{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,17]],"date-time":"2025-12-17T08:31:08Z","timestamp":1765960268198,"version":"3.37.3"},"reference-count":32,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2023,6,6]],"date-time":"2023-06-06T00:00:00Z","timestamp":1686009600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"},{"start":{"date-parts":[[2023,6,6]],"date-time":"2023-06-06T00:00:00Z","timestamp":1686009600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"}],"funder":[{"name":"Manipal Academy of Higher Education, Manipal"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Int J Wireless Inf Networks"],"published-print":{"date-parts":[[2023,9]]},"abstract":"<jats:title>Abstract<\/jats:title><jats:p>In wireless body area network health care applications, energy-constraint wearable devices are used to monitor patient physiological parameters. The security of the private health information of a person plays a significant role because if it is captured and read by an unauthorized person, the confidentiality of the patient data is lost. Therefore, there is a requirement to secure the data by performing encryption to transfer it into an unreadable form. Since the resources used for encryption should be kept to a minimum as the devices are attached to the human body, a lightweight encryption algorithm has to be used. Therefore, the generation of a unique key used for encryption plays a significant role. In work, generating a unique key uses the ECG values taken from MIT-BIH Arrhythmia database. Four unique keys are generated, which can be used for encryption. The uniqueness and randomness of the keys generated are proved using the runs test and frequency test within the block. Also, the average hamming distance calculated between the ECG keys generated from two different ECG signals is 62.5% (<jats:inline-formula><jats:alternatives><jats:tex-math>$$\\approx$$<\/jats:tex-math><mml:math xmlns:mml=\"http:\/\/www.w3.org\/1998\/Math\/MathML\">\n                  <mml:mo>\u2248<\/mml:mo>\n                <\/mml:math><\/jats:alternatives><\/jats:inline-formula> 80 bits), which proves the distinctiveness of the keys generated. Implementation of the work is performed using Matlab.<\/jats:p>","DOI":"10.1007\/s10776-023-00597-8","type":"journal-article","created":{"date-parts":[[2023,6,6]],"date-time":"2023-06-06T17:47:59Z","timestamp":1686073679000},"page":"270-281","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":5,"title":["Efficient Key Generation Techniques for Wireless Body Area Network"],"prefix":"10.1007","volume":"30","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-1353-5891","authenticated-orcid":false,"given":"S.","family":"Divya","sequence":"first","affiliation":[]},{"given":"K. V.","family":"Prema","sequence":"additional","affiliation":[]},{"given":"Balachandra","family":"Muniyal","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,6,6]]},"reference":[{"key":"597_CR1","doi-asserted-by":"publisher","first-page":"238","DOI":"10.1016\/j.compeleceng.2017.02.011","volume":"61","author":"X Li","year":"2017","unstructured":"X. Li, J. Peng, S. Kumari, F. Wu, M. Karuppiah, K. K. R. Choo, An enhanced 1-round authentication protocol for wireless body area networks with user anonymity. Computers and Electrical Engineering, Vol. 61, pp. 238\u2013249, 2017.","journal-title":"Computers and Electrical Engineering"},{"key":"597_CR2","doi-asserted-by":"publisher","first-page":"199","DOI":"10.1109\/SmartCloud49737.2020.00045","volume-title":"2020 IEEE International Conference on Smart Cloud (SmartCloud)","author":"X Wu","year":"2020","unstructured":"X. Wu, J. Xu, W. Huang, W. Jian, A new mutual authentication and key agreement protocol in wireless body area network. in 2020 IEEE International Conference on Smart Cloud (SmartCloud), IEEE, pp. 199\u2013203, 2020."},{"key":"597_CR3","first-page":"17","volume-title":"Autonomous Sensor Networks","author":"S Gonz\u00e1lez-Valenzuela","year":"2013","unstructured":"S. Gonz\u00e1lez-Valenzuela, X. Liang, H. Cao, M. Chen, V. C. M. Leung, Body Area Networks. In: Filippini, D. (ed.) Autonomous Sensor Networks, Springer, Berlin, Heidelberg, pp. 17\u201337, 2013."