Security Protocol to Verify Authentication for Wireless Body Area Networks Integrate with Blockchain
Main Article Content
Abstract
The advancement of wireless communication, Wireless Body Area Network (WBAN) has gained a lot of attention with the development of compact sensors Medical information is very sensitive. If any physiological information is tampered with or intercepted, it may affect the diagnosis or the patient's privacy. Security in WBAN is still important. Therefore, it is important to verify the authentication of each other's sending and receiving data. between the sensor node and the server to protect patient information from malicious people. and for the privacy of patients. This research presents a protocol for secure authentication between sensor node and server. nodes connected to the patient's body We use the hash function. to make the protocol lightweight. In addition, the security analysis and the integration of blockchain technology It shows that the model in the research presented is consistent with the necessary safety features. make the protocol efficient
Article Details
This work is licensed under a Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License.
I/we certify that I/we have participated sufficiently in the intellectual content, conception and design of this work or the analysis and interpretation of the data (when applicable), as well as the writing of the manuscript, to take public responsibility for it and have agreed to have my/our name listed as a contributor. I/we believe the manuscript represents valid work. Neither this manuscript nor one with substantially similar content under my/our authorship has been published or is being considered for publication elsewhere, except as described in the covering letter. I/we certify that all the data collected during the study is presented in this manuscript and no data from the study has been or will be published separately. I/we attest that, if requested by the editors, I/we will provide the data/information or will cooperate fully in obtaining and providing the data/information on which the manuscript is based, for examination by the editors or their assignees. Financial interests, direct or indirect, that exist or may be perceived to exist for individual contributors in connection with the content of this paper have been disclosed in the cover letter. Sources of outside support of the project are named in the cover letter.
I/We hereby transfer(s), assign(s), or otherwise convey(s) all copyright ownership, including any and all rights incidental thereto, exclusively to the Journal, in the event that such work is published by the Journal. The Journal shall own the work, including 1) copyright; 2) the right to grant permission to republish the article in whole or in part, with or without fee; 3) the right to produce preprints or reprints and translate into languages other than English for sale or free distribution; and 4) the right to republish the work in a collection of articles in any other mechanical or electronic format.
We give the rights to the corresponding author to make necessary changes as per the request of the journal, do the rest of the correspondence on our behalf and he/she will act as the guarantor for the manuscript on our behalf.
All persons who have made substantial contributions to the work reported in the manuscript, but who are not contributors, are named in the Acknowledgment and have given me/us their written permission to be named. If I/we do not include an Acknowledgment that means I/we have not received substantial contributions from non-contributors and no contributor has been omitted.
References
Y. Qu, G. Zheng, H. Ma, X. Wang, B. Ji, and H. Wu, "A survey of routing protocols in WBAN for healthcare applications. Sensors", vol. 19, no. 7, pp. 1638, 2019.
M. Ghamari, B. Janko, R.S. Sherratt, W. Harwin, R. Piechockic, and C. Soltanpur, “A survey on wireless body area networks for ehealthcare systems in residential environments”, Sensors, vol. 16, no.6, pp. 831, 2016.
B. Narwal, and A.K. Mohapatra, “A survey on security and authentication in wireless body area networks”, Journal of Systems Architecture, vol. 113, pp. 101883, 2021.
S. Al-Janabi, I. Al-Shourbaji, M. Shojafar, and S. Shamshirband, “Survey of main challenges (security and privacy) in wireless body area networks for healthcare applications”, Egyptian Informatics Journal, vol. 18, no. 2, pp. 113-122, 2017.
M. Polai, S. Mohanty, and S.S. Sahoo, “A lightweight mutual authentication protocol for wireless body area network”, In international conference on signal processing and integrated networks, pp. 760-765, 2019.
M. Kim, J. Lee, S. Yu, K. Park, Y. Park, and Y. Park, “A secure authentication and key establishment scheme for wearable devices”, In International Conference on Computer Communication and Networks, pp. 1-2. 2019.
K. Chatterjee, “An improved authentication protocol for wireless body sensor networks applied in healthcare applications”, Wireless Personal Communications, vol.111, no. 4, pp. 2605-2623, 2020.
K. Parvez, F.T. Zohra, and M. Jahan, “A secure and lightweight user authentication mechanism for wireless body area network”, In Proceedings of the International Conference on Networking, Systems and Security, pp. 139-143, 2019.
B.A. Alzahrani, “Secure and efficient cloud-based IoT authenticated key agreement scheme for e-health wireless sensor networks”, Arabian Journal for Science and Engineering, vol. 46, no. 4, pp. 3017-3032, 2021.
G. Praveen, P.K. Singh, and P. Ranjan, “The impact of blockchain on the healthcare environment”, Central University of South Bihar, Gaya, India, 7 Jun 2021.
L. Xiao, D. Han, X. Meng, W. Liang, and K. Li, “A secure framework for data sharing in private blockchain-based WBANs”, IEEE Access, vol. 8, pp. 153956-153968, 2020.
Y. Ren, Y. Leng, F. Zhu, J. Wang, and H. Kim, “Data storage mechanism based on blockchain with privacy protection in wireless body area network”, Sensors, vol. 19, no. 10, pp. 2395, 2019.
N.R. Potlapally, S. Ravi, A. Raghunathan, and N. K. Jha, "A study of the energy consumption characteristics of cryptographic algorithms and security protocols," in IEEE Trans. Mobile computing, vol. 5, no. 2, pp. 128-143, 2006.
A. Castiglione, F. Palmieri, U. Fiore, A. Castiglione, and A. De Santis, "Modeling energy-efficient secure communications in multi-mode wireless mobile devices," Journal of Computer and System Sciences, vol 81, no. 8, pp. 1464-1478, 2015.
C. Thammarat, and C. Techapanupreeda, "Secure mutual authentication protocol based on wireless body area networks", Journal of Information Science and Technology, vol. 11, no. 2, pp. 29-37, 2021.
C. Thammarat, and C. Techapanupreeda, "A secure authentication and key exchange protocol for M2M communication", Electrical Engineering Congress (iEECON), pp. 456-459, 2021.
C.J.F. Cremers, “The scyther tool: verification, falsification, and analysis of security protocols,” In: International Conference on Computer Aided Verification. Springer, pp. 414-418, 2008.
C. Thammarat, and C. Techapanupreeda, "A secure mobile payment protocol for handling accountability with formal verification", International Conference on Information Networking (ICOIN), pp. 249-254), 2021.
C. Thammarat, and C. Techapanupreeda, "Secure key establishment protocol for smart homes based on symmetric cryptography", International Conference on Information Networking (ICOIN), pp. 46-51, 2022.