Public-Key Authentication for Cloud-based WBANs

Merging WBAN systems with cloud computing is an efficient solution to overcome limitations inherent in WBAN, especially in critical human-related applications such as remote health monitoring. In cloud-based WBAN, the nodes are classified into WBAN sensors that report measurements about the human body and WBAN actuators that receive commands from the medical staff and perform actions. Authenticating these commands is a critical security issue as any alteration may lead to serious consequences. This paper presents a light-weight public-key authentication protocol for cloud-based WBAN systems. The proposed protocol is based on the modified Rabin authentication algorithm which is customized in this paper by making some of its components run in parallel. To prove the efficiency of the modified Rabin we implemented the algorithm with different hardware settings using Tmote Sky motes. The Rabin algorithm with and without the parallel settings is also programmed on FPGA to evaluate its design and performance. The results show that secure, direct, instant, and authenticated commands can be delivered from the medical staff located at the cloud side to the WBAN nodes located in/on the human body. Compared to other public-key protocols implemented on the motes, Rabin algorithm achieved extremely faster verification and reasonable signature generation speed. Moreover, the suggested parallel settings of the Rabin signature generation significantly reduced the delays (by almost 80%) which is a critical issue in WBAN applications.

[1]  P. Brandão Abstracting information on body area networks , 2012 .

[2]  Ralph C. Merkle,et al.  A Certified Digital Signature , 1989, CRYPTO.

[3]  Hoh Peter In,et al.  A scheme for data confidentiality in Cloud-assisted Wireless Body Area Networks , 2014, Inf. Sci..

[4]  Berk Sunar,et al.  Public Key Cryptography in Sensor Networks - Revisited , 2004, ESAS.

[5]  Vlado Handziski,et al.  Experimental Study of the Impact of WLAN Interference on IEEE 802.15.4 Body Area Networks , 2009, EWSN.

[6]  Athanasios V. Vasilakos,et al.  ReTrust: Attack-Resistant and Lightweight Trust Management for Medical Sensor Networks , 2012, IEEE Transactions on Information Technology in Biomedicine.

[7]  Michael D. Smith,et al.  A public-key infrastructure for key distribution in TinyOS based on elliptic curve cryptography , 2004, 2004 First Annual IEEE Communications Society Conference on Sensor and Ad Hoc Communications and Networks, 2004. IEEE SECON 2004..

[8]  Farid Touati,et al.  U-Healthcare System: State-of-the-Art Review and Challenges , 2013, Journal of Medical Systems.

[9]  Ingrid Moerman,et al.  A Comprehensive Survey of Wireless Body Area Networks , 2012, Journal of Medical Systems.

[10]  Hong Liu,et al.  Modeling of WBAN and Cloud Integration for Secure and Reliable Healthcare , 2013, BODYNETS.

[11]  Miodrag Potkonjak,et al.  mHealthMon: Toward Energy-Efficient and Distributed Mobile Health Monitoring Using Parallel Offloading , 2013, 2013 35th Annual International Conference of the IEEE Engineering in Medicine and Biology Society (EMBC).

[12]  Xiaofei Wang,et al.  Cloud-enabled wireless body area networks for pervasive healthcare , 2013, IEEE Network.

[13]  Athanasios V. Vasilakos,et al.  ECG-Cryptography and Authentication in Body Area Networks , 2012, IEEE Transactions on Information Technology in Biomedicine.

[14]  Athanasios V. Vasilakos,et al.  Mobile Cloud Computing: A Survey, State of Art and Future Directions , 2013, Mobile Networks and Applications.

[15]  J. Wenny Rahayu,et al.  Mobile cloud computing: A survey , 2013, Future Gener. Comput. Syst..

[16]  Xiaolei Dong,et al.  Security and privacy for storage and computation in cloud computing , 2014, Inf. Sci..

[17]  Cormac J. Sreenan,et al.  A context aware wireless body area network (BAN) , 2009, 2009 3rd International Conference on Pervasive Computing Technologies for Healthcare.

[18]  Sasikanth Avancha,et al.  Security for Sensor Networks , 2004 .

[19]  P ? ? ? ? ? ? ? % ? ? ? ? , 1991 .

[20]  Vicki Almstrum,et al.  Low-cost remote patient monitoring system based on reduced platform computer technology. , 2011, Telemedicine journal and e-health : the official journal of the American Telemedicine Association.

[21]  Alfred Menezes,et al.  Handbook of Applied Cryptography , 2018 .

[22]  Adi Shamir,et al.  A method for obtaining digital signatures and public-key cryptosystems , 1978, CACM.

[23]  Athanasios V. Vasilakos,et al.  Cloud-assisted body area networks: state-of-the-art and future challenges , 2014, Wirel. Networks.

[24]  Athanasios V. Vasilakos,et al.  A survey of wireless technologies coexistence in WBAN: analysis and open research issues , 2014, Wireless Networks.

[25]  M. Rabin DIGITALIZED SIGNATURES AND PUBLIC-KEY FUNCTIONS AS INTRACTABLE AS FACTORIZATION , 1979 .

[26]  Xuemin Shen,et al.  SPS: Secure personal health information sharing with patient-centric access control in cloud computing , 2013, 2013 IEEE Global Communications Conference (GLOBECOM).

[27]  Christof Paar,et al.  Elliptic and hyperelliptic curves on embedded μP , 2004, TECS.

[28]  Ingrid Moerman,et al.  A survey on wireless body area networks , 2011, Wirel. Networks.