Skip to main content
Erschienen in: Wireless Personal Communications 4/2018

12.09.2018

A Secure Crypto Base Authentication and Communication Suite in Wireless Body Area Network (WBAN) for IoT Applications

verfasst von: Dur-e-Shawar Agha, Fozia Hanif Khan, Rehan Shams, Huma Hasan Rizvi, Farheen Qazi

Erschienen in: Wireless Personal Communications | Ausgabe 4/2018

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

To monitor the functions of human body and their surroundings Wireless Body Area Network (WBAN) is used, which are based on low powered and light weight wireless sensors devices. WBAN highly supports numerous applications but this study will focus on the security of ubiquitous healthcare applications. In E-health research monitoring the critical data in terms of security has become a major challenge as WBAN deals with various threats day by day. Therefore the design of secure and reasonably resource optimal algorithms with a robust key generation and management scheme is today’s need. There must be only authorized user’s who can have access to patient related data; otherwise it can be exploited by anyone. This proposed study is aiming to formulate the two security suite for WBAN, which comprises on KBS keys, KAISC and Hash algorithm three improved versions of key management procedures and authentication procedure respectively. Firstly the KBS Keys and improved Hashing suite which is an independent and adaptive key management and authentication scheme for improving the security of WBANs will be used, and secondly KAISC will be used for inter-sensor communication and key management security scheme. All above mentioned procedures will be suitably blend with the encryption and decryption process which will securely send the patient’s critical data to the base station and further to the concerned doctor. The novelty of work is that the proposed methodology is not only simple but also advanced and much secured procedure of key generation and management that will be further validated by the performance analysis. This technique will be beneficial for the continuous monitoring of patient’s critical data in remote areas also.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Sampangi, R. V., Dey, S., Urs, S. R., & Sampalli, S. (2012). A security suite for wireless body area network. International Journal of Network Security & Its Applications (IJNSA), 4(1), 97–116.CrossRef Sampangi, R. V., Dey, S., Urs, S. R., & Sampalli, S. (2012). A security suite for wireless body area network. International Journal of Network Security & Its Applications (IJNSA), 4(1), 97–116.CrossRef
3.
5.
Zurück zum Zitat Kaur, S., Farooq, O., Singhal, R., & Ahuja, B. S. (2010). Digital watermarking of ECG data for secure wireless Communication. In Proceedings of the international conference on telecommunication and computing recent trends in information, 12–13 March (pp. 140–144). Kochi: IEEE Xplore Press. https://doi.org/10.1109/itc.2010.96. Kaur, S., Farooq, O., Singhal, R., & Ahuja, B. S. (2010). Digital watermarking of ECG data for secure wireless Communication. In Proceedings of the international conference on telecommunication and computing recent trends in information, 12–13 March (pp. 140–144). Kochi: IEEE Xplore Press. https://​doi.​org/​10.​1109/​itc.​2010.​96.
6.
Zurück zum Zitat Tan, C. C., Wang, H., Zhong, S., & Li, Q., (2008). Body sensor network security: An identity-based cryptography approach. In Proceedings of WiSec ‘08, March 31–April. Tan, C. C., Wang, H., Zhong, S., & Li, Q., (2008). Body sensor network security: An identity-based cryptography approach. In Proceedings of WiSec ‘08, March 31–April.
7.
Zurück zum Zitat Hu, C., Zhang, N., Li, H., & Cheng, X. (2013). Body area network security fuzzy attribute based signcryption scheme. IEEE Journal on Selected Areas in Communications/Supplement, 31(9), 37–46.CrossRef Hu, C., Zhang, N., Li, H., & Cheng, X. (2013). Body area network security fuzzy attribute based signcryption scheme. IEEE Journal on Selected Areas in Communications/Supplement, 31(9), 37–46.CrossRef
8.
Zurück zum Zitat Mana, M., Feham, M., & Bensaber, B. A. (2009). SEKEBAN (Secure and Efficient Key Exchange for Wireless Body Area Network). International Journal of Advanced Science and Technology, 12, 45–60. Mana, M., Feham, M., & Bensaber, B. A. (2009). SEKEBAN (Secure and Efficient Key Exchange for Wireless Body Area Network). International Journal of Advanced Science and Technology, 12, 45–60.
9.
