Tytuł artykułu
Treść / Zawartość
Pełne teksty:
Identyfikatory
Warianty tytułu
Języki publikacji
Abstrakty
Wireless Body Area Networks (WBANs) are based on connected and dedicated sensor nodes for patient monitoring in the healthcare sector. The sensor nodes are implanted inside or outside the patient’s body for sensing the vital signs and transmitting the sensed data to the end devices for decision-making. These sensor nodes use advanced communication technologies for data communication. However, they have limited capabilities in terms of computation power, battery life, storage, and memory, and these constraints make networks more vulnerable to security breaches and routing challenges. Important and sensitive information is exchanged over an unsecured channel in the network. Several devices are involved in handling the data in WBANs, including sink nodes, coordinator, or gateway nodes. Many cryptographic schemes have been introduced to ensure security in WBANs by using traditional confidentiality and key-sharing strategies. However, these techniques are not suitable for limited resource-based sensor nodes. In this paper, we propose a Lightweight Hybrid Cryptography Algorithm (LWHCA) that uses cryptographicbased techniques for WBAN networks to improve network security, minimize network overhead and delay issues, and improve the healthcare monitoring processes. The proposed solution is evaluated in a simulation scenario and compared with state-of-the-art schemes in terms of energy consumption, and ciphertext size.
Rocznik
Tom
Strony
213--240
Opis fizyczny
Bibliogr. 30 poz., rys., tab., wykr.
Twórcy
autor
- Department of Robotics and Artificial Intelligence, Shaheed Zulfikar Ali Bhutto Instituteof Science and Technology (SZABIST University), Islamabad, Pakistan
autor
- Department of Electronic & Computer Engineering, University of Limerick, Limerick, Ireland
autor
- Department of Robotics and Artificial Intelligence, Shaheed Zulfikar Ali Bhutto Instituteof Science and Technology (SZABIST University), Islamabad, Pakistan
autor
- Department of Information and Communication Technology Engineering,Erbil Polytechnic University, Erbil, Iraq
- Department of Computer Science, Knowledge University, University Park, Erbil, Iraq
autor
- Department of Embedded Systems Engineering, Incheon National University, Incheon, South Korea
Bibliografia
- 1. M. Anwar, A.H. Abdullah, A. Altameem, K.N. Qureshi, F. Masud, M. Faheem, Y. Cao, R. Kharel, Green communication for wireless body area networks: Energy aware link efficient routing approach, Sensors, 18(10): 3237, 2018, doi: 10.3390/s18103237.
- 2. M. Anwar, A.H. Abdullah, K.N. Qureshi, A.H. Majid, Wireless body area networks for healthcare applications: An overview, TELKOMNIKA, 15(3): 1088–1095, 2017, doi: 10.12928/TELKOMNIKA.v15i3.5793.
- 3. R. Qazi, K.N. Qureshi, F. Bashir, N.U. Islam, S. Iqbal, A. Arshad, Security protocol using elliptic curve cryptography algorithm for wireless sensor networks, Journal of Ambient Intelligence Humanized Computing, 12: 547–566, 2021, doi: 10.1007/s12652-020-02020-z.
- 4. M.F. Moghadam, M. Nikooghadam, M.A.B. Al Jabban, M. Alishahi, L. Mortazavi, A. Mohajerzadeh, An efficient authentication and key agreement scheme based on ECDH for wireless sensor network, IEEE Access, 8: 73182–73192, 2020, doi: 10.1109/ACCESS.2020.2987764.
- 5. K. Awan, K.N. Qureshi, M. Mehwish, Wireless body area networks routing protocols: A review, Indonesian Journal of Electrical Engineering Computer Science, 4(3): 594–604, 2016, doi: 10.11591/ijeecs.v4.i3.pp594-604.
- 6. K.N. Qureshi, S. Din, G. Jeon, F. Piccialli, Link quality and energy utilization based preferable next hop selection routing for wireless body area networks, Computer Communications, 149: 382–392, 2020, doi: 10.1016/j.comcom.2019.10.030.
- 7. P. Sinha, V.K. Jha, A.K. Rai, B. Bhushan, Security vulnerabilities, attacks and countermeasures in wireless sensor networks at various layers of OSI reference model: A survey, [in:] 2017 International Conference on Signal Processing and Communication (ICSPC), Coimbatore, India, pp. 288–293, 2017, doi: 10.1109/CSPC.2017.8305855.
- 8. R. Rizk, Y. Alkady, Two-phase hybrid cryptography algorithm for wireless sensor networks, Journal of Electrical Systems Information Technology, 2(3): 296–313, 2015, doi: 10.1016/j.jesit.2015.11.005.
- 9. A. Karakaya, S. Akleylek, A survey on security threats and authentication approaches in wireless sensor networks, [in:] 2018 6th International Symposium on Digital Forensic and Security (ISDFS), Antalya, Turkey, pp. 1–4, 2018, doi: 10.1109/ISDFS.2018.8355381.
- 10. M.S. Yousefpoor, E. Yousefpoor, H. Barati, A. Barati, A. Movaghar, M. Hosseinzadeh, Secure data aggregation methods and countermeasures against various attacks in wireless sensor networks: A comprehensive review, Journal of Network and Computer Applications, 190: 103118, 2021, doi: 10.1016/j.jnca.2021.103118.
- 11. S.B. Sadkhan, A.O. Salman, A survey on lightweight-cryptography status and future challenges, [in:] 2018 International Conference on Advance of Sustainable Engineering and its Application (ICASEA), Wasit-Kut, Iraq, pp. 105–108, 2018, doi: 10.1109/ICASEA.2018.8370965.
