Biometric behavior authentication exploiting propagation characteristics of wireless channel

Zhao, N., Ren, A., Ur Rehman, M. , Zhang, Z., Yang, X. and Hu, F. (2016) Biometric behavior authentication exploiting propagation characteristics of wireless channel. IEEE Access, 4, pp. 4789-4796. (doi: 10.1109/ACCESS.2016.2602286)

201377.pdf - Published Version



Massive expansion of wireless body area networks (WBANs) in the field of health monitoring applications has given rise to the generation of huge amount of biomedical data. Ensuring privacy and security of this very personal data serves as a major hurdle in the development of these systems. An effective and energy friendly authentication algorithm is, therefore, a necessary requirement for current WBANs. Conventional authentication algorithms are often implemented on higher levels of the Open System Interconnection model and require advanced software or major hardware upgradation. This paper investigates the implementation of a physical layer security algorithm as an alternative. The algorithm is based on the behavior fingerprint developed using the wireless channel characteristics. The usability of the algorithm is established through experimental results, which show that this authentication method is not only effective, but also very suitable for the energy-, resource-, and interface-limited WBAN medical applications.

Item Type:Articles
Additional Information:This work was supported in part by the National Natural Science Foundation of China under Grant 61671349, in part by the Fundamental Research Funds for the Central Universities, in part by the China Postdoctoral Science Foundation, and in part by the Postdoctoral Research Projects Funded in Shaanxi Province.
Glasgow Author(s) Enlighten ID:Ur Rehman, Dr Masood
Authors: Zhao, N., Ren, A., Ur Rehman, M., Zhang, Z., Yang, X., and Hu, F.
College/School:College of Science and Engineering > School of Engineering
Journal Name:IEEE Access
ISSN (Online):2169-3536
Published Online:24 August 2016
Copyright Holders:Copyright © 2016 IEEE
First Published:First published in IEEE Access 4:4789-4796
Publisher Policy:Reproduced in accordance with the publisher copyright policy

University Staff: Request a correction | Enlighten Editors: Update this record