Adaptive security and privacy for mHealth sensing
Shrirang Mare1, Jacob Sorber1, Minho Shin2, Cory Cornelius1, and David Kotz1
1 Dartmouth College, USA 2 Myongi University, South Korea
Adaptive security and privacy for mHealth sensing Shrirang Mare 1 , - - PowerPoint PPT Presentation
Adaptive security and privacy for mHealth sensing Shrirang Mare 1 , Jacob Sorber 1 , Minho Shin 2 , Cory Cornelius 1 , and David Kotz 1 1 Dartmouth College, USA 2 Myongi University, South Korea Source: Javanov et. al., Stress Monitoring Using a
Shrirang Mare1, Jacob Sorber1, Minho Shin2, Cory Cornelius1, and David Kotz1
1 Dartmouth College, USA 2 Myongi University, South Korea
Source: Javanov et. al., Stress Monitoring Using a Distributed Wireless Intelligent Sensor System,
Source: Javanov et. al., Stress Monitoring Using a Distributed Wireless Intelligent Sensor System,
Source: Javanov et. al., Stress Monitoring Using a Distributed Wireless Intelligent Sensor System,
Source: Javanov et. al., Stress Monitoring Using a Distributed Wireless Intelligent Sensor System,
0xa170c3 Encrypted Data 0xa21b3d
Mobile Node
Fixed address a1:70:c3
MAC Payload Header
Sensor Node
0xa170c3 Encrypted Data 0xa21b3d
Mobile Node
Fixed address a1:70:c3
MAC Payload Header
0xa170c3 Encrypted Data 0x001e72
Sensor Node
0x7a0d1e Encrypted Data 0xa21b3d
Mobile Node
Address pool 7a:0d:1e 47:c2:23 17:dc:b2
MAC Payload Header
Sensor Node
0x7a0d1e Encrypted Data 0xa21b3d
Mobile Node
Address pool 7a:0d:1e 47:c2:23 17:dc:b2
MAC Payload Header
0x17dcb2 Encrypted Data 0x001e72
Sensor Node
Payload
16 bytes 4-16 bytes
Header MAC
Header MAC
1000+ bytes
Payload
16 bytes 4-16 bytes
Header MAC Payload
Header MAC
1000+ bytes
~10-50 bytes
Payload
16 bytes 4-16 bytes
Header MAC Payload
Header MAC
1000+ bytes
~10-50 bytes
Payload
16 bytes 4-16 bytes
Header MAC Payload
Header MAC
1000+ bytes
~10-50 bytes
Adversary
Overhead
Adversary
Overhead
Adversary
Overhead
Adversary
Payload
Header MAC
Payload
Header MAC
0x7a0da1 Encrypted Data 0xa21b3d
Header MAC
0x7a0da1 Encrypted Data 0xa21b3d
Header MAC
0x7a0da1 Encrypted Data 0xa21b3d
Header MAC
0x7a0da1 Encrypted Data 0xa21b3d
0xa962b2 Encrypted Data 0xd7c012
Header MAC
0x7a0da1 Encrypted Data 0xa21b3d
0xa962b2 Encrypted Data 0xd7c012
Header MAC
0x7a0da1 Encrypted Data 0xa21b3d
0xa962b2 Encrypted Data 0xd7c012
0xa962c3 Encrypted Data 0xd7c012
Header MAC
0x7a0da1 Encrypted Data 0xa21b3d
0xa962b2 Encrypted Data 0xd7c012
0xa962c3 Encrypted Data 0xd7c012
Header MAC
0x7a0da1 Encrypted Data 0xa21b3d
0xa962b2 Encrypted Data 0xd7c012
0xa962c3 Encrypted Data 0xd7c012
Header MAC
Header Encrypted Data MAC
l
2l
= 1 − (1 − 1
2l )x
< 2−δ
2l
= 1 − (1 − 1
2l )x
log(1− 1
2l )
< 2−δ
2l
= 1 − (1 − 1
2l )x
Pr(succ. forgery) < 2−δ
500 1000 1500 2000 2500 20 40 60 80
Time (s) Security Bits Attack
MN SN
50 100 150 200 250 300 50 100 150 200 250 300 Work done by an adversary (lg scale) Bit−level security of protocol Adaptive protocol
Shrirang Mare1, Jacob Sorber1, Minho Shin2, Cory Cornelius1, and David Kotz1
1 Dartmouth College, USA 2 Myongi University, South Korea