Internet of Things (IoT) Based Design of a Secure and Lightweight Body Area Network (BAN) Healthcare System

As sensor networks and cloud computation technologies have rapidly developed over recent years, many services and applications integrating these technologies into daily life have come together as an Internet of Things (IoT). At the same time, aging populations have increased the need for expanded and more efficient elderly care services. Fortunately, elderly people can now wear sensing devices which relay data to a personal wireless device, forming a body area network (BAN). These personal wireless devices collect and integrate patients’ personal physiological data, and then transmit the data to the backend of the network for related diagnostics. However, a great deal of the information transmitted by such systems is sensitive data, and must therefore be subject to stringent security protocols. Protecting this data from unauthorized access is thus an important issue in IoT-related research. In regard to a cloud healthcare environment, scholars have proposed a secure mechanism to protect sensitive patient information. Their schemes provide a general architecture; however, these previous schemes still have some vulnerability, and thus cannot guarantee complete security. This paper proposes a secure and lightweight body-sensor network based on the Internet of Things for cloud healthcare environments, in order to address the vulnerabilities discovered in previous schemes. The proposed authentication mechanism is applied to a medical reader to provide a more comprehensive architecture while also providing mutual authentication, and guaranteeing data integrity, user untraceability, and forward and backward secrecy, in addition to being resistant to replay attack.

[1]  Zhibin Zhou,et al.  Efficient Privacy-Preserving Ciphertext-Policy Attribute Based-Encryption and Broadcast Encryption , 2015, IEEE Transactions on Computers.

[2]  Hassan Ghasemzadeh,et al.  Multi-sensor fusion in body sensor networks: State-of-the-art and research challenges , 2017, Inf. Fusion.

[3]  Xianghan Zheng,et al.  Lightweight distributed secure data management system for health internet of things , 2017, J. Netw. Comput. Appl..

[4]  Zhi Chen,et al.  A lightweight attribute-based encryption scheme for the Internet of Things , 2015, Future Gener. Comput. Syst..

[5]  Mihai Dimian,et al.  Internet of Things for e-Health: An approach to medical applications , 2015, 2015 International Workshop on Computational Intelligence for Multimedia Understanding (IWCIM).

[6]  Willy Susilo,et al.  Searchable Attribute-Based Mechanism With Efficient Data Sharing for Secure Cloud Storage , 2015, IEEE Transactions on Information Forensics and Security.

[7]  Richard A. Frost,et al.  A Survey of Applications of Identity-Based Cryptography in Mobile Ad-Hoc Networks , 2012, IEEE Communications Surveys & Tutorials.

[8]  Athanasios V. Vasilakos,et al.  ReTrust: Attack-Resistant and Lightweight Trust Management for Medical Sensor Networks , 2012, IEEE Transactions on Information Technology in Biomedicine.

[9]  Hannu Tenhunen,et al.  End-to-end security scheme for mobility enabled healthcare Internet of Things , 2016, Future Gener. Comput. Syst..

[10]  Marcos A. Simplício,et al.  Lightweight and escrow-less authenticated key agreement for the internet of things , 2017, Comput. Commun..

[11]  Steffen Lochmann,et al.  Prototype of a secure wireless patient monitoring system for the medical community , 2011 .

[12]  Athanasios V. Vasilakos,et al.  A Distributed Trust Evaluation Model and Its Application Scenarios for Medical Sensor Networks , 2012, IEEE Transactions on Information Technology in Biomedicine.

[13]  Giancarlo Fortino,et al.  A framework for collaborative computing and multi-sensor data fusion in body sensor networks , 2015, Inf. Fusion.

[14]  Samee Ullah Khan,et al.  > REPLACE THIS LINE WITH YOUR PAPER IDENTIFICATION NUMBER (DOUBLE-CLICK HERE TO EDIT) < 1 , 2008 .

[15]  Anurag Agarwal,et al.  The Internet of Things—A survey of topics and trends , 2014, Information Systems Frontiers.

[16]  Chun Chen,et al.  Secure and Lightweight Network Admission and Transmission Protocol for Body Sensor Networks , 2013, IEEE Journal of Biomedical and Health Informatics.

[17]  Djamel Tandjaoui,et al.  A Lightweight Authentication Scheme for E-Health Applications in the Context of Internet of Things , 2015, 2015 9th International Conference on Next Generation Mobile Applications, Services and Technologies.

[18]  Chun Chen,et al.  SDRP: A Secure and Distributed Reprogramming Protocol for Wireless Sensor Networks , 2012, IEEE Transactions on Industrial Electronics.

[19]  Yi Mu,et al.  Improving Privacy and Security in Decentralized Ciphertext-Policy Attribute-Based Encryption , 2015, IEEE Transactions on Information Forensics and Security.

[20]  Sang Hyuk Son,et al.  The price of security in wireless sensor networks , 2010, Comput. Networks.

[21]  Jemal H. Abawajy,et al.  Universal and secure object ownership transfer protocol for the Internet of Things , 2018, Future Gener. Comput. Syst..

[22]  Jianqiang Li,et al.  A hybrid solution for privacy preserving medical data sharing in the cloud environment , 2015, Future Gener. Comput. Syst..

[23]  Zhian Zhu,et al.  An ID‐based mutual authentication with key agreement protocol for multiserver environment on elliptic curve cryptosystem , 2014, Int. J. Commun. Syst..

[24]  Farrukh Aslam Khan,et al.  A cluster-based key agreement scheme using keyed hashing for Body Area Networks , 2011, Multimedia Tools and Applications.

[25]  Giancarlo Fortino,et al.  BodyCloud: A SaaS approach for community Body Sensor Networks , 2014, Future Gener. Comput. Syst..

[26]  Paulo S. L. M. Barreto,et al.  Comparison of Authenticated-Encryption schemes in Wireless Sensor Networks , 2011, 2011 IEEE 36th Conference on Local Computer Networks.

[27]  Jong-Moon Chung,et al.  A novel elliptical curve ID cryptography protocol for multi-hop ZigBee sensor networks , 2012, Wirel. Commun. Mob. Comput..

[28]  Maode Ma,et al.  Conjunctive Keyword Search With Designated Tester and Timing Enabled Proxy Re-Encryption Function for E-Health Clouds , 2016, IEEE Transactions on Information Forensics and Security.