A Three-Tier Approach for Lightweight Data Security of Body Area Networks in E-Health Applications
Introduction Body Area Networks (BANs) are used in e-Health applications to monitor various physiological parameters of patients. There is a need for lightweight data security mechanisms to protect the sensitive data transmitted through BANs. The Three-Tier Approach is a proposed solution that provides lightweight data security for BANs in e-Health applications. The approach consists of three layers: the Physical Layer, the Middleware Layer, and the Application Layer. The Physical Layer includes hardware-based security mechanisms such as encryption and authentication to secure the data transmitted over BANs. The Middleware Layer provides security services such as access control and data integrity checks to ensure the data transmitted through BANs is secure. The Application Layer provides user-level security mechanisms such as user authentication and role-based access control to ensure authorized access to the data transmitted through BANs. The Three-Tier Approach provides a comprehensive and lightweight security solution for BANs in e-Health applications, ensuring the privacy and security of patient data.
Brief Literature Review A. Al-Fuqaha et al. (2015) conducted a comprehensive review of WBANs in healthcare, highlighting the challenges and opportunities associated with the technology. The study emphasizes the need for reliable, secure, and energy-efficient WBANs to enable continuous monitoring of patients' health status. In a study by S. S. Khalil et al. (2018), the authors proposed a WBAN-based system for monitoring elderly patients' health status. The system includes various sensors for measuring vital signs such as heart rate, blood pressure, and body temperature. The study shows that the proposed system can provide accurate and reliable health monitoring for elderly patients. A study by Y. Zhou et al. (2019) proposes a novel framework for secure data transmission in WBANs. The study focuses on the security issues associated with the transmission of medical data over wireless networks and proposes a secure data transmission mechanism based on homomorphic encryption.
WBANS A WBAN is a wireless communication network between low-power sensing devices that is used around the body of a patient. focuses on wearable device also called sensor devices are implanted into the body of patients to check the current situation of health. Human body is linked with internet through gateway devices. Medical specialists use this data to cure the patient’s diseases like asthma, diabetes, heart attacks and blood pressures. WBANs are vulnerable to security attacks because they continuously collect physiological data to monitor people’s physical condition. The network security issues in WBANs are commonly addressed in the sensor-base station (BS) layer we propose that WBAN security in e-health applications should be constructed as a three-layer security model,
WBAN components is divided into three separate layers Layer 1. Data collection: Sensor interaction is limited to the patient body. Data transmission is between sensors and BS, which works as a data source in layer 2. Layer 2. Communication: Communication connects the BS with layer 3 to send the sensors’ data via the Internet to a repository. Layer 3. Application: Tasks are executed to retrieve sensed data and to analyze those data. Both tasks are performed by authorized entities.
WBAN SECURITY REQUIREMENTS: Confidentiality Integrity Authenticity Access Control
Abstraction Model Abstraction Model: E, H, ABE We also make the following assumptions: The BS stores a symmetric key ki , which is shared uniquely with the sensor node Si . Each access control policy P is defined by the system administrator by considering the available attributes under the format required by the ABE algorithm. The generation of user private keys SKUj ensures that data access can only be granted by the system administrator.
Methodology Used Encryption: Encryption is the process of converting plain text data into a coded form to prevent unauthorized access. In healthcare WBANs, encryption is used to protect patient data during transmission and storage. Strong encryption algorithms such as AES-256 and RSA can be used. Access control: Access control is a mechanism that regulates access to data and devices. In healthcare WBANs, access control can be used to ensure only authorized personnel have access to patient data. This can be done using passwords, biometric authentication, and digital certificates. Data integrity: Data integrity is the ability to maintain the accuracy and consistency of data. In healthcare WBANs, data integrity can be ensured by implementing message authentication codes (MACs) or digital signatures. This ensures that any unauthorized modification or tampering of data is detected. Privacy preservation: Privacy preservation is the ability to protect patient privacy by hiding their identity and data. In healthcare WBANs, privacy preservation techniques such as data anonymization, data aggregation, and data perturbation can be used to protect patient privacy. Secure data storage: Secure data storage involves storing patient data in a secure manner to prevent unauthorized access. In healthcare WBANs, secure data storage can be achieved by encrypting data at rest, using secure storage devices, and implementing access control mechanisms.
Results if any/Analysis The minimum security level used in each lightweight cryptographic algorithm is 128 bits. ES1. Sending Data From Sensor Nodes to BS This architecture defines the QoS requirements for integration of both internal and external sensors into an autonomous system. This article can be considered as a source of motivation for future research dimensions. Researchers have been developing signaling for very low power consumption. The hybrid authentication model is also needed to handle the large amount of data .
Conclusion A three-tier security model for WBAN systems suitable for e-health applications was proposed. The cost of crypto-algorithms in terms of computational resources is acceptable. The penalty in performance due to the computational processing of cryptographic layers can be tolerated by end-users while still meeting the expected data rate of sensed data. The proposed secure WBAN deployment offers flexibility to provide different security levels (128, 192, and 256 bits) as desired. The proposed security solution exhibits competitive performance in terms of execution time, memory, and energy consumption.