AN EFFICIENT AND SECURE SESSION KEY ESTABLISHMENT SCHEME FOR HEALTH-CARE APPLICATIONS IN WIRELESS BODY AREA NETWORKS

  • Gulzar Mehmood Department of Computer Science & I.T, University of Malakand.
  • Muhammad Zahid Khan Department of Computer Science & Information Technology, University of Malakand, Chakdara, Dir (L), Khyber Pakhtunkhwa, Pakistan
  • Haseeb Ur Rahman Department of Computer Science & Information Technology, University of Malakand, Chakdara, Dir (L), Khyber Pakhtunkhwa, Pakistan
  • Sohail Abbas Department of Computer Science, College of Sciences, University of Sharjah, UAE
Keywords: WBAN (Wireless Body Area Network);, Bio-sensor, Rivet-Shamming-Adleman, Elliptic Curve Cryptography

Abstract

Wireless Body Area Network (WBAN) is special breed of Wireless Sensor Network (WSN). Due to the increasing interest and the tremendous advancement in miniaturization and sensor technology, WBAN has emerged as an active filed of research. WBAN has many unique applications especially in medical and health-care. This kind of network provides support in on-the-spot decision making and therapeutic treatments. However, one of the main issues with WBAN in medical applications is security and patients’ information privacy. In such applications ensuring human vital sign privacy and security is very important. To address this important issue, in this paper we propose a novel secure session key establishment scheme for WBAN in health-care domain to ensure security and privacy of vital sign related to human body. In the proposed scheme, session key is established for a specific period of time in order to communicate important data related to vital signs of patients’ health securely. Hence, on the basis of this reliable and secure data transmission, efficient required medical decision can be taken. As a result, on the spot health-care operation can be performed by utilizing different health-care units. The proposed scheme is dynamic in nature, i.e. if a node in the network is compromised or a new node joins the network, the process of session key establishment is re-initiated. The proposed scheme has been evaluated through extensive simulation, and the results are compared with an existing scheme. The simulation results show that our scheme is efficient and cost effective in terms of communication and computation cost, and key establishment delay, hence conserves energy and enhances security.

Author Biographies

Muhammad Zahid Khan, Department of Computer Science & Information Technology, University of Malakand, Chakdara, Dir (L), Khyber Pakhtunkhwa, Pakistan

I'm Muhammad Zahid Khan, working in the Department of Computer Science and I.T., University of Malakand, Pakistan since 2005. I did BCS (4 Years, session 1999-2003) from the Department of Computer Science, Univerisity of Peshawar, and FSc (Pre-Engineering) from Edwardes College Peshawar, Pakistan. I completed my Ph.D. at the School of Computing and Mathematical Sciences, Liverpool John Moores University, UK (May 2013). I also worked as a Lecturer (Computer Science) at Nisar Shaheed Degree College, Risalpur Pakistan. My area of research was Fault Management in Wireless Sensor Network, and I worked under the supervision of Prof. Madjid Merabti, Dr. Bob Askwith and Dr. Faycal Bouhafs.

Network Systems & Security Research Group (NSSRG)
Department of Computer Science & Information Technology,

University of Malakand, Chakdara, Dir (L),

Khyber Pakhtunkhwa, Pakistan

Haseeb Ur Rahman, Department of Computer Science & Information Technology, University of Malakand, Chakdara, Dir (L), Khyber Pakhtunkhwa, Pakistan

Network Systems & Security Research Group (NSSRG)
Department of Computer Science & Information Technology,

University of Malakand, Chakdara,

Dir (L), Khyber Pakhtunkhwa,

Pakistan

Sohail Abbas, Department of Computer Science, College of Sciences, University of Sharjah, UAE

Network Systems & Security Research Group (NSSRG)

