International Journal of Innovative Technology and Exploring Engineering (IJITEE) ISSN: 2278-3075, Volume-8 Issue-12, October, 2019 159 Published By: Blue Eyes Intelligence Engineering & Sciences Publication Retrieval Number L35061081219/2019©BEIESP DOI: 10.35940/ijitee.L3506.1081219 An efficient method for Secure ECG Feature Based Cryptographic Key Generation S.Premkumar, J.Mohana Abstract- A novel method to generate ECG feature oriented cryptographic keys is proposed. Due to the advantage of the uniqueness and randomness properties of ECG’s main feature, this feature is achieved. As the production of key depends on four reference- free ECG main features, Low-latency property is obtained. These features are obtained in short time. This process is referred as (SEF)-based cryptographic key production. The SEF has the following features like: 1) identifying the appearance time of ECG’s fiducial values by means of Daubechies wavelet transform to calculate ECG’s main features conversely; 2) A dynamic method is used to denote the best quantity of bits that can be obtained from the main ECG feature, which consists of PR, RR, PP, QT, and ST time periods; 3) Generating cryptographic keys by the ECG features extracted in the method mentioned above and 4) Making the SEF method as strong with cryptographically secure pseudo-random number generators. Fibonacci linear feedback shift register and recent encryption traditional algorithms are executed as the pseudo- random number generator to improve the safety stage of the produced cryptographic keys. This method is executed to 239 subjects’ ECG signals consisting of normal sinus rhythm, arrhythmia, atrial brillation, and myocardial infraction. Normal ECG rhythms have slightly better randomness when compare with the abnormal.The output results proves that the SEF method is faster than the present existing key production methods. It produces higher security level when compared to existing methods. Key word: Cryptographic key generation, electrocardiogram, bio- electrical signal, body area network. I. INTRODUCTION Body Area Network (BAN) is a key technology for healthcare systems [1]. It monitors the patient efficiently eventhough the patient is in remote location. BAN has medical sensors which contains patients health related data. As medical sensor nodes share out with patients’ vital health data, their communication safety is mandatory [2]. Lack of strong safety features may affect the privacy of the patients and opponents can potentially control actual health data resulting in incorrect analysis and medicine [3]. Medical sensors depends on cryptography to safe their interactions [4]. Proper application of cryptography necessitates the usage of secure keys and key production methods. Key generation approaches that are proposed for generic wireless sensors are not directly applicable to tiny sensors used in BANs as they are highly resource- constrained and demand a higher security level [5]. Key generation in sensor networks generally requires few standards pre-deployment. Revised Manuscript Received on October 10, 2019 Correspondence Author S.Premkumar, Assistant Professor, ECE, Saveetha School of Engineering, SIMATS, Chennai, India. premkumar@saveetha.com J.Mohana, Associate Professor,ECE, Saveetha School of Engineering, SIMATS, Chennai, India. mohana@saveetha.com Traditional key production methods may potentially engage reasonable calculations as well as latency throughout network or any following adjustments, as their necessity for pre-deployment. Biometrics are normally considered as the only resolution that is lightweight, demands less resources, and certainly can recognized authenticated topic in BANs [4], [6] [8]. Through the creation of strong key production methods, the safety of medical sensors can be provided in a plug-n-play way in which neither a net-work is set nor a key pre-distribution method is wanted. Cryptographic keys can be produced within the network on the y by means of biometric, the information obtained through medical sensors. Moreover, key call back and renewal are carried on routinely when required. The range of a biometric to be used to generate cryptographic keys relies on the strength of medical sensors on getting a biometric data. The chosen key points should follow the constraints [4]: (i) it should be varying for the subjects. (ii) that it should change for the same person at different time periods. (iii) it should be cryptographically not a constant. A low degree of randomness provides an attacker to get a patient’s cryptographic key and predict their medical data. (iv) It should be measurable from all the subjects. The ECG is a noninvasive tool used to record the electrical manifestation of the contractile and relaxation activity of the heart. Nobel laureate, Willem Einthoven, was the first who had recorded the ECG in 1903. It can be recorded with the surface electrodes placed on the limbs and chest. ECG devices use varying number of electrodes ranging from 3 to 12 for signal acquisition while the system using more electrodes exceeding 12 and up to 120 is also available. Each normal cycle of an ECG signal contains P, QRS, and T waves (for instance see Figure 1 ). The P wave is a representation of contraction of the atrial muscle and has duration of 60100 millisecond (ms). It has low-amplitude morphology of 0.10.25 millivolt (mV) and usually found in the beginning of the heartbeat. The QRS complex is the result of depolarization of the messy ventricles. It is a sharp biphasic or triphasic wave of 80–120 ms duration and shows a significant amplitude deflection that varies from person to person. The time taken for ionic potential to spread from sinus node through the atrial muscle and enter the ventricles is 120–200 ms and known as PR interval. The ventricles have a relatively long ionic potential duration of 300 420 ms known as the QT interval. The plateau part of ionic potential is of 80–120 ms after the QRS and known as the ST segment. The return of the ventricular muscle to its resting ionic state causes the T wave that has an amplitude of 0.1–0.5 mV and duration of 120–180 ms. The duration from resting of ventricles to the beginning of the next cycle of atrial contraction is known as TP segment which is a long plateau part of negligible elevation.