Nothing Special   »   [go: up one dir, main page]

skip to main content
10.4108/icst.bodynets.2014.257172guideproceedingsArticle/Chapter ViewAbstractPublication PagesConference Proceedingsacm-pubtype
research-article
Free access

Public-key authentication for cloud-based WBANs

Published: 29 September 2014 Publication History

Abstract

Merging WBAN systems with cloud computing is an efficient solution to overcome limitations inherent in WBAN, especially in critical human-related applications such as remote health monitoring. In cloud-based WBAN, the nodes are classified into WBAN sensors that report measurements about the human body and WBAN actuators that receive commands from the medical staff and perform actions. Authenticating these commands is a critical security issue as any alteration may lead to serious consequences. This paper presents a light-weight public-key authentication protocol for cloud-based WBAN systems. The proposed protocol is based on the modified Rabin authentication algorithm which is customized in this paper by making some of its components run in parallel. To prove the efficiency of the modified Rabin we implemented the algorithm with different hardware settings using Tmote Sky motes. The Rabin algorithm with and without the parallel settings is also programmed on FPGA to evaluate its design and performance. The results show that secure, direct, instant, and authenticated commands can be delivered from the medical staff located at the cloud side to the WBAN nodes located in/on the human body. Compared to other public-key protocols implemented on the motes, Rabin algorithm achieved extremely faster verification and reasonable signature generation speed. Moreover, the suggested parallel settings of the Rabin signature generation significantly reduced the delays (by almost 80%) which is a critical issue in WBAN applications.