- 12. K.N. Mishra, C. Chakraborty, A novel approach towards using big data and IoT for improving the efficiency of m-health systems, [in:] Advanced Computational Intelligence Techniques for Virtual Reality in Healthcare, D. Gupta, A. Hassanien, A. Khanna [Eds.], Studies in Computational Intelligence, Springer, Vol. 875, pp. 123–139, 2020, doi: 10.1007/978-3-030-35252-3_7.
- 13. A. Kishor, C. Chakraborty, W. Jeberson, Intelligent healthcare data segregation using fog computing with internet of things and machine learning, International Journal of Engineering Systems Modelling and Simulation, 12(2–3): 188–194, 2021, doi: 10.1504/IJESMS.2021.115533.
- 14. C. Chakraborty, Performance analysis of compression techniques for chronic wound image transmission under smartphone-enabled tele-wound network, [in:] Research Anthology on Telemedicine Efficacy, Adoption, and Impact on Healthcare Delivery, IGI Global, pp. 345–364, 2021, doi: 10.4018/978-1-7998-8052-3.ch018.
- 15. P. Gope, T. Hwang, A realistic lightweight anonymous authentication protocol for securing real-time application data access in wireless sensor networks, IEEE Transactions on Industrial Electronics, 63(11): 7124–7132, 2016, doi: 10.1109/TIE.2016.2585081.
- 16. A. Ghani, K. Mansoor, S. Mehmood, S.A. Chaudhry, A.U. Rahman, M. Najmus Saqib, Security and key management in IoT-based wireless sensor networks: An authentication protocol using symmetric key, International Journal of Communication Systems, 32(16): e4139, 2019, doi: 10.1002/dac.4139.
- 17. M. Elhoseny, H. Elminir, A. Riad, X. Yuan, A secure data routing schema for WSN using elliptic curve cryptography and homomorphic encryption, Journal of King Saud University-Computer and Information Sciences, 28(3): 262–275, 2016, doi: 10.1016/j.jksuci.2015.11.001.
- 18. A. Praveena, S. Smys, Efficient cryptographic approach for data security in wireless sensor networks using MES V-U, [in:] 2016 10th International Conference on Intelligent Systems and Control (ISCO), Coimbatore, India, pp. 1–6, 2016, doi: 10.1109/ISCO.2016.7726911.
- 19. J. Srinivas, S. Mukhopadhyay, D. Mishra, Secure and efficient user authentication scheme for multi-gateway wireless sensor networks, Ad Hoc Networks, 54: 147–169, 2017, doi: 10.1016/j.adhoc.2016.11.002.
- 20. D. Wang, W. Li, P. Wang, Measuring two-factor authentication schemes for real-time data access in industrial wireless sensor networks, IEEE Transactions on Industrial Informatics, 14(9): 4081–4092, 2018, doi: 10.1109/TII.2018.2834351.
- 21. S. Prakash, A. Rajput, Hybrid cryptography for secure data communication in wireless sensor networks, [in:] Ambient Communications and Computer Systems, G. Perez, S. Tiwari, M. Trivedi, K. Mishra [Eds.], Advances in Intelligent Systems and Computing, Vol. 696, pp. 401–410, Springer, 2018, doi: 10.1007/978-981-10-7386-1_50.
- 22. S. Farooq, D. Prashar, K. Jyoti, Hybrid encryption algorithm in wireless body area networks (WBAN), [in:] Intelligent Communication, Control and Devices, R. Singh, S. Choudhury, A. Gehlot [Eds.], Advances in Intelligent Systems and Computing, Vol. 624, pp. 401–410, Springer, 2018, doi: 10.1007/978-981-10-5903-2_41.
- 23. M. Alotaibi, An enhanced symmetric cryptosystem and biometric-based anonymous user authentication and session key establishment scheme for WSN, IEEE Access, 6: 70072–70087, 2018, doi: 10.1109/ACCESS.2018.2880225.
- 24. J. Jung, J. Kim, Y. Choi, D. Won, An anonymous user authentication and key agreement scheme based on a symmetric cryptosystem in wireless sensor networks, Sensors, 16(8): 1299, 2016, doi: 10.3390/s16081299.
- 25. V.S. Naresh, R. Sivaranjani, N.V.E.S. Murthy, Provable secure lightweight hyper elliptic curve-based communication system for wireless sensor networks, International Journal of Communication Systems, 31(15): e3763, 2018, doi: 10.1002/dac.3763.
- 26. K.M. Abdullah, E.H. Houssein, H.H. Zayed, New security protocol using hybrid cryptography algorithm for WSN, [in:] 2018 1st International Conference on Computer Applications & Information Security (ICCAIS), Riyadh, Saudi Arabia, pp. 1–6, 2018, doi: 10.1109/CAIS.2018.8442003.
- 27. N. Gupta, V. Kapoor, Hybrid cryptographic technique to secure data in web application, Journal of Discrete Mathematical Sciences Cryptography, 23(1): 125–135, 2020, doi: 10.1080/09720529.2020.1721872.
- 28. M. Yuvaraju, K.A. Pranesh, Energy proficient hybrid secure scheme for wireless sensor networks, Wireless Personal Communications, 117: 747–767, 2021, doi: 10.1007/s11277-020-07895-x.
- 29. C.-W. Hung, W.-T. Hsu, Power consumption and calculation requirement analysis of AES for WSN IoT, Sensors, 18(6): 1675, 2018, doi: 10.3390/s18061675.
- 30. S. Ali et al., An efficient cryptographic technique using modified Diffie–Hellman in wireless sensor networks, International Journal of Distributed Sensor Networks, 16(6): 1550147720925772, 2020, doi: 10.1177/1550147720925772.
Typ dokumentu
Bibliografia
Identyfikator YADDA
bwmeta1.element.baztech-df86d591-92b5-4320-98c2-ce04ea739921