Development and Simulation of Enhanced Key Management Scheme for WBANs

  • Sufyan T. Al-Janabi College of Science and Technology, University of Human Development, Sulaimani, Kurdistan Region, Iraq
  • Ali J. Dawood College of Computer, University of Anbar, Ramadi, Iraq
  • Ekram Habeeb Hassan Computer College, Anbar University, Ramadi, Iraq


The design and deployment of Wireless Body Area Networks (WBANs) have recently resulted from the use of sensors to measure the biometrics and movements of the human body. The development of such networks is imperative for modern telemedicine and e-health. Since WBANs are dealing with very sensitive information (i.e., medical data which has a direct impact on human life), security is an essential part of WBANs design. Indeed, key management plays pivotal role in ensuring security requirements in WBAN.

In this paper, an enhanced version of a biometric-based distributed key management scheme is introduced. This scheme is designed for use in WBAN scenarios. It makes use of key refreshment schedules and distributes key management responsibility among all nodes in a WBAN in a fair manner. The scheme supports the use of biometric measurements to generate symmetric keys in WBANs via facilitating the work of biometric random number generators that can extract a random bit sequence from biological data to generate symmetric keys. A general description of the development of this scheme is given along with all phases of its operation. Furthermore, simulation results are presented with security analysis related to the resistance of the proposed scheme against some possible attacks.


[1] E. Jovanov, A. Milenkovic, C. Otto, P. Groen, B. Johnson, S. Warren, and G. Taibi, "A WBAN System for Ambulatory Monitoring of Physical Activity and Health Status: Applications and Challenges," 27th Annual International Conference of the Engineering in Medicine and Biology Society (IEEE-EMBS 2005), China, pp. 3810-3813, Jan. 2006.
[2] C. Otto, E. Jovanov, and A. Milenkovic, "A WBAN-based System for Health Monitoring at Home," 3rd IEEE/EMBS International Summer School on Medical Devices and Biosensors, USA, pp. 20-23, Sept. 2006.
[3] S. Warren, J. Lebak, J. Yao, J. Creekmore, A. Milenkovic, and E. Jovanov, "Interoperability and Security in Wireless Body Area Network Infrastructures," Proceedings of the 27th Annual Conference of Engineering in Medicine and Biology, IEEE, Shanghai, China, Sept. 2005.
[4] Changle Li, Huan-Bang Li, and R. Kohno, "Performance Evaluation of IEEE 802.15.4 for Wireless Body Area Network (WBAN)", IEEE International Conference on Communications. ICC Workshops, Germany, pp.1-5, June 2009.
[5] Ramesh Kumar and Rajeswari Mukesh, "State Of The Art: Security in Wireless Body Area Networks", International Journal of Computer Science & Engineering Technology (IJCSET), Vol. 4 No. 05 May 2013.
[6] Jingwei Liu and Kyung S. Kwak, "Hybrid Security Mechanisms for Wireless Body Area Networks", The Second International Conference on Ubiquitous and Future Networks (ICUFN), 2010.
[7] J. Szczepanskia, E. Wajnryba, J.M. Amigo´, Maria V. Sanchez-Vives, and M. Slater, "Biometric random number generators", Computers & Security, No. 23, pp. 77-84, 2004.
[8] Syed Muhammad Khaliq-ur-Rahman Raazi, Heejo Lee, Sungyoung Lee, and Young-Koo Lee, “BARI+: A Biometric Based Distributed Key Management Approach for Wireless Body Area Networks”, Sensors Journal, Vol. 10, No. 4, pp. 3911-3933, MDPI, April 2010.
[9] Lin Yao, Bing Liu, Kai Ya, Guowei Wu, and Jia Wang, "An ECG-Based Signal Key Establishment Protocol in Body Area Network", 7th International Conference on Ubiquitous Intelligence & Computing and 7th International Conference on Autonomic & Trusted Computing (UIC/ATC), pp. 233-238, China, Oct. 2010.
[10] Mohammed Mana, Mohammed Feham, and Boucif Amar Bensaber, "Trust Key Management Scheme for Wireless Body Area Networks", International Journal of Network Security, March 2011.
[11] Venkatasubramanian Sivaprasatham and Jothi Venkateswaran, "A secure key management technique for wireless body area networks", Journal of Computer Science, Science Publications, 2012.
[12] William Stallings, Cryptography and Network Security Principles and Practice, Prentice Hall, 5th ed., 2011.
How to Cite
AL-JANABI, Sufyan T.; DAWOOD, Ali J.; HASSAN, Ekram Habeeb. Development and Simulation of Enhanced Key Management Scheme for WBANs. Journal of University of Human Development, [S.l.], v. 1, n. 2, p. 280-287, apr. 2015. ISSN 2411-7765. Available at: <>. Date accessed: 03 aug. 2021. doi: