Lightweight Hybrid Cryptography Algorithm for Wireless Body Area Sensor Networks Using Cipher Technique

Downloads

Authors

  • Aizaz Raziq Shaheed Zulfikar Ali Bhutto Institute of Science and Technology (SZABIST University), Islamabad, Pakistan
  • Kashif Naseer Qureshi Department of Electronic & Computer Engineering, University of Limerick, Limerick, Pakistan
  • Asfand Yar Department of Computer Science, Bahria University, Islamabad, Pakistan
  • Kayhan Zrar Ghafoor 1) Department of Information & Communication Technology Engineering, Erbil Polytechnic University, and 2) Department of Computer Science, Knowledge University, University Park, Erbil, Iraq
  • Gwanggil Jeon Incheon National University, Incheon, South Korea

Abstract

Wireless Body Area Networks (WBANs) are based on connected and dedicated sensor nodes for patient monitoring in the healthcare sector. The sensor nodes are implanted inside or outside the patient’s body for sensing the vital signs and transmitting the sensed data to the end devices for decision-making. These sensor nodes use advanced communication technologies for data communication. However, they have limited capabilities in terms of computation power, battery life, storage, and memory, and these constraints make networks more vulnerable to security breaches and routing challenges. Important and sensitive information is exchanged over an unsecured channel in the network. Several devices are involved in handling the data in WBANs, including sink nodes, coordinator, or gateway nodes. Many cryptographic schemes have been introduced to ensure security in WBANs by using traditional confidentiality and key-sharing strategies. However, these techniques are not suitable for limited resource-based sensor nodes. In this paper, we propose a Lightweight Hybrid Cryptography Algorithm (LWHCA) that uses cryptographicbased techniques for WBAN networks to improve network security, minimize network overhead and delay issues, and improve the healthcare monitoring processes. The proposed solution is evaluated in a simulation scenario and compared with state-of-the-art schemes in terms of energy consumption, and ciphertext size.

Keywords:

WBAN, healthcare, security, data, network, routing, cryptography, lightweight, mechanism

References

1. M. Anwar, A.H. Abdullah, A. Altameem, K.N. Qureshi, F. Masud, M. Faheem, Y. Cao, R. Kharel, Green communication for wireless body area networks: Energy aware link efficient routing approach, Sensors, 18(10): 3237, 2018, https://doi.org/10.3390/s18103237

2. M. Anwar, A.H. Abdullah, K.N. Qureshi, A.H. Majid, Wireless body area networks for healthcare applications: An overview, TELKOMNIKA, 15(3): 1088–1095, 2017, https://doi.org/10.12928/TELKOMNIKA.v15i3.5793

3. R. Qazi, K.N. Qureshi, F. Bashir, N.U. Islam, S. Iqbal, A. Arshad, Security protocol using elliptic curve cryptography algorithm for wireless sensor networks, Journal of Ambient Intelligence Humanized Computing, 12: 547–566, 2021, https://doi.org/10.1007/s12652-020-02020-z

4. M.F. Moghadam, M. Nikooghadam, M.A.B. Al Jabban, M. Alishahi, L. Mortazavi, A. Mohajerzadeh, An efficient authentication and key agreement scheme based on ECDH for wireless sensor network, IEEE Access, 8: 73182–73192, 2020, https://doi.org/10.1109/ACCESS.2020.2987764

5. K. Awan, K.N. Qureshi, M. Mehwish, Wireless body area networks routing protocols: A review, Indonesian Journal of Electrical Engineering Computer Science, 4(3): 594–604, 2016, https://doi.org/10.11591/ijeecs.v4.i3.pp594-604

6. K.N. Qureshi, S. Din, G. Jeon, F. Piccialli, Link quality and energy utilization based preferable next hop selection routing for wireless body area networks, Computer Communications, 149: 382–392, 2020, https://doi.org/10.1016/j.comcom.2019.10.030

7. P. Sinha, V.K. Jha, A.K. Rai, B. Bhushan, Security vulnerabilities, attacks and countermeasures in wireless sensor networks at various layers of OSI reference model: A survey, [in:] 2017 International Conference on Signal Processing and Communication (ICSPC), Coimbatore, India, pp. 288–293, 2017, https://doi.org/10.1109/CSPC.2017.8305855

8. R. Rizk, Y. Alkady, Two-phase hybrid cryptography algorithm for wireless sensor networks, Journal of Electrical Systems Information Technology, 2(3): 296–313, 2015, https://doi.org/10.1016/j.jesit.2015.11.005

9. A. Karakaya, S. Akleylek, A survey on security threats and authentication approaches in wireless sensor networks, [in:] 2018 6th International Symposium on Digital Forensic and Security (ISDFS), Antalya, Turkey, pp. 1–4, 2018, https://doi.org/10.1109/ISDFS.2018.8355381

10. M.S. Yousefpoor, E. Yousefpoor, H. Barati, A. Barati, A. Movaghar, M. Hosseinzadeh, Secure data aggregation methods and countermeasures against various attacks in wireless sensor networks: A comprehensive review, Journal of Network and Computer Applications, 190: 103118, 2021, https://doi.org/10.1016/j.jnca.2021.103118

11. S.B. Sadkhan, A.O. Salman, A survey on lightweight-cryptography status and future challenges, [in:] 2018 International Conference on Advance of Sustainable Engineering and its Application (ICASEA), Wasit-Kut, Iraq, pp. 105–108, 2018, https://doi.org/10.1109/ICASEA.2018.8370965

