Abstract

With the development of sensor devices, wireless sensor networks have been widely used, and Wireless Body Area Networks (WBANs) are relatively common application scenarios in wireless sensor networks. The wearable device is used to collect physiological data of the human body, and the server device is adopted to store physiological data of the human body. The openness of the network environment and network devices' dynamic nature make WBANs vulnerable to security threats from attackers. The centralized two-hop architecture contains only one hub node, and the data stored in the hub node may be tampered with by attackers. Once attackers occupy the node, the entire network will be paralyzed. To tackle such an issue, it is proposed in this article a model in WBANs architecture based on Blockchain technology, where the authentication protocol and blind signature protocol between nodes are designed in the new WBANs model, making the Blockchain data transmission system in a wireless network environment secure and reliable. Experimental results show that the proposed method is promising and shows higher levels of safety and stability than other methods.

Highlights

  • With the development of the mobile Internet, several sensor nodes and server nodes can be connected to form a wireless sensor network

  • Sensor nodes are responsible for perceiving the environment and collecting data and transmitting the collected data to the server node, whereas the server node is responsible for processing and storing the data sent by the sensor node [1,2,3]

  • Wireless body area networks (WBANs) are a small sensor network composed of sensor nodes worn on the patient's body, which is used to collect the human body's physiological data

Read more

Summary

INTRODUCTION

With the development of the mobile Internet, several sensor nodes and server nodes can be connected to form a wireless sensor network. In addition to technical improvements, data security and privacy protection need to comply with national and international laws and regulations Once these data are leaked, it will infringe on the privacy of patients. Using local regenerative code technology to repair and store data between failed nodes can ensure user data safety, so the experiments will show how the scheme has dramatically improved the repair rate of multi-node data and data storage rates

BACKGROUND
BLOCKCHAIN-BASED BLIND SIGNATURE PROTOCOL
SECURITY AND PRIVACY ANALYSIS
INFORMAL SECURITY ANALYSIS
PERFORMANCE EVALUATION
CONCLUSIONS
Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.