Zurück zum Zitat Mana, M., Feham, M., & Bensaber, B. A. (2011). Trust key management scheme for wireless body area networks. International Journal of Network Security, 12(2), 71–79. Mana, M., Feham, M., & Bensaber, B. A. (2011). Trust key management scheme for wireless body area networks. International Journal of Network Security, 12(2), 71–79.
10.
Zurück zum Zitat Raazi, S. M. K., & Lee, H., (2009). BARI: A distributed key management approach for wireless body area networks. In Proceedings of 2009 international conference on computational intelligence and security (pp. 324–329). Raazi, S. M. K., & Lee, H., (2009). BARI: A distributed key management approach for wireless body area networks. In Proceedings of 2009 international conference on computational intelligence and security (pp. 324–329).
11.
Zurück zum Zitat Wang, H., Fang, H., Xing, L., & Chen, M. (2011). An integrated biometric-based security framework using wavelet-domain hmm in wireless body area networks (WBAN). In 2011 IEEE international conference on communications (ICC) (pp. 1–5). Wang, H., Fang, H., Xing, L., & Chen, M. (2011). An integrated biometric-based security framework using wavelet-domain hmm in wireless body area networks (WBAN). In 2011 IEEE international conference on communications (ICC) (pp. 1–5).
12.
Zurück zum Zitat Kwak, K. S., Ameen, M. A., Kwak, D., Lee, C., & Lee, H. (2009). A study on proposed IEEE 802.15 WBAN MAC protocols. In 9th international symposium on communications and information technology, 2009 (pp 834–840). ISCIT. Kwak, K. S., Ameen, M. A., Kwak, D., Lee, C., & Lee, H. (2009). A study on proposed IEEE 802.15 WBAN MAC protocols. In 9th international symposium on communications and information technology, 2009 (pp 834–840). ISCIT.
13.
Zurück zum Zitat Kumar, J., & Ezhilarasi, M. (2012). Adaptive security mechanism for PEAS in wireless sensor networks. In International conference on computing and control engineering (ICCCE). ISBN 978-1-4675- 2248-9 ©. Kumar, J., & Ezhilarasi, M. (2012). Adaptive security mechanism for PEAS in wireless sensor networks. In International conference on computing and control engineering (ICCCE). ISBN 978-1-4675- 2248-9 ©.
14.
Zurück zum Zitat Raghini, M., Maheswari, N. U., & Ventakesh, R. (2013). Overview on key distribution primitives in wireless sensor network. Journal of Computer Science, 543–550. Raghini, M., Maheswari, N. U., & Ventakesh, R. (2013). Overview on key distribution primitives in wireless sensor network. Journal of Computer Science, 543–550.
16.
Zurück zum Zitat Wang, W., Wang, H., Peng, D., & Sharif, H. (2011). Secure stochastic ECG signals based on Gaussian mixture model for e-healthcare systems. IEEE Systems Journal, 5(4), 564–573.CrossRef Wang, W., Wang, H., Peng, D., & Sharif, H. (2011). Secure stochastic ECG signals based on Gaussian mixture model for e-healthcare systems. IEEE Systems Journal, 5(4), 564–573.CrossRef
17.
Zurück zum Zitat Venkatasubramanian, K., Banerjee, A., & Gupta, S. (2010). Pska: Usable and secure key agreement scheme for body area networks. IEEE Transactions on Information Technology in Biomedicine, 14(1), 60–68.CrossRef Venkatasubramanian, K., Banerjee, A., & Gupta, S. (2010). Pska: Usable and secure key agreement scheme for body area networks. IEEE Transactions on Information Technology in Biomedicine, 14(1), 60–68.CrossRef
19.
Zurück zum Zitat Clifton, D. A., Pimentel, M. A. F., Watkinson, P. J., & Tarassenko, L. (2013). Gaussian processes for personalized E-health monitoring with wearable sensors. IEEE Transactions on Biomedical Engineering, 60(1), 193–197.CrossRef Clifton, D. A., Pimentel, M. A. F., Watkinson, P. J., & Tarassenko, L. (2013). Gaussian processes for personalized E-health monitoring with wearable sensors. IEEE Transactions on Biomedical Engineering, 60(1), 193–197.CrossRef
20.
Zurück zum Zitat Shujata, S., & Govindraraju, R. (2013). A secure crypto based ECG data communication using modified SPHIT and modified quasigroup encryption. International Journal of Computer Applications, 78(6), 27–33.CrossRef Shujata, S., & Govindraraju, R. (2013). A secure crypto based ECG data communication using modified SPHIT and modified quasigroup encryption. International Journal of Computer Applications, 78(6), 27–33.CrossRef
Metadaten
Titel
A Secure Crypto Base Authentication and Communication Suite in Wireless Body Area Network (WBAN) for IoT Applications
verfasst von
Dur-e-Shawar Agha
Fozia Hanif Khan
Rehan Shams
Huma Hasan Rizvi
Farheen Qazi
Publikationsdatum
12.09.2018
Verlag
Springer US
Erschienen in
Wireless Personal Communications / Ausgabe 4/2018
Print ISSN: 0929-6212
Elektronische ISSN: 1572-834X
DOI
https://doi.org/10.1007/s11277-018-5968-y

Weitere Artikel der Ausgabe 4/2018

Wireless Personal Communications 4/2018 Zur Ausgabe

Neuer Inhalt