12. K.N. Mishra, C. Chakraborty, A novel approach towards using big data and IoT for improving the efficiency of m-health systems, [in:] Advanced Computational Intelligence Techniques for Virtual Reality in Healthcare, D. Gupta, A. Hassanien, A. Khanna [Eds.], Studies in Computational Intelligence, Springer, Vol. 875, pp. 123–139, 2020, https://doi.org/10.1007/978-3-030-35252-3_7

13. A. Kishor, C. Chakraborty, W. Jeberson, Intelligent healthcare data segregation using fog computing with internet of things and machine learning, International Journal of Engineering Systems Modelling and Simulation, 12(2–3): 188–194, 2021, https://doi.org/10.1504/IJESMS.2021.115533

14. C. Chakraborty, Performance analysis of compression techniques for chronic wound image transmission under smartphone-enabled tele-wound network, [in:] Research Anthology on Telemedicine Efficacy, Adoption, and Impact on Healthcare Delivery, IGI Global, pp. 345–364, 2021, https://doi.org/10.4018/978-1-7998-8052-3.ch018

15. P. Gope, T. Hwang, A realistic lightweight anonymous authentication protocol for securing real-time application data access in wireless sensor networks, IEEE Transactions on Industrial Electronics, 63(11): 7124–7132, 2016, https://doi.org/10.1109/TIE.2016.2585081

16. A. Ghani, K. Mansoor, S. Mehmood, S.A. Chaudhry, A.U. Rahman, M. Najmus Saqib, Security and key management in IoT-based wireless sensor networks: An authentication protocol using symmetric key, International Journal of Communication Systems, 32(16): e4139, 2019, https://doi.org/10.1002/dac.4139

17. M. Elhoseny, H. Elminir, A. Riad, X. Yuan, A secure data routing schema for WSN using elliptic curve cryptography and homomorphic encryption, Journal of King Saud University-Computer and Information Sciences, 28(3): 262–275, 2016, https://doi.org/10.1016/j.jksuci.2015.11.001

18. A. Praveena, S. Smys, Efficient cryptographic approach for data security in wireless sensor networks using MES V-U, [in:] 2016 10th International Conference on Intelligent Systems and Control (ISCO), Coimbatore, India, pp. 1–6, 2016, https://doi.org/10.1109/ISCO.2016.7726911

19. J. Srinivas, S. Mukhopadhyay, D. Mishra, Secure and efficient user authentication scheme for multi-gateway wireless sensor networks, Ad Hoc Networks, 54: 147–169, 2017, https://doi.org/10.1016/j.adhoc.2016.11.002

20. D. Wang, W. Li, P. Wang, Measuring two-factor authentication schemes for real-time data access in industrial wireless sensor networks, IEEE Transactions on Industrial Informatics, 14(9): 4081–4092, 2018, https://doi.org/10.1109/TII.2018.2834351

21. S. Prakash, A. Rajput, Hybrid cryptography for secure data communication in wireless sensor networks, [in:] Ambient Communications and Computer Systems, G. Perez, S. Tiwari, M. Trivedi, K. Mishra [Eds.], Advances in Intelligent Systems and Computing, Vol. 696, pp. 401–410, Springer, 2018, https://doi.org/10.1007/978-981-10-7386-1_50

22. S. Farooq, D. Prashar, K. Jyoti, Hybrid encryption algorithm in wireless body area networks (WBAN), [in:] Intelligent Communication, Control and Devices, R. Singh, S. Choudhury, A. Gehlot [Eds.], Advances in Intelligent Systems and Computing, Vol. 624, pp. 401–410, Springer, 2018, https://doi.org/10.1007/978-981-10-5903-2_41

23. M. Alotaibi, An enhanced symmetric cryptosystem and biometric-based anonymous user authentication and session key establishment scheme for WSN, IEEE Access, 6: 70072–70087, 2018, https://doi.org/10.1109/ACCESS.2018.2880225

24. J. Jung, J. Kim, Y. Choi, D. Won, An anonymous user authentication and key agreement scheme based on a symmetric cryptosystem in wireless sensor networks, Sensors, 16(8): 1299, 2016, https://doi.org/10.3390/s16081299

25. V.S. Naresh, R. Sivaranjani, N.V.E.S. Murthy, Provable secure lightweight hyper elliptic curve-based communication system for wireless sensor networks, International Journal of Communication Systems, 31(15): e3763, 2018, https://doi.org/10.1002/dac.3763

26. K.M. Abdullah, E.H. Houssein, H.H. Zayed, New security protocol using hybrid cryptography algorithm for WSN, [in:] 2018 1st International Conference on Computer Applications & Information Security (ICCAIS), Riyadh, Saudi Arabia, pp. 1–6, 2018, https://doi.org/10.1109/CAIS.2018.8442003

27. N. Gupta, V. Kapoor, Hybrid cryptographic technique to secure data in web application, Journal of Discrete Mathematical Sciences Cryptography, 23(1): 125–135, 2020, https://doi.org/10.1080/09720529.2020.1721872

28. M. Yuvaraju, K.A. Pranesh, Energy proficient hybrid secure scheme for wireless sensor networks, Wireless Personal Communications, 117: 747–767, 2021, https://doi.org/10.1007/s11277-020-07895-x

29. C.-W. Hung, W.-T. Hsu, Power consumption and calculation requirement analysis of AES for WSN IoT, Sensors, 18(6): 1675, 2018, https://doi.org/10.3390/s18061675

30. S. Ali et al., An efficient cryptographic technique using modified Diffie–Hellman in wireless sensor networks, International Journal of Distributed Sensor Networks, 16(6): 1550147720925772, 2020, https://doi.org/10.1177/1550147720925772