Securing communication by attribute-based authentication in HetNet used for medical applications

One of the major applications of the Heterogeneous Network (HetNet) is in the healthcare system. Deploying HetNet in healthcare systems enables patients, physicians, and other stakeholders to communicate easily with each other. Due to the large growth in the network’s subscribers, the security of the stored health data became one of the major concerns because unauthorized access to this data may lead to very serious complications, and unreliable transmission of data may lead to fatal risks to the patient’s life. Therefore, taking data integrity into consideration, user authentication has become one of the main factors. However, significant research work has been performed at HetNet’s physical layer to secure communication, but the result of this leads to an increase in hardware components. The increasing hardware components not only costs money but also power consumption. Therefore, this paper presents an alternate way of securing communication in HetNet at the network layer. However, resolving security problems at the network layer increases computational complexity. Nevertheless, earlier, some encryption techniques like identity-based encryption (IBE), symmetric key encryption (SKE), and public-key encryption (PKE) have been utilized for securing data. Due to their own disadvantages, this paper utilizes an attribute-based encryption (ABE) authentication scheme for securing health data in medical applications. With the help of this method, access to the intruders is denied which results in reduced communication overhead. This authentication scheme helps protect the essential information against attacks by the intruders. It includes a third party server that helps to authenticate and store patient’s information. The whole security technique has been written in the form of HLPSL (high-level protocol specification language) codes, and the results are then validated with the help of AVISPA (automated validation of Internet security protocols and applications) tool.

[1]  Yen-Cheng Chen,et al.  ABACS: An Attribute-Based Access Control System for Emergency Services over Vehicular Ad Hoc Networks , 2011, IEEE Journal on Selected Areas in Communications.

[2]  Kai-Kit Wong,et al.  Robust Physical Layer Security for Power Domain Non-Orthogonal Multiple Access-Based HetNets and HUDNs: SIC Avoidance at Eavesdroppers , 2019, IEEE Access.

[3]  Hilde van der Togt,et al.  Publisher's Note , 2003, J. Netw. Comput. Appl..

[4]  Ryoichi Komiya,et al.  A Study of Attribute-Based Encryption for Body Sensor Networks , 2011 .

[5]  Ling Luo,et al.  Caching-Aided Physical Layer Security in Wireless Cache-Enabled Heterogeneous Networks , 2018, IEEE Access.

[6]  Abdul Hanan Abdullah,et al.  F3TM: Flooding Factor based Trust Management Framework for secure data transmission in MANETs , 2017, J. King Saud Univ. Comput. Inf. Sci..

[7]  Omprakash Kaiwartya,et al.  Physical Layer Security in Vehicular Networks with Reconfigurable Intelligent Surfaces , 2019, 2020 IEEE 91st Vehicular Technology Conference (VTC2020-Spring).

[8]  Omprakash Kaiwartya,et al.  Physical Layer Security in Vehicular Communication Networks in the Presence of Interference , 2019, 2019 IEEE Global Communications Conference (GLOBECOM).

[9]  Eduard A. Jorswieck,et al.  Physical layer security vs. network layer secrecy: Who wins on the untrusted two-way relay channel? , 2013, 2013 IEEE 18th International Workshop on Computer Aided Modeling and Design of Communication Links and Networks (CAMAD).

[10]  Youngho Park,et al.  A secure billing protocol over attribute-based encryption in vehicular cloud computing , 2016, EURASIP J. Wirel. Commun. Netw..

[11]  Brent Waters,et al.  Fuzzy Identity-Based Encryption , 2005, EUROCRYPT.

[12]  You-Chiun Wang,et al.  Small-cell planning in LTE HetNet to improve energy efficiency , 2018, Int. J. Commun. Syst..

[13]  Rose Qingyang Hu,et al.  Interference Management for Physical Layer Security in Heterogeneous Networks , 2017, 2017 IEEE 15th Intl Conf on Dependable, Autonomic and Secure Computing, 15th Intl Conf on Pervasive Intelligence and Computing, 3rd Intl Conf on Big Data Intelligence and Computing and Cyber Science and Technology Congress(DASC/PiCom/DataCom/CyberSciTech).

[14]  Jiguo Li,et al.  Privacy-preserving personal health record using multi-authority attribute-based encryption with revocation , 2014, International Journal of Information Security.

[15]  Nouha Oualha,et al.  Lightweight Attribute-Based Encryption for the Internet of Things , 2016, 2016 25th International Conference on Computer Communication and Networks (ICCCN).

[16]  Md. Atiqur Rahman Ahad,et al.  Security Analysis and a Potential Layer to Layer Security Solution of Medical Cyber-Physical Systems , 2019, A Handbook of Internet of Things in Biomedical and Cyber Physical System.

[17]  Kai-Kit Wong,et al.  Secrecy Energy Efficiency in Wireless Powered Heterogeneous Networks: A Distributed ADMM Approach , 2018, IEEE Access.

[18]  Amang Sudarsono,et al.  A secure data sharing using identity-based encryption scheme for e-healthcare system , 2017, 2017 3rd International Conference on Science in Information Technology (ICSITech).

[19]  Abderrahim Beni Hssane,et al.  Big healthcare data: preserving security and privacy , 2018, Journal of Big Data.

[20]  Yao Zheng,et al.  Scalable and Secure Sharing of Personal Health Records in Cloud Computing Using Attribute-Based Encryption , 2019, IEEE Transactions on Parallel and Distributed Systems.

[21]  Brent Waters,et al.  Ciphertext-Policy Attribute-Based Encryption , 2007, 2007 IEEE Symposium on Security and Privacy (SP '07).

[22]  Hooman Kashanian,et al.  Internet of things in medical applications with a service-oriented and security approach: a survey , 2018 .

[23]  Faissal El Bouanani,et al.  A secure cooperative transmission model in VANET using attribute based encryption , 2016, 2016 International Conference on Advanced Communication Systems and Information Security (ACOSIS).

[24]  Kwok Hung Li,et al.  Physical Layer Security in Heterogeneous Networks With Pilot Attack: A Stochastic Geometry Approach , 2018, IEEE Transactions on Communications.

[25]  Jie Xu,et al.  Multiuser MISO Beamforming for Simultaneous Wireless Information and Power Transfer , 2013, IEEE Transactions on Signal Processing.

[26]  Xianbin Wang,et al.  Physical Layer Authentication for Mobile Systems with Time-Varying Carrier Frequency Offsets , 2014, IEEE Transactions on Communications.

[27]  Xianbin Wang,et al.  Authentication handover and privacy protection in 5G hetnets using software-defined networking , 2015, IEEE Communications Magazine.

[28]  Abdul Hanan Abdullah,et al.  FSM-F: Finite State Machine Based Framework for Denial of Service and Intrusion Detection in MANET , 2016, PloS one.

[29]  Sheng Zhong,et al.  IBE-Lite: A Lightweight Identity-Based Cryptography for Body Sensor Networks , 2009, IEEE Transactions on Information Technology in Biomedicine.

[30]  Kai-Kit Wong,et al.  Safeguarding massive MIMO aided hetnets using physical layer security , 2015, 2015 International Conference on Wireless Communications & Signal Processing (WCSP).

[31]  Kuang Jingming,et al.  Resource allocation for physical layer security in heterogeneous network with hidden eavesdropper , 2016, China Communications.

[32]  Xianbin Wang,et al.  Fast authentication in 5G HetNet through SDN enabled weighted secure-context-information transfer , 2016, 2016 IEEE International Conference on Communications (ICC).

[33]  Jin Cao,et al.  CPPHA: Capability-Based Privacy-Protection Handover Authentication Mechanism for SDN-Based 5G HetNets , 2019, IEEE Transactions on Dependable and Secure Computing.

[34]  Omprakash Kaiwartya,et al.  A reliable energy-efficient pressure-based routing protocol for underwater wireless sensor network , 2017, Wireless Networks.

[35]  Abdul Hanan Abdullah,et al.  A Dynamic Congestion Control Scheme for safety applications in vehicular ad hoc networks , 2018, Comput. Electr. Eng..