Skip to main content

Advertisement

Log in

ISDA-BAN: interoperability and security based data authentication scheme for body area network

  • Published:
Cluster Computing Aims and scope Submit manuscript

Abstract

The new and integrated technologies have changed the traditional systems and services with new and smart automation systems. Smart healthcare system is one of the example of patients monitoring systems with more smart and cost effective services to protect the people who suffered from physical or psychological diseases, illnesses, and health concerns. wireless body area network contains smart sensor nodes planted inside or outside the patient body by using sensing and monitoring capabilities. With various benefits, these networks have some serious security challenges where the patient data is compromised due to different types of security attacks. Biomedical devices and sensor nodes are communicating internally or externally and always the open and easy target for attackers. There are various types of routing protocols have been designed for security but due to their complex and heavy processes the sensor nodes energy depleted, delay and overhead occurred. Due to limited resources of sensor nodes like battery, processing, memory, and storage, these networks need special lightweight security solutions. In this context, this paper proposes an interoperability and security for data authentication scheme for body area network protocol by using different leftover features like forwarding data security and address the synchronization and key control issues. The proposed protocol provides security for both internal and external devices and protect the data from any kind of unauthorized data breach. Experiments results indicated the better performance of the proposed protocol as compared with the state-of-the-art schemes. The proposed protocol is one of the effective security addition for secure medical healthcare data transmission.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9

Similar content being viewed by others

Data availability

Enquiries about data availability should be directed to the authors.

References

  1. Mukherjee, P., Mukherjee, A.: Advanced processing techniques and secure architecture for sensor networks in ubiquitous healthcare systems. In: Sensors for health monitoring, pp. 3–29. Elsevier (2019)

    Chapter  Google Scholar 

  2. Anwar, M., Abdullah, A.H., Altameem, A., Qureshi, K.N., Masud, F., Faheem, M., Cao, Y., Kharel, R.: Green communication for wireless body area networks: energy aware link efficient routing approach. Sensors 18(10), 3237 (2018)

    Article  Google Scholar 

  3. Anwar, M., Abdullah, A.H., Butt, R.A., Ashraf, M.W., Qureshi, K.N., Ullah, F.: Securing data communication in wireless body area networks using digital signatures,. Tech. J. 23(02), 50–55 (2018)

    Google Scholar 

  4. Kang, J., Fan, K., Zhang, K., Cheng, X., Li, H., Yang, Y.: An ultra light weight and secure RFID batch authentication scheme for IoMT. Comput. Commun 167, 48–54 (2021)

    Article  Google Scholar 

  5. Xu, G., Li, X., Jiao, L., Wang, W., Liu, A., Su, C., Zheng, X., Liu, S., Cheng, X.: Bagkd: a batch authentication and group key distribution protocol for vanets. IEEE Commun. Mag 58(7), 35–41 (2020)

    Article  Google Scholar 

  6. Qureshi, M.A., Qureshi, K.N., Jeon, G., Piccialli, F.: Deep learning-based ambient assisted living for self-management of cardiovascular conditions. Neural Comput Appl (2021). https://doi.org/10.1007/s00521-020-05678-w

    Article  Google Scholar 

  7. Qureshi, K.N., Ahmad, A., Piccialli, F., Casolla, G., Jeon, G.: Nature-inspired algorithm-based secure data dissemination framework for smart city networks. Neural Comput Appl (2020). https://doi.org/10.1007/s00521-020-04900-z

    Article  Google Scholar 

  8. Qureshi, K.N., Jeon, G., Piccialli, F.: Anomaly detection and trust authority in artificial intelligence and cloud computing. Comput Netw 2020,(2020)

    Google Scholar 

  9. Yetgin, H., Cheung, K.T.K., El-Hajjar, M., Hanzo, L.H.: A survey of network lifetime maximization techniques in wireless sensor networks,. IEEE Commun. Surv. Tutorials. 19(2), 828–854 (2017)

    Article  Google Scholar 

  10. Butt, S.A., Jamal, T., Azad, M.A., Ali, A., Safa, N.S.: A multivariant secure framework for smart mobile health application. Trans Emerg Telecommun Technol 2019,(2019)

    Google Scholar 

  11. Qureshi, K.N., Din, S., Jeon, G., Piccialli, F.: Link quality and energy utilization based preferable next hop selection routing for wireless body area networks. Comput. Commun 149, 382–392 (2020)

    Article  Google Scholar 

  12. Das, A.K., Zeadally, S., Wazid, M.: Lightweight authentication protocols for wearable devices. Comput. Electr. Eng 63, 196–208 (2017)

    Article  Google Scholar 

  13. Sourav, S., Odelu, V., Prasath, R.: Enhanced session initiation protocols for emergency healthcare applications. In: International symposium on security in computing and communication, pp. 278–289. Springer, USA (2018)

