Abstract
The need to monitor the vital signals of the human body for the early diagnosis of diseases has led to the emergence of wireless body area networks (WBAN) for E-Health. One of the most important problems associated with this technology is to secure the user data over the internet and to keep it safe and inaccessible by unauthorized persons or manipulated by any person maintaining the privacy of the patient. In this paper, a system to secure patient data was proposed by employing the Blockchain technology to save user data and privacy, and cryptography algorithms were used to secure the data transmission channel between the patient and the E-health service provider. The results showed that the proposed system fulfilled the security objectives, namely confidentiality, integrity, authentication, and non-repudiation, in addition to protecting the privacy of the patient to maintain patient data from penetration.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsReferences
Yuce, M., Khan, J.: Wireless Body Area Networks: Technology, Implementation, and Applications. Pan Stanford Publishing, Singapore (2012)
Thotahewa, K.M.S., Redouté, J.M., Yuce, M.R.: Ultra Wideband Wireless Body Area Networks. Springer International Publishing, Cham (2014). https://doi.org/10.1007/978-3-319-05287-8
Mana, M., et al.: SEKEBAN (secure and efficient key exchange for wireless body area network). Int. J. Adv. Sci. Technol. 12(November), 45–60 (2009)
Faraj, S.T., Dawood, A.J., Salman, A.D.: Distributed data security and privacy in WBAN-related e-health systems. AL-Mansour J. 20, 121–132 (2013)
Shen, J., Chang, S., Shen, J., Liu, Q., Sun, X.: A lightweight multi-layer authentication protocol for wireless body area networks. Future Gener. Comput. Syst. 78(Part 3), 956–963 (2018)
He, D., Zeadally, S., Wu, L.: Certificateless public auditing scheme for cloud-assisted wireless body area networks. IEEE Syst. J. 12(1), 64–73 (2018)
AL-Alak, S.M.K., Naser, M.A., Hussein, A.M.: Adaptive security protocol for wireless body area network. J. Kerbala Univ. 14(2) 153–162 (2016). Scientific
Wei, F., Vijayakumar, P., Shen, J., Zhang, R., Li, L.: A provably secure password-based anonymous authentication scheme for wireless body area networks. Comput. Electr. Eng. 65, 322–331 (2018)
Shen, J., Gui, Z., Ji, S., Shen, J., Tan, H., Tang, Y.: Cloud-aided lightweight certificateless authentication protocol with anonymity for wireless body area networks. J. Netw. Comput. Appl. 106, 117–123 (2018)
Hasan, F.H.: Securing data in wireless body area network using hyper-chaotic Zhou system. Ibn Al-Haitham J. Pure Appl. Sci. 31(1), 260–267 (2018)
Khan, H., Dowling, B., Martin, K.M.: Highly efficient privacy-preserving key agreement for wireless body area Networks. In: 2018 17th IEEE International Conference on Trust, Security and Privacy in Computing And Communications, 12th IEEE International Conference on Big Data Science and Engineering (TrustCom/BigDataSE), pp. 1064–1069. IEEE (2018)
Farooq, S., Prashar, D., Jyoti, K.: Hybrid encryption algorithm in wireless body area networks (WBAN). In: Singh, R., Choudhury, S., Gehlot, A. (eds.) Intelligent Communication, Control and Devices. AISC, vol. 624, pp. 401–410. Springer, Singapore (2018). https://doi.org/10.1007/978-981-10-5903-2_41
Li, F., Han, Y., Jin, C.: Cost-effective and anonymous access control for wireless body area networks. IEEE Syst. J. 12(1), 747–758 (2018)
Ciampa, M.: Security + Guide to Network Security Fundamentals, 3rd edn. Cengage Learning, Boston (2009). Course Technology
Stallings, W.: Cryptography And Network Security: Principles and Practice, 5th edn. Pearson Education, Inc., London (2006). publishing as Prentice Hall, 2011
NIST. Secure Hash Standard, FIPS PUB 180-4 (2012)
Katz, J., Menezes, A.J., Van Oorschot, P.C., Vanstone, S.A.: Handbook of Applied Cryptography. CRC Press, Inc., Boca Raton (1996)
Rhee, M.Y.: Internet Security: Cryptographic Principles. Algorithms and Protocols. John Wiley, Hoboken (2003)
Stamp, M., Low, R.M.: Applied Cryptanalysis: Breaking Ciphers in the Real World. John Wiley, Hoboken (2007)
Indesteege, S.: Analysis and design of cryptographic hash functions (Doctoral dissertation, Ph.D. thesis (Katholieke Universiteit Leuven, Leuven, Belgium)) (2010)
Sobti, R., Geetha, G.: Cryptographic hash functions: a review. Int. J. Comput. Sci. Issues (IJCSI) 9(2), 461 (2012)
Nakamoto, S.: Bitcoin: A Peer-to-Peer Electronic Cash System. https://bitcoin.org/bitcoin.pdf
Chuen, L.D.K., Linda, L.: Blockchain. Cryptocurrency and ICO. World Scientifc Publishing Co. Pte. Ltd., Singapore (2018)
Bambara, J., Allen, P.: Blockchain: A Practical Guide to Developing Business, Law, and Technology Solutions. McGraw-Hill Education, New York City (2018)
Bashir, I.: Mastering Blockchain: Distributed ledgers, decentralization and smart contracts explained. Packt Publishing Ltd., Birmingham (2017)
Sankar, L.S., Sindhu, M., Sethumadhavan, M.: Survey of consensus protocols on blockchain applications. In: 2017 4th International Conference on Advanced Computing and Communication Systems (ICACCS). IEEE (2017)
Drescher, D.: Blockchain Basics: A Non-Technical Introduction in 25 Steps (2017). Daniel Drescher
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2020 Springer Nature Switzerland AG
About this paper
Cite this paper
Dakhel, M., Hassan, S. (2020). A Secure Wireless Body Area Network for E-Health Application Using Blockchain. In: Khalaf, M., Al-Jumeily, D., Lisitsa, A. (eds) Applied Computing to Support Industry: Innovation and Technology. ACRIT 2019. Communications in Computer and Information Science, vol 1174. Springer, Cham. https://doi.org/10.1007/978-3-030-38752-5_31
Download citation
DOI: https://doi.org/10.1007/978-3-030-38752-5_31
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-38751-8
Online ISBN: 978-3-030-38752-5
eBook Packages: Computer ScienceComputer Science (R0)