Security of Broadcast Authentication for Cloud-Enabled Wireless Medical Sensor Devices in 5G Networks

Wireless Body Area Network (WBAN) has become one of the fastest growing technologies nowadays. There are some characteristic limitations in WBAN, especially when it comes to health-related applications that are used to monitor human bodies. To overcome and mitigate theses limitations in WBAN, cloud computing technology can be combined with the WBAN as a solution. We can classify the WBAN sensors in the cloud-based WBAN into i) nodes that monitor the human body and ii) WBAN actuators that take action upon the order commands from the medical staff. The biggest concern is the security of the medical commands to the WBAN actuators because if they are altered or tampered with, there can be serious consequences. Therefore, authentication plays an important role in securing cloud-based WBANs. In this article, we explore the security and privacy issues of Wireless Body Area Network combined with Mobile Cloud Computing (wMCC) with 5G mobile networks and investigate public-key based security solutions. At first, the paper presents a detailed description of wMCC architecture, discussing its main advantages and limitations. The main features of 5G mobile network are then presented, focusing on the advancement it may provide if integrated with wMCC systems. We further investigate the security issues of wMCC with 5G mobile networks while emphasizing the challenges that face this system in healthcare applications. The authentication techniques in wMCC are then classified and discussed with the feasibility of deploying practical solutions. Finally, we outline the main challenges and metrics of an ideal authentication protocols to be used in wMCC with 5G. The metrics are helpful for researchers in this field to evaluate, analyze, and compare the authentication protocols to decide the suitable application for each protocol.

[1]  Wenliang Du,et al.  Diversify sensor nodes to improve resilience against node compromise , 2006, SASN '06.

[2]  Dimitrios Zissis,et al.  Addressing cloud computing security issues , 2012, Future Gener. Comput. Syst..

[3]  Peter Langendörfer,et al.  How public key cryptography influences wireless sensor node lifetime , 2006, SASN '06.

[4]  Hideya Ochiai,et al.  Security Assessment Model to Analysis DOS Attacks in WSN , 2019, IRICT.

[5]  Nadjib Badache,et al.  Fast authentication in wireless sensor networks , 2016, Future Gener. Comput. Syst..

[6]  Gary M. Weiss,et al.  Biometric Authentication and Verification for Medical Cyber Physical Systems , 2018, Electronics.

[7]  An Braeken,et al.  Novel 5G Authentication Protocol to Improve the Resistance Against Active Attacks and Malicious Serving Networks , 2019, IEEE Access.

[8]  Per Lynggaard,et al.  Deploying 5G-Technologies in Smart City and Smart Home Wireless Sensor Networks with Interferences , 2015, Wirel. Pers. Commun..

[9]  Miodrag Potkonjak,et al.  mHealthMon: Toward Energy-Efficient and Distributed Mobile Health Monitoring Using Parallel Offloading , 2013, 2013 35th Annual International Conference of the IEEE Engineering in Medicine and Biology Society (EMBC).

[10]  Athanasios V. Vasilakos,et al.  Mobile Cloud Computing: A Survey, State of Art and Future Directions , 2013, Mobile Networks and Applications.

[11]  Dushantha Nalin K. Jayakody,et al.  A Survey on Security and Privacy of 5G Technologies: Potential Solutions, Recent Advancements, and Future Directions , 2020, IEEE Communications Surveys & Tutorials.

[12]  Roberta Spolon,et al.  μTESLA protocol in vehicular networks , 2017, 2017 12th Iberian Conference on Information Systems and Technologies (CISTI).

[13]  Peng Ning,et al.  Mitigating DoS attacks against broadcast authentication in wireless sensor networks , 2008, TOSN.

[14]  Shree Krishna Sharma,et al.  The Potential Short- and Long-Term Disruptions and Transformative Impacts of 5G and Beyond Wireless Networks: Lessons Learnt From the Development of a 5G Testbed Environment , 2020, IEEE Access.

