Soriano ldquoSecuring cog-nitive radio networksrdquo International Journal of CommunicationSystems vol 23 no 5 pp 633ndash652 2010

[14] M Rostami A Juels and F Koushanfar ldquoHeart-to-Heart(H2H) authentication for implanted medical devicesrdquo in Pro-ceedings of the ACM SIGSAC Conference on Computer andCommunications Security (CCS rsquo13) pp 1099ndash1111 ACM BerlinGermany November 2013

[15] K B Rasmussen C Castelluccia T S Heydt-Benjamin andS Capkun ldquoProximity-based access control for implantablemedical devicesrdquo in Proceedings of the 16th ACM Conference onComputer and Communications Security (CCS rsquo09) pp 410ndash419Chicago Ill USA November 2009

[16] L Shi M Li S Yu and J Yuan ldquoBANA body area networkauthentication exploiting channel characteristicsrdquo IEEE Journalon Selected Areas in Communications vol 31 no 9 pp 1803ndash1816 2013

[17] C C Tan S Zhong H Wang and Q Li ldquoBody sensornetwork security an identity-based cryptography approachrdquoin Proceedings of the 1st ACM Conference on Wireless NetworkSecurity (WiSec rsquo08) pp 148ndash153 April 2008

[18] O Garcia-Morchon T Falck T Heer and K Wehrle ldquoSecurityfor pervasive medical sensor networksrdquo in Proceedings of the6th Annual International Conference on Mobile and UbiquitousSystems Networking and Services (MobiQuitous rsquo09) pp 1ndash10Toronto Canada July 2009

[19] G Selimis L Huang F Masse et al ldquoA lightweight securityscheme for wireless body area networks design energy evalu-ation and proposed microprocessor designrdquo Journal of MedicalSystems vol 35 no 5 pp 1289ndash1298 2011

[20] Y Yan and T Shu ldquoEnergy-efficient In-network encryp-tiondecryption for wireless body area sensor networksrdquo inProceedings of the IEEE Global Communications Conference(GLOBECOM rsquo14) pp 2442ndash2447 IEEE Austin Tex USADecember 2014

[21] Y Xu A Anpalagan Q Wu L Shen Z Gao and J WangldquoDecision-theoretic distributed channel selection for oppor-tunistic spectrum access strategies challenges and solutionsrdquoIEEE Communications Surveys and Tutorials vol 15 no 4 pp1689ndash1713 2013

[22] Y Xu J Wang Q Wu A Anpalagan and Y-D Yao ldquoOppor-tunistic spectrum access in cognitive radio networks globaloptimization using local interaction gamesrdquo IEEE Journal onSelected Topics in Signal Processing vol 6 no 2 pp 180ndash1942012

[23] R Chavez-Santiago K E Nolan O Holland et al ldquoCognitiveradio for medical body area networks using ultra widebandrdquoIEEE Wireless Communications vol 19 no 4 pp 74ndash81 2012

International Journal of Distributed Sensor Networks 13

[24] A R Syed and K-L A Yau ldquoOn cognitive radio-based wirelessbody area networks for medical applicationsrdquo in Prceedingsof the 1st IEEE Symposium on Computational Intelligence inHealthcare and e-Health (CICARE rsquo13) pp 51ndash57 SingaporeApril 2013

[25] R Chen J-M Park and K Bian ldquoRobust distributed spectrumsensing in cognitive radio networksrdquo in Proceedings of the 27thIEEE Conference on Computer Communications (INFOCOMrsquo08) pp 1876ndash1884 IEEE Phoenix Ariz USA April 2008

[26] H Rifa-Pous M J Blasco and C Garrigues ldquoReview of robustcooperative spectrum sensing techniques for cognitive radionetworksrdquoWireless Personal Communications vol 67 no 2 pp175ndash198 2012

[27] B Braem B Latre C Blondia I Moerman and P DemeesterldquoAnalyzing and improving reliability in multi-hop body sensornetworksrdquo International Journal on Advances in Internet Tech-nology vol 2 no 1 pp 152ndash161 2009

[28] I F Akyildiz B F Lo and R Balakrishnan ldquoCooperative spec-trum sensing in cognitive radio networks a surveyrdquo PhysicalCommunication vol 4 no 1 pp 40ndash62 2011

[29] B Sundararaman U Buy and A D Kshemkalyani ldquoClocksynchronization for wireless sensor networks a surveyrdquoAdHocNetworks vol 3 no 3 pp 281ndash323 2005

[30] A Bogdanov G Leander C Paar A Poschmann M J BRobshaw and Y Seurin ldquoHash functions and RFID tags mindthe gaprdquo in Cryptographic Hardware and Embedded SystemsmdashCHES 2008 10th International Workshop Washington DCUSA August 10ndash13 2008 Proceedings vol 5154 of Lecture Notesin Computer Science pp 283ndash299 Springer Berlin Germany2008

[31] C Cordeiro K Challapali D Birru and N Sai ShankarldquoIEEE 80222 the first worldwide wireless standard based oncognitive radiosrdquo in Proceedings of the 1st IEEE InternationalSymposium on New Frontiers in Dynamic Spectrum AccessNetworks (DySPAN rsquo05) pp 328ndash337 Baltimore Md USANovember 2005

[32] S UllahHHiggins B Braem et al ldquoA comprehensive survey ofwireless body area networks on PHY MAC and network layerssolutionsrdquo Journal of Medical Systems vol 36 no 3 pp 1065ndash1094 2012

[33] N Sastry and D Wagner ldquoSecurity considerations for IEEE802154 networksrdquo in Proceedings of the ACM Workshop onWireless Security (WiSe rsquo04) pp 32ndash42 Philadelphia Pa USAOctober 2004

[34] M Pajic Z Jiang I LeeO Sokolsky andRMangharam ldquoFromverification to implementation a model translation tool and apacemaker case studyrdquo in Proceedings of the 18th IEEE Real Timeand Embedded Technology and Applications Symposium (RTASrsquo12) pp 173ndash184 Beijing China April 2012

[35] CC2540 24-GHz Bluetooth low energy System-on-Chip 2013httpwwwticomlitdssymlinkcc2540pdf

[36] U Kretzschmar ldquoAES128mdasha C implementation for encryp-tion and decryption MSP430 systems ECCN 5E002 TSPAmdashtechnologysoftware publiclyrdquo Application Report SLAA397ATexas Instruments Dallas Tex USA 2009 httpwwwticomcncnlitanslaa397aslaa397apdf

[37] El Barquero Aqueronte MSP430 Cycles and Instructionsedited by Aqueronte 2011 httpunbarqueroblogspotcomes201105msp430-cycles-and-instructionshtml

[38] A Bogdanov G Leander C Paar A Poschmann M J BRobshaw and Y Seurin ldquoHash functions and RFID tags mindthe gaprdquo in Cryptographic Hardware and Embedded SystemsmdashHES 2008 vol 5154 of Lecture Notes in Computer Science pp283ndash299 Springer Berlin Germany 2008

[39] S Kamath and J Lindh ldquoMeasuring bluetooth low energypower consumptionrdquo Application Note AN092 Texas Instru-ments Dallas TEx USA 2012 Version SWRA347a httpwwwticomlitanswra347aswra347apdf

International Journal of

AerospaceEngineeringHindawi Publishing Corporationhttpwwwhindawicom Volume 2014

RoboticsJournal of

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Active and Passive Electronic Components

Control Scienceand Engineering

Journal of

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

International Journal of

RotatingMachinery

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Hindawi Publishing Corporation httpwwwhindawicom

Journal ofEngineeringVolume 2014

Submit your manuscripts athttpwwwhindawicom

VLSI Design

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Shock and Vibration

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Civil EngineeringAdvances in

Acoustics and VibrationAdvances in

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Electrical and Computer Engineering

Journal of

Advances inOptoElectronics

Hindawi Publishing Corporation httpwwwhindawicom

Volume 2014

The Scientific World JournalHindawi Publishing Corporation httpwwwhindawicom Volume 2014

SensorsJournal of

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Modelling amp Simulation in EngineeringHindawi Publishing Corporation httpwwwhindawicom Volume 2014

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Chemical EngineeringInternational Journal of Antennas and

Propagation

International Journal of

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Navigation and Observation

International Journal of

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

DistributedSensor Networks

International Journal of

Page 9: Research Article A Cognitive-Radio-Based Method for

International Journal of Distributed Sensor Networks 9

length and the key length depend on the algorithm beingused Regardless of the algorithm block ciphers can be usedin several modes of operation depending on the service tobe provided that is encryption only authentication only orencryptionauthentication Generally the followingmodes ofoperation are applied

Authentication CBC-MAC is a block cipher mode for gen-erating message authentication codes The message to beauthenticated is divided into several blocks of equal size andeach block is encrypted so that the value of a given blockdepends on the encryption of the previous block The finaloutput of the cipher that is the message authentication codeor CBC-MAC is the result of encrypting the last block of themessage When the input of the cipher is shorter than theblock size (as it is usually the case in sensor networks) theCBC-MAC can be obtained by directly encrypting a singleblock padded until the block size of the cipher is reached

Encryption CTRmode of operation turns a block cipher intoa stream cipher meaning that the resulting ciphertext has thesame size as the input or plain textThus it does not force theoutput length to be amultiple of the block size as it is the caseof other modes such as CBC-MACThis property makes thismode of operation suitable for encryption in sensor networkswhere devices usually exchange short-length messages

Authentication+Encryption CCM (CTR + CBC-MAC) is acommon choice for providing both encryption (CTR) andauthentication (CBC-MAC) [19] Aminor variation of CCMcalled CCMlowast is used in the ZigBee standard [7]

In this work we assume that Advanced EncryptionStandard (AES) in CTRmode is used for encryption andAESCBC-MAC for authentication as it is the current standardfor symmetric cryptography even in sensor nodes [33]Currently there are efficient hardware implementations ofAES that are highly affordable

Regarding hardware platforms the vast majority of pre-vious works on BSNs have used the 16-bit Texas Instrumentsrsquo(TI) MSP430 and CC2540 families of microcontrollers [34]Built around a 16-bit CPU ultra-low-power MSP430 micro-controllers are designed for low cost and specifically low-power consumption embedded applications As an exampleTIrsquos CC2540 family [35] enable robust Bluetooth low energy(BLE) network nodes to be built with low total bill-of-material (BOM) costs BLE operates in the same spectrumrange (2400GHzndash24835GHz ISM band) as classic Blue-tooth technology but uses a different set of channels insteadof 79 1MHz channels BLE offers 40 2MHz channels 3 foradvertising purposes and 37 for data exchange

