Abstract

Objective: To review different key agreement schemes which are used to establish Wireless body area network (WBAN) on the basis of identified attacks and also evaluate the schemes on performance parameters. Method: In this paper, an overview of WBAN, its architecture, difference between WSN and WBAN, IEEE 802.15.6 specifications of WBAN, attacks in the environment and security essentials are discussed at first. It further divides the key agreement schemes into four classes and provides an extensive review of the schemes on the basis of distinct parameters viz. data confidentiality, node authentication, data integrity, mutual authentication, unforgeability, unlinkability, forward/backward secrecy, scalability, freshness, dos attack and node capture attack. Schemes are searched using the keywords- (“Traditional Key Agreement Scheme” OR “Physiological Key Agreement Scheme” OR “Signal Based Key Agreement Scheme” OR “Hybrid Key Agreement Scheme” OR “Security in Key Agreement Scheme”) AND (“Wireless Body Area Network” OR “WBAN” OR “Body Area Network” OR “BAN” OR “Body Sensor Network” OR “BSN” OR “Medical Body Area Network” OR “MBAN”). The papers are shortlisted around long stretches of 2003-2021 with a focus on recent work from IEEE Xplore, Springer, Science Direct, ACM, MDPI and Google Scholar databases. Schemes are analyzed against the mentioned attacks and the result of the comparative analysis is shown using tables and chart tools graphically. Findings: The wide coverage of the schemes in this review provides in-depth exposure to the shortcomings of the different schemes against the listed attacks which will provide a road map to the researchers to develop secure schemes in the future. Moreover, maximum schemes do not consider all the three aspects of performance viz. memory efficiency, computational efficiency and energy efficiency which are the foremost parameters in resource scarce environment of WBAN. Novelty: This review is unique as it analyzes the distinct key agreement schemes under specific attacks found in the literature while other review papers discuss the general aspects of the security threats and corresponding counter measures in WBAN environment. It also provides the performance analysis of the key management schemes which are missing from other review works. Keywords: WBAN; IOT; Bio sensors; Security; Privacy; Attacks; Encryption; Key agreement schemes; IEEE 802.15.6

Highlights

  • With the advancement in electronics and embedded systems, the size of the biosensors has been reduced to a level that it is possible to wear these sensors either on the clothing or body or even implanted inside the body [1]

  • A compromised server may divert all the medical data towards the attacker which can play disastrous to the system

  • Taxonomy is provided to analyze different key agreement schemes based upon the identified security parameters

Read more

Summary

Introduction

With the advancement in electronics and embedded systems, the size of the biosensors has been reduced to a level that it is possible to wear these sensors either on the clothing or body or even implanted inside the body [1]. The data gathered on personal server is communicated to nearby linked device or PDA in tier 2 This communication is found to be heterogeneous and required to be protected. This paper covers the security key agreement schemes required in intra-WBAN architecture which is the primary aspect of security in tier 1. T. et al[22] provides a comparison of multiple data security schemes for WBAN considering different attack scenarios. This review work fills the research gap found in the available literature It is an improvement over the past reviews on key agreement schemes in WBAN which are first and foremost agenda in securing WBAN. Unlike other review papers which cover the general aspects of the security requirements in WBAN, this work provides a detailed review which covers a range of key agreement schemes since almost the inception of WBAN up to the latest.

Inceptive Level
Subservient Level
Difference between WSN and WBAN
Attacks on BAN
Security Requirements of WBAN
Key Agreement in WBAN
Key Revocation
Traditional key agreement schemes
Physiological value based key agreement schemes
Physiological value based protocols without pre-distributed secret keys
Signal Based Secret key generation schemes
Hybrid key agreement scheme
Analysis of Key Agreement Scheme on the basis of different parameters
Analysis of Traditional Key Agreement Schemes
Analysis of Hybrid Key Agreement Schemes
Findings
Conclusion
Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call