An Efficient and Secure Approach to Prevent Data attack in WBAN Server using ElGamal Algorithm

Authors

  • Hemlathadhevi A Department of Computer Science and Engineering, Panimalar Engineering college, Chennai, TamilNadu, India. Author
  • Thirupurasundari D. R Department of Computer Science and Engineering, Bharath Institute of Higher Education and Research, Chennai, Tamil Nadu, India. Author
  • Vijay Ramalingam Department of Computer Science and Engineering, Satyabama Institute of Science and Technology (Deemed to be University), Chennai, Tamil Nadu, India. Author

Keywords:

Wireless Body Area Network (WBAN), Wireless Medical Sensor Network (WMSN), Patient Data Privacy, ElGamal Encryption

Abstract

In recent years, wireless body area networks are broadly used in healthcare applications, such as hospitals and home patients. Wireless health sensor networks are much more sensitive to wiretaps, modifications, identity transfer, and repetition of attacks than cable networks. The present has been a major of work on provided that wireless health sensor networks. Existing solutions protect the patient's data during transmission, but they cannot prevent an internal attack where patient database administrators detect sensitive patient data. In this article, we offer a practical approach to preventing internal attacks by using multiple data servers to store patient data. The most important contribution to this article is the safe distribution of patient data on multiple data servers and ElGamal cryptographic systems to achieve statistical analysis on the patient data without compromising the patients’ confidentiality 

Downloads

Download data is not yet available.

References

Huang, Haiping, Tianhe Gong, Ning Ye, Ruchuan Wang, and Yi Dou. "Private and secured medical data transmission and analysis for wireless sensing healthcare system." IEEE Transactions on Industrial Informatics 13, no. 3 (2017): 1227-1237.

D. Malan, T. F. Jones, M. Welsh, S. Moulton. CodeBlue: An Ad-Hoc Sensor Network Infrastructure for Emergency Medical Care. In Proc. MobiSys 2004 Workshop on Applications of Mobile Embedded Systems (WAMES’04), Boston, MA, USA,6-9 June 2004.

Kumar, Pradeep, and Hoon-Jae Lee. "Security issues in healthcare applications using wireless medical sensor networks: A survey." Sensors 12, no. 1 (2011): 55-91.

X. Yi, J. Williamson, F. Nat-Abdesselam. Privacy-Preserving Wireless Medical Sensor Network. In Proc. TrustCom'13, pages 118-125, 2013.

T. ElGamal. A Public-Key Cryptosystem and a Signature Scheme Based on Discrete Logarithms. IEEE Transactions on Information Theory, 31 (4): 469-472, 1985.

Advanced Encryption Standard (AES). FIPS PUB 197, November 26, 2001. http://csrc.nist.gov/publications/fips/fips197/fips-197.pdf

S. Dagtas, G. Pekhteryev, Z. Sahinoglu, H. Cam, N. Challa.Real-Time and Secure Wireless Health Monitoring. Int. J.Telemed. Appl. 2008, doi: 10.1155/2008/135808.

F. Hu, M. Jiang, M. Wagner, D. C. Dong. Privacy-Preserving Telecardiology Sensor Networks: Toward a Low-Cost Portable Wireless Hardware/Software Codesign. IEEE Trans. Inform.Tech. Biomed, 11: 619-627, 2007.

P. Kumar, Y. D. Lee, H. J. Lee. Secure Health Monitoring Using Medical Wireless Sensor Networks. In Proc. 6th International Conference on Networked Computing and Advanced Information Management, pages 491-494, Seoul, Korea, 16-18 August 2010.

S. Raazi, H. Lee, S. Lee, Y. K. Lee. BARI+: A Biometric Based Distributed Key Management Approach for Wireless Body Area Networks. Sensors 10: 3911-3933, 2010.

A. B. Waluyo, I. Pek, X. Chen, W.-S.Yeoh. Design and Evaluation of Lightweight Middleware for Personal Wireless Body Area Network. Pers. Ubiquiti. Comput, 13: 509-525, 2009.

X. Yi, J. Williamson, F. Nat-Abdesselam. Privacy-Preserving Wireless Medical Sensor Network. In Proc. TrustCom'13, pages 118-125, 2013.