},{"key":"597_CR4","doi-asserted-by":"publisher","unstructured":"R. Negra, I. Jemili, A. Belghith, Wireless body area networks: Applications and technologies. Procedia Computer Science 83(Supplement C), 1274\u20131281 (2016). https:\/\/doi.org\/10.1016\/j.procs.2016.04.266. The 7th International Conference on Ambient Systems, Networks and Technologies (ANT 2016) \/ The 6th International Conference on Sustainable Energy Information Technology (SEIT-2016) \/ Affiliated Workshops.","DOI":"10.1016\/j.procs.2016.04.266"},{"issue":"24","key":"597_CR5","doi-asserted-by":"publisher","first-page":"2005","DOI":"10.17485\/IJST\/v14i24.1708","volume":"14","author":"S Hussain","year":"2021","unstructured":"S. Hussain, M. Kumar, Secured key agreement schemes in wireless body area network-a review. Indian Journal of Science and Technology, Vol. 14, No. 24, pp. 2005\u20132033, 2021.","journal-title":"Indian Journal of Science and Technology"},{"key":"597_CR6","first-page":"7","volume":"2019","author":"S Karchowdhury","year":"2019","unstructured":"S. Karchowdhury, M. Sen, Survey on attacks on wireless body area network. International Journal of Computational Intelligence, Vol. 2019, p. 7, 2019.","journal-title":"International Journal of Computational Intelligence"},{"issue":"2","key":"597_CR7","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s42452-020-04058-2","volume":"3","author":"Q Liu","year":"2021","unstructured":"Q. Liu, K. Q. Mkongwa, C. Zhang (2021) Performance issues in wireless body area networks for the healthcare application: a survey and future prospects. SN Applied Sciences, Vol. 3, No. 2, pp. 1\u201319, 2021.","journal-title":"SN Applied Sciences"},{"issue":"4","key":"597_CR8","doi-asserted-by":"publisher","first-page":"3911","DOI":"10.3390\/s100403911","volume":"10","author":"SM Raazi","year":"2010","unstructured":"S. M. Raazi, H. Lee, S. Lee, Y. K. Lee, Bari+: a biometric based distributed key management approach for wireless body area networks. Sensors, Vol.  10, No. 4, pp. 3911\u20133933, 2010.","journal-title":"Sensors"},{"issue":"2","key":"597_CR9","doi-asserted-by":"publisher","first-page":"113","DOI":"10.1016\/j.eij.2016.11.001","volume":"18","author":"S Al-Janabi","year":"2017","unstructured":"S. Al-Janabi, I. Al-Shourbaji, M. Shojafar, S. Shamshirband, Survey of main challenges (security and privacy) in wireless body area networks for healthcare applications. Egyptian Informatics Journal, Vol. 18, No. 2, pp. 113\u2013122, 2017.","journal-title":"Egyptian Informatics Journal"},{"key":"597_CR10","unstructured":"R. V. Sampangi, S. Dey, S. R. Urs, S. Sampalli, A Security Suite for Wireless Body Area Networks. Preprint at http:\/\/arxiv.org\/abs\/1202.2171, 2012."},{"issue":"10","key":"597_CR11","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s10916-015-0272-9","volume":"39","author":"A Ali","year":"2015","unstructured":"A. Ali, F. A. Khan, Key agreement schemes in wireless body area networks: Taxonomy and state-of-the-art. Journal of Medical Systems, Vol. 39, No. 10, pp. 1\u201314, 2015.","journal-title":"Journal of medical systems"},{"key":"597_CR12","doi-asserted-by":"publisher","first-page":"196","DOI":"10.1016\/j.compeleceng.2017.03.008","volume":"63","author":"AK Das","year":"2017","unstructured":"A. K. Das, S. Zeadally, M. Wazid, Lightweight authentication protocols for wearable devices. Computers & Electrical Engineering, Vol. 63, pp. 196\u2013208, 2017.","journal-title":"Computers and Electrical Engineering"},{"key":"597_CR13","first-page":"1","volume-title":"IEEE Infocom Workshops 2008","author":"KK Venkatasubramanian","year":"2008","unstructured":"K. K. Venkatasubramanian, A. Banerjee, S. K. Gupta, Ekg-based key agreement in body sensor networks. in IEEE Infocom Workshops 2008, IEEE, pp. 1\u20136, 2008."},{"key":"597_CR14","doi-asserted-by":"publisher","first-page":"1159","DOI":"10.1016\/j.protcy.2013.12.129","volume":"9","author":"RA \u00c1lvarez","year":"2013","unstructured":"R. A. \u00c1lvarez, A.J.M. Pen\u00edn, X.A.V. Sobrino, A comparison of three qrs detection algorithms over a public database. Procedia Technology, Vol. 9, pp. 1159\u20131165, 2013.","journal-title":"Procedia Technology"},{"key":"597_CR15","doi-asserted-by":"publisher","first-page":"5940","DOI":"10.1109\/EMBC.2015.7319744","volume-title":"2015 37th Annual International Conference of the IEEE Engineering in Medicine and Biology Society (EMBC)","author":"MR Arefin","year":"2015","unstructured":"M. R. Arefin, K. Tavakolian, R. Fazel-Rezai, Qrs complex detection in ecg signal for wearable devices. in 2015 37th Annual International Conference of the IEEE Engineering in Medicine and Biology Society (EMBC), IEEE, pp. 5940\u20135943, 2015."