{"title":"基于心电的嵌入式设备唯一身份识别","authors":"L. Adnan, H. Hashim","doi":"10.1109/ISCAIE.2017.8074973","DOIUrl":null,"url":null,"abstract":"In the last decade, sensor nodes have been widely deployed in many application, owing to the their simple attributes and installation process. However, the sensors nodes are vulnerable to many potential threats such as node cloning and identity attack. The threats become more significant when the nodes are used in applications such as biomedical and e-Health applications where trust, privacy and security are of a major concern. In trusted systems, identity plays an important role in completing the chain of trust. One of the potential attacks on wireless sensor nodes is identity attack namely replication attack where one or more nodes illegitimately claim the identity (ID) of a legitimate node and replicate itself throughout wireless sensor network (WSN). Deployment of high security solutions leads to implementation challenges such overcoming the resource constraints that exist in sensor nodes and the need for arbitration by trusted third parties. This study explores the feasibility of using the human electrocardiogram (ECG) characteristics in generating the identity of the sensor node platform thus eliminating the need to store the identity on the node itself. An identity generation algorithm is derived from features extraction and reduction signal to cope with the constraint of the sensor node platform and provide the main solution to the above mentioned issues.","PeriodicalId":298950,"journal":{"name":"2017 IEEE Symposium on Computer Applications & Industrial Electronics (ISCAIE)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2017-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"ECG based unique identity for embedded devices\",\"authors\":\"L. Adnan, H. Hashim\",\"doi\":\"10.1109/ISCAIE.2017.8074973\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"In the last decade, sensor nodes have been widely deployed in many application, owing to the their simple attributes and installation process. However, the sensors nodes are vulnerable to many potential threats such as node cloning and identity attack. The threats become more significant when the nodes are used in applications such as biomedical and e-Health applications where trust, privacy and security are of a major concern. In trusted systems, identity plays an important role in completing the chain of trust. One of the potential attacks on wireless sensor nodes is identity attack namely replication attack where one or more nodes illegitimately claim the identity (ID) of a legitimate node and replicate itself throughout wireless sensor network (WSN). Deployment of high security solutions leads to implementation challenges such overcoming the resource constraints that exist in sensor nodes and the need for arbitration by trusted third parties. This study explores the feasibility of using the human electrocardiogram (ECG) characteristics in generating the identity of the sensor node platform thus eliminating the need to store the identity on the node itself. An identity generation algorithm is derived from features extraction and reduction signal to cope with the constraint of the sensor node platform and provide the main solution to the above mentioned issues.\",\"PeriodicalId\":298950,\"journal\":{\"name\":\"2017 IEEE Symposium on Computer Applications & Industrial Electronics (ISCAIE)\",\"volume\":\"1 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2017-04-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2017 IEEE Symposium on Computer Applications & Industrial Electronics (ISCAIE)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ISCAIE.2017.8074973\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2017 IEEE Symposium on Computer Applications & Industrial Electronics (ISCAIE)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ISCAIE.2017.8074973","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
In the last decade, sensor nodes have been widely deployed in many application, owing to the their simple attributes and installation process. However, the sensors nodes are vulnerable to many potential threats such as node cloning and identity attack. The threats become more significant when the nodes are used in applications such as biomedical and e-Health applications where trust, privacy and security are of a major concern. In trusted systems, identity plays an important role in completing the chain of trust. One of the potential attacks on wireless sensor nodes is identity attack namely replication attack where one or more nodes illegitimately claim the identity (ID) of a legitimate node and replicate itself throughout wireless sensor network (WSN). Deployment of high security solutions leads to implementation challenges such overcoming the resource constraints that exist in sensor nodes and the need for arbitration by trusted third parties. This study explores the feasibility of using the human electrocardiogram (ECG) characteristics in generating the identity of the sensor node platform thus eliminating the need to store the identity on the node itself. An identity generation algorithm is derived from features extraction and reduction signal to cope with the constraint of the sensor node platform and provide the main solution to the above mentioned issues.