Department of Computer Science,

College of Sciences,

University of Sharjah,

UAE

References

[1] H.-C. Chao, S. Zeadally, and B. Hu, "Wearable computing for health care," Journal of medical systems, vol. 40, no. 4, pp. 1-3, 2016.
[2] J. Lee, D. Kim, H.-Y. Ryoo, and B.-S. Shin, "Sustainable Wearables: Wearable Technology for Enhancing the Quality of Human Life," Sustainability, vol. 8, no. 5, p. 466, 2016.
[3] M. Pervez Khan, A. Hussain, and K. S. Kwak, "Medical applications of wireless body area networks," Int. J. Digital Content Technol. Appli, 2009.
[4] E. Del Re, S. Morosi, L. Mucchi, L. S. Ronga, and S. Jayousi, "Future Wireless Systems for Human Bond Communications," Wireless Personal Communications, vol. 88, no. 1, pp. 39-52, 2016.
[5] "IEEE Standard for Local and metropolitan area networks - Part 15.6: Wireless Body Area Networks," IEEE Std 802.15.6-2012, pp. 1-271, 2012.
[6] S. Movassaghi, M. Abolhasan, J. Lipman, D. Smith, and A. Jamalipour, "Wireless body area networks: a survey," 2014.
[7] T. Dimitriou and K. Ioannis, "Security issues in biomedical wireless sensor networks," in Applied Sciences on Biomedical and Communication Technologies, 2008. ISABEL'08. First International Symposium on, 2008, pp. 1-5: IEEE.
[8] L. Zhouzhou and H. Wang, "A key agreement method for wireless body area networks," in 2016 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS), 2016, pp. 690-695.
[9] C. Hu, H. Li, Y. Huo, T. Xiang, and X. Liao, "Secure and Efficient Data Communication Protocol for Wireless Body Area Networks," IEEE Transactions on Multi-Scale Computing Systems, vol. 2, no. 2, pp. 94-107, 2016.
[10] Y. Zhou, Z. Sheng, V. C. M. Leung, and P. Servati, "Beacon-based opportunistic scheduling in wireless body area network," in 2016 38th Annual International Conference of the IEEE Engineering in Medicine and Biology Society (EMBC), 2016, pp. 4995-4998.
[11] C. Hu, H. Li, Y. Huo, T. Xiang, and X. Liao, "Secure and Efficient data communication protocol for Wireless Body Area Networks."
[12] L. Yao, B. Liu, G. Wu, K. Yao, and J. Wang, "A biometric key establishment protocol for body area networks," International Journal of Distributed Sensor Networks, vol. 2011, 2011.
[13] M. H. Eldefrawy, M. K. Khan, and K. Alghathbar, "A key agreement algorithm with rekeying for wireless sensor networks using public key cryptography," in Anti-Counterfeiting Security and Identification in Communication (ASID), 2010 International Conference on, 2010, pp. 1-6: IEEE.
[14] P. Kumar, S.-G. Lee, and H.-J. Lee, "A user authentication for healthcare application using wireless medical sensor networks," in High Performance Computing and Communications (HPCC), 2011 IEEE 13th International Conference on, 2011, pp. 647-652: IEEE.
[15] S. M. K.-u.-R. Raazi, H. Lee, S. Lee, and Y.-K. Lee, "BARI+: a biometric based distributed key management approach for wireless body area networks," Sensors, vol. 10, no. 4, pp. 3911-3933, 2010.
[16] S. S. Ahmad, S. Camtepe, and D. Jayalath, "Understanding data flow and security requirements in wireless Body Area Networks for healthcare," in 2015 17th International Conference on E-health Networking, Application & Services (HealthCom), 2015, pp. 621-626: IEEE.
[17] S. A. Salehi, M. A. Razzaque, I. Tomeo-Reyes, N. Hussain, and V. Kaviani, "Efficient high-rate key management technique for wireless body area networks," in 2016 22nd Asia-Pacific Conference on Communications (APCC), 2016, pp. 529-534.
[18] M. Asad and S. Chaudhry, "An authenticated key agreement with rekeying for secured body sensor networks based on hybrid cryptosystem," in Networking, Sensing and Control (ICNSC), 2012 9th IEEE International Conference on, 2012, pp. 118-121: IEEE.
[19] M. Majidi, R. Mobarhan, A. H. Hardoroudi, and A. Parchinaki, "Energy cost analyses of key management techniques for secure patient monitoring in WSN," in Open Systems (ICOS), 2011 IEEE Conference on, 2011, pp. 111-115: IEEE.
[20] L. Ertaul and W. Lu, "ECC based threshold cryptography for secure data forwarding and secure key exchange in MANET (I)," in NETWORKING 2005. Networking Technologies, Services, and Protocols; Performance of Computer and Communication Networks; Mobile and Wireless Communications Systems: Springer, 2005, pp. 102-113.
[21] A. Sahana and I. S. Misra, "Implementation of RSA security protocol for sensor network security: Design and network lifetime analysis," in Wireless Communication, Vehicular Technology, Information Theory and Aerospace & Electronic Systems Technology (Wireless VITAE), 2011 2nd International Conference on, 2011, pp. 1-5: IEEE.
[22] Z. Zhao, "An efficient anonymous authentication scheme for wireless body area networks using elliptic curve cryptosystem," Journal of medical systems, vol. 38, no. 2, pp. 1-7, 2014.
[23] S. Chatterjee, A. K. Das, and J. K. Sing, "A novel and efficient user access control scheme for wireless body area sensor networks," Journal of King Saud University-Computer and Information Sciences, vol. 26, no. 2, pp. 181-201, 2014.
[24] Y. S. Lee, E. Alasaarela, and H. Lee, "Secure key management scheme based on ECC algorithm for patient's medical information in healthcare system," in Information Networking (ICOIN), 2014 International Conference on, 2014, pp. 453-457: IEEE.
[25] A. Gurtov, P. Porambage, and I. Nikolaevskiy, "Secure lightweight protocols for medical device monitoring," in Open Innovations Association FRUCT, Proceedings of 15th Conference of, 2014, pp. 46-51: IEEE.
[26] S. A. Chaudhry, M. S. Farash, H. Naqvi, S. Kumari, and M. K. Khan, "An enhanced privacy preserving remote user authentication scheme with provable security," Security and Communication Networks, vol. 8, no. 18, pp. 3782-3795, 2015.
[27] H. Arshad and M. Nikooghadam, "An efficient and secure authentication and key agreement scheme for session initiation protocol using ECC," Multimedia Tools and Applications, vol. 75, no. 1, pp. 181-197, 2016.
[28] C. Marghescu, M. Pantazica, A. Brodeala, and P. Svasta, "Simulation of a wireless sensor network using OPNET," in Design and Technology in Electronic Packaging (SIITME), 2011 IEEE 17th International Symposium for, 2011, pp. 249-252: IEEE.
[29] M. S. Dawood, S. Sadasivam, and G. Athisha, "Energy efficient wireless sensor networks based on QoS enhanced base station controlled dynamic clustering protocol," Energy, vol. 13, no. 4, 2011.
[30] M. L. Das, "Two-factor user authentication in wireless sensor networks," Wireless Communications, IEEE Transactions on, vol. 8, no. 3, pp. 1086-1090, 2009.
Published
2018-06-30
How to Cite
Mehmood, G., Khan, M., Rahman, H., & Abbas, S. (2018). AN EFFICIENT AND SECURE SESSION KEY ESTABLISHMENT SCHEME FOR HEALTH-CARE APPLICATIONS IN WIRELESS BODY AREA NETWORKS. JOURNAL OF ENGINEERING AND APPLIED SCIENCES, 37(1). Retrieved from https://journals.uetjournals.com/index.php/JEAS/article/view/2866