61 TransmissionReception Overhead In this section weanalyze the overhead introduced by our proposal in termsof transmissionreception of channel availability data andcompare it with the overhead exhibited when conventionalapproaches are used for data encryptionauthentication asexplained above We assume that all sensors are capable ofsensing a given set of channels and report information abouttheir state

With our proposal the minimum number of transmittedbitswill dependon the number of channels that a given sensoris reporting the number of bits used to code the state ofeach channel and the length of the authentication code Asexplained in Section 52 a length of 16 bits is enough to securemost applications in WSNs and thus we have assumed thisvalue for the authentication fieldThis leads to a total amountof Bits

119905119909= 119897 + 16 of transmitted bits where 119897 represents the

total number of bits used to code all possible channels andBits119905119909= (119899 minus 1)Bits

119905119909received bits representing the number

of bits received by a given sensor from its neighborsAiming to provide a fair comparison we choose the same

key length for block ciphers and for our proposal that is tosay a 128-bit key The transmitted bits overhead added byAES CBC-MAC authentication is 128 bits (for a semanticallysecure implementation also an IV or nonce must be sharedbetween emitter and receiver so that the overhead can behigher) Regarding encryption the number of transmittedbits is equal to the number of bits 119897 used to code the state of thechannels but it also requires the use of a nonce with a lengthequal to half of the key length that is 64 bits per message

During every sensing period every node must transmita packet with sensing information but also must process thepackets received from its neighbors Table 1 and Figure 7respectively show the transmission and reception overheaddue to the secure sharing of sensing information using bothstandard block ciphers and our proposal The values areprovided as a function of the number of bits 119897 used to codethe state of the channels and the number of nodes119873 rangingfrom 5 to 30 Given that the considered scenario is a bodysensor network this is more than a reasonable value sincea patient wearing more than 30 sensors may be an unlikelysituation

The reader may notice that the overhead introducedby this mechanism increases linearly with the number ofnodes for both approaches However with the proposedmethod the transmissionreception overhead is considerablyreduced with respect to the use of standard block cipherswhile still maintaining an acceptable level of security Infact the more the nodes in the CBSN the bigger theimprovement introduced by the former As wewill show laterthe transmissionreception savings lead to a huge saving alsoin energy consumption

62 Computational Cost In this section we provide a com-parison of the CPU cost in cycles due to the implementationof the cryptographic functions

If AES is used the total cryptographic cost per nodefor securing the exchange of sensing data equals the costof one encryption and 119873 minus 1 decryptions Assumingthe Texas Instrumentsrsquo reference AES-implementation forCC2540 microcontrollers [36] AES encryption needs 6600cyclesblock and AES decryption 8400 cyclesblock

With our proposal the energy consumption has threecomponents the computation of the different sequences 119878119906

119894

with the hash function before the sensing period begins theXOR of the keystream 119870119906

119894with the sequence 119863119906

119894that signals

the availability of channels and the XOR of the sequences 119862119906119894

received from neighbors with the precomputed 119878119906119894Therefore

10 International Journal of Distributed Sensor Networks

Table 1 Transmission overhead

119897 (bits) Overhead(bits)

Authentication only (CBC-MAC)16 12832 12864 128

Encryption only (CTR)16 8032 9664 128

Authentication and encryption (CCM)16 20832 22464 256

Authentication and encryption (our proposal)16 3232 4864 80

1000

800

600

400

200

05 10 15 20 25 30

Number of nodes (N)

Rece

ptio

n ov

erhe

ad (b

ytes

)

CBC-MAC l = 16 32 64

CTR l = 16

CTR l = 32

CTR l = 64

CCM l = 16

CCM l = 32

CCM l = 64

Ours l = 16

Ours l = 32

Ours l = 64

Figure 7 Reception overhead for a varying number of nodes119873

a nodemust compute119873 hashes and perform119873XORs to sendchannel information and process the reports received from itsneighbors

As per [37] XORoperationwith aMSP430 accounts for 4-5 cyclesbyte Assuming a 128-bit hash function and the worstcase every XOR in our proposals accounts for 5 sdot 16 = 80cycles As previously explained in Section 51 we suggest theuse of a lightweight cryptographic hash function specificallysuited for low-end devices with an output of 128 bits Table 2depicts the number of CPU cycles per block needed [38]for two potential candidates As clearly seen in the tablecomputing one of these hash functions requires only a fewtens of cyclesblock In the following for this analysis we will

Table 2 Cycles per block for different cryptographic hash functions

Algorithm Hash output size Cyclesblock(Stripped) MAME 128 96H-PRESENT-128 128 32

consider the (stripped) MAME hash function as it is a purehash function that does not rely on a symmetric cipher andrequires more CPU cycles (worst case)

Taking into account the previous data Figure 8 showsthe CPU cycles consumed with both our proposal (with aMAME hash function) and standard AES-128 security It canbe clearly seen that our proposal scales much better withthe number of nodes while still providing an appropriatelevel of security We do not provide values for the processtime that is the time needed for key generation encryptiondecryption and data authentication but the number of CPUcycles required to execute each function In this way timevalues can be obtained for a particular sensor node accordingto its CPU features

63 Total Energy Cost Table 3 provides the transmission andreception energy consumption of a TIrsquos CC2540 microcon-troller for different modes and values of transmission powerThe displayed values have been tested under 25∘CWe do nothave values for in-body conditions (asymp38∘C) but we presentthese data for reference purposes In any case this fact onlyaffects the energy consumption for receivingtransmittingNote that the total cost in terms of energy is much highersince it should also account for duty cycles state changes andother parameters [39]

There is no single specific ldquoenergy per CPU cyclerdquo valuesince the cycle consumption depends on the type of CPUoperation Anyway in [34] the authors measured that theTIrsquos MSP430F1611 consumes energy at an average of 072 nJper clock cycle and we have adopted such value in our study

Figure 9 shows the total average energy consumption as afunction of the number of neighboring sensor nodes and thenumber 119897 of bits used to code the channels for the proposedmechanism and standard approaches CCM (authenticationand encryption) CTR (encryption only) and CBC-MAC(authentication only) We have assumed standard receptionand short-range transmission of minus6 dBm (see Table 3)

As clearly denoted in the figure ourmethod only requiresa few tens of 120583J regardless of the number of sensor nodeswhile AES-based security requires higher values of energyranging from 35 120583J to almost 240120583J when encryption andauthentication are provided and for 30 sensor nodes Themore the number of sensor nodes the bigger the improve-ment introduced by our proposal

It must be remarked however that the purpose of thisfigure is to provide reference values to be taken into accountfor future implementations Besides the level of security pro-vided by our method is lower than AES-based methods butstill ismore than adequate given the features of CBSNs (trans-mission rate number of sentmessages etc) and given the factthat the data we are trying to protect are just a limited numberof potential channels to be used for operation of the network

International Journal of Distributed Sensor Networks 11

Table 3 Currentenergy consumption for RXTX tested on TexasInstruments CC2540 EMwith 119879

119860= 25∘Cwith no peripherals active

and low MCU activity at 250 kHz

Test conditions Current EnergybyteRX standard 196mA 588 nJRX high gain 221mA 663 nJTX minus23 dBm 211mA 633 nJTX minus6 dBm 238mA 714 nJTX 0 dBm 27mA 81 nJTX 4 dBm 316mA 948 nJ

5 10 15 20 25 30

Number of nodes (N)

AES l = 16 32 64

Ours l = 16 32 64

300000

250000

200000

150000

100000

50000

0

CPU

cycle

s

Figure 8 Added CPU cycles for a secure exchange of sensing data

Indeed thismechanism introduces some overhead due tospectrum sensing and sharing of channel information and aswe pointed out above the overhead increases linearly withthe number of nodes in the network The synchronizationprotocol adds some overhead too but the increase willstrongly depend on the chosen protocol In [29] someprotocols with high energy efficiency are referenced whichcould be used in our proposal

Despite it we claim that it is definitely worth introducingthis overhead to increase the availability of the network andmake it robust to potential interferences and DoS attacksUnder these undesired situations the current channel usedby the CBSN may become unavailable but the proposedmethod allows the nodes to securely agree on a new channelof operation and rapidly resume their transmissions It mustbe remarked that securing channel availability informationmay prevent or at least diminished the effect of further DoSattacks when switching to a new channel

We do not quantify the benefits of applying our methodin terms of attack mitigation because it strongly depends onthe capabilities of the attacker (time required for sensing eachchannel number of channels that can sense etc) As a futurework it would be interesting to estimate the improvementachieved by our approach in terms of throughput of the

5 10 15 20 25 30

Number of nodes (N)

CBC-MAC l = 16 32 64

CTR l = 16

CTR l = 32

CTR l = 64

CCM l = 16

CCM l = 32

CCM l = 64

Ours l = 16

Ours l = 32

Ours l = 64

250

200

150

100

50

0

Ener

gy co

st (120583

J)Figure 9 Added energy costs for a TIrsquos MSP430F1611 with a TIrsquosCC2540 microcontroller

CBSNs connections and the tradeoff between benefits andoverhead

7 Conclusions

Body sensor networks (BSNs) emerge as an optimal solutionfor ensuring constant and remote monitoring of the healthstatus in patients Recent advances in technology have madeit possible to deploy a network of tiny sensors over the humanbody and even in body which can measure vital signs suchas temperature heart rate or the level of glucose and reportthese data to medical personnel

Guaranteeing the availability of such communicationsis a must as long as connectivity losses during emergencysituations may prevent a patient from immediately receivingmedical assistance and may end up in catastrophic results

A new network paradigm known as cognitive body sen-sor networks (CBSNs) could mitigate this threat by allowingbody sensors to operate in a wide range of frequenciesand adapt its transmission parameters according to highlydynamic environment conditions However this would comeat the expense of implementing cooperative spectrum sensingmechanisms that allow sensors to exchange informationabout channel quality and availability As a consequenceCBSNs might become vulnerable to specific attacks that aretargeted to these mechanisms

In this paper we presented a novel and simple methodto secure the sensing process in a CBSN and improve itsavailability The method relies on cryptographic primitivesthat require a minimum amount of memory and low energyconsumption thus beingmore suited for devices with limitedresources than traditional approaches It offers authentication

12 International Journal of Distributed Sensor Networks

and encryption of control data shared by the sensors in theCBSN to agree on a given channel

