device, but provide no experimental results. A
wearable health-monitoring device using a Personal
Area Network (PAN) or Body Area Network (BAN)
can be integrated into a user’s clothing (Park and
Jayaraman, 2003), like Foster-Miller’s health
monitoring garment for soldiers. Along these lines,
Paradiso (Paradiso, 2003) describes preliminary work
on the WEALTHY system, a garment with embedded
ECG sensors for continuous monitoring of the heart.
Jovanov et al present in (Jovanov et al., 2005) a
wireless BAN with motion sensors for computer-
assisted physical rehabilitation and ambulatory
monitoring. In (Kemp et al., 2008), Kamp et al
develop a wearable system for manned bomb disposal
missions. Mihovska and Prasad (Mihovska and
Prasad, 2007) have developed an adaptive security
architecture for personal networks with an
asymmetric key agreement scheme on three levels by
using contextual information, such as the location of
the user and the capability of the devices. This
architecture is based on an elliptic curve
cryptosystem. It has, however, one shortcoming. It is
susceptible to impersonation via key compromise.
A global notice about these approaches shows that
traditional communication protocols are used to
transmit the collected data from the human body to an
external system (e.g., cellphone, laptop).
Unfortunately, this does not guarantee a real-time
transmission of this information since an important
variable delay can occur, especially when some
sensors transmit large units of data such as images.
Moreover, due to the use of radio communication, the
confidentiality of the transmitted data is not
intrinsically guaranteed, which may lead to privacy
violation. In several applications, including
healthcare, even the identity of the wearer should be
hidden.
3 PROPOSED WISSN
ARCHITECTURE
In this paper, we address two crucial issues regarding
wearable sensor systems:
•Improving Real-time Responsiveness: This is
achieved by building special communication frame
structures based on the non-uniform multiplexing of
the data generated by different types of sensors
•Combining Sensor Authentication and user
anonymity through the use of lightweight
cryptographic protocols: In order to adapt to the
severe resource limitations characterizing WISSNs,
we use an elliptic curve implementation of the
proposed security functions
In spite of its apparent simplicity, WISSNs exhibit
several complex features and therefore require
sophisticated engineering approaches in order to be
set up. In the following, we list the most relevant
factors that may shape the communication models
used in smart sensor networks.
1. Multi-functional framework: A sensor node
may be able to carry out multiple functions that can
be set on/off depending on the situation. Obviously,
the communication requirements may differ greatly
from one functionality to another according to the
data sent across the WISSN. For instance, when the
network is deployed in a mining structure, a first
category of sensor may be used to monitor the amount
of several toxic gases in the atmosphere. A second
type of sensor can serve to estimate the opacity of the
encountered obstacles. IRM sensors can be used in
such a context in order to predict, and possibly
prevent, disasters. Since the volume of data generated
by the latter category is by far greater than that
generated by the former, much more bandwidth must
be reserved to transmit image data.
2. Independent monitoring capability: Due to the
non-uniform nature of the monitored events
(irrespective of the application), some sensors may
exhaust their energy more rapidly than others. This
may result in the presence of uncovered regions
where the nodes in charge of gathering data related to
the environment are out of power. Since such a
situation significantly affects the efficiency of the
WISSN, solutions should be proposed to avoid it. One
alternative is to tune the quality of the data gathered
by a sensor node according to its residual energy
resources. This would extend considerably the
lifetime of this node at the cost of losing some refined
data, which is definitely better than totally losing the
functionalities provided by the node. As a result the
communication resources required to transmit the
data may vary from one sensor to another.
3. Exportable configuration: Configurations can
be exported from one sensor to another in order to
turn on/off several functionalities. Even though this
feature allows energy to be saved (by triggering
power-consuming time only when necessary), it
creates a significant security hole since node
imposture can be easily carried out. Hence,
authentication mechanisms should be set up to
prevent non-authorized nodes from manipulating the
WISSN. Two important issues must be taken into
consideration: First, the security algorithms must be
based on non-complex algorithms and use small
cryptographic credentials (to adapt to limited CPU
time and memory resources) and; Second For a wide
range of applications, the anonymity of the person
holding the wearable or implantable smart sensor
system should be preserved. Since this conflicts with
authentication, specific security infrastructures will
SECURE WEARABLE AND IMPLANTABLE BODY SENSOR NETWORKS IN HAZARDOUS ENVIRONMENTS
87