scholarly journals Group authentication and key distribution for sensors in wireless body area network

2021 ◽  
Vol 17 (9) ◽  
pp. 155014772110443
Author(s):  
Yong Ding ◽  
Hui Xu ◽  
Meng Zhao ◽  
Hai Liang ◽  
Yujue Wang

Wireless body area network can be employed to collect patient’s electronic health data. To guarantee the reliability and confidentiality of the collected data, secure data transmission in wireless body area network is required. In wireless body area network, a mutual authentication process has to be carried out between the controller and sensors to ensure their legitimacy, and a key distribution mechanism is required to secure communication after successful mutual authentication. Li et al. proposed a cryptographic solution, which allows group device pairing authentication and key agreement but has low authentication efficiency and key leakage problems. To address these issues, a group authentication and key distribution scheme is proposed in this article. It enables effectively mutual authentication between controller and sensors, supports all signatures of sensors in the group to be checked by the controller through aggregation verification to achieve efficient authentication, and allows key distribution during authentication to improve the computation efficiency. Security analysis indicates that the proposed scheme enjoys existentially unforgeability, and theoretical and experimental comparison demonstrates its practicality in terms of computation and communication cost.

Network security has been great concern with recent technical advancement in wireless communication. And for that, a secured system is to be developed to provide data security over wireless transmission. This paper presents wireless body area network (WBAN) with cryptographic AES algorithm which monitors patient biomedical parameters based on sensors, Arduino and ZigBee. WBAN provides real-time measurements of patients health based on biomedical sensor. AES cryptographic algorithm is implemented for secure communication over wireless network by encryption and decryption of physiological parameters. Implementation of algorithm using Arduino has been communicated by ZigBee network to provide security to the encrypted data (cipher text) on medium cost devices. This ensures security of data for medical rehabilitation and monitoring of patients. The main purpose of this paper is to help a physician to treat patients during emergency by monitoring patients round the clock (24*7). This paper is helpful for elderly and disabled people with no assistance to measure and send the results to the doctor immediately


2020 ◽  
Vol 6 (11) ◽  
pp. 48-53
Author(s):  
Vineeta Shrivastava ◽  
Mayank Namdev

Now-a-days ireless Body Area Network (WBAN) is considered to be new era technique in which patient’s health record are monitored remotely by using wearable sensors from anywhere in the world. In such high-level communication, there is need of security services are required to protect the data being used by healthcare professionals and patients from intruders or attackers. Therefore, many researchers are showing their keen interest for security enhancement of WBAN architecture for secure communication. In this dissertation work, different security and privacy techniques are reviewed and analysed WBAN/IoT challenges as well their limitations based on the latest standards and publications. This research also covers the state-of-art security measures and research in WBAN. This research presents an ElGamal cryptosystem and biometric information authentication scheme for WBAN/IOT applications. This work observed that most of the authentication protocols using hash function and ElGamal cryptosystem for cloud-based applications are affected by security attacks and are unable to hide the actual identities of the end users during login session. Therefore, this work has introduced a secure biometric ElGamal-based authentication as well as data sharing schemes. The result analysis shows that the proposed work is better with respect to existing work with respect to execution time and cost as well as security level.


Sign in / Sign up

Export Citation Format

Share Document