Our proposal was analyzed in terms of security and weshowed that although it does not provide the same level ofsecurity as AES-based encryption and authentication it isstill sufficient for low packet rate networks such as CBSNsThe provided results also showed that our method outper-forms existing approaches in terms of transmissionreceptionoverhead and number of CPU cycles needed particularly asthe number of sensor nodes increases For typical microcon-trollers as CC2540 and MSP430 the improvement in energyconsumption clearly justifies the use of the proposed methodagainst AES-based mechanisms in constrained networkssuch as CBSNs in which maximizing the network life isextremely important

Conflict of Interests

The authors declare that there is no conflict of interestsregarding the publication of this paper

Acknowledgment

This work has been partially supported by the spanishgovernment under grant TEC2011-22746 ldquoTAMESISrdquo andby the Ministry of Economy and Competitiveness throughthe projects CO-PRIVACY (TIN2011-27076-C03-02) andSMARTGLACIS (TIN2014-57364-C2-2-R)

References

[1] B Latre B Braem I Moerman C Blondia and P DemeesterldquoA survey on wireless body area networksrdquo Wireless Networksvol 17 no 1 pp 1ndash18 2011

[2] S Movassaghi M Abolhasan J Lipman D Smith and AJamalipour ldquoWireless body area networks a surveyrdquo IEEECommunications Surveys amp Tutorials vol 16 no 3 pp 1658ndash1686 2014

[3] 802156-2012mdashIEEE Standard for Local and metropolitanarea networksmdashPart 156 Wireless Body Area Networks2012 httpstandardsieeeorggetieee802download802156-2012pdf

[4] Bluetooth Low Energy (LE) June 2014 httpwwwbluetoothcomPageslow-energy-tech-infoaspx

[5] The ANT+ Alliance 2014 httpwwwthisisantcom

[6] Wi-Fi Alliance June 2014 httpwwwwi-fiorg

[7] Zigbee Alliance June 2014 httpwwwzigbeeorg

[8] M Rushanan A D Rubin D F Kune and C M SwansonldquoSoK security and privacy in implantable medical devices andbody area networksrdquo in Proceedings of the 35th IEEE Symposiumon Security and Privacy (SP rsquo14) pp 524ndash539 San Jose Calif USA May 2014

[9] I F Akyildiz W-Y Lee M C Vuran and S Mohanty ldquoNeXtgenerationdynamic spectrum accesscognitive radio wirelessnetworks a surveyrdquo Computer Networks vol 50 no 13 pp2127ndash2159 2006

[10] BWang and K J R Liu ldquoAdvances in cognitive radio networksa surveyrdquo IEEE Journal of Selected Topics in Signal Processingvol 5 no 1 pp 5ndash23 2011

[11] Y Xu J Wang Q Wu A Anpalagan and Y-D Yao ldquoOppor-tunistic spectrum access in unknown dynamic environment agame-theoretic stochastic learning solutionrdquo IEEE Transactionson Wireless Communications vol 11 no 4 pp 1380ndash1391 2012

[12] D Cavalcanti S Das J Wang and K Challapali ldquoCognitiveradio based wireless sensor networksrdquo in Proceedings of the17th International Conference on Computer Communicationsand Networks (ICCCN rsquo08) pp 1ndash6 August 2008

[13] O Leon J Hernandez-Serrano andM Soriano ldquoSecuring cog-nitive radio networksrdquo International Journal of CommunicationSystems vol 23 no 5 pp 633ndash652 2010

[14] M Rostami A Juels and F Koushanfar ldquoHeart-to-Heart(H2H) authentication for implanted medical devicesrdquo in Pro-ceedings of the ACM SIGSAC Conference on Computer andCommunications Security (CCS rsquo13) pp 1099ndash1111 ACM BerlinGermany November 2013

[15] K B Rasmussen C Castelluccia T S Heydt-Benjamin andS Capkun ldquoProximity-based access control for implantablemedical devicesrdquo in Proceedings of the 16th ACM Conference onComputer and Communications Security (CCS rsquo09) pp 410ndash419Chicago Ill USA November 2009

[16] L Shi M Li S Yu and J Yuan ldquoBANA body area networkauthentication exploiting channel characteristicsrdquo IEEE Journalon Selected Areas in Communications vol 31 no 9 pp 1803ndash1816 2013

[17] C C Tan S Zhong H Wang and Q Li ldquoBody sensornetwork security an identity-based cryptography approachrdquoin Proceedings of the 1st ACM Conference on Wireless NetworkSecurity (WiSec rsquo08) pp 148ndash153 April 2008

[18] O Garcia-Morchon T Falck T Heer and K Wehrle ldquoSecurityfor pervasive medical sensor networksrdquo in Proceedings of the6th Annual International Conference on Mobile and UbiquitousSystems Networking and Services (MobiQuitous rsquo09) pp 1ndash10Toronto Canada July 2009

[19] G Selimis L Huang F Masse et al ldquoA lightweight securityscheme for wireless body area networks design energy evalu-ation and proposed microprocessor designrdquo Journal of MedicalSystems vol 35 no 5 pp 1289ndash1298 2011

[20] Y Yan and T Shu ldquoEnergy-efficient In-network encryp-tiondecryption for wireless body area sensor networksrdquo inProceedings of the IEEE Global Communications Conference(GLOBECOM rsquo14) pp 2442ndash2447 IEEE Austin Tex USADecember 2014

[21] Y Xu A Anpalagan Q Wu L Shen Z Gao and J WangldquoDecision-theoretic distributed channel selection for oppor-tunistic spectrum access strategies challenges and solutionsrdquoIEEE Communications Surveys and Tutorials vol 15 no 4 pp1689ndash1713 2013

[22] Y Xu J Wang Q Wu A Anpalagan and Y-D Yao ldquoOppor-tunistic spectrum access in cognitive radio networks globaloptimization using local interaction gamesrdquo IEEE Journal onSelected Topics in Signal Processing vol 6 no 2 pp 180ndash1942012

[23] R Chavez-Santiago K E Nolan O Holland et al ldquoCognitiveradio for medical body area networks using ultra widebandrdquoIEEE Wireless Communications vol 19 no 4 pp 74ndash81 2012

International Journal of Distributed Sensor Networks 13

[24] A R Syed and K-L A Yau ldquoOn cognitive radio-based wirelessbody area networks for medical applicationsrdquo in Prceedingsof the 1st IEEE Symposium on Computational Intelligence inHealthcare and e-Health (CICARE rsquo13) pp 51ndash57 SingaporeApril 2013

[25] R Chen J-M Park and K Bian ldquoRobust distributed spectrumsensing in cognitive radio networksrdquo in Proceedings of the 27thIEEE Conference on Computer Communications (INFOCOMrsquo08) pp 1876ndash1884 IEEE Phoenix Ariz USA April 2008

[26] H Rifa-Pous M J Blasco and C Garrigues ldquoReview of robustcooperative spectrum sensing techniques for cognitive radionetworksrdquoWireless Personal Communications vol 67 no 2 pp175ndash198 2012

[27] B Braem B Latre C Blondia I Moerman and P DemeesterldquoAnalyzing and improving reliability in multi-hop body sensornetworksrdquo International Journal on Advances in Internet Tech-nology vol 2 no 1 pp 152ndash161 2009

[28] I F Akyildiz B F Lo and R Balakrishnan ldquoCooperative spec-trum sensing in cognitive radio networks a surveyrdquo PhysicalCommunication vol 4 no 1 pp 40ndash62 2011

[29] B Sundararaman U Buy and A D Kshemkalyani ldquoClocksynchronization for wireless sensor networks a surveyrdquoAdHocNetworks vol 3 no 3 pp 281ndash323 2005

[30] A Bogdanov G Leander C Paar A Poschmann M J BRobshaw and Y Seurin ldquoHash functions and RFID tags mindthe gaprdquo in Cryptographic Hardware and Embedded SystemsmdashCHES 2008 10th International Workshop Washington DCUSA August 10ndash13 2008 Proceedings vol 5154 of Lecture Notesin Computer Science pp 283ndash299 Springer Berlin Germany2008

[31] C Cordeiro K Challapali D Birru and N Sai ShankarldquoIEEE 80222 the first worldwide wireless standard based oncognitive radiosrdquo in Proceedings of the 1st IEEE InternationalSymposium on New Frontiers in Dynamic Spectrum AccessNetworks (DySPAN rsquo05) pp 328ndash337 Baltimore Md USANovember 2005

[32] S UllahHHiggins B Braem et al ldquoA comprehensive survey ofwireless body area networks on PHY MAC and network layerssolutionsrdquo Journal of Medical Systems vol 36 no 3 pp 1065ndash1094 2012

[33] N Sastry and D Wagner ldquoSecurity considerations for IEEE802154 networksrdquo in Proceedings of the ACM Workshop onWireless Security (WiSe rsquo04) pp 32ndash42 Philadelphia Pa USAOctober 2004

[34] M Pajic Z Jiang I LeeO Sokolsky andRMangharam ldquoFromverification to implementation a model translation tool and apacemaker case studyrdquo in Proceedings of the 18th IEEE Real Timeand Embedded Technology and Applications Symposium (RTASrsquo12) pp 173ndash184 Beijing China April 2012

[35] CC2540 24-GHz Bluetooth low energy System-on-Chip 2013httpwwwticomlitdssymlinkcc2540pdf

[36] U Kretzschmar ldquoAES128mdasha C implementation for encryp-tion and decryption MSP430 systems ECCN 5E002 TSPAmdashtechnologysoftware publiclyrdquo Application Report SLAA397ATexas Instruments Dallas Tex USA 2009 httpwwwticomcncnlitanslaa397aslaa397apdf

[37] El Barquero Aqueronte MSP430 Cycles and Instructionsedited by Aqueronte 2011 httpunbarqueroblogspotcomes201105msp430-cycles-and-instructionshtml

[38] A Bogdanov G Leander C Paar A Poschmann M J BRobshaw and Y Seurin ldquoHash functions and RFID tags mindthe gaprdquo in Cryptographic Hardware and Embedded SystemsmdashHES 2008 vol 5154 of Lecture Notes in Computer Science pp283ndash299 Springer Berlin Germany 2008

[39] S Kamath and J Lindh ldquoMeasuring bluetooth low energypower consumptionrdquo Application Note AN092 Texas Instru-ments Dallas TEx USA 2012 Version SWRA347a httpwwwticomlitanswra347aswra347apdf

International Journal of

AerospaceEngineeringHindawi Publishing Corporationhttpwwwhindawicom Volume 2014

RoboticsJournal of

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Active and Passive Electronic Components

Control Scienceand Engineering

Journal of

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

International Journal of

RotatingMachinery

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Hindawi Publishing Corporation httpwwwhindawicom

Journal ofEngineeringVolume 2014

Submit your manuscripts athttpwwwhindawicom

VLSI Design

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Shock and Vibration

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Civil EngineeringAdvances in

