International Journal of Innovative Technology and Exploring Engineering (IJITEE)
ISSN: 2278-3075, Volume-8 Issue-12, October, 2019
159
Published By:
Blue Eyes Intelligence Engineering
& Sciences Publication
Retrieval Number L35061081219/2019©BEIESP
DOI: 10.35940/ijitee.L3506.1081219
An efficient method for Secure ECG Feature
Based Cryptographic Key Generation
S.Premkumar, J.Mohana
Abstract- A novel method to generate ECG feature oriented
cryptographic keys is proposed. Due to the advantage of the
uniqueness and randomness properties of ECG’s main feature,
this feature is achieved. As the production of key depends on four
reference- free ECG main features, Low-latency property is
obtained. These features are obtained in short time. This process
is referred as (SEF)-based cryptographic key production. The
SEF has the following features like: 1) identifying the
appearance time of ECG’s fiducial values by means of
Daubechies wavelet transform to calculate ECG’s main features
conversely; 2) A dynamic method is used to denote the best
quantity of bits that can be obtained from the main ECG feature,
which consists of PR, RR, PP, QT, and ST time periods; 3)
Generating cryptographic keys by the ECG features extracted in
the method mentioned above and 4) Making the SEF method as
strong with cryptographically secure pseudo-random number
generators. Fibonacci linear feedback shift register and recent
encryption traditional algorithms are executed as the pseudo-
random number generator to improve the safety stage of the
produced cryptographic keys. This method is executed to 239
subjects’ ECG signals consisting of normal sinus rhythm,
arrhythmia, atrial brillation, and myocardial infraction. Normal
ECG rhythms have slightly better randomness when compare
with the abnormal.The output results proves that the SEF
method is faster than the present existing key production
methods. It produces higher security level when compared to
existing methods.
Key word: Cryptographic key generation, electrocardiogram, bio-
electrical signal, body area network.
I. INTRODUCTION
Body Area Network (BAN) is a key technology for
healthcare systems [1]. It monitors the patient efficiently
eventhough the patient is in remote location. BAN has
medical sensors which contains patients health related data.
As medical sensor nodes share out with patients’ vital health
data, their communication safety is mandatory [2]. Lack of
strong safety features may affect the privacy of the patients
and opponents can potentially control actual health data
resulting in incorrect analysis and medicine [3].
Medical sensors depends on cryptography to safe their
interactions [4]. Proper application of cryptography
necessitates the usage of secure keys and key production
methods. Key generation approaches that are proposed for
generic wireless sensors are not directly applicable to tiny
sensors used in BANs as they are highly resource-
constrained and demand a higher security level [5]. Key
generation in sensor networks generally requires few
standards pre-deployment.
Revised Manuscript Received on October 10, 2019
Correspondence Author
S.Premkumar, Assistant Professor, ECE, Saveetha School of
Engineering, SIMATS, Chennai, India. premkumar@saveetha.com
J.Mohana, Associate Professor,ECE, Saveetha School of Engineering,
SIMATS, Chennai, India. mohana@saveetha.com
Traditional key production methods may potentially engage
reasonable calculations as well as latency throughout
network or any following adjustments, as their necessity for
pre-deployment. Biometrics are normally considered as the
only resolution that is lightweight, demands less resources,
and certainly can recognized authenticated topic in BANs
[4], [6] [8]. Through the creation of strong key production
methods, the safety of medical sensors can be provided in a
plug-n-play way in which neither a net-work is set nor a key
pre-distribution method is wanted. Cryptographic keys can
be produced within the network on the y by means of
biometric, the information obtained through medical
sensors. Moreover, key call back and renewal are carried on
routinely when required. The range of a biometric to be used
to generate cryptographic keys relies on the strength of
medical sensors on getting a biometric data. The chosen key
points should follow the constraints [4]: (i) it should be
varying for the subjects. (ii) that it should change for the
same person at different time periods. (iii) it should be
cryptographically not a constant. A low degree of
randomness provides an attacker to get a patient’s
cryptographic key and predict their medical data. (iv) It
should be measurable from all the subjects.
The ECG is a noninvasive tool used to record the electrical
manifestation of the contractile and relaxation activity of the
heart. Nobel laureate, Willem Einthoven, was the first who
had recorded the ECG in 1903. It can be recorded with the
surface electrodes placed on the limbs and chest. ECG
devices use varying number of electrodes ranging from 3 to
12 for signal acquisition while the system using more
electrodes exceeding 12 and up to 120 is also available.
Each normal cycle of an ECG signal contains P, QRS, and T
waves (for instance see Figure 1 ). The P wave is a
representation of contraction of the atrial muscle and has
duration of 60–100 millisecond (ms). It has low-amplitude
morphology of 0.1–0.25 millivolt (mV) and usually found in
the beginning of the heartbeat. The QRS complex is the
result of depolarization of the messy ventricles. It is a sharp
biphasic or triphasic wave of 80–120 ms duration and shows
a significant amplitude deflection that varies from person to
person. The time taken for ionic potential to spread from
sinus node through the atrial muscle and enter the ventricles
is 120–200 ms and known as PR interval. The ventricles
have a relatively long ionic potential duration of 300–
420 ms known as the QT interval. The plateau part of ionic
potential is of 80–120 ms after the QRS and known as the
ST segment. The return of the ventricular muscle to its
resting ionic state causes the T wave that has an amplitude
of 0.1–0.5 mV and duration of 120–180 ms. The duration
from resting of ventricles to the beginning of the next cycle
of atrial contraction is known as TP segment which is a long
plateau part of negligible elevation.