Skip to main content

Modified Blowfish Encryption Algorithm for Wireless Body Area Network

  • Conference paper
  • First Online:
Applications and Techniques in Information Security (ATIS 2022)

Abstract

Wireless body area network (WBAN) consists of group of wearable devices placed inside or on the human body and wearable device controller. The devices are used to monitor and measure vital parameters, process them, transfer them to the wearable device controller. If an attacker tries to alter the information, the confidentiality of the data is lost and also it could prove fatal to the person to whom the data belongs to. The paper focuses on achieving confidentiality of the data by encrypting using the Modified Blowfish encryption algorithm. It is proved that the proposed method minimizes the encryption time by 50% as compared with Blowfish algorithm. The value calculated for avalanche of the Modified Blowfish is 48.5% and the Blowfish achieved 47.14%. Matlab is used in the research work for performing encryption of the data.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 64.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 84.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Milad, A.A., Muda, Z., Noh, Z.A.B.M., Algaet, M.A.: Comparative study of performance in cryptography algorithms (blowfish and skipjack). J. Comput. Sci. 8(7), 1191–1197 (2012). https://doi.org/10.3844/jcssp.2012.1191.1197,https://www.researchgate.net/publication/250614450. the 6th International Conference on Ambient Systems, Networks and Technologies (ANT-2015), the 5th International Conference on Sustainable Energy Information Technology (SEIT-2015)

  2. Ali, A., Khan, F.A.: Key agreement schemes in wireless body area networks: taxonomy and state-of-the-art. J. Med. Syst. 39(10), 1–14 (2015)

    Article  Google Scholar 

  3. Das, A.K., Zeadally, S., Wazid, M.: Lightweight authentication protocols for wearable devices. Comput. Electr. Eng. 63, 196–208 (2017)

    Article  Google Scholar 

  4. Divya, S., Prema, K., Muniyal, B.: Privacy preservation mechanism for the data used in image authentication. In: 2019 IEEE International Conference on Distributed Computing, VLSI, Electrical Circuits and Robotics (DISCOVER), pp. 1–6. IEEE (2019)

    Google Scholar 

  5. González-Valenzuela, S., Liang, X., Cao, H., Chen, M., Leung, V.C.M.: Body Area Networks, pp. 17–37. Springer, Berlin Heidelberg, Berlin, Heidelberg (2013). https://doi.org/10.1007/5346_26,https://doi.org/10.1007/5346_2012_26

  6. Masdari, M., Ahmadzadeh, S., Bidaki, M.: Key management in wireless body area network: challenges and issues. J. Netw. Comput. Appl. 91(Supplement C), 36–51 (2017). https://doi.org/10.1016/j.jnca.2017.04.008, https://www.sciencedirect.com/science/article/pii/S1084804517301492

  7. Mota, A.V., Azam, S., Shanmugam, B., Yeo, K.C., Kannoorpatti, K.: Comparative analysis of different techniques of encryption for secured data transmission. In: 2017 IEEE International Conference on Power, Control, Signals and Instrumentation Engineering (ICPCSI), pp. 231–237. IEEE (2017)

    Google Scholar 

  8. Patel, R., Kamboj, P.: Security enhancement of blowfish block cipher. In: Unal, A., Nayak, M., Mishra, D.K., Singh, D., Joshi, A. (eds.) SmartCom 2016. CCIS, pp. 231–238. Springer, Singapore (2016). https://doi.org/10.1007/978-981-10-3433-6_28

    Chapter  Google Scholar 

  9. Patil, P., Narayankar, P., Narayan, D.G., Meena, S.M.: A comprehensive evaluation of cryptographic algorithms: DES, 3DES, AES, RSA and blowfish. Proc. Comput. Sci. 78(Supplement C), 617–624 (2016). https://doi.org/10.1016/j.procs.2016.02.108, https://www.sciencedirect.com/science/article/pii/S1877050916001101. 1st International Conference on Information Security and Privacy 2015

  10. Paul, P.C., Loane, J., Regan, G., McCaffery, F.: Analysis of attacks and security requirements for wireless body area networks - a systematic literature review. In: Walker, A., O’Connor, R.V., Messnarz, R. (eds.) EuroSPI 2019. CCIS, vol. 1060, pp. 439–452. Springer, Cham (2019). https://doi.org/10.1007/978-3-030-28005-5_34

    Chapter  Google Scholar 

  11. Quilala, T.F., Sison, A., Medina, R.: Modified blowfish algorithm. Indonesian J. Electr. Eng. Comput. Sci. 12, 38–45 (10). https://doi.org/10.11591/ijeecs.v12.i1.pp38-45

  12. Raazi, S.M., Lee, H., Lee, S., Lee, Y.K.: Bari+: a biometric based distributed key management approach for wireless body area networks. Sensors 10(4), 3911–3933 (2010)

    Article  Google Scholar 

  13. Ross, B.S., Josephraj, V.: Performance enhancement of blowfish encryption using RK blowfish. Int. J. Appl. Eng. Res. 12(20), 9236–9244 (2017)

    Google Scholar 

  14. Sampangi, R.V., Dey, S., Urs, S.R., Sampalli, S.: A security suite for wireless body area networks. arXiv preprint arXiv:1202.2171 (2012)

  15. Shen, J., Chang, S., Shen, J., Liu, Q., Sun, X.: A lightweight multi-layer authentication protocol for wireless body area networks. Futur. Gener. Comput. Syst. 78, 956–963 (2018)

    Article  Google Scholar 

  16. Stallings, W.: Cryptography and Network Security Principles and practice. Pearson Education Inc, publishing as Prentice Hall, 3 edn. (2006)

    Google Scholar 

  17. Vaudenay, S.: On the weak keys of blowfish. In: Gollmann, D. (ed.) FSE 1996. LNCS, vol. 1039, pp. 27–32. Springer, Heidelberg (1996). https://doi.org/10.1007/3-540-60865-6_39

    Chapter  Google Scholar 

  18. Venkatasubramanian, K.K., Banerjee, A., Gupta, S.K.: EKG-based key agreement in body sensor networks. In: IEEE Infocom Workshops 2008, pp. 1–6. IEEE (2008)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to K. V. Prema .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2023 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Divya, S., Prema, K.V., Muniyal, B. (2023). Modified Blowfish Encryption Algorithm for Wireless Body Area Network. In: Prabhu, S., Pokhrel, S.R., Li, G. (eds) Applications and Techniques in Information Security . ATIS 2022. Communications in Computer and Information Science, vol 1804. Springer, Singapore. https://doi.org/10.1007/978-981-99-2264-2_8

Download citation

  • DOI: https://doi.org/10.1007/978-981-99-2264-2_8

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-99-2263-5

  • Online ISBN: 978-981-99-2264-2

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics