On using a von neumann extractor in heart-beat-based security

Conference Paper (2015)
Author(s)

Robert Mark Seepers (Erasmus MC)

C Strydis (Erasmus MC)

Ioannis Sourdis (Chalmers University of Technology)

Chris I. De Zeeuw (Erasmus MC)

Affiliation
External organisation
DOI related publication
https://doi.org/10.1109/Trustcom.2015.411
More Info
expand_more
Publication Year
2015
Language
English
Affiliation
External organisation
Pages (from-to)
491-498
ISBN (electronic)
9781467379519

Abstract

The Inter-Pulse-Interval (IPI) of heart beats has previously been suggested for facilitating security in mobile health (mHealth) applications. In heart-beat-based security, a security key is derived from the time difference between consecutive heart beats. As two entities that simultaneously sample the same heart beats may generate the same key (with some inter-key disparity), these keys may be used for various security functions, such as entity authentication or data confidentiality. One of the key limitations in heart-beat-based security is the low randomness intrinsic to the most-significant bits (MSBs) in the digital representation of each IPI. In this paper, we explore the use of a von Neumann entropy extractor on these MSBs in order to increase their randomness. We show that our von Neumann key-generator produces significantly more random bits than a non-extracting key generator with an average bit-extraction rate between 13.4% and 21.9%. Despite this increase in randomness, we also find a substantial increase in inter-key disparity, increasing the mismatch tolerance required for a given true-key pair. Accordingly, the maximum-attainable effective key-strength of our key generator is only slightly higher than that of a non-extracting generator (16.4 bits compared to 15.2 bits of security for a 60-bit key), while the former requires an increase in average key-generation time of 2.5x.

No files available

Metadata only record. There are no files for this record.