},{"key":"597_CR16","doi-asserted-by":"publisher","first-page":"2664","DOI":"10.1109\/CEC.2014.6900461","volume-title":"2014 IEEE Congress on Evolutionary Computation (CEC)","author":"K Ding","year":"2014","unstructured":"K. Ding, Y. Tan, Comparison of random number generators in particle swarm optimization algorithm. in 2014 IEEE Congress on Evolutionary Computation (CEC), IEEE, pp. 2664\u20132671, 2014."},{"key":"597_CR17","doi-asserted-by":"publisher","first-page":"40","DOI":"10.1016\/j.compeleceng.2019.03.006","volume":"76","author":"M Chahal","year":"2019","unstructured":"M. Chahal, S. Harit, Optimal path for data dissemination in vehicular ad hoc networks using meta-heuristic. Computers & Electrical Engineering, Vol. 76, pp. 40\u201355, 2019.","journal-title":"Computers and Electrical Engineering"},{"key":"597_CR18","unstructured":"K. Bhattacharjee, K. Maity, S. Das, A Search for Good Pseudo-random Number Generators: Survey and Empirical Studies. Preprint at http:\/\/arxiv.org\/abs\/1811.04035, 2018."},{"key":"597_CR19","doi-asserted-by":"publisher","first-page":"895","DOI":"10.1109\/CCAA.2015.7148503","volume-title":"International Conference on Computing, Communication and Automation","author":"R Khokher","year":"2015","unstructured":"R. Khokher, R. C. Singh, Generation of security key using ecg signal. in International Conference on Computing, Communication & Automation, IEEE, pp. 895\u2013900, 2015."},{"key":"597_CR20","doi-asserted-by":"publisher","first-page":"644","DOI":"10.1109\/MWSCAS.2009.5236010","volume-title":"2009 52nd IEEE International Midwest Symposium on Circuits and Systems","author":"H Garcia-Baleon","year":"2009","unstructured":"H. Garcia-Baleon, V. Alarcon-Aquino, O. Starostenko, A wavelet-based 128-bit key generator using electrocardiogram signals. in 2009 52nd IEEE International Midwest Symposium on Circuits and Systems, IEEE, pp. 644\u2013647, (2009)"},{"issue":"6","key":"597_CR21","doi-asserted-by":"publisher","first-page":"1400","DOI":"10.1109\/TBME.2016.2607020","volume":"64","author":"N Karimian","year":"2016","unstructured":"N. Karimian, Z. Guo, M. Tehranipoor, D. Forte, Highly reliable key generation from electrocardiogram (ecg), IEEE Transactions on Biomedical Engineering, Vol. 64, No. 6, pp. 1400\u20131411, 2016.","journal-title":"IEEE Transactions on Biomedical Engineering"},{"issue":"4","key":"597_CR22","doi-asserted-by":"publisher","first-page":"2037","DOI":"10.1007\/s11277-018-5924-x","volume":"106","author":"M Karthikeyan","year":"2019","unstructured":"M. Karthikeyan, J. M. L. Manickam, Ecg-signal based secret key generation (eskg) scheme for wban and hardware implementation. Wireless Personal Communications, Vol. 106, No. 4, pp. 2037\u20132052, 2019.","journal-title":"Wireless Personal Communications"},{"key":"597_CR23","doi-asserted-by":"publisher","first-page":"1024","DOI":"10.1109\/CCNC.2017.7983280","volume-title":"2017 14th IEEE Annual Consumer Communications and Networking Conference (CCNC)","author":"SR Moosavi","year":"2017","unstructured":"S. R. Moosavi, E. Nigussie, S. Virtanen, J. Isoaho, Cryptographic key generation using ecg signal. in 2017 14th IEEE Annual Consumer Communications & Networking Conference (CCNC), IEEE, pp. 1024\u20131031, 2017."