Page 123 - 2023-Vol19-Issue2
P. 123

119 |                                                             Rashid et al.

privacy breaches [10]. In this context, security refers to the           categorizing the signals into two types, normal and
protection of data from illegal use while they are connected,            abnormal, are specified. This classification includes
transferred, processed, and saved. Privacy refers to the ability         all types of sensors used in this work, such as body
to maintain the confidentiality of a patient’s personal infor-           temperature sensor.
mation, such as his/her name and details about his/her health
[11]. In 2018, Wei et al. [12] proposed a secure authentication        • In the patient’s health care part, an adequate scheme
scheme that depended on a low-entropy PIN. Their work can                attached to the patient’s device, which can analyze the
be more convenient for WBAN to apply on a simple-to-recall               class and type of the sensor’s signal and perform suit-
PIN. In 2019, Kompara et al. [13] presented a good authenti-             able actions without demanding a physician, is pro-
cation system for a two-hop WBAN with a confirmation on a                posed.
pseudonym and nonchase merit. The performance and solidity
of this system were elucidated utilizing an unofficial analysis,       • This work is characterized by strong security and high
which was then officially confirmed. Koya and Deepthi [14]               confidentiality in terms of exchanging information be-
supported an authentication scheme based on physiological                tween the basic parts of the components of the work
signals. The authors’ opinion was that physiological value               environment.
assistance was employed in protecting the scheme versus sen-
sor node impersonation attacks. Wang et al. [15] proposed              • This proposed scheme is very important and can be used
a swift authentication method for health contingencies; their            by patients, the elderly, athletes, and those interested
work relied on decreasing authentication time to lug contin-             in continuously monitoring the functions of their vital
gencies speedily without aiding a physician. Dodangeh et al.             bodies.
[16] suggested a good authentication scheme depended on
the biometric merits of the human body. The authors offered            • On the security side, the proposed scheme can resist
two schemes for authentication and key agreement in WBAN.                familiar attacks such as insider attacks, MITM attacks,
Their work applied biometric features, secure exchanged data,            and DoS attacks. Moreover, AVISPA prove the security
and an essay password to supply security. In 2019, Liu et                of the proposed scheme.
al. [17] developed a modern authentication scheme that was
distinguished using a dynamic password. The main aim of           B. Organization
this research is to develop secure scheme for patient’s health    This paper is organized as follows: Section 2 presents an
cases observation.                                                architecture of WBAN’s organization. Section 3 displays the
                                                                  proposed scheme. Section 4 demonstrates the formal analysis
                                                                  and the results of the experiment. Section 4 consists of a
                                                                  comparison with other related schemes. Section 5 presents
                                                                  the conclusions.

                   Fig. 1. WBAN organization                                II. ARCHITECTURE OF WBAN

A. THE RESEARCH CONTRIBUTIONS                                     A. System Components of WBAN
The contributions of the proposed scheme can be summarized        The components of the WBAN system are sensors (Si), per-
in the following points:                                          sonal devices (PDi), and an authentication server (AS). Figure
                                                                  2 presents the components of the WBAN system. Sensors
     • To keep the energy of the sensor, the time at which        (Si): Sensors are considered limited resources, as they have
       the pivotal signals are submitted from a sensor during     the ability to collect patients’ health data and send signals
                                                                  to personal devices via Bluetooth or Wi-Fi. Personal device
                                                                  (PDi): A personal device is a communication tool that can
                                                                  connect biometric sensors, users, and an authentication server.
                                                                  A personal device can interpret the sensor’s signals and send
                                                                  information to the server or notify the patient about his/her
                                                                  health condition through an application provided by the health
                                                                  institution. Authentication server (AS): An authentication
                                                                  server has many roles, including saving the sensitive informa-
                                                                  tion of the patients in a secure database, analyzing data, and
                                                                  processing and distributing data to the relevant people.
   118   119   120   121   122   123   124   125   126   127   128