A logistic mapping-based encryption scheme for Wireless Body Area Networks

Abstract In recent years, data security becomes a critical issue restricting the wider acceptance of Internet of Things (IoT) devices and Cyber-physical systems since they have limited hardware resources and power supply while high data security protection requires relatively large hardware resources and power supply utilization. This contradiction is particularly prominent in the field of Wireless Body Area Networks (WBANs) which is a segment of the IoT field. WBANs are dedicated to transmit and process biomedical data collected from human beings, any kind of tampering or hacking may cause severe consequences to users. However, the limited computing ability and battery supply of biomedical sensors attached or implanted in the users restrict the security protection strength of the data in WBANs. In this paper, a quantized Logistic mapping-based stream encryption scheme for WBANs is proposed. Meanwhile, Power spectral entropy (PSD) and Peak-to-average Power Ratio (PAPR) analysis of the quantized chaotic sequences have been performed to evaluate the chaotic characteristic among different quantization precision to resolve the ineffectiveness of Lyapunov factor in quantized systems. This encryption scheme utilizes chaotic systems with different quantization precision based on the security requirement of every individual communication, which leads to higher hardware and power efficiency. Finally, the proposed encryption scheme is implemented with VHDL and synthesized using SMIC 60 CMOS technology. The evaluation results illustrate that the proposed encryption scheme has the advantages of high-security performance and high-efficiency hardware resources utilization.

[1]  Jian Shen,et al.  A lightweight multi-layer authentication protocol for wireless body area networks , 2018, Future Gener. Comput. Syst..

[2]  Md. Zakirul Alam Bhuiyan,et al.  Hardware design and modeling of lightweight block ciphers for secure communications , 2018, Future Gener. Comput. Syst..

[3]  R. Povinelli,et al.  Analyzing Logistic Map Pseudorandom Number Generators for Periodicity Induced by Finite Precision Floating-Point Representation , 2012 .

[4]  Yicong Zhou,et al.  Cascade Chaotic System With Applications , 2015, IEEE Transactions on Cybernetics.

[5]  Athanasios V. Vasilakos,et al.  ECG-Cryptography and Authentication in Body Area Networks , 2012, IEEE Transactions on Information Technology in Biomedicine.

[6]  Rahim Rahmani,et al.  Towards Security on Internet of Things: Applications and Challenges in Technology , 2018, EUSPN/ICTH.

[7]  Lixiang Li,et al.  Secure and Energy-Efficient Data Transmission System Based on Chaotic Compressive Sensing in Body-to-Body Networks , 2017, IEEE Transactions on Biomedical Circuits and Systems.

[8]  Junchao Wang,et al.  A baseband processing ASIC for body area networks , 2019, J. Ambient Intell. Humaniz. Comput..

[9]  Ming Li,et al.  BANA: Body Area Network Authentication Exploiting Channel Characteristics , 2013, IEEE J. Sel. Areas Commun..

[10]  Gwanggil Jeon,et al.  A lightweight method of data encryption in BANs using electrocardiogram signal , 2018, Future Gener. Comput. Syst..

[11]  Xue Ouyang,et al.  Period Analysis of Chaotic Systems under Finite Precisions , 2018, 2018 26th International Conference on Systems Engineering (ICSEng).

[12]  Zhiyu Chen,et al.  A blockchain-based eHealthcare system interoperating with WBANs , 2020, Future Gener. Comput. Syst..

[13]  Ayan Banerjee,et al.  Challenges of implementing cyber-physical security solutions in body area networks , 2009, BODYNETS.

[14]  Xiong Li,et al.  A user friendly mutual authentication and key agreement scheme for wireless sensor networks using chaotic maps , 2016, Future Gener. Comput. Syst..

[15]  Shalini Batra,et al.  An efficient multi-party scheme for privacy preserving collaborative filtering for healthcare recommender system , 2018, Future Gener. Comput. Syst..

[16]  Abbas Jamalipour,et al.  Wireless Body Area Networks: A Survey , 2014, IEEE Communications Surveys & Tutorials.

[17]  Khaled Salah,et al.  IoT security: Review, blockchain solutions, and open challenges , 2017, Future Gener. Comput. Syst..

[18]  José María Sierra,et al.  A light-weight authentication scheme for wireless sensor networks , 2011, Ad Hoc Networks.

[19]  Junchao Wang,et al.  An ASIC Implementation of Security Scheme for Body Area Networks , 2018, 2018 IEEE International Symposium on Circuits and Systems (ISCAS).

[20]  Vallipuram Muthukkumarasamy,et al.  An Encryption Scheme Using Chaotic Map and Genetic Operations for Wireless Sensor Networks , 2015, IEEE Sensors Journal.