scholarly journals Lightweight Fine-Grained Access Control for Wireless Body Area Networks

Sensors ◽  
2020 ◽  
Vol 20 (4) ◽  
pp. 1088 ◽  
Author(s):  
Mohammad Ali ◽  
Mohammad-Reza Sadeghi ◽  
Ximeng Liu

Wireless Body Area Network (WBAN) is a highly promising technology enabling health providers to remotely monitor vital parameters of patients via tiny wearable and implantable sensors. In a WBAN, medical data is collected by several tiny sensors and usually transmitted to a server-side (e.g., a cloud service provider) for long-term storage and online/offline processing. However, as the health data includes several sensitive information, providing confidentiality and fine-grained access control is necessary to preserve the privacy of patients. In this paper, we design an attribute-based encryption (ABE) scheme with lightweight encryption and decryption mechanisms. Our scheme enables tiny sensors to encrypt the collected data under an access control policy by performing very few computational operations. Also, the computational overhead on the users in the decryption phase is lightweight, and most of the operations are performed by the cloud server. In comparison with some excellent ABE schemes, our encryption mechanism is more than 100 times faster, and the communication overhead in our scheme decreases significantly. We provide the security definition for the new primitive and prove its security in the standard model and under the hardness assumption of the decisional bilinear Diffie-Hellman (DBDH) problem.

2021 ◽  
Vol 1 (2) ◽  
pp. 49-59
Author(s):  
Mubarak Umar ◽  
Zhenqiang Wu ◽  
Xuening Liao ◽  
Jiawang Chen ◽  
Bello Ahmad Muhammad

Owing to its capability to measure the sensitive biological data of patients through embedded sensors and transmit them via open wireless channels to remote medical experts, wireless body area network (WBAN) has been playing an important role in pervasive healthcare systems. However, the open nature of the wireless channels renders the data susceptible to being eavesdropped by an adversary and linked to the identities of the transmitting devices, which can enable the adversary to gain sensitive information and launch targeted physical attacks. Therefore, anonymous authentication and confidentiality of the data in WBAN are vital. In the last few years, numerous anonymous authentication schemes based on cryptographic primitives and physiological features were designed to enhance security in WBAN. However, most of the existing schemes are not computationally efficient or require additional sensing hardware. To address these limitations, we propose an efficient anonymous authentication scheme for WBAN based on signal propagation characteristics. The key idea in the proposed scheme is to utilize the distinct received signal strength (RSS) variation profiles between on-body and off-body communication channels to conceal the identities of communicating devices, thereby ensuring their anonymity during authentication. We perform security and performance analyses of the proposed approach to prove its security strength and computational efficiency, respectively. Moreover, extensive experiments are conducted on human volunteers in indoor and outdoor environments to show the robustness of our approach. The results of the analyses and the experiments show that our scheme can successfully mitigate 88.8% of active attack attempts with less computation overhead.


2021 ◽  
Author(s):  
Hailong Yao ◽  
Qiao Yan ◽  
Xingbing Fu ◽  
Zhibin Zhang ◽  
Caihui Lan

Abstract The E-healthcare system has a complex architecture, diverse business types, and sensitive data security. To meet the secure communication and access control requirements in the user-medical server, user-patient, patient-medical server and other scenarios in the E-healthcare system, secure and efficient authenticated key agreement and access authorization scheme need to be studied. However, the existing multi-server solutions do not consider the authentication requirements of the Wireless Body Area Network(WBAN), and are not suitable for user-patient, patient-medical server scenarios; most of the existing WBAN authentication scheme are single-server type, which are difficult to meet the requirements of multi-server applications; the study of user-patient real-time scenarios has not received due attention. This work first reveals the structural flaws and security vulnerabilities of the existing typical schemes, and then proposes an authentication and access control architecture suitable for multiple scenarios of the E-healthcare system with separate management and business, and designs a novel ECC-based multi-factor remote authentication and access control scheme for E-healthcare using physically uncloneable function (PUF) and hash. Security analysis and efficiency analysis show that the new scheme has achieved improved functionality and higher security while maintaining low computational and communication overhead.


2018 ◽  
pp. 55-58
Author(s):  
Hendro FJ Lami ◽  
Stephanie Imelda Pella

Protokol media access control (MAC) berperan menjamin keberhasilan transmisi data antar sensor nirkabel dan konsumsi daya pada Wireless Body Area Network (WBAN). Penelitian ini membandingkan unjuk kerja dua buah protocol MAC, yaitu T-MAC dan ZigbeeMAC pada sistem WBAN, pada laju kedatangan paket (λ) yang berbeda. Hasil simulasi menunjukan bahwa pada jaringan dengan λ rendah tingkat keberhasilan pengiriman paket antara protocol T-MAC dan ZigbeeMAC mencapai rata-rata 90% dari throughput maksimal walaupun pada kondisi tersebut kinerja ZigbeeMAC memiliki nilai lebih baik dibanding T-MAC. Pada laju kedatangan paket tinggi, throughput pada T-MAC memiliki perbedaan yang signifikan terhadap ZigbeeMAC. Pada keadaan terburuk troughput T-MAC adalah 88% dari throughput maksimal sedangkan Zigbee menurun hingga 43% dari throughput maksimal. Kosumsi daya pada ZigbeeMAC cenderung konstan untuk setiap laju kedatangan paket sedangkan pada T-MAC meningkat sejalan dengan pertambahan laju kedatangan paket.  


Internet of Things (IoT) devices under cloud assistance is deployed in different distributed environment. It collects sensed data and outsources the data to remote server and user for sharing. As IoT is used in important fields like healthcare, business and research, the sensed data are sensitive information which needs to be protected. Encryption is usual technique to protect data from adversaries. A fine grained access control is essential for heterogeneous device involved social network. The existing access control policies were defined for predefined identity and role which needs to be changed in dynamic situations. Moreover, all the necessary policies cannot be defined in advance and new policies were demanded for new situational context. To solve these issues, this work design a model which calculate final trust value based on semantic information dynamically referring to ontology. a access control policy is also designed on semantic role of the device. The semantic technology is used for high level reasoning of the context situation


2018 ◽  
Vol 42 (6) ◽  
Author(s):  
Anyembe Andrew Omala ◽  
Angolo Shem Mbandu ◽  
Kamenyi Domenic Mutiria ◽  
Chunhua Jin ◽  
Fagen Li

Sign in / Sign up

Export Citation Format

Share Document