References

[1]
Altera inc., quartus ii introduction using verilog designs. ftp://ftp.altera.com/up/pub/Altera-Material /9.1/ Tutorials /Verilog /Quartus-II-Introduction.pdf.
[2]
J. H. Ahnn and M. Potkonjak. mhealthmon: Toward energy-efficient and distributed mobile health monitoring using parallel offloading. Journal of medical systems, 37(5): 1--11, 2013.
[3]
M. Barua, R. Lu, and X. Shen. Sps: Secure personal health information sharing with patient-centric access control in cloud computing. In Proc. of GLOBECOM, pages 647--652, Dec 2013.
[4]
P. Brandão. Abstracting information on body area networks. PhD thesis, University of Cambridge, 2012.
[5]
K. Divi and H. Liu. Modeling of wban and cloud integration for secure and reliable healthcare. In Proc. of BodyNets, pages 128--131, 2013.
[6]
G. Fortino, G. Di Fatta, M. Pathan, and A. Vasilakos. Cloud-assisted body area networks: state-of-the-art and future challenges. Wireless Networks, pages 1--14, 2014.
[7]
J.-P. K. G. Gaubatz and B. Sunar. Public key cryptography in sensor networks - revisited. In Proc. of ESAS, pages 2--18, Springer, Heidelberg, 2004. Lecture Notes in Computer Science.
[8]
G. Gaubatz, J. Kaps, and B. Sunar. Public key cryptography in sensor networks - revisited. In Proc. of ESAS, pages 2--18, Springer, Heidelberg, 2004. Lecture Notes in Computer Science.
[9]
N. D. Han, L. Han, D. M. Tuan, H. P. In, and M. Jo. A scheme for data confidentiality in cloud-assisted wireless body area networks. Information Sciences, 2014.
[10]
J.-H. Hauer, V. Handziski, and A. Wolisz. Experimental study of the impact of wlan interference on ieee 802.15.4 body area networks. In Wireless Sensor Networks, volume 5432 of Lecture Notes in Computer Science, pages 17--32. Springer Berlin Heidelberg, 2009.
[11]
T. Hayajneh, G. Almashaqbeh, S. Ullah, and A. Vasilakos. A survey of wireless technologies coexistence in wban: analysis and open research issues. Wireless Networks, pages 1--35, 2014.
[12]
D. He, C. Chen, S. Chan, J. Bu, and A. Vasilakos. Retrust: Attack-resistant and lightweight trust management for medical sensor networks. Information Technology in Biomedicine, IEEE Transactions on, 16(4): 623--632, 2012.
[13]
N. A. Jacob, V. Pillai, S. Nair, D. T. Harrell, R. Delhommer, B. Chen, I. Sanchez, V. Almstrum, and S. Gopalan. Low-cost remote patient monitoring system based on reduced platform computer technology. Telemedicine and e-Health, 17(7): 536--545, 2011.
[14]
B. Latré, B. Braem, I. Moerman, C. Blondia, and P. Demeester. A survey on wireless body area networks. Wireless Networks, 17(1): 1--18, 2011.
[15]
D. J. Malan, M. Welsh, and M. D. Smith. A public-key infrastructure for key distribution in tinyos based on elliptic curve cryptography. In Proc. of SECON, 2004.
[16]
A. J. Menezes, P. C. van Oorschot, and S. A. Vanstone. Handbook of Applied Cryptography. CRC Press, Waterloo, Canada, 2001.
[17]
R. Merkle. A certified digital signature. In Proc. of CRYPTO, pages 218--238. Springer New York, 1989.
[18]
T. O'Donovan, J. O'Donoghue, C. Sreenan, D. Sammon, P. O'Reilly, and K. O'Connor. A context aware wireless body area network (ban). In Proc. of PervasiveHealth, pages 1--8, April 2009.
[19]
A. Perrig, R. Szewczyk, J. Tygar, V. Wen, and D. E. Culler. Spins: Security protocols for sensor networks. Wireless networks, 8(5): 521--534, 2002.
[20]
M. Rabin. Digitalized signatures and public key functions as intractable as factorization. Massachusetts Institute of Technology, Reading, Massachusetts, 1979.
[21]
M. Rahimi, J. Ren, C. Liu, A. Vasilakos, and N. Venkatasubramanian. Mobile cloud computing: A survey, state of art and future directions. Mobile Networks and Applications, 19(2): 133--143, 2014.
[22]
R. L. Rivest, A. Shamir, and L. Adleman. A method for obtaining digital signatures and public-key cryptosystems. Communications of the ACM, 21(2): 120--126, 1978.
[23]
F. Touati and R. Tabish. U-healthcare system: State-of-the-art review and challenges. Journal of medical systems, 37(3): 1--20, 2013.
[24]
S. Ullah, H. Higgins, B. Braem, B. Latre, C. Blondia, I. Moerman, S. Saleem, Z. Rahman, and K. S. Kwak. A comprehensive survey of wireless body area networks. Journal of Medical Systems, 36(3): 1065--1094, 2012.
[25]
J. Wan, C. Zou, S. Ullah, C.-F. Lai, M. Zhou, and X. Wang. Cloud-enabled wireless body area networks for pervasive healthcare. Network, IEEE, 27(5): 56--61, September 2013.
[26]
L. Wei, H. Zhu, Z. Cao, X. Dong, W. Jia, Y. Chen, and A. V. Vasilakos. Security and privacy for storage and computation in cloud computing. Information Sciences, 258(0): 371--386, 2014.
[27]
T. Wollinger, J. Pelzl, V. Wittelsberger, C. Paar, G. Saldamli, and C. Koc. Elliptic and hyperelliptic curves on embedded up. In Proc. of TECS, 2004.
[28]
Z. Zhang, H. Wang, A. Vasilakos, and H. Fang. Ecg-cryptography and authentication in body area networks. Information Technology in Biomedicine, IEEE Transactions on, 16(6): 1070--1078, 2012.

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image Guide Proceedings
BodyNets '14: Proceedings of the 9th International Conference on Body Area Networks
September 2014
385 pages
ISBN:9781631900471

Publisher

ICST (Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering)

Brussels, Belgium

Publication History

Published: 29 September 2014

Qualifiers

  • Research-article

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • 0
    Total Citations
  • 88
    Total Downloads
  • Downloads (Last 12 months)6
  • Downloads (Last 6 weeks)1
Reflects downloads up to 16 Nov 2024

Other Metrics

Citations

View Options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Login options

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media