{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,12]],"date-time":"2025-10-12T04:20:52Z","timestamp":1760242852961,"version":"build-2065373602"},"reference-count":20,"publisher":"MDPI AG","issue":"9","license":[{"start":{"date-parts":[[2016,9,8]],"date-time":"2016-09-08T00:00:00Z","timestamp":1473292800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Sensors"],"abstract":"<jats:p>Body-worn sensor networks are important for rescue-workers, medical and many other applications. Sensitive data are often transmitted over such a network, motivating the need for encryption. Body-worn sensor networks are deployed in conditions where the wireless communication channel varies dramatically due to fading and shadowing, which is considered a disadvantage for communication. Interestingly, these channel variations can be employed to extract a common encryption key at both sides of the link. Legitimate users share a unique physical channel and the variations thereof provide data series on both sides of the link, with highly correlated values. An eavesdropper, however, does not share this physical channel and cannot extract the same information when intercepting the signals. This paper documents a practical wearable communication system implementing channel-based key generation, including an implementation and a measurement campaign comprising indoor as well as outdoor measurements. The results provide insight into the performance of channel-based key generation in realistic practical conditions. Employing a process known as key reconciliation, error free keys are generated in all tested scenarios. The key-generation system is computationally simple and therefore compatible with the low-power micro controllers and low-data rate transmissions commonly used in wireless sensor networks.<\/jats:p>","DOI":"10.3390\/s16091453","type":"journal-article","created":{"date-parts":[[2016,9,8]],"date-time":"2016-09-08T10:08:36Z","timestamp":1473329316000},"page":"1453","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":10,"title":["Channel-Based Key Generation for Encrypted Body-Worn Wireless Sensor Networks"],"prefix":"10.3390","volume":"16","author":[{"given":"Patrick","family":"Van Torre","sequence":"first","affiliation":[{"name":"Department of Information Technology, Ghent University\/iMinds, Technologiepark-Zwijnaarde 15, 9052 Gent, Belgium"}]}],"member":"1968","published-online":{"date-parts":[[2016,9,8]]},"reference":[{"key":"ref_1","doi-asserted-by":"crossref","first-page":"40","DOI":"10.1109\/MIC.2015.24","article-title":"From the internet of things to the internet of people","volume":"19","author":"Miranda","year":"2015","journal-title":"IEEE Internet Comput."},{"key":"ref_2","doi-asserted-by":"crossref","unstructured":"Dalal, H.N., Soni, N.V., and Razaque, A. (2016, January 29). Header encryption of IEEE802.15.4. Proceedings of the 2016 IEEE Long Island Systems, Applications and Technology Conference (LISAT), New York, NY, USA.","DOI":"10.1109\/LISAT.2016.7494140"},{"key":"ref_3","doi-asserted-by":"crossref","first-page":"2801","DOI":"10.1109\/JSEN.2014.2380816","article-title":"An encryption scheme using chaotic map and genetic operations for wireless sensor networks","volume":"15","author":"Biswas","year":"2015","journal-title":"IEEE Sens. J."},{"key":"ref_4","doi-asserted-by":"crossref","unstructured":"Gandino, F., Ferrero, R., and Rebaudengo, M. (2016). A key distribution scheme for mobile wireless sensor networks: q-s-composite. IEEE Trans. Inf. Forensics Secur.","DOI":"10.1109\/TIFS.2016.2601061"},{"key":"ref_5","doi-asserted-by":"crossref","unstructured":"Huai, L., Zou, X., Liu, Z., and Han, Y. (2009, January 25\u201326). An energy-efficient AES-CCM implementation for IEEE802.15.4 wireless sensor networks. Proceedings of the International Conference on Networks Security, Wireless Communications and Trusted Computing (NSWCTC \u201909), Wuhan, China.","DOI":"10.1109\/NSWCTC.2009.246"},{"key":"ref_6","doi-asserted-by":"crossref","first-page":"73","DOI":"10.1109\/MCOM.2006.1632652","article-title":"A novel biometrics method to secure wireless body area sensor networks for telemedicine and m-health","volume":"44","author":"Poon","year":"2006","journal-title":"IEEE Commun. Mag."},{"key":"ref_7","doi-asserted-by":"crossref","unstructured":"Blaunstein, N., and Christodoulou, C.G. (2014). Radio Propagation and Adaptive Antennas for Wireless Communication Networks, John Wiley & Sons, Inc.","DOI":"10.1002\/9781118816707"},{"key":"ref_8","doi-asserted-by":"crossref","first-page":"205","DOI":"10.1109\/TMC.2010.114","article-title":"Secret key establishment using temporally and spatially correlated wireless channel coefficients","volume":"10","author":"Chen","year":"2011","journal-title":"IEEE Trans. Mob. Comput."