Acoustics and VibrationAdvances in

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Electrical and Computer Engineering

Journal of

Advances inOptoElectronics

Hindawi Publishing Corporation httpwwwhindawicom

Volume 2014

The Scientific World JournalHindawi Publishing Corporation httpwwwhindawicom Volume 2014

SensorsJournal of

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Modelling amp Simulation in EngineeringHindawi Publishing Corporation httpwwwhindawicom Volume 2014

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Chemical EngineeringInternational Journal of Antennas and

Propagation

International Journal of

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Navigation and Observation

International Journal of

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

DistributedSensor Networks

International Journal of

Page 10: Research Article A Cognitive-Radio-Based Method for

10 International Journal of Distributed Sensor Networks

Table 1 Transmission overhead

119897 (bits) Overhead(bits)

Authentication only (CBC-MAC)16 12832 12864 128

Encryption only (CTR)16 8032 9664 128

Authentication and encryption (CCM)16 20832 22464 256

Authentication and encryption (our proposal)16 3232 4864 80

1000

800

600

400

200

05 10 15 20 25 30

Number of nodes (N)

Rece

ptio

n ov

erhe

ad (b

ytes

)

CBC-MAC l = 16 32 64

CTR l = 16

CTR l = 32

CTR l = 64

CCM l = 16

CCM l = 32

CCM l = 64

Ours l = 16

Ours l = 32

Ours l = 64

Figure 7 Reception overhead for a varying number of nodes119873

a nodemust compute119873 hashes and perform119873XORs to sendchannel information and process the reports received from itsneighbors

As per [37] XORoperationwith aMSP430 accounts for 4-5 cyclesbyte Assuming a 128-bit hash function and the worstcase every XOR in our proposals accounts for 5 sdot 16 = 80cycles As previously explained in Section 51 we suggest theuse of a lightweight cryptographic hash function specificallysuited for low-end devices with an output of 128 bits Table 2depicts the number of CPU cycles per block needed [38]for two potential candidates As clearly seen in the tablecomputing one of these hash functions requires only a fewtens of cyclesblock In the following for this analysis we will

Table 2 Cycles per block for different cryptographic hash functions

Algorithm Hash output size Cyclesblock(Stripped) MAME 128 96H-PRESENT-128 128 32

consider the (stripped) MAME hash function as it is a purehash function that does not rely on a symmetric cipher andrequires more CPU cycles (worst case)

Taking into account the previous data Figure 8 showsthe CPU cycles consumed with both our proposal (with aMAME hash function) and standard AES-128 security It canbe clearly seen that our proposal scales much better withthe number of nodes while still providing an appropriatelevel of security We do not provide values for the processtime that is the time needed for key generation encryptiondecryption and data authentication but the number of CPUcycles required to execute each function In this way timevalues can be obtained for a particular sensor node accordingto its CPU features

63 Total Energy Cost Table 3 provides the transmission andreception energy consumption of a TIrsquos CC2540 microcon-troller for different modes and values of transmission powerThe displayed values have been tested under 25∘CWe do nothave values for in-body conditions (asymp38∘C) but we presentthese data for reference purposes In any case this fact onlyaffects the energy consumption for receivingtransmittingNote that the total cost in terms of energy is much highersince it should also account for duty cycles state changes andother parameters [39]

There is no single specific ldquoenergy per CPU cyclerdquo valuesince the cycle consumption depends on the type of CPUoperation Anyway in [34] the authors measured that theTIrsquos MSP430F1611 consumes energy at an average of 072 nJper clock cycle and we have adopted such value in our study

Figure 9 shows the total average energy consumption as afunction of the number of neighboring sensor nodes and thenumber 119897 of bits used to code the channels for the proposedmechanism and standard approaches CCM (authenticationand encryption) CTR (encryption only) and CBC-MAC(authentication only) We have assumed standard receptionand short-range transmission of minus6 dBm (see Table 3)

As clearly denoted in the figure ourmethod only requiresa few tens of 120583J regardless of the number of sensor nodeswhile AES-based security requires higher values of energyranging from 35 120583J to almost 240120583J when encryption andauthentication are provided and for 30 sensor nodes Themore the number of sensor nodes the bigger the improve-ment introduced by our proposal

It must be remarked however that the purpose of thisfigure is to provide reference values to be taken into accountfor future implementations Besides the level of security pro-vided by our method is lower than AES-based methods butstill ismore than adequate given the features of CBSNs (trans-mission rate number of sentmessages etc) and given the factthat the data we are trying to protect are just a limited numberof potential channels to be used for operation of the network

International Journal of Distributed Sensor Networks 11

Table 3 Currentenergy consumption for RXTX tested on TexasInstruments CC2540 EMwith 119879

119860= 25∘Cwith no peripherals active

and low MCU activity at 250 kHz

Test conditions Current EnergybyteRX standard 196mA 588 nJRX high gain 221mA 663 nJTX minus23 dBm 211mA 633 nJTX minus6 dBm 238mA 714 nJTX 0 dBm 27mA 81 nJTX 4 dBm 316mA 948 nJ

5 10 15 20 25 30

Number of nodes (N)

AES l = 16 32 64

Ours l = 16 32 64

300000

250000

200000

150000

100000

50000

0

CPU

cycle

s

Figure 8 Added CPU cycles for a secure exchange of sensing data

Indeed thismechanism introduces some overhead due tospectrum sensing and sharing of channel information and aswe pointed out above the overhead increases linearly withthe number of nodes in the network The synchronizationprotocol adds some overhead too but the increase willstrongly depend on the chosen protocol In [29] someprotocols with high energy efficiency are referenced whichcould be used in our proposal

Despite it we claim that it is definitely worth introducingthis overhead to increase the availability of the network andmake it robust to potential interferences and DoS attacksUnder these undesired situations the current channel usedby the CBSN may become unavailable but the proposedmethod allows the nodes to securely agree on a new channelof operation and rapidly resume their transmissions It mustbe remarked that securing channel availability informationmay prevent or at least diminished the effect of further DoSattacks when switching to a new channel

We do not quantify the benefits of applying our methodin terms of attack mitigation because it strongly depends onthe capabilities of the attacker (time required for sensing eachchannel number of channels that can sense etc) As a futurework it would be interesting to estimate the improvementachieved by our approach in terms of throughput of the

5 10 15 20 25 30

Number of nodes (N)

CBC-MAC l = 16 32 64

CTR l = 16

CTR l = 32

CTR l = 64

CCM l = 16

CCM l = 32

CCM l = 64

Ours l = 16

Ours l = 32

Ours l = 64

250

200

150

100

50

0

Ener

gy co

st (120583

J)Figure 9 Added energy costs for a TIrsquos MSP430F1611 with a TIrsquosCC2540 microcontroller

CBSNs connections and the tradeoff between benefits andoverhead

7 Conclusions

Body sensor networks (BSNs) emerge as an optimal solutionfor ensuring constant and remote monitoring of the healthstatus in patients Recent advances in technology have madeit possible to deploy a network of tiny sensors over the humanbody and even in body which can measure vital signs suchas temperature heart rate or the level of glucose and reportthese data to medical personnel

Guaranteeing the availability of such communicationsis a must as long as connectivity losses during emergencysituations may prevent a patient from immediately receivingmedical assistance and may end up in catastrophic results

A new network paradigm known as cognitive body sen-sor networks (CBSNs) could mitigate this threat by allowingbody sensors to operate in a wide range of frequenciesand adapt its transmission parameters according to highlydynamic environment conditions However this would comeat the expense of implementing cooperative spectrum sensingmechanisms that allow sensors to exchange informationabout channel quality and availability As a consequenceCBSNs might become vulnerable to specific attacks that aretargeted to these mechanisms

In this paper we presented a novel and simple methodto secure the sensing process in a CBSN and improve itsavailability The method relies on cryptographic primitivesthat require a minimum amount of memory and low energyconsumption thus beingmore suited for devices with limitedresources than traditional approaches It offers authentication

12 International Journal of Distributed Sensor Networks

and encryption of control data shared by the sensors in theCBSN to agree on a given channel

Our proposal was analyzed in terms of security and weshowed that although it does not provide the same level ofsecurity as AES-based encryption and authentication it isstill sufficient for low packet rate networks such as CBSNsThe provided results also showed that our method outper-forms existing approaches in terms of transmissionreceptionoverhead and number of CPU cycles needed particularly asthe number of sensor nodes increases For typical microcon-trollers as CC2540 and MSP430 the improvement in energyconsumption clearly justifies the use of the proposed methodagainst AES-based mechanisms in constrained networkssuch as CBSNs in which maximizing the network life isextremely important

Conflict of Interests

The authors declare that there is no conflict of interestsregarding the publication of this paper

Acknowledgment

This work has been partially supported by the spanishgovernment under grant TEC2011-22746 ldquoTAMESISrdquo andby the Ministry of Economy and Competitiveness throughthe projects CO-PRIVACY (TIN2011-27076-C03-02) andSMARTGLACIS (TIN2014-57364-C2-2-R)

References

[1] B Latre B Braem I Moerman C Blondia and P DemeesterldquoA survey on wireless body area networksrdquo Wireless Networksvol 17 no 1 pp 1ndash18 2011

[2] S Movassaghi M Abolhasan J Lipman D Smith and AJamalipour ldquoWireless body area networks a surveyrdquo IEEECommunications Surveys amp Tutorials vol 16 no 3 pp 1658ndash1686 2014

[3] 802156-2012mdashIEEE Standard for Local and metropolitanarea networksmdashPart 156 Wireless Body Area Networks2012 httpstandardsieeeorggetieee802download802156-2012pdf

[4] Bluetooth Low Energy (LE) June 2014 httpwwwbluetoothcomPageslow-energy-tech-infoaspx

[5] The ANT+ Alliance 2014 httpwwwthisisantcom

[6] Wi-Fi Alliance June 2014 httpwwwwi-fiorg

[7] Zigbee Alliance June 2014 httpwwwzigbeeorg

[8] M Rushanan A D Rubin D F Kune and C M SwansonldquoSoK security and privacy in implantable medical devices andbody area networksrdquo in Proceedings of the 35th IEEE Symposiumon Security and Privacy (SP rsquo14) pp 524ndash539 San Jose Calif USA May 2014

[9] I F Akyildiz W-Y Lee M C Vuran and S Mohanty ldquoNeXtgenerationdynamic spectrum accesscognitive radio wirelessnetworks a surveyrdquo Computer Networks vol 50 no 13 pp2127ndash2159 2006