[15]  Konstantinos Katzis,et al.  5G and wireless body area networks , 2018, 2018 IEEE Wireless Communications and Networking Conference Workshops (WCNCW).

[16]  Shoubin Wang,et al.  A Survey of Time Synchronization Algorithms for Wireless Sensor Networks , 2019, 2019 Chinese Control Conference (CCC).

[17]  Deborah Estrin,et al.  Proceedings of the 5th Symposium on Operating Systems Design and Implementation Fine-grained Network Time Synchronization Using Reference Broadcasts , 2022 .

[18]  Wei You,et al.  A Systematic Analysis Method for 5G Non-Access Stratum Signalling Security , 2019, IEEE Access.

[19]  Athanasios V. Vasilakos,et al.  A cloud-based interference-aware remote health monitoring system for non-hospitalized patients , 2014, 2014 IEEE Global Communications Conference.

[20]  Aiqing Zhang,et al.  Security-Aware and Privacy-Preserving D2D Communications in 5G , 2017, IEEE Network.

[21]  Padmalaya Nayak,et al.  A Fuzzy Logic-Based Clustering Algorithm for WSN to Extend the Network Lifetime , 2016, IEEE Sensors Journal.

[22]  Chonho Lee,et al.  A survey of mobile cloud computing: architecture, applications, and approaches , 2013, Wirel. Commun. Mob. Comput..

[23]  Ali Al-Shaikhi,et al.  Asynchronous Time Synchronization Protocol for WSNs , 2019, 2019 16th International Multi-Conference on Systems, Signals & Devices (SSD).

[24]  Elaine Shi,et al.  Detection of denial-of-message attacks on sensor network broadcasts , 2005, 2005 IEEE Symposium on Security and Privacy (S&P'05).

[25]  Majaz Moonis,et al.  Mobile cloud computing based stroke healthcare system , 2019, Int. J. Inf. Manag..

[26]  Taekyoung Kwon,et al.  Two-Factor Authenticated Key Agreement Supporting Unlinkability in 5G-Integrated Wireless Sensor Networks , 2018, IEEE Access.

[27]  J. Wenny Rahayu,et al.  Mobile cloud computing: A survey , 2013, Future Gener. Comput. Syst..

[28]  Berk Sunar,et al.  Public Key Cryptography in Sensor Networks - Revisited , 2004, ESAS.

[29]  Abderrezak Guessoum,et al.  FPGA implementation of a wireless sensor node with built-in security coprocessors for secured key exchange and data transfer , 2020 .

[30]  Leslie Lamport,et al.  Constructing Digital Signatures from a One Way Function , 2016 .

[31]  Divya Sharma,et al.  Body area networks: A survey , 2016, 2016 3rd International Conference on Computing for Sustainable Global Development (INDIACom).

[32]  Ya-Fen Chang,et al.  An IoT notion-based authentication and key agreement scheme ensuring user anonymity for heterogeneous ad hoc wireless sensor networks , 2017, J. Inf. Secur. Appl..

[33]  Kechar Bouabdellah,et al.  Formal verification of a new authenticated and optimized version of AOMDV for WSN , 2020, Int. J. Commun. Syst..

[34]  Adrian Perrig,et al.  Seven cardinal properties of sensor network broadcast authentication , 2006, SASN '06.

[35]  Yongli Wang,et al.  A trust enhancement scheme for cluster-based wireless sensor networks , 2018, The Journal of Supercomputing.

[36]  Thaier Hayajneh,et al.  Modeling and optimization of the lightweight HIGHT block cipher design with FPGA implementation , 2016, Secur. Commun. Networks.

[37]  Sibi Amaran,et al.  An Enhanced Scheme of Excluding Compromised Nodes in Wireless Sensor Networks , 2019 .

[38]  Athanasios V. Vasilakos,et al.  Cloud-assisted body area networks: state-of-the-art and future challenges , 2014, Wirel. Networks.

[39]  Peng Ning,et al.  An efficient scheme for authenticating public keys in sensor networks , 2005, MobiHoc '05.