},{"issue":"1","key":"597_CR24","doi-asserted-by":"publisher","first-page":"108","DOI":"10.33736\/jita.3847.2021","volume":"9","author":"NAS Aziz","year":"2021","unstructured":"N. A. S. Aziz, Mutual authentication in body area networks (bans) using multi-biometric and physiological signal-based key agreement, Journal of IT in Asia, Vol. 9, No. 1, pp. 108\u2013120, 2021","journal-title":"Journal of IT in Asia"},{"issue":"4","key":"597_CR25","doi-asserted-by":"publisher","first-page":"404","DOI":"10.3390\/electronics10040404","volume":"10","author":"Y Al-Saeed","year":"2021","unstructured":"Y. Al-Saeed, E. Eldaydamony, A. Atwan, M. Elmogy, O. Ouda, Efficient key agreement algorithm for wireless body area networks using reusable ecg-based features. Electronics, Vol. 10, No. 4, pp. 404, 2021.","journal-title":"Electronics"},{"issue":"1","key":"597_CR26","first-page":"136","volume":"2","author":"SS Tote","year":"2015","unstructured":"S. S. Tote, S. M. Khupse, K. S. Bhutwani, Data authentication in wireless body area network (wban) using a biometric-based security, International Journal for Research in Emerging Science and Technology, Vol. 2, No. 1, pp. 136\u2013142, 2015.","journal-title":"International Journal for Research in Emerging Science and Technology"},{"key":"597_CR27","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.jnca.2017.03.003","volume":"87","author":"M Masdari","year":"2017","unstructured":"M. Masdari, S. Ahmadzadeh, A survey and taxonomy of the authentication schemes in telecare medicine information systems. Journal of Network and Computer Applications, Vol. 87, pp. 1\u201319, 2017.","journal-title":"Journal of Network and Computer Applications"},{"key":"597_CR28","doi-asserted-by":"publisher","first-page":"2388","DOI":"10.1109\/ICACCI.2017.8126204","volume-title":"2017 International Conference on Advances in Computing, Communications and Informatics (ICACCI)","author":"O Swathi","year":"2017","unstructured":"O. Swathi, M. Ganesan, R. Lavanya, R peak detection and feature extraction for the diagnosis of heart diseases. in 2017 International Conference on Advances in Computing, Communications and Informatics (ICACCI), IEEE, pp. 2388\u20132391, 2017."},{"issue":"3","key":"597_CR29","doi-asserted-by":"publisher","first-page":"45","DOI":"10.1109\/51.932724","volume":"20","author":"GB Moody","year":"2001","unstructured":"G. B. Moody, R. G. Mark, The impact of the mit-bih arrhythmia database, IEEE Engineering in Medicine and Biology Magazine, Vol. 20, No. 3, pp. 45\u201350, 2001.","journal-title":"IEEE Engineering in Medicine and Biology Magazine"},{"key":"597_CR30","doi-asserted-by":"publisher","first-page":"230","DOI":"10.1109\/TBME.1985.325532","volume":"3","author":"J Pan","year":"1985","unstructured":"J. Pan, W. J. Tompkins, A real-time qrs detection algorithm, IEEE Transactions on Biomedical Engineering, Vol. 3, pp. 230\u2013236, 1985.","journal-title":"IEEE Transactions on Biomedical Engineering"},{"key":"597_CR31","volume-title":"Mersenne twister-a pseudo random number generator and its variants","author":"A Jagannatam","year":"2008","unstructured":"A. Jagannatam,Mersenne Twister-a Pseudo Random Number Generator and Its Variants. Department of Electrical and Computer Engineering, George Mason University, 2008."},{"key":"597_CR32","doi-asserted-by":"publisher","first-page":"460","DOI":"10.1109\/AHS.2009.11","volume-title":"2009 NASA\/ESA Conference on Adaptive Hardware and Systems","author":"X Tian","year":"2009","unstructured":"X. Tian, K. Benkrid, Mersenne twister random number generation on fpga, cpu and gpu, in 2009 NASA\/ESA Conference on Adaptive Hardware and Systems, IEEE, pp. 460\u2013464, 2009."}],"container-title":["International Journal of Wireless Information Networks"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10776-023-00597-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10776-023-00597-8\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10776-023-00597-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,8,17]],"date-time":"2023-08-17T08:10:34Z","timestamp":1692259834000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10776-023-00597-8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,6,6]]},"references-count":32,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2023,9]]}},"alternative-id":["597"],"URL":"https:\/\/doi.org\/10.1007\/s10776-023-00597-8","relation":{},"ISSN":["1068-9605","1572-8129"],"issn-type":[{"type":"print","value":"1068-9605"},{"type":"electronic","value":"1572-8129"}],"subject":[],"published":{"date-parts":[[2023,6,6]]},"assertion":[{"value":"12 March 2022","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"14 January 2023","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"21 April 2023","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"6 June 2023","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}