[10] BWang and K J R Liu ldquoAdvances in cognitive radio networksa surveyrdquo IEEE Journal of Selected Topics in Signal Processingvol 5 no 1 pp 5ndash23 2011

[11] Y Xu J Wang Q Wu A Anpalagan and Y-D Yao ldquoOppor-tunistic spectrum access in unknown dynamic environment agame-theoretic stochastic learning solutionrdquo IEEE Transactionson Wireless Communications vol 11 no 4 pp 1380ndash1391 2012

[12] D Cavalcanti S Das J Wang and K Challapali ldquoCognitiveradio based wireless sensor networksrdquo in Proceedings of the17th International Conference on Computer Communicationsand Networks (ICCCN rsquo08) pp 1ndash6 August 2008

[13] O Leon J Hernandez-Serrano andM Soriano ldquoSecuring cog-nitive radio networksrdquo International Journal of CommunicationSystems vol 23 no 5 pp 633ndash652 2010

[14] M Rostami A Juels and F Koushanfar ldquoHeart-to-Heart(H2H) authentication for implanted medical devicesrdquo in Pro-ceedings of the ACM SIGSAC Conference on Computer andCommunications Security (CCS rsquo13) pp 1099ndash1111 ACM BerlinGermany November 2013

[15] K B Rasmussen C Castelluccia T S Heydt-Benjamin andS Capkun ldquoProximity-based access control for implantablemedical devicesrdquo in Proceedings of the 16th ACM Conference onComputer and Communications Security (CCS rsquo09) pp 410ndash419Chicago Ill USA November 2009

[16] L Shi M Li S Yu and J Yuan ldquoBANA body area networkauthentication exploiting channel characteristicsrdquo IEEE Journalon Selected Areas in Communications vol 31 no 9 pp 1803ndash1816 2013

[17] C C Tan S Zhong H Wang and Q Li ldquoBody sensornetwork security an identity-based cryptography approachrdquoin Proceedings of the 1st ACM Conference on Wireless NetworkSecurity (WiSec rsquo08) pp 148ndash153 April 2008

[18] O Garcia-Morchon T Falck T Heer and K Wehrle ldquoSecurityfor pervasive medical sensor networksrdquo in Proceedings of the6th Annual International Conference on Mobile and UbiquitousSystems Networking and Services (MobiQuitous rsquo09) pp 1ndash10Toronto Canada July 2009

[19] G Selimis L Huang F Masse et al ldquoA lightweight securityscheme for wireless body area networks design energy evalu-ation and proposed microprocessor designrdquo Journal of MedicalSystems vol 35 no 5 pp 1289ndash1298 2011

[20] Y Yan and T Shu ldquoEnergy-efficient In-network encryp-tiondecryption for wireless body area sensor networksrdquo inProceedings of the IEEE Global Communications Conference(GLOBECOM rsquo14) pp 2442ndash2447 IEEE Austin Tex USADecember 2014

[21] Y Xu A Anpalagan Q Wu L Shen Z Gao and J WangldquoDecision-theoretic distributed channel selection for oppor-tunistic spectrum access strategies challenges and solutionsrdquoIEEE Communications Surveys and Tutorials vol 15 no 4 pp1689ndash1713 2013

[22] Y Xu J Wang Q Wu A Anpalagan and Y-D Yao ldquoOppor-tunistic spectrum access in cognitive radio networks globaloptimization using local interaction gamesrdquo IEEE Journal onSelected Topics in Signal Processing vol 6 no 2 pp 180ndash1942012

[23] R Chavez-Santiago K E Nolan O Holland et al ldquoCognitiveradio for medical body area networks using ultra widebandrdquoIEEE Wireless Communications vol 19 no 4 pp 74ndash81 2012

International Journal of Distributed Sensor Networks 13

[24] A R Syed and K-L A Yau ldquoOn cognitive radio-based wirelessbody area networks for medical applicationsrdquo in Prceedingsof the 1st IEEE Symposium on Computational Intelligence inHealthcare and e-Health (CICARE rsquo13) pp 51ndash57 SingaporeApril 2013

[25] R Chen J-M Park and K Bian ldquoRobust distributed spectrumsensing in cognitive radio networksrdquo in Proceedings of the 27thIEEE Conference on Computer Communications (INFOCOMrsquo08) pp 1876ndash1884 IEEE Phoenix Ariz USA April 2008

[26] H Rifa-Pous M J Blasco and C Garrigues ldquoReview of robustcooperative spectrum sensing techniques for cognitive radionetworksrdquoWireless Personal Communications vol 67 no 2 pp175ndash198 2012

[27] B Braem B Latre C Blondia I Moerman and P DemeesterldquoAnalyzing and improving reliability in multi-hop body sensornetworksrdquo International Journal on Advances in Internet Tech-nology vol 2 no 1 pp 152ndash161 2009

[28] I F Akyildiz B F Lo and R Balakrishnan ldquoCooperative spec-trum sensing in cognitive radio networks a surveyrdquo PhysicalCommunication vol 4 no 1 pp 40ndash62 2011

[29] B Sundararaman U Buy and A D Kshemkalyani ldquoClocksynchronization for wireless sensor networks a surveyrdquoAdHocNetworks vol 3 no 3 pp 281ndash323 2005

[30] A Bogdanov G Leander C Paar A Poschmann M J BRobshaw and Y Seurin ldquoHash functions and RFID tags mindthe gaprdquo in Cryptographic Hardware and Embedded SystemsmdashCHES 2008 10th International Workshop Washington DCUSA August 10ndash13 2008 Proceedings vol 5154 of Lecture Notesin Computer Science pp 283ndash299 Springer Berlin Germany2008

[31] C Cordeiro K Challapali D Birru and N Sai ShankarldquoIEEE 80222 the first worldwide wireless standard based oncognitive radiosrdquo in Proceedings of the 1st IEEE InternationalSymposium on New Frontiers in Dynamic Spectrum AccessNetworks (DySPAN rsquo05) pp 328ndash337 Baltimore Md USANovember 2005

[32] S UllahHHiggins B Braem et al ldquoA comprehensive survey ofwireless body area networks on PHY MAC and network layerssolutionsrdquo Journal of Medical Systems vol 36 no 3 pp 1065ndash1094 2012

[33] N Sastry and D Wagner ldquoSecurity considerations for IEEE802154 networksrdquo in Proceedings of the ACM Workshop onWireless Security (WiSe rsquo04) pp 32ndash42 Philadelphia Pa USAOctober 2004

[34] M Pajic Z Jiang I LeeO Sokolsky andRMangharam ldquoFromverification to implementation a model translation tool and apacemaker case studyrdquo in Proceedings of the 18th IEEE Real Timeand Embedded Technology and Applications Symposium (RTASrsquo12) pp 173ndash184 Beijing China April 2012

[35] CC2540 24-GHz Bluetooth low energy System-on-Chip 2013httpwwwticomlitdssymlinkcc2540pdf

[36] U Kretzschmar ldquoAES128mdasha C implementation for encryp-tion and decryption MSP430 systems ECCN 5E002 TSPAmdashtechnologysoftware publiclyrdquo Application Report SLAA397ATexas Instruments Dallas Tex USA 2009 httpwwwticomcncnlitanslaa397aslaa397apdf

[37] El Barquero Aqueronte MSP430 Cycles and Instructionsedited by Aqueronte 2011 httpunbarqueroblogspotcomes201105msp430-cycles-and-instructionshtml

[38] A Bogdanov G Leander C Paar A Poschmann M J BRobshaw and Y Seurin ldquoHash functions and RFID tags mindthe gaprdquo in Cryptographic Hardware and Embedded SystemsmdashHES 2008 vol 5154 of Lecture Notes in Computer Science pp283ndash299 Springer Berlin Germany 2008

[39] S Kamath and J Lindh ldquoMeasuring bluetooth low energypower consumptionrdquo Application Note AN092 Texas Instru-ments Dallas TEx USA 2012 Version SWRA347a httpwwwticomlitanswra347aswra347apdf

International Journal of

AerospaceEngineeringHindawi Publishing Corporationhttpwwwhindawicom Volume 2014

RoboticsJournal of

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Active and Passive Electronic Components

Control Scienceand Engineering

Journal of

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

International Journal of

RotatingMachinery

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Hindawi Publishing Corporation httpwwwhindawicom

Journal ofEngineeringVolume 2014

Submit your manuscripts athttpwwwhindawicom

VLSI Design

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Shock and Vibration

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Civil EngineeringAdvances in

Acoustics and VibrationAdvances in

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Electrical and Computer Engineering

Journal of

Advances inOptoElectronics

Hindawi Publishing Corporation httpwwwhindawicom

Volume 2014

The Scientific World JournalHindawi Publishing Corporation httpwwwhindawicom Volume 2014

SensorsJournal of

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Modelling amp Simulation in EngineeringHindawi Publishing Corporation httpwwwhindawicom Volume 2014

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Chemical EngineeringInternational Journal of Antennas and

Propagation

International Journal of

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Navigation and Observation

International Journal of

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

DistributedSensor Networks

International Journal of

Page 11: Research Article A Cognitive-Radio-Based Method for

International Journal of Distributed Sensor Networks 11

Table 3 Currentenergy consumption for RXTX tested on TexasInstruments CC2540 EMwith 119879

119860= 25∘Cwith no peripherals active

and low MCU activity at 250 kHz

Test conditions Current EnergybyteRX standard 196mA 588 nJRX high gain 221mA 663 nJTX minus23 dBm 211mA 633 nJTX minus6 dBm 238mA 714 nJTX 0 dBm 27mA 81 nJTX 4 dBm 316mA 948 nJ

5 10 15 20 25 30

Number of nodes (N)

AES l = 16 32 64

Ours l = 16 32 64

300000

250000

200000

150000

100000

50000

0

CPU

cycle

s

Figure 8 Added CPU cycles for a secure exchange of sensing data

Indeed thismechanism introduces some overhead due tospectrum sensing and sharing of channel information and aswe pointed out above the overhead increases linearly withthe number of nodes in the network The synchronizationprotocol adds some overhead too but the increase willstrongly depend on the chosen protocol In [29] someprotocols with high energy efficiency are referenced whichcould be used in our proposal

Despite it we claim that it is definitely worth introducingthis overhead to increase the availability of the network andmake it robust to potential interferences and DoS attacksUnder these undesired situations the current channel usedby the CBSN may become unavailable but the proposedmethod allows the nodes to securely agree on a new channelof operation and rapidly resume their transmissions It mustbe remarked that securing channel availability informationmay prevent or at least diminished the effect of further DoSattacks when switching to a new channel

