Abstract
Wireless body area network (WBAN) consists of group of wearable devices placed inside or on the human body and wearable device controller. The devices are used to monitor and measure vital parameters, process them, transfer them to the wearable device controller. If an attacker tries to alter the information, the confidentiality of the data is lost and also it could prove fatal to the person to whom the data belongs to. The paper focuses on achieving confidentiality of the data by encrypting using the Modified Blowfish encryption algorithm. It is proved that the proposed method minimizes the encryption time by 50% as compared with Blowfish algorithm. The value calculated for avalanche of the Modified Blowfish is 48.5% and the Blowfish achieved 47.14%. Matlab is used in the research work for performing encryption of the data.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Milad, A.A., Muda, Z., Noh, Z.A.B.M., Algaet, M.A.: Comparative study of performance in cryptography algorithms (blowfish and skipjack). J. Comput. Sci. 8(7), 1191–1197 (2012). https://doi.org/10.3844/jcssp.2012.1191.1197,https://www.researchgate.net/publication/250614450. the 6th International Conference on Ambient Systems, Networks and Technologies (ANT-2015), the 5th International Conference on Sustainable Energy Information Technology (SEIT-2015)
Ali, A., Khan, F.A.: Key agreement schemes in wireless body area networks: taxonomy and state-of-the-art. J. Med. Syst. 39(10), 1–14 (2015)
Das, A.K., Zeadally, S., Wazid, M.: Lightweight authentication protocols for wearable devices. Comput. Electr. Eng. 63, 196–208 (2017)
Divya, S., Prema, K., Muniyal, B.: Privacy preservation mechanism for the data used in image authentication. In: 2019 IEEE International Conference on Distributed Computing, VLSI, Electrical Circuits and Robotics (DISCOVER), pp. 1–6. IEEE (2019)
González-Valenzuela, S., Liang, X., Cao, H., Chen, M., Leung, V.C.M.: Body Area Networks, pp. 17–37. Springer, Berlin Heidelberg, Berlin, Heidelberg (2013). https://doi.org/10.1007/5346_26,https://doi.org/10.1007/5346_2012_26
Masdari, M., Ahmadzadeh, S., Bidaki, M.: Key management in wireless body area network: challenges and issues. J. Netw. Comput. Appl. 91(Supplement C), 36–51 (2017). https://doi.org/10.1016/j.jnca.2017.04.008, https://www.sciencedirect.com/science/article/pii/S1084804517301492
Mota, A.V., Azam, S., Shanmugam, B., Yeo, K.C., Kannoorpatti, K.: Comparative analysis of different techniques of encryption for secured data transmission. In: 2017 IEEE International Conference on Power, Control, Signals and Instrumentation Engineering (ICPCSI), pp. 231–237. IEEE (2017)
Patel, R., Kamboj, P.: Security enhancement of blowfish block cipher. In: Unal, A., Nayak, M., Mishra, D.K., Singh, D., Joshi, A. (eds.) SmartCom 2016. CCIS, pp. 231–238. Springer, Singapore (2016). https://doi.org/10.1007/978-981-10-3433-6_28
Patil, P., Narayankar, P., Narayan, D.G., Meena, S.M.: A comprehensive evaluation of cryptographic algorithms: DES, 3DES, AES, RSA and blowfish. Proc. Comput. Sci. 78(Supplement C), 617–624 (2016). https://doi.org/10.1016/j.procs.2016.02.108, https://www.sciencedirect.com/science/article/pii/S1877050916001101. 1st International Conference on Information Security and Privacy 2015
Paul, P.C., Loane, J., Regan, G., McCaffery, F.: Analysis of attacks and security requirements for wireless body area networks - a systematic literature review. In: Walker, A., O’Connor, R.V., Messnarz, R. (eds.) EuroSPI 2019. CCIS, vol. 1060, pp. 439–452. Springer, Cham (2019). https://doi.org/10.1007/978-3-030-28005-5_34
Quilala, T.F., Sison, A., Medina, R.: Modified blowfish algorithm. Indonesian J. Electr. Eng. Comput. Sci. 12, 38–45 (10). https://doi.org/10.11591/ijeecs.v12.i1.pp38-45
Raazi, S.M., Lee, H., Lee, S., Lee, Y.K.: Bari+: a biometric based distributed key management approach for wireless body area networks. Sensors 10(4), 3911–3933 (2010)
Ross, B.S., Josephraj, V.: Performance enhancement of blowfish encryption using RK blowfish. Int. J. Appl. Eng. Res. 12(20), 9236–9244 (2017)
Sampangi, R.V., Dey, S., Urs, S.R., Sampalli, S.: A security suite for wireless body area networks. arXiv preprint arXiv:1202.2171 (2012)
Shen, J., Chang, S., Shen, J., Liu, Q., Sun, X.: A lightweight multi-layer authentication protocol for wireless body area networks. Futur. Gener. Comput. Syst. 78, 956–963 (2018)
Stallings, W.: Cryptography and Network Security Principles and practice. Pearson Education Inc, publishing as Prentice Hall, 3 edn. (2006)
Vaudenay, S.: On the weak keys of blowfish. In: Gollmann, D. (ed.) FSE 1996. LNCS, vol. 1039, pp. 27–32. Springer, Heidelberg (1996). https://doi.org/10.1007/3-540-60865-6_39
Venkatasubramanian, K.K., Banerjee, A., Gupta, S.K.: EKG-based key agreement in body sensor networks. In: IEEE Infocom Workshops 2008, pp. 1–6. IEEE (2008)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2023 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Divya, S., Prema, K.V., Muniyal, B. (2023). Modified Blowfish Encryption Algorithm for Wireless Body Area Network. In: Prabhu, S., Pokhrel, S.R., Li, G. (eds) Applications and Techniques in Information Security . ATIS 2022. Communications in Computer and Information Science, vol 1804. Springer, Singapore. https://doi.org/10.1007/978-981-99-2264-2_8
Download citation
DOI: https://doi.org/10.1007/978-981-99-2264-2_8
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-99-2263-5
Online ISBN: 978-981-99-2264-2
eBook Packages: Computer ScienceComputer Science (R0)