Abstract

Wireless body area networks (WBANs) can enable e-health applications under Internet of Things (IoT) scenarios. However, to use WBAN technologies in practical applications, sensitive data collected by wireless sensors must be protected when transmitted across a network and until accessed by authorized applications or end-users. Specifically, it is necessary to provide confidentiality, integrity, authentication and access control in WBANs. This paper presents a security approach to provide these security services in a layered WBAN system using lightweight cryptography. Layer 1 consists of the communication between the sensor nodes and the base station (data acquisition); Layer 2 involves the communication between the base station and a data repository (data storage); and Layer 3 deals with the communication of end-users to the repository (data access). In the past, security has focused only on Layer 1 and for limited security levels. In this paper, security concerns in the three layers of a WBAN system are studied and addressed. As primary contributions, the design details of a secure WBAN system prototype and the impact of lightweight cryptographic engines on the performance of the primary use cases in the WBAN system are highlighted from data acquisition until data use. We present a novel WBAN system prototype that ensures most of the required security services for standard security levels.

Highlights

  • The demand for advanced healthcare applications is expected to grow with the progressive deployment of the Internet of Things (IoT), including remote patient monitoring, which has become a reality to continuously track vital sign data from individuals

  • 1) We propose a novel abstraction model in which each security service (C, I, A, or access control (AC)) is characterized by a set of generic operations, which are provided by algorithms that have been carefully selected from the state-of-the-art on lightweight cryptography

  • RESULTS we present the results and analysis of the data obtained from the experimental evaluation based on the three experiments described in the previous section involving the security concerns at each layer in the proposed Wireless body area networks (WBANs)

Read more

Summary

Introduction

The demand for advanced healthcare applications is expected to grow with the progressive deployment of the Internet of Things (IoT), including remote patient monitoring, which has become a reality to continuously track vital sign data (e.g., blood pressure, blood oxygen levels, heart rate, etc.) from individuals. Collected information could be accessed by an authorized healthcare provider to enable, for example, the timely detection of clinical deterioration In this context, a prominent enabling technology in the IoT ecosystem to monitor patients’ vital sign data is the wireless body area network (WBAN). In e-health applications, a WBAN aims to provide an efficient and reliable communication infrastructure to all implanted, nonimplanted and wearable sensor devices for the human body [1] In this regard, because health data transmitted through a WBAN could be exposed to unauthorized parties, or even malicious adversaries, it is critical to ensure security services through the entire data stream (data life cycle), which involves data acquisition, data transmission to a storage system, and the data accessed by authorized users. The data cycle can be decomposed into a three-layer network architecture in terms of data collection (sensory stage), transmission (communication network) and storage (application)

Objectives
Methods
Results
Conclusion
Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.