We do not quantify the benefits of applying our methodin terms of attack mitigation because it strongly depends onthe capabilities of the attacker (time required for sensing eachchannel number of channels that can sense etc) As a futurework it would be interesting to estimate the improvementachieved by our approach in terms of throughput of the

5 10 15 20 25 30

Number of nodes (N)

CBC-MAC l = 16 32 64

CTR l = 16

CTR l = 32

CTR l = 64

CCM l = 16

CCM l = 32

CCM l = 64

Ours l = 16

Ours l = 32

Ours l = 64

250

200

150

100

50

0

Ener

gy co

st (120583

J)Figure 9 Added energy costs for a TIrsquos MSP430F1611 with a TIrsquosCC2540 microcontroller

CBSNs connections and the tradeoff between benefits andoverhead

7 Conclusions

Body sensor networks (BSNs) emerge as an optimal solutionfor ensuring constant and remote monitoring of the healthstatus in patients Recent advances in technology have madeit possible to deploy a network of tiny sensors over the humanbody and even in body which can measure vital signs suchas temperature heart rate or the level of glucose and reportthese data to medical personnel

Guaranteeing the availability of such communicationsis a must as long as connectivity losses during emergencysituations may prevent a patient from immediately receivingmedical assistance and may end up in catastrophic results

A new network paradigm known as cognitive body sen-sor networks (CBSNs) could mitigate this threat by allowingbody sensors to operate in a wide range of frequenciesand adapt its transmission parameters according to highlydynamic environment conditions However this would comeat the expense of implementing cooperative spectrum sensingmechanisms that allow sensors to exchange informationabout channel quality and availability As a consequenceCBSNs might become vulnerable to specific attacks that aretargeted to these mechanisms

In this paper we presented a novel and simple methodto secure the sensing process in a CBSN and improve itsavailability The method relies on cryptographic primitivesthat require a minimum amount of memory and low energyconsumption thus beingmore suited for devices with limitedresources than traditional approaches It offers authentication

12 International Journal of Distributed Sensor Networks

and encryption of control data shared by the sensors in theCBSN to agree on a given channel

Our proposal was analyzed in terms of security and weshowed that although it does not provide the same level ofsecurity as AES-based encryption and authentication it isstill sufficient for low packet rate networks such as CBSNsThe provided results also showed that our method outper-forms existing approaches in terms of transmissionreceptionoverhead and number of CPU cycles needed particularly asthe number of sensor nodes increases For typical microcon-trollers as CC2540 and MSP430 the improvement in energyconsumption clearly justifies the use of the proposed methodagainst AES-based mechanisms in constrained networkssuch as CBSNs in which maximizing the network life isextremely important

Conflict of Interests

The authors declare that there is no conflict of interestsregarding the publication of this paper

Acknowledgment

This work has been partially supported by the spanishgovernment under grant TEC2011-22746 ldquoTAMESISrdquo andby the Ministry of Economy and Competitiveness throughthe projects CO-PRIVACY (TIN2011-27076-C03-02) andSMARTGLACIS (TIN2014-57364-C2-2-R)

References

[1] B Latre B Braem I Moerman C Blondia and P DemeesterldquoA survey on wireless body area networksrdquo Wireless Networksvol 17 no 1 pp 1ndash18 2011

[2] S Movassaghi M Abolhasan J Lipman D Smith and AJamalipour ldquoWireless body area networks a surveyrdquo IEEECommunications Surveys amp Tutorials vol 16 no 3 pp 1658ndash1686 2014

[3] 802156-2012mdashIEEE Standard for Local and metropolitanarea networksmdashPart 156 Wireless Body Area Networks2012 httpstandardsieeeorggetieee802download802156-2012pdf

[4] Bluetooth Low Energy (LE) June 2014 httpwwwbluetoothcomPageslow-energy-tech-infoaspx

[5] The ANT+ Alliance 2014 httpwwwthisisantcom

[6] Wi-Fi Alliance June 2014 httpwwwwi-fiorg

[7] Zigbee Alliance June 2014 httpwwwzigbeeorg

[8] M Rushanan A D Rubin D F Kune and C M SwansonldquoSoK security and privacy in implantable medical devices andbody area networksrdquo in Proceedings of the 35th IEEE Symposiumon Security and Privacy (SP rsquo14) pp 524ndash539 San Jose Calif USA May 2014

[9] I F Akyildiz W-Y Lee M C Vuran and S Mohanty ldquoNeXtgenerationdynamic spectrum accesscognitive radio wirelessnetworks a surveyrdquo Computer Networks vol 50 no 13 pp2127ndash2159 2006

[10] BWang and K J R Liu ldquoAdvances in cognitive radio networksa surveyrdquo IEEE Journal of Selected Topics in Signal Processingvol 5 no 1 pp 5ndash23 2011

[11] Y Xu J Wang Q Wu A Anpalagan and Y-D Yao ldquoOppor-tunistic spectrum access in unknown dynamic environment agame-theoretic stochastic learning solutionrdquo IEEE Transactionson Wireless Communications vol 11 no 4 pp 1380ndash1391 2012

[12] D Cavalcanti S Das J Wang and K Challapali ldquoCognitiveradio based wireless sensor networksrdquo in Proceedings of the17th International Conference on Computer Communicationsand Networks (ICCCN rsquo08) pp 1ndash6 August 2008

[13] O Leon J Hernandez-Serrano andM Soriano ldquoSecuring cog-nitive radio networksrdquo International Journal of CommunicationSystems vol 23 no 5 pp 633ndash652 2010

[14] M Rostami A Juels and F Koushanfar ldquoHeart-to-Heart(H2H) authentication for implanted medical devicesrdquo in Pro-ceedings of the ACM SIGSAC Conference on Computer andCommunications Security (CCS rsquo13) pp 1099ndash1111 ACM BerlinGermany November 2013

[15] K B Rasmussen C Castelluccia T S Heydt-Benjamin andS Capkun ldquoProximity-based access control for implantablemedical devicesrdquo in Proceedings of the 16th ACM Conference onComputer and Communications Security (CCS rsquo09) pp 410ndash419Chicago Ill USA November 2009

[16] L Shi M Li S Yu and J Yuan ldquoBANA body area networkauthentication exploiting channel characteristicsrdquo IEEE Journalon Selected Areas in Communications vol 31 no 9 pp 1803ndash1816 2013

[17] C C Tan S Zhong H Wang and Q Li ldquoBody sensornetwork security an identity-based cryptography approachrdquoin Proceedings of the 1st ACM Conference on Wireless NetworkSecurity (WiSec rsquo08) pp 148ndash153 April 2008

[18] O Garcia-Morchon T Falck T Heer and K Wehrle ldquoSecurityfor pervasive medical sensor networksrdquo in Proceedings of the6th Annual International Conference on Mobile and UbiquitousSystems Networking and Services (MobiQuitous rsquo09) pp 1ndash10Toronto Canada July 2009

[19] G Selimis L Huang F Masse et al ldquoA lightweight securityscheme for wireless body area networks design energy evalu-ation and proposed microprocessor designrdquo Journal of MedicalSystems vol 35 no 5 pp 1289ndash1298 2011

[20] Y Yan and T Shu ldquoEnergy-efficient In-network encryp-tiondecryption for wireless body area sensor networksrdquo inProceedings of the IEEE Global Communications Conference(GLOBECOM rsquo14) pp 2442ndash2447 IEEE Austin Tex USADecember 2014

[21] Y Xu A Anpalagan Q Wu L Shen Z Gao and J WangldquoDecision-theoretic distributed channel selection for oppor-tunistic spectrum access strategies challenges and solutionsrdquoIEEE Communications Surveys and Tutorials vol 15 no 4 pp1689ndash1713 2013

[22] Y Xu J Wang Q Wu A Anpalagan and Y-D Yao ldquoOppor-tunistic spectrum access in cognitive radio networks globaloptimization using local interaction gamesrdquo IEEE Journal onSelected Topics in Signal Processing vol 6 no 2 pp 180ndash1942012

[23] R Chavez-Santiago K E Nolan O Holland et al ldquoCognitiveradio for medical body area networks using ultra widebandrdquoIEEE Wireless Communications vol 19 no 4 pp 74ndash81 2012

International Journal of Distributed Sensor Networks 13

[24] A R Syed and K-L A Yau ldquoOn cognitive radio-based wirelessbody area networks for medical applicationsrdquo in Prceedingsof the 1st IEEE Symposium on Computational Intelligence inHealthcare and e-Health (CICARE rsquo13) pp 51ndash57 SingaporeApril 2013

[25] R Chen J-M Park and K Bian ldquoRobust distributed spectrumsensing in cognitive radio networksrdquo in Proceedings of the 27thIEEE Conference on Computer Communications (INFOCOMrsquo08) pp 1876ndash1884 IEEE Phoenix Ariz USA April 2008

[26] H Rifa-Pous M J Blasco and C Garrigues ldquoReview of robustcooperative spectrum sensing techniques for cognitive radionetworksrdquoWireless Personal Communications vol 67 no 2 pp175ndash198 2012

[27] B Braem B Latre C Blondia I Moerman and P DemeesterldquoAnalyzing and improving reliability in multi-hop body sensornetworksrdquo International Journal on Advances in Internet Tech-nology vol 2 no 1 pp 152ndash161 2009

[28] I F Akyildiz B F Lo and R Balakrishnan ldquoCooperative spec-trum sensing in cognitive radio networks a surveyrdquo PhysicalCommunication vol 4 no 1 pp 40ndash62 2011

[29] B Sundararaman U Buy and A D Kshemkalyani ldquoClocksynchronization for wireless sensor networks a surveyrdquoAdHocNetworks vol 3 no 3 pp 281ndash323 2005

[30] A Bogdanov G Leander C Paar A Poschmann M J BRobshaw and Y Seurin ldquoHash functions and RFID tags mindthe gaprdquo in Cryptographic Hardware and Embedded SystemsmdashCHES 2008 10th International Workshop Washington DCUSA August 10ndash13 2008 Proceedings vol 5154 of Lecture Notesin Computer Science pp 283ndash299 Springer Berlin Germany2008

[31] C Cordeiro K Challapali D Birru and N Sai ShankarldquoIEEE 80222 the first worldwide wireless standard based oncognitive radiosrdquo in Proceedings of the 1st IEEE InternationalSymposium on New Frontiers in Dynamic Spectrum AccessNetworks (DySPAN rsquo05) pp 328ndash337 Baltimore Md USANovember 2005

[32] S UllahHHiggins B Braem et al ldquoA comprehensive survey ofwireless body area networks on PHY MAC and network layerssolutionsrdquo Journal of Medical Systems vol 36 no 3 pp 1065ndash1094 2012

[33] N Sastry and D Wagner ldquoSecurity considerations for IEEE802154 networksrdquo in Proceedings of the ACM Workshop onWireless Security (WiSe rsquo04) pp 32ndash42 Philadelphia Pa USAOctober 2004

[34] M Pajic Z Jiang I LeeO Sokolsky andRMangharam ldquoFromverification to implementation a model translation tool and apacemaker case studyrdquo in Proceedings of the 18th IEEE Real Timeand Embedded Technology and Applications Symposium (RTASrsquo12) pp 173ndash184 Beijing China April 2012

[35] CC2540 24-GHz Bluetooth low energy System-on-Chip 2013httpwwwticomlitdssymlinkcc2540pdf

[36] U Kretzschmar ldquoAES128mdasha C implementation for encryp-tion and decryption MSP430 systems ECCN 5E002 TSPAmdashtechnologysoftware publiclyrdquo Application Report SLAA397ATexas Instruments Dallas Tex USA 2009 httpwwwticomcncnlitanslaa397aslaa397apdf

[37] El Barquero Aqueronte MSP430 Cycles and Instructionsedited by Aqueronte 2011 httpunbarqueroblogspotcomes201105msp430-cycles-and-instructionshtml

[38] A Bogdanov G Leander C Paar A Poschmann M J BRobshaw and Y Seurin ldquoHash functions and RFID tags mindthe gaprdquo in Cryptographic Hardware and Embedded SystemsmdashHES 2008 vol 5154 of Lecture Notes in Computer Science pp283ndash299 Springer Berlin Germany 2008

[39] S Kamath and J Lindh ldquoMeasuring bluetooth low energypower consumptionrdquo Application Note AN092 Texas Instru-ments Dallas TEx USA 2012 Version SWRA347a httpwwwticomlitanswra347aswra347apdf

International Journal of

AerospaceEngineeringHindawi Publishing Corporationhttpwwwhindawicom Volume 2014

RoboticsJournal of

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Active and Passive Electronic Components

Control Scienceand Engineering

Journal of

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

International Journal of

RotatingMachinery

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Hindawi Publishing Corporation httpwwwhindawicom

Journal ofEngineeringVolume 2014

Submit your manuscripts athttpwwwhindawicom

VLSI Design

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Shock and Vibration

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Civil EngineeringAdvances in

Acoustics and VibrationAdvances in

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Electrical and Computer Engineering

Journal of

Advances inOptoElectronics

Hindawi Publishing Corporation httpwwwhindawicom

Volume 2014

The Scientific World JournalHindawi Publishing Corporation httpwwwhindawicom Volume 2014

SensorsJournal of

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Modelling amp Simulation in EngineeringHindawi Publishing Corporation httpwwwhindawicom Volume 2014

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Chemical EngineeringInternational Journal of Antennas and

Propagation

International Journal of

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Navigation and Observation

International Journal of

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

DistributedSensor Networks

International Journal of

Page 12: Research Article A Cognitive-Radio-Based Method for

12 International Journal of Distributed Sensor Networks

and encryption of control data shared by the sensors in theCBSN to agree on a given channel

Our proposal was analyzed in terms of security and weshowed that although it does not provide the same level ofsecurity as AES-based encryption and authentication it isstill sufficient for low packet rate networks such as CBSNsThe provided results also showed that our method outper-forms existing approaches in terms of transmissionreceptionoverhead and number of CPU cycles needed particularly asthe number of sensor nodes increases For typical microcon-trollers as CC2540 and MSP430 the improvement in energyconsumption clearly justifies the use of the proposed methodagainst AES-based mechanisms in constrained networkssuch as CBSNs in which maximizing the network life isextremely important

Conflict of Interests

The authors declare that there is no conflict of interestsregarding the publication of this paper

Acknowledgment

This work has been partially supported by the spanishgovernment under grant TEC2011-22746 ldquoTAMESISrdquo andby the Ministry of Economy and Competitiveness throughthe projects CO-PRIVACY (TIN2011-27076-C03-02) andSMARTGLACIS (TIN2014-57364-C2-2-R)

References

[1] B Latre B Braem I Moerman C Blondia and P DemeesterldquoA survey on wireless body area networksrdquo Wireless Networksvol 17 no 1 pp 1ndash18 2011

[2] S Movassaghi M Abolhasan J Lipman D Smith and AJamalipour ldquoWireless body area networks a surveyrdquo IEEECommunications Surveys amp Tutorials vol 16 no 3 pp 1658ndash1686 2014

[3] 802156-2012mdashIEEE Standard for Local and metropolitanarea networksmdashPart 156 Wireless Body Area Networks2012 httpstandardsieeeorggetieee802download802156-2012pdf

[4] Bluetooth Low Energy (LE) June 2014 httpwwwbluetoothcomPageslow-energy-tech-infoaspx

[5] The ANT+ Alliance 2014 httpwwwthisisantcom

[6] Wi-Fi Alliance June 2014 httpwwwwi-fiorg

[7] Zigbee Alliance June 2014 httpwwwzigbeeorg

[8] M Rushanan A D Rubin D F Kune and C M SwansonldquoSoK security and privacy in implantable medical devices andbody area networksrdquo in Proceedings of the 35th IEEE Symposiumon Security and Privacy (SP rsquo14) pp 524ndash539 San Jose Calif USA May 2014

[9] I F Akyildiz W-Y Lee M C Vuran and S Mohanty ldquoNeXtgenerationdynamic spectrum accesscognitive radio wirelessnetworks a surveyrdquo Computer Networks vol 50 no 13 pp2127ndash2159 2006

[10] BWang and K J R Liu ldquoAdvances in cognitive radio networksa surveyrdquo IEEE Journal of Selected Topics in Signal Processingvol 5 no 1 pp 5ndash23 2011

[11] Y Xu J Wang Q Wu A Anpalagan and Y-D Yao ldquoOppor-tunistic spectrum access in unknown dynamic environment agame-theoretic stochastic learning solutionrdquo IEEE Transactionson Wireless Communications vol 11 no 4 pp 1380ndash1391 2012

[12] D Cavalcanti S Das J Wang and K Challapali ldquoCognitiveradio based wireless sensor networksrdquo in Proceedings of the17th International Conference on Computer Communicationsand Networks (ICCCN rsquo08) pp 1ndash6 August 2008

[13] O Leon J Hernandez-Serrano andM Soriano ldquoSecuring cog-nitive radio networksrdquo International Journal of CommunicationSystems vol 23 no 5 pp 633ndash652 2010

[14] M Rostami A Juels and F Koushanfar ldquoHeart-to-Heart(H2H) authentication for implanted medical devicesrdquo in Pro-ceedings of the ACM SIGSAC Conference on Computer andCommunications Security (CCS rsquo13) pp 1099ndash1111 ACM BerlinGermany November 2013

[15] K B Rasmussen C Castelluccia T S Heydt-Benjamin andS Capkun ldquoProximity-based access control for implantablemedical devicesrdquo in Proceedings of the 16th ACM Conference onComputer and Communications Security (CCS rsquo09) pp 410ndash419Chicago Ill USA November 2009

[16] L Shi M Li S Yu and J Yuan ldquoBANA body area networkauthentication exploiting channel characteristicsrdquo IEEE Journalon Selected Areas in Communications vol 31 no 9 pp 1803ndash1816 2013

[17] C C Tan S Zhong H Wang and Q Li ldquoBody sensornetwork security an identity-based cryptography approachrdquoin Proceedings of the 1st ACM Conference on Wireless NetworkSecurity (WiSec rsquo08) pp 148ndash153 April 2008

[18] O Garcia-Morchon T Falck T Heer and K Wehrle ldquoSecurityfor pervasive medical sensor networksrdquo in Proceedings of the6th Annual International Conference on Mobile and UbiquitousSystems Networking and Services (MobiQuitous rsquo09) pp 1ndash10Toronto Canada July 2009

[19] G Selimis L Huang F Masse et al ldquoA lightweight securityscheme for wireless body area networks design energy evalu-ation and proposed microprocessor designrdquo Journal of MedicalSystems vol 35 no 5 pp 1289ndash1298 2011

[20] Y Yan and T Shu ldquoEnergy-efficient In-network encryp-tiondecryption for wireless body area sensor networksrdquo inProceedings of the IEEE Global Communications Conference(GLOBECOM rsquo14) pp 2442ndash2447 IEEE Austin Tex USADecember 2014

[21] Y Xu A Anpalagan Q Wu L Shen Z Gao and J WangldquoDecision-theoretic distributed channel selection for oppor-tunistic spectrum access strategies challenges and solutionsrdquoIEEE Communications Surveys and Tutorials vol 15 no 4 pp1689ndash1713 2013

[22] Y Xu J Wang Q Wu A Anpalagan and Y-D Yao ldquoOppor-tunistic spectrum access in cognitive radio networks globaloptimization using local interaction gamesrdquo IEEE Journal onSelected Topics in Signal Processing vol 6 no 2 pp 180ndash1942012

[23] R Chavez-Santiago K E Nolan O Holland et al ldquoCognitiveradio for medical body area networks using ultra widebandrdquoIEEE Wireless Communications vol 19 no 4 pp 74ndash81 2012

International Journal of Distributed Sensor Networks 13

[24] A R Syed and K-L A Yau ldquoOn cognitive radio-based wirelessbody area networks for medical applicationsrdquo in Prceedingsof the 1st IEEE Symposium on Computational Intelligence inHealthcare and e-Health (CICARE rsquo13) pp 51ndash57 SingaporeApril 2013

[25] R Chen J-M Park and K Bian ldquoRobust distributed spectrumsensing in cognitive radio networksrdquo in Proceedings of the 27thIEEE Conference on Computer Communications (INFOCOMrsquo08) pp 1876ndash1884 IEEE Phoenix Ariz USA April 2008

[26] H Rifa-Pous M J Blasco and C Garrigues ldquoReview of robustcooperative spectrum sensing techniques for cognitive radionetworksrdquoWireless Personal Communications vol 67 no 2 pp175ndash198 2012

[27] B Braem B Latre C Blondia I Moerman and P DemeesterldquoAnalyzing and improving reliability in multi-hop body sensornetworksrdquo International Journal on Advances in Internet Tech-nology vol 2 no 1 pp 152ndash161 2009

[28] I F Akyildiz B F Lo and R Balakrishnan ldquoCooperative spec-trum sensing in cognitive radio networks a surveyrdquo PhysicalCommunication vol 4 no 1 pp 40ndash62 2011