H. Zhao, J. Qin, and J. Hu. An Energy Efficient Key Management Scheme for Body Sensor Networks. IEEE Transactions on Parallel and Distributed Systems, 24 (11): 2202-2210, 2013.

W. Diffie and M. Hellman. New Directions in Cryptography.IEEE Transactions on Information Theory, 22 (6): 644-654,1976.

R. Rivest, A. Shamir, and L. Adleman. A Method for Obtaining Digital Signatures and Public-Key Cryptosystems. Communications of the ACM, 21 (2): 120-126, 1978.

D. He, S. Chan and S. Tang. A Novel and Lightweight System to Secure Wireless Medical Sensor Networks. IEEE Journal of Biomedical and Health Informatics, 18 (1): 316-326, 2014.

Y. M. Huang, M. Y. Hsieh, H. C. Hung, J. H. Park. Pervasive, Secure Access to a Hierarchical Sensor-Based Healthcare Monitoring Architecture in Wireless Heterogeneous Networks.IEEE J. Select. Areas Commun. 27: 400-411, 2009.

Muhammad, K.R.R.S.; Lee, H.; Lee, S.; Lee, Y.K. BARI+: A Biometric Based Distributed Key Management Approach for Wireless Body Area Networks. Sensors 2010, 10, 3911–3933.

Waluyo, A.B.; Pek, I.; Chen, X.; Yeoh, W.-S. Design, and Evaluation of Lightweight Middleware for Personal Wireless Body Area Network. Pers. Ubiquiti. Comput 2009, 13, 509–525.

Huang, Y.M.; Hsieh, M.Y.; Hung, H.C.; Park, J.H. Pervasive, Secure Access to a Hierarchical Sensor-Based Healthcare Monitoring Architecture in Wireless Heterogeneous Networks. IEEE J. Select. Areas Commun 2009, 27, 400–411.

Muraleedharan, R.; Osadciw, L.A. Secure Healthcare Monitoring Network Against Denial-of-Service Attacks Using Cognitive Intelligence. Proceedings of Communication Networks and Services Research Conference, Halifax, NS, Canada, 5–8 May 2008; pp. 165–170.

Le, X.H.; Khalid, M.; Sankar, R.; Lee, S. An Efficient Mutual Authentication and Access Control Scheme for Wireless Sensor Network in Healthcare. J. Networks2011, 27, 355–364.

Boukerche, A.; Ren, Y. A Secure Mobile Healthcare System Using Trust-Based Multicast Scheme. IEEE J. Select. Area. Commun 2009, 27, 387–399.

Kang, D.O.; Lee, H.J.; Ko, E.J.; Kang, K.; Lee, J. A Wearable Context-Aware System for Ubiquitous Healthcare. Proceedings of 28th IEEE EMBS Annual International Conference, New York, NY, USA, 30 August–3 September 2006; pp. 5192–5195.

Kang, D.O.; Lee, H.J.; Ko, E.J.; Kang, K.; Lee, J. A Wearable Context-Aware System for Ubiquitous Healthcare. Proceedings of 28th IEEE EMBS Annual International Conference, New York, NY, USA, 30 August–3 September 2006; pp. 5192–5195.

SHA-3 Standard: Permutation-Based Hash and Extendable-Output Functions. Draft FIPS PUB 202, May 2014.http:csrc.nist.govpublicationsdraftsfips202fips 202 draft.pdf

Digital Signature Standard (DSS). FIPS PUB 186-4, July 2013,http://nvlpubs.nist.gov/nistpubs/FIPS/NIST.FIPS.186-4.pdf.

Published

2024-02-26

Issue

Section

Research Articles

How to Cite

A, Hemlathadhevi, Thirupurasundari D. R, and Vijay Ramalingam. 2024. “An Efficient and Secure Approach to Prevent Data Attack in WBAN Server Using ElGamal Algorithm”. International Journal of Scientific and Research in Engineering(IJSRE) 1 (1): 1-10. http://ijsre.org/index.php/home/article/view/1.

Similar Articles

You may also start an advanced similarity search for this article.