A Novel of High Secure Protocol Architecture for Healthcare Wireless Body Area Network

Authors

  • K. Uma School of Information Technology and Engineering, VIT University, TamilNadu, India. Author
  • Thirumurugan Shanmugam Department of Information Technology, College of Applied Sciences Suhar, Oman. Author

Keywords:

Medical Wireless Body Area Network (MWBAN), Healthcare, Security, Hospital, Encryption, Data Transmission

Abstract

The distributed wireless sensor network technologies have become one of the most important research areas in health care due to the rapid maturity of improving quality of life. The Wireless Medical Sensing Network (MWSN) enables long-term monitoring of vital health parameters, allowing doctors to make a more accurate diagnosis and better treatment. MWSNs provide flexibility and cost savings for patients and the healthcare industry. Medical patient sensors are generating more and more real-time data. The transmission of these data over wireless networks in the hospital has become a serious problem as one person's health information is highly sensitive, confidential and confidential. In this paper, we provide security models that protect the transmission of medical data to hospitals using MWSN. We offer encrypted encryption to transmit secure, low-lifetime information through sensor networks.

Downloads

Download data is not yet available.

References

B. Chandrasekaran, R. Balakrishnan, and Y. Nogami, "Secure Data Communication using File Hierarchy Attribute-Based Encryption in Wireless Body Area Networks," 2018. http://dx.doi.org/10.24138/jcomss.v14i1.446

M. Compare and M. Hölbl, "Survey on security in intra-body area network communication," Ad Hoc Networks, vol. 70, pp. 23–43, 2018. ttp://dx.doi.org/10.1016/j.adhoc.2017.11.006

J. Shen, S. Chang, J. Shen, Q. Liu, and X. Sun, “A lightweight multi-layer authentication protocol for wireless body area networks,” Futur. Gener. Comput. Syst., vol. 78, pp. 956–963, 2018.

J. Shen, Z. Gui, S. Ji, J. Shen, H. Tan, and Y. Tang, "Cloud-aided lightweight certificate-less authentication protocol with anonymity for wireless body area networks," J. Netw. Comput. Appl., vol. 106, pp. 117–123, 2018.

M. Al Ameen, J. Liu, and K. Kwak, “Security and privacy issues in wireless sensor networks for healthcare applications,” J. Med. Syst., vol. 36, no. 1, pp. 93–101, 2012. http://dx.doi.org/10.1007/s10916-010-9449-4

Q. Pu, J. Wang, and R. Zhao, “Strong authentication scheme for telecare medicine information systems,” J. Med. Syst., vol. 36, no. 4, pp. 2609–2619, 2012.

L. Uhsadel, A. Poschmann, and C. Paar, “Enabling full-size public-key algorithms on 8-bit sensor nodes,” in European Workshop on Security in Ad-hoc and Sensor Networks, 2007, pp. 73–86. http://dx.doi.org/10.1007/978-3-540-73275-4_6

P. Szczechowiak, L. B. Oliveira, M. Scott, M. Collier, and R. Dahab, “NanoECC: Testing the limits of elliptic curve cryptography in sensor networks,” in Wireless sensor networks, Springer, 2008, pp. 305–320. http://dx.doi.org/10.1007/978-3-540-77690-1_19

K. Malasri and L. Wang, “Addressing security in medical sensor networks,” in Proceedings of the 1st ACM SIGMOBILE international workshop on Systems and networking support for healthcare and assisted living environments, 2007, pp. 7–12. ttp://dx.doi.org/10.1145/1248054.1248058

L. B. Oliveira, D. F. Aranha, E. Morais, F. Daguano, J. López, and R. Dahab, “TinyTate: Identity-Based Encryption for Sensor Networks.,” IACR Cryptol. EPrint Arch., vol. 2007, p. 20, 2007.

C. C. Tan, H. Wang, S. Zhong, and Q. Li, "Body sensor network security: an identity-based cryptography approach," in Proceedings of the First ACM conference on Wireless network security, 2008, pp. 148–153.

C. C. Tan, H. Wang, S. Zhong, and Q. Li, "IBE-lite: lightweight identity-based cryptography for body sensor networks," IEEE Trans. Inf. Technol. Biomed., vol. 13, no. 6, pp. 926–932, 2009.

X. H. Le, M. Khalid, R. Sankar, and S. Lee, “An efficient mutual authentication and access control scheme for wireless sensor networks in healthcare,” J. Networks, vol. 6, no. 3, p. 355, 2011.

M. Balouchestani, K. Raahemifar, and S. Krishnan, “Low power wireless body area networks with compressed sensing theory,” in Circuits and Systems (MWSCAS), 2012 IEEE 55th International Midwest Symposium on, 2012, pp. 916–919. http://dx.doi.org/10.1109/MWSCAS.2012.6292170.

P. Zhang, C. Chen, and M. Liu, “The application of compressed sensing in wireless sensor network,” in Wireless Communications & Signal Processing, 2009. WCSP 2009. International Conference on, 2009, pp. 1–5. http://dx.doi.org/10.1109/WCSP.2009.5371386

C. Castelluccia, A. C. F. Chan, E. Mykletun, and G. Tsudik, “Efficient and provably secure aggregation of encrypted data in wireless sensor networks,” ACM Trans. Sens. Networks, vol. 5, no. 3, p. 20, 2009. http://dx.doi.org/10.1145/1525856.1525858

J. Domingo-Ferrer, “A provably secure additive and multiplicative privacy homomorphism,” in International Conference on Information Security, 2002, pp. 471–483. http://dx.doi.org/10.1007/3-540-45811-5_37

P. Levis, N. Lee, M. Welsh, and D. Culler, “TOSSIM: Accurate and scalable simulation of entire TinyOS applications,” in Proceedings of the 1st international conference on Embedded networked sensor systems, 2003, pp. 126–137. http://dx.doi.org/10.1145/958491.958506

C. Karlof, N. Sastry, and D. Wagner, “TinySec: a link layer security architecture for wireless sensor networks,” in Proceedings of the 2nd international conference on Embedded networked sensor systems, 2004, pp. 162–175. http://dx.doi.org/10.1145/1031495.1031515

Published

2024-04-27

Issue

Section

Research Articles

How to Cite

K. Uma, and Thirumurugan Shanmugam. 2024. “A Novel of High Secure Protocol Architecture for Healthcare Wireless Body Area Network”. International Journal of Scientific and Research in Engineering(IJSRE) 1 (2): 20-28. http://ijsre.org/index.php/home/article/view/6.

Similar Articles

You may also start an advanced similarity search for this article.