[29] B Sundararaman U Buy and A D Kshemkalyani ldquoClocksynchronization for wireless sensor networks a surveyrdquoAdHocNetworks vol 3 no 3 pp 281ndash323 2005

[30] A Bogdanov G Leander C Paar A Poschmann M J BRobshaw and Y Seurin ldquoHash functions and RFID tags mindthe gaprdquo in Cryptographic Hardware and Embedded SystemsmdashCHES 2008 10th International Workshop Washington DCUSA August 10ndash13 2008 Proceedings vol 5154 of Lecture Notesin Computer Science pp 283ndash299 Springer Berlin Germany2008

[31] C Cordeiro K Challapali D Birru and N Sai ShankarldquoIEEE 80222 the first worldwide wireless standard based oncognitive radiosrdquo in Proceedings of the 1st IEEE InternationalSymposium on New Frontiers in Dynamic Spectrum AccessNetworks (DySPAN rsquo05) pp 328ndash337 Baltimore Md USANovember 2005

[32] S UllahHHiggins B Braem et al ldquoA comprehensive survey ofwireless body area networks on PHY MAC and network layerssolutionsrdquo Journal of Medical Systems vol 36 no 3 pp 1065ndash1094 2012

[33] N Sastry and D Wagner ldquoSecurity considerations for IEEE802154 networksrdquo in Proceedings of the ACM Workshop onWireless Security (WiSe rsquo04) pp 32ndash42 Philadelphia Pa USAOctober 2004

[34] M Pajic Z Jiang I LeeO Sokolsky andRMangharam ldquoFromverification to implementation a model translation tool and apacemaker case studyrdquo in Proceedings of the 18th IEEE Real Timeand Embedded Technology and Applications Symposium (RTASrsquo12) pp 173ndash184 Beijing China April 2012

[35] CC2540 24-GHz Bluetooth low energy System-on-Chip 2013httpwwwticomlitdssymlinkcc2540pdf

[36] U Kretzschmar ldquoAES128mdasha C implementation for encryp-tion and decryption MSP430 systems ECCN 5E002 TSPAmdashtechnologysoftware publiclyrdquo Application Report SLAA397ATexas Instruments Dallas Tex USA 2009 httpwwwticomcncnlitanslaa397aslaa397apdf

[37] El Barquero Aqueronte MSP430 Cycles and Instructionsedited by Aqueronte 2011 httpunbarqueroblogspotcomes201105msp430-cycles-and-instructionshtml

[38] A Bogdanov G Leander C Paar A Poschmann M J BRobshaw and Y Seurin ldquoHash functions and RFID tags mindthe gaprdquo in Cryptographic Hardware and Embedded SystemsmdashHES 2008 vol 5154 of Lecture Notes in Computer Science pp283ndash299 Springer Berlin Germany 2008

[39] S Kamath and J Lindh ldquoMeasuring bluetooth low energypower consumptionrdquo Application Note AN092 Texas Instru-ments Dallas TEx USA 2012 Version SWRA347a httpwwwticomlitanswra347aswra347apdf

International Journal of

AerospaceEngineeringHindawi Publishing Corporationhttpwwwhindawicom Volume 2014

RoboticsJournal of

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Active and Passive Electronic Components

Control Scienceand Engineering

Journal of

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

International Journal of

RotatingMachinery

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Hindawi Publishing Corporation httpwwwhindawicom

Journal ofEngineeringVolume 2014

Submit your manuscripts athttpwwwhindawicom

VLSI Design

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Shock and Vibration

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Civil EngineeringAdvances in

Acoustics and VibrationAdvances in

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Electrical and Computer Engineering

Journal of

Advances inOptoElectronics

Hindawi Publishing Corporation httpwwwhindawicom

Volume 2014

The Scientific World JournalHindawi Publishing Corporation httpwwwhindawicom Volume 2014

SensorsJournal of

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Modelling amp Simulation in EngineeringHindawi Publishing Corporation httpwwwhindawicom Volume 2014

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Chemical EngineeringInternational Journal of Antennas and

Propagation

International Journal of

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Navigation and Observation

International Journal of

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

DistributedSensor Networks

International Journal of

Page 13: Research Article A Cognitive-Radio-Based Method for

International Journal of Distributed Sensor Networks 13

[24] A R Syed and K-L A Yau ldquoOn cognitive radio-based wirelessbody area networks for medical applicationsrdquo in Prceedingsof the 1st IEEE Symposium on Computational Intelligence inHealthcare and e-Health (CICARE rsquo13) pp 51ndash57 SingaporeApril 2013

[25] R Chen J-M Park and K Bian ldquoRobust distributed spectrumsensing in cognitive radio networksrdquo in Proceedings of the 27thIEEE Conference on Computer Communications (INFOCOMrsquo08) pp 1876ndash1884 IEEE Phoenix Ariz USA April 2008

[26] H Rifa-Pous M J Blasco and C Garrigues ldquoReview of robustcooperative spectrum sensing techniques for cognitive radionetworksrdquoWireless Personal Communications vol 67 no 2 pp175ndash198 2012

[27] B Braem B Latre C Blondia I Moerman and P DemeesterldquoAnalyzing and improving reliability in multi-hop body sensornetworksrdquo International Journal on Advances in Internet Tech-nology vol 2 no 1 pp 152ndash161 2009

[28] I F Akyildiz B F Lo and R Balakrishnan ldquoCooperative spec-trum sensing in cognitive radio networks a surveyrdquo PhysicalCommunication vol 4 no 1 pp 40ndash62 2011

[29] B Sundararaman U Buy and A D Kshemkalyani ldquoClocksynchronization for wireless sensor networks a surveyrdquoAdHocNetworks vol 3 no 3 pp 281ndash323 2005

[30] A Bogdanov G Leander C Paar A Poschmann M J BRobshaw and Y Seurin ldquoHash functions and RFID tags mindthe gaprdquo in Cryptographic Hardware and Embedded SystemsmdashCHES 2008 10th International Workshop Washington DCUSA August 10ndash13 2008 Proceedings vol 5154 of Lecture Notesin Computer Science pp 283ndash299 Springer Berlin Germany2008

[31] C Cordeiro K Challapali D Birru and N Sai ShankarldquoIEEE 80222 the first worldwide wireless standard based oncognitive radiosrdquo in Proceedings of the 1st IEEE InternationalSymposium on New Frontiers in Dynamic Spectrum AccessNetworks (DySPAN rsquo05) pp 328ndash337 Baltimore Md USANovember 2005

[32] S UllahHHiggins B Braem et al ldquoA comprehensive survey ofwireless body area networks on PHY MAC and network layerssolutionsrdquo Journal of Medical Systems vol 36 no 3 pp 1065ndash1094 2012

[33] N Sastry and D Wagner ldquoSecurity considerations for IEEE802154 networksrdquo in Proceedings of the ACM Workshop onWireless Security (WiSe rsquo04) pp 32ndash42 Philadelphia Pa USAOctober 2004

[34] M Pajic Z Jiang I LeeO Sokolsky andRMangharam ldquoFromverification to implementation a model translation tool and apacemaker case studyrdquo in Proceedings of the 18th IEEE Real Timeand Embedded Technology and Applications Symposium (RTASrsquo12) pp 173ndash184 Beijing China April 2012

[35] CC2540 24-GHz Bluetooth low energy System-on-Chip 2013httpwwwticomlitdssymlinkcc2540pdf

[36] U Kretzschmar ldquoAES128mdasha C implementation for encryp-tion and decryption MSP430 systems ECCN 5E002 TSPAmdashtechnologysoftware publiclyrdquo Application Report SLAA397ATexas Instruments Dallas Tex USA 2009 httpwwwticomcncnlitanslaa397aslaa397apdf

[37] El Barquero Aqueronte MSP430 Cycles and Instructionsedited by Aqueronte 2011 httpunbarqueroblogspotcomes201105msp430-cycles-and-instructionshtml

[38] A Bogdanov G Leander C Paar A Poschmann M J BRobshaw and Y Seurin ldquoHash functions and RFID tags mindthe gaprdquo in Cryptographic Hardware and Embedded SystemsmdashHES 2008 vol 5154 of Lecture Notes in Computer Science pp283ndash299 Springer Berlin Germany 2008

[39] S Kamath and J Lindh ldquoMeasuring bluetooth low energypower consumptionrdquo Application Note AN092 Texas Instru-ments Dallas TEx USA 2012 Version SWRA347a httpwwwticomlitanswra347aswra347apdf

International Journal of

AerospaceEngineeringHindawi Publishing Corporationhttpwwwhindawicom Volume 2014

RoboticsJournal of

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Active and Passive Electronic Components

Control Scienceand Engineering

Journal of

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

International Journal of

RotatingMachinery

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Hindawi Publishing Corporation httpwwwhindawicom

Journal ofEngineeringVolume 2014

Submit your manuscripts athttpwwwhindawicom

VLSI Design

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Shock and Vibration

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Civil EngineeringAdvances in

Acoustics and VibrationAdvances in

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Electrical and Computer Engineering

Journal of

Advances inOptoElectronics

Hindawi Publishing Corporation httpwwwhindawicom

Volume 2014

The Scientific World JournalHindawi Publishing Corporation httpwwwhindawicom Volume 2014

SensorsJournal of

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Modelling amp Simulation in EngineeringHindawi Publishing Corporation httpwwwhindawicom Volume 2014

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Chemical EngineeringInternational Journal of Antennas and

Propagation

International Journal of

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Navigation and Observation

International Journal of

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

DistributedSensor Networks

International Journal of

Page 14: Research Article A Cognitive-Radio-Based Method for

International Journal of

AerospaceEngineeringHindawi Publishing Corporationhttpwwwhindawicom Volume 2014

RoboticsJournal of

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Active and Passive Electronic Components

Control Scienceand Engineering

Journal of

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

International Journal of

RotatingMachinery

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Hindawi Publishing Corporation httpwwwhindawicom

Journal ofEngineeringVolume 2014

Submit your manuscripts athttpwwwhindawicom

VLSI Design

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Shock and Vibration

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Civil EngineeringAdvances in

Acoustics and VibrationAdvances in

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Electrical and Computer Engineering

Journal of

Advances inOptoElectronics

Hindawi Publishing Corporation httpwwwhindawicom

Volume 2014

The Scientific World JournalHindawi Publishing Corporation httpwwwhindawicom Volume 2014

SensorsJournal of

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Modelling amp Simulation in EngineeringHindawi Publishing Corporation httpwwwhindawicom Volume 2014

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Chemical EngineeringInternational Journal of Antennas and

Propagation

International Journal of

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Navigation and Observation

International Journal of

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

DistributedSensor Networks

International Journal of