},{"key":"ref_9","doi-asserted-by":"crossref","first-page":"917","DOI":"10.1109\/TMC.2012.63","article-title":"Secret key extraction from wireless signal strength in real environments","volume":"12","author":"Premnath","year":"2013","journal-title":"IEEE Trans. Mob. Comput."},{"key":"ref_10","doi-asserted-by":"crossref","unstructured":"Van Torre, P., Castel, T., and Rogier, H. (2016, January 10\u201315). Encrypted body-to-body wireless sensor node employing channel-state-based key generation. Proceedings of the 10th European Conference on Antennas and Propagation (EuCAP), Davos, Switzerland.","DOI":"10.1109\/EuCAP.2016.7481769"},{"key":"ref_11","doi-asserted-by":"crossref","first-page":"1578","DOI":"10.1109\/TAP.2016.2526681","article-title":"Impact of propagation on the vulnerability of channel-based key establishment","volume":"64","author":"Mahmood","year":"2016","journal-title":"IEEE Trans. Antennas Propag."},{"key":"ref_12","doi-asserted-by":"crossref","first-page":"18583","DOI":"10.3390\/s141018583","article-title":"Synchronous wearable wireless body sensor network composed of autonomous textile nodes","volume":"14","author":"Vanveerdeghem","year":"2014","journal-title":"Sensors"},{"key":"ref_13","doi-asserted-by":"crossref","first-page":"577","DOI":"10.1109\/COMST.2015.2459691","article-title":"A Survey of Public-Key Cryptographic Primitives in Wireless Sensor Networks","volume":"18","author":"Shim","year":"2016","journal-title":"IEEE Commun. Surv. Tutor."},{"key":"ref_14","doi-asserted-by":"crossref","unstructured":"Xiong, L., and Li, H. (2012, January 19\u201320). Side channel analysis attacks against channel state information based key generation. Proceedings of the 2012 International Conference on Systems and Informatics (ICSAI), Yantai, China.","DOI":"10.1109\/ICSAI.2012.6223329"},{"key":"ref_15","doi-asserted-by":"crossref","first-page":"2101","DOI":"10.1109\/TIFS.2013.2287600","article-title":"Differential electromagnetic attacks on a 32-bit microprocessor using software defined radios","volume":"8","author":"Montminy","year":"2013","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"ref_16","doi-asserted-by":"crossref","first-page":"6300","DOI":"10.1109\/TWC.2014.2330835","article-title":"Key establishment employing reconfigurable antennas: Impact of antenna complexity","volume":"13","author":"Mehmood","year":"2014","journal-title":"IEEE Trans. Wirel. Commun."},{"key":"ref_17","doi-asserted-by":"crossref","first-page":"5146","DOI":"10.1109\/TWC.2013.090313.122034","article-title":"Maximizing the secret key rate for informed radios under different channel conditions","volume":"12","author":"Quist","year":"2013","journal-title":"IEEE Trans. Wirel. Commun."},{"key":"ref_18","doi-asserted-by":"crossref","first-page":"5063","DOI":"10.1109\/TAP.2015.2479244","article-title":"Impact of array mutual coupling on multiantenna propagation-based key establishment","volume":"63","author":"Mahmood","year":"2015","journal-title":"IEEE Trans. Antennas Propag."},{"key":"ref_19","doi-asserted-by":"crossref","unstructured":"Castel, T., Van Torre, P., and Rogier, H. (2016, January 23\u201324). RSS-based secret key generation for indoor and outdoor WBANs using on-body sensor nodes. Proceedings of the 2016 International Conference on Military Communications and Information Systems (ICMCIS), Brussels, Belgium.","DOI":"10.1109\/ICMCIS.2016.7496540"},{"key":"ref_20","doi-asserted-by":"crossref","first-page":"1357","DOI":"10.1109\/TAP.2010.2041168","article-title":"Wireless communication for firefighters using dual-polarized textile antennas integrated in their garment","volume":"58","author":"Vallozzi","year":"2010","journal-title":"IEEE Trans. Antennas Propag."}],"container-title":["Sensors"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/1424-8220\/16\/9\/1453\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,11]],"date-time":"2025-10-11T19:30:23Z","timestamp":1760211023000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/1424-8220\/16\/9\/1453"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,9,8]]},"references-count":20,"journal-issue":{"issue":"9","published-online":{"date-parts":[[2016,9]]}},"alternative-id":["s16091453"],"URL":"https:\/\/doi.org\/10.3390\/s16091453","relation":{},"ISSN":["1424-8220"],"issn-type":[{"type":"electronic","value":"1424-8220"}],"subject":[],"published":{"date-parts":[[2016,9,8]]}}}