    Google Scholar 

  14. Kumari, S., Das, A.K., Li, X., Wu, F., Khan, M.K., Jiang, Q., Islam, S.H.: A provably secure biometrics-based authenticated key agreement scheme for multi-server environments. Multimed Tools Appl 77(2), 2359–2389 (2018)

    Article  Google Scholar 

  15. Xu, G., Qiu, S., Ahmad, H., Xu, G., Guo, Y., Zhang, M., Xu, H.: A multi-server two-factor authentication scheme with un-traceability using elliptic curve cryptography. Sensors 18(7), 2394 (2018)

    Article  Google Scholar 

  16. Jusak, J., Mahmoud, S.S.: A novel and low processing time ecg security method suitable for sensor node platforms. Int. J. Commun Netw Inform. Secur 10(1), 213–222 (2018)

    Google Scholar 

  17. Amin, R., Islam, S.H., Biswas, G., Obaidat, M.S.: A robust mutual authentication protocol for WSN with multiple base-stations. Ad Hoc Netw 75, 1–18 (2018)

    Article  Google Scholar 

  18. Yu, Y., Hu, L., Chu, J.: A secure authentication and key agreement scheme for IoT-based cloud computing environment. Symmetry 12(1), 150 (2020)

    Article  Google Scholar 

  19. Shynu, P., Nadesh, R., Menon, V.G., Venu, P., Abbasi, M., Khosravi, M.R.: A secure data deduplication system for integrated cloud-edge networks. J. Cloud Comput 9(1), 1–12 (2020)

    Google Scholar 

  20. Almuhaideb, A.M., Alghamdi, H.A.: Secure and efficient WBAN authentication protocols for intra-BAN tier. J. Sens. Actu Netw 11(3), 44 (2022)

    Article  Google Scholar 

  21. Zhang, J., Dong, C.: Secure and lightweight data aggregation scheme for anonymous multi-receivers in WBAN. IEEE Trans Netw Sci Eng 2022, 1–10 (2022)

    Google Scholar 

  22. Ostad-Sharif, A., Abbasinezhad-Mood, D., Nikooghadam, M.: A robust and efficient ECC-based mutual authentication and session key generation scheme for healthcare applications. J. Med. Syst 43(1), 1–22 (2019)

    Article  Google Scholar 

  23. Koblitz, N.: Elliptic curve cryptosystems. Math. Comput 48(177), 203–209 (1987)

    Article  MathSciNet  MATH  Google Scholar 

  24. Miller, V.S.: Use of elliptic curves in cryptography. In: Conference on the theory and application of cryptographic techniques, pp. 417–426. Springer (1985)

    Google Scholar 

  25. Naresh, V.S., Sivaranjani, R., Murthy, N.V.E.S.: Provable secure lightweight hyper elliptic curve-based communication system for wireless sensor networks,. Int. J. Commun Syst. 31(15), e3763 (2018)

    Article  Google Scholar 

  26. Li, X., Peng, J., Kumari, S., Wu, F., Karuppiah, M., Choo, K.K.R.: An enhanced 1-round authentication protocol for wireless body area networks with user anonymity. Comput. Electr. Eng 61, 238–249 (2017)

    Article  Google Scholar 

  27. Mehmood, T.: Cooja network simulator: exploring the infinite possible ways to compute the performance metrics of iot based smart devices to understand the working of iot based compression & routing protocols. arXiv preprint arXiv:1712.08303, (2017)

  28. Amin, R., Islam, S.H., Biswas, G., Khan, M.K., Kumar, N.: A robust and anonymous patient monitoring system using wireless medical sensor networks. Future Gener Comput Syst 80, 483–495 (2018)

    Article  Google Scholar 

  29. Li, X., Niu, J., Kumari, S., Wu, F., Sangaiah, A.K., Choo, K.K.R.: A three-factor anonymous authentication scheme for wireless sensor networks in internet of things environments. J. Netw. Comput. Appl 103, 194–204 (2018)

    Article  Google Scholar 

  30. Vigano, L.: Automated security protocol analysis with the AVISPA tool. Electron. Notes Theor. Comput. Sci 155, 61–86 (2006)

    Article  Google Scholar 

  31. Zhao, Z.: An efficient anonymous authentication scheme for wireless body area networks using elliptic curve cryptosystem. J. Med. Syst 38(2), 1–7 (2014)

    Article  Google Scholar 

Download references

Funding

The authors have not disclosed any funding.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Gwanggil Jeon.

Ethics declarations

Conflict of interest

The authors have not disclosed any competing interests.

Additional information

Publisher’s Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Kiyani, F., Qureshi, K.N., Ghafoor, K.Z. et al. ISDA-BAN: interoperability and security based data authentication scheme for body area network. Cluster Comput 26, 2429–2442 (2023). https://doi.org/10.1007/s10586-022-03823-9

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s10586-022-03823-9

Keywords

Navigation