Distributed privacy protection strategy for MEC enhanced wireless body area networks

Abstract With the rapid development and widespread application of Wireless Body Area Networks (WBANs), the traditional centralized system architecture cannot handle the massive data generated by the edge devices. Meanwhile, in order to ensure the security of physiological privacy data and the identity privacy of patients, this paper presents a privacy protection strategy for Mobile Edge Computing(MEC) enhanced WBANs, which leverages the blockchain-based decentralized MEC paradigm to support efficient transmission of privacy information with low latency, high reliability within a high-demand data security scenario. On this basis, the Merkle tree optimization model is designed to authenticate nodes and to verify the source of physiological data. Furthermore, a hybrid signature algorithm is devised to guarantee the node anonymity with unforgeability, data integrity and reduced delay. The security performance analysis and simulation results show that our proposed strategy not only reduces the delay, but also secures the privacy and transmission of sensitive WBANs data.

[1]  Hang Shi,et al.  A Feature-Based Learning System for Internet of Things Applications , 2019, IEEE Internet of Things Journal.

[2]  Robin Doss,et al.  Establishing trust relationships in OppNets using Merkle trees , 2016, 2016 8th International Conference on Communication Systems and Networks (COMSNETS).

[3]  Danna Zhou,et al.  d. , 1934, Microbial pathogenesis.

[4]  Pan Li,et al.  Channel State Information Prediction for 5G Wireless Communications: A Deep Learning Approach , 2020, IEEE Transactions on Network Science and Engineering.

[5]  Jian Shen,et al.  An ID-Based Linearly Homomorphic Signature Scheme and Its Application in Blockchain , 2018, IEEE Access.

[6]  Xiao Wang,et al.  Blockchain-Powered Parallel Healthcare Systems Based on the ACP Approach , 2018, IEEE Transactions on Computational Social Systems.

[7]  Wei Jiang,et al.  Healthcare Data Gateways: Found Healthcare Intelligence on Blockchain with Novel Privacy Risk Control , 2016, Journal of Medical Systems.

[8]  Rui Guo,et al.  Secure Attribute-Based Signature Scheme With Multiple Authorities for Blockchain in Electronic Health Records Systems , 2018, IEEE Access.

[9]  John B. Shoven,et al.  I , Edinburgh Medical and Surgical Journal.

[10]  Junjie Yan,et al.  Social Attribute Aware Incentive Mechanism for Device-to-Device Video Distribution , 2017, IEEE Transactions on Multimedia.

[11]  Athanasios V. Vasilakos,et al.  Secure Authentication for Remote Patient Monitoring with Wireless Medical Sensor Networks † , 2016, Sensors.

[12]  Andrew Lippman,et al.  A Case Study for Blockchain in Healthcare : “ MedRec ” prototype for electronic health records and medical research data , 2016 .

[13]  Qing Yang,et al.  Cache Less for More: Exploiting Cooperative Video Caching and Delivery in D2D Communications , 2019, IEEE Transactions on Multimedia.

[14]  Shaoen Wu,et al.  Biologically Inspired Resource Allocation for Network Slices in 5G-Enabled Internet of Things , 2019, IEEE Internet of Things Journal.

[15]  Daniel T. H. Lai,et al.  A Review of Implant Communication Technology in WBAN: Progress and Challenges , 2019, IEEE Reviews in Biomedical Engineering.

[16]  Yuzhe Liu,et al.  Cooperative Willingness Aware Collaborative Caching Mechanism Towards Cellular D2D Communication , 2018, IEEE Access.

[17]  Yan Zhang,et al.  Mobile Edge Computing: A Survey , 2018, IEEE Internet of Things Journal.

[18]  Mengjun Wang,et al.  Automatic Modulation Classification Using Convolutional Neural Network With Features Fusion of SPWVD and BJD , 2019, IEEE Transactions on Signal and Information Processing over Networks.

[19]  Zufan Zhang,et al.  Social tie-driven content priority scheme for D2D communications , 2019, Inf. Sci..

[20]  Tobias Distler,et al.  Resource-Efficient Byzantine Fault Tolerance , 2016, IEEE Transactions on Computers.

[21]  Zhiguang Qin,et al.  Revocable and Scalable Certificateless Remote Authentication Protocol With Anonymity for Wireless Body Area Networks , 2015, IEEE Transactions on Information Forensics and Security.

[22]  Qiang Ye,et al.  Performance Analysis of IEEE 802.15.6-Based Coexisting Mobile WBANs With Prioritized Traffic and Dynamic Interference , 2018, IEEE Transactions on Wireless Communications.

[23]  Naohiro Hayashibara,et al.  Energy Efficient Raft Consensus Algorithm , 2017, NBiS.

[24]  Honggang Wang,et al.  Security-oriented opportunistic data forwarding in Mobile Social Networks , 2017, Future Gener. Comput. Syst..