A Secure Patient Monitoring Solution Using Wireless Sensor Networks
Total Page:16
File Type:pdf, Size:1020Kb
A Secure Patient Monitoring Solution using Wireless Sensor Networks Submitted by Avijit Mathur For the award of Doctor of Philosophy Supervised by Dr. Thomas Newe Department of Electronic and Computer Engineering Submitted to the University of Limerick October 2017 Declaration This thesis is written to meet the requirements for the degree of Doctorate of Philosophy. It is entirely my own work and has not been submitted to any other university or higher institution. Where the work of other people has been used, it has been fully referenced and acknowledged. Signed ____________________________________ Avijit Mathur i Contents 1 INTRODUCTION 1 RESEARCH OBJECTIVES ................................................................................................... 3 RESEARCH METHODOLOGY.............................................................................................. 4 NOVELTY OF RESEARCH .................................................................................................. 5 STRUCTURE OF THESIS ..................................................................................................... 5 RESULTING PUBLICATIONS............................................................................................... 6 SUMMARY ....................................................................................................................... 6 2 SENSOR NETWORKS BACKGROUND AND OVERVIEW 9 WIRELESS SENSOR NETWORKS ......................................................................................... 9 2.1.1 Existing healthcare Systems ..................................................................................10 2.1.2 Applications .........................................................................................................12 2.1.3 Protocols...............................................................................................................14 2.1.4 Platforms ..............................................................................................................24 2.1.5 Operating Systems ................................................................................................27 SUMMARY ......................................................................................................................33 3 SAS: SYSTEM AND SECURITY 35 SYSTEM OVERVIEW ........................................................................................................35 3.1.1 Security Protocols .................................................................................................37 3.1.2 Communication Protocols .....................................................................................39 SECURITY OVERVIEW .....................................................................................................42 3.2.1 Security Services ..................................................................................................42 3.2.2 Security Attacks ....................................................................................................43 3.2.3 Physical Security ..................................................................................................44 3.2.4 Link Layer Security ..............................................................................................45 3.2.5 Routing Security ...................................................................................................46 3.2.6 Internet Security ...................................................................................................48 SUMMARY ......................................................................................................................50 4 SECURE ROUTING 51 CURRENT SOLUTIONS .....................................................................................................52 EXPERIMENTAL SET-UP ...................................................................................................54 4.2.1 Routing .................................................................................................................55 4.2.2 Black-hole attack and consequences ......................................................................56 4.2.3 Black-hole Countermeasure ..................................................................................57 4.2.4 Selective Forwarding attack and consequences ......................................................59 4.2.5 Selective Forwarding Countermeasure...................................................................59 4.2.6 Packet Gathering ...................................................................................................63 4.2.7 BS Analysis ..........................................................................................................64 iii DETAILS ON PROTOCOL MODIFICATIONS......................................................................... 66 RESULTS ........................................................................................................................ 66 4.4.1 Latency: Network ................................................................................................. 67 4.4.2 Accuracy .............................................................................................................. 68 4.4.3 Power consumption: Tmote Sky (Cooja) ............................................................... 71 4.4.4 Current consumption: Openmote .......................................................................... 73 SECURITY IMPLEMENTED ............................................................................................... 75 SUMMARY ..................................................................................................................... 76 5 SYSTEM KEY MANAGEMENT 77 CURRENT SOLUTIONS ..................................................................................................... 79 PREREQUISITES FOR SYSTEM KEY MANAGEMENT ........................................................... 81 5.2.1 Platform: Openmote ............................................................................................. 81 5.2.2 Platform: Intel Edison ........................................................................................... 81 5.2.3 Platform: PC ........................................................................................................ 81 5.2.4 Platform: Mosquitto Broker (via Internet) ............................................................. 82 5.2.5 System Work-flow ............................................................................................... 82 KEY MANAGEMENT ........................................................................................................ 84 5.3.1 Key Updates ......................................................................................................... 85 5.3.2 Results ................................................................................................................. 87 PSEUDO RANDOM NUMBER GENERATOR SEEDING (PRNGS) ........................................... 88 SUMMARY ..................................................................................................................... 91 6 CLUSTER ELECTIONS 93 CURRENT SOLUTIONS ..................................................................................................... 94 ARCHITECTURE .............................................................................................................. 95 6.2.1 Platform and OS ................................................................................................... 96 EXPERIMENTAL SET-UP .................................................................................................. 97 6.3.1 Cluster Security .................................................................................................... 98 6.3.2 Results ................................................................................................................. 99 SUMMARY ................................................................................................................... 107 7 CONCLUSION 109 SYSTEM IMPLEMENTATION ........................................................................................... 110 SIMULATION VS HARDWARE ........................................................................................ 112 7.2.1 Secure Routing ................................................................................................... 113 7.2.2 Cluster Elections ................................................................................................ 114 CONTRIBUTIONS .......................................................................................................... 116 FUTURE WORK ............................................................................................................ 117 A PUBLICATIONS 119 B PROGRAMMING CODE (HIGHLIGHTS) 121 iv B.1 LINUX-PC APPLICATION (MAIN FUNCTION).................................................................... 121 B.2 EDISON BOARD (SAMPLE SERIAL DATA) ....................................................................... 122 B.3 CLUSTERSCHEME.H (SENSOR NODES) ............................................................................ 123 B.4 KEYS.H (ROUTER NODES).............................................................................................. 125 BIBLIOGRAPHY 127 v List of Figures FIGURE 2.1: OVERVIEW OF A WIRELESS SENSOR NETWORK SYSTEM IN HEALTHCARE ..........................10 FIGURE 2.2: SENSORS USED FOR MEDICAL APPLICATION OF WIRELESS