ELPA: A NEW KEY AGREEMENT SCHEME BASED ON LINEAR PREDICTION OF ECG FEATURES FOR WBAN Emna Kalai Zaghouani *† , Abderrazak Jemai , Adel Benzina * , Rabah Attia * * Laboratory of Electronic Systems and Communication Network, TUNISIA Polytechnic School TELNET Innovation Labs, Telnet Holding Tunis, Tunisia Laboratoire LIP2, Facult´ e des Sciences de Tunis, 1060 Belv´ ed` ere Tunis, Tunisie Emna.kalai@telnet-consulting.com, Abderrazak.Jemai@insat.rnu.tn, Adel.Benzina@isd.rnu.tn,Rabah.attia@enit.rnu.tn ABSTRACT In this paper, we propose a novel key agreement scheme called ECG Linear Prediction key Agreement (ELPA) with the properties of plug-n-play and transparency to secure inter-sensor communication in Wireless Body Area Networks (WBANs). ELPA is a new physiological based key agreement scheme allowing two nodes belonging to the same WBAN to agree on a symmetric key from ECG signal features. The paper introduces the use of Linear Prediction Coding (LPC), which has always been used for a compression purpose, in hiding the cryptographic key. In fact we prove that concealing the symmetric key using this tool ensures high security level while keeping low computational complexity and communi- cation overhead compared with the state of the art. Index TermsWBAN, communication security, ECG features, LPC, communication overhead 1. INTRODUCTION WBAN, a promising new research area, is defined as a net- work consisting of intelligent, low-power, micro technology sensors and actuators which can be placed on the body, pro- viding timely data [1]. The WBAN nodes are interconnected and connected to a coordinator node via a wireless communi- cation technology like Bluetooth and Zigbee [1]. Considered as a mistrusted channel, and while WBAN deals with sensi- tive medical data, securing the inter-sensor communications remains a major issue. Communication is encrypted with a shared symmetric key thats why a secure management and agreement of this shared symmetric key must be performed. Usual methods to secure inter-sensor communications have been based on symmetric key distribution or predeployment mechanisms. However the former requires secure key distri- bution scheme and the latter requires a set up and rekeying for every node management, whereas nodes in WBAN must be removed, added and tuned in a secure and transparent manner : without the user participation. The recent proposed solution, This work is supported by Telnet Innovation labs and the PASRI program funded by the European Union. to deal with key management problem, is physiological based security. The main idea of physiological based key agreement is to allow nodes belonging to the same WBAN to agree on a symmetric cryptographic key from the common physiological features. The collected features at different parts of the body are enough similar for an authentication purpose but not ex- actly identical to generate the same key sequence. This is due to noise caused by analog to digital converter and muscles contractions. The already used technique to overcome this problem is the fuzzy vault scheme [2]. The major weakness of this method is the size of the vault, a random set constructed to conceal the features, which is closely correlated to commu- nication overhead, primary cause of energy consumption. In this paper we investigate the use of linear prediction coding (LPC) to achieve feature set locking minimizing greatly the communication overhead. ELPA does not require any hiding of the features in a vault set which reduces greatly the mes- sage size. The proposed algorithm uses the already developed feature extraction stage AC/DCT [3]. ELPA is first assessed in the MIT-BIH Normal Sinus Rhythm Database [4] contain- ing recordings of healthy subjects and second in the MIT-BIH Arrhythmia Database [4]containing records affected by heart diseases to evaluate the robustness of the proposed method. The remainder of this paper is organized as follows. Sec- tion 2 presents an overview of the usual methods of secur- ing inter-sensor communication and the existing works in the new promising area: biological key. In section 3 we present the whole proposed scheme and detail each system bloc. Fi- nally we estimate the performance of the proposed system compared with the most known one the PSKA [5] in term of overhead and security. 2. RELATED WORK All the security requirements for communications can be ful- filled if a key is successfully and securely distributed. Usually used, predeployed keying mechanism was always the primary solution to secure communication in a Wireless sensor Net- work. It consists of distributing initial keys to all the partic- ipating sensors in the set-up phase [6]. The trend has then 23rd European Signal Processing Conference (EUSIPCO) 978-0-9928626-3-3/15/$31.00 ©2015 IEEE 81