Cover
Vol. 19 No. 2 (2023)

Published: December 31, 2023

Pages: 118-127

Original Article

Authentication Healthcare Scheme in WBAN

Abstract

A wireless body area network (WBAN) connects separate sensors in many places of the human body, such as clothes, under the skin. WBAN can be used in many domains such as health care, sports, and control system. In this paper, a scheme focused on managing a patient’s health care is presented based on building a WBAN that consists of three components, biometric sensors, mobile applications related to the patient, and a remote server. An excellent scheme is proposed for the patient’s device, such as a mobile phone or a smartwatch, which can classify the signal coming from a biometric sensor into two types, normal and abnormal. In an abnormal signal, the device can carry out appropriate activities for the patient without requiring a doctor as a first case. The patient does not respond to the warning message in a critical case sometimes, and the personal device sends an alert to the patient’s family, including his/her location. The proposed scheme can preserve the privacy of the sensitive data of the patient in a protected way and can support several security features such as mutual authentication, key management, anonymous password, and resistance to malicious attacks. These features have been proven depending on the Automated Validation of Internet Security Protocols and Applications. Moreover, the computation and communication costs are efficient compared with other related schemes.

References

  1. O. Ali, M. K. Ishak, M. K. L. Bhatti, I. Khan, and K.- I. Kim, “A comprehensive review of internet of things: Technology stack, middlewares, and fog/edge computing interface,” Sensors, vol. 22, no. 3, p. 995, 2022.
  2. L. Babangida, T. Perumal, N. Mustapha, and R. Yaakob, “Internet of things (iot) based activity recognition strate- gies in smart homes: A review,” IEEE Sensors Journal, vol. 22, no. 9, pp. 8327–8336, 2022.
  3. V. Mohindru, S. Vashishth, and D. Bathija, “Internet of things (iot) for healthcare systems: A comprehensive survey,” Recent Innovations in Computing: Proceedings of ICRIC 2021, Volume 1, pp. 213–229, 2022.
  4. C. Bayılmıs¸, M. A. Ebleme, ¨U. C¸ avus¸o˘glu, K. K¨uc¨uk, and A. Sevin, “A survey on communication protocols and performance evaluations for internet of things,” Digital Communications and Networks, vol. 8, no. 6, pp. 1094–1104, 2022. 127 | Rashid et al.
  5. J. Iqbal, M. Adnan, Y. Khan, H. AlSalman, S. Hussain, S. S. Ullah, N. u. Amin, and A. Gumaei, “Designing a healthcare-enabled software-defined wireless body area network architecture for secure medical data and effi- cient diagnosis,” Journal of Healthcare Engineering, vol. 2022, pp. 1–19, 2022.
  6. S. M. Mousavi, A. Khademzadeh, and A. M. Rahmani, “The role of low-power wide-area network technologies in internet of things: A systematic and comprehensive re- view,” International Journal of Communication Systems, vol. 35, no. 3, p. e5036, 2022.
  7. Y. Perwej, N. Akhtar, N. Kulshrestha, and P. Mishra, “A methodical analysis of medical internet of things (miot) security and privacy in current and future trends,” Jour- nal of Emerging Technologies and Innovative Research, vol. 9, no. 1, pp. d346–d371, 2022.
  8. M. Kaur et al., “A review on classification of data in wban,” in 2022 8th International Conference on Advanced Computing and Communication Systems (ICACCS), vol. 1, pp. 1434–1438, IEEE, 2022.
  9. A. Behura and S. Nandan Mohanty, “Application of the internet of things (iot) in biomedical engineering: Present scenario and challenges,” Internet of Things and Its Applications, pp. 151–169, 2022.
  10. M. Trnka, A. S. Abdelfattah, A. Shrestha, M. Coffey, and T. Cerny, “Systematic review of authentication and authorization advancements for the internet of things,” Sensors, vol. 22, no. 4, p. 1361, 2022.
  11. T.-Y. Wu, Q. Meng, S. Kumari, and P. Zhang, “Rotating behind security: A lightweight authentication protocol based on iot-enabled cloud computing environments,” Sensors, vol. 22, no. 10, p. 3858, 2022.
  12. F. Wei, P. Vijayakumar, J. Shen, R. Zhang, and L. Li, “A provably secure password-based anonymous authenti- cation scheme for wireless body area networks,” Com- puters & Electrical Engineering, vol. 65, pp. 322–331, 2018.
  13. M. Kompara, S. H. Islam, and M. H¨olbl, “A robust and efficient mutual authentication and key agreement scheme with untraceability for wbans,” Computer net- works, vol. 148, pp. 196–213, 2019.
  14. A. M. Koya and P. Deepthi, “Anonymous hybrid mu- tual authentication and key agreement scheme for wire- less body area network,” Computer Networks, vol. 140, pp. 138–151, 2018.
  15. C. Wang, W. Zheng, S. Ji, Q. Liu, and A. Wang, “Identity-based fast authentication scheme for smart mo- bile devices in body area networks,” Wireless Communi- cations and Mobile Computing, vol. 2018, 2018.
  16. P. Dodangeh and A. H. Jahangir, “A biometric security scheme for wireless body area networks,” Journal of Information Security and Applications, vol. 41, pp. 62– 74, 2018.
  17. X. Liu, R. Zhang, and M. Zhao, “A robust authentication scheme with dynamic password for wireless body area networks,” Computer Networks, vol. 161, pp. 220–234, 2019.
  18. M. Soni and D. K. Singh, “New directions for secu- rity attacks, privacy, and malware detection in wban,” Evolutionary Intelligence, pp. 1–18, 2022.
  19. D. Hammood and A. Alkhayyat, “An overview of the survey/review studies in wireless body area network,” in 2020 3rd International Conference on Engineering Technology and its Applications (IICETA), pp. 18–23, IEEE, 2020.
  20. M. H. Alzuwaini and A. A. Yassin, “An efficient mech- anism to prevent the phishing attacks.,” Iraqi Journal for Electrical & Electronic Engineering, vol. 17, no. 1, 2021.
  21. A. J. Mohammed and A. A. Yassin, “Efficient and flexi- ble multi-factor authentication protocol based on fuzzy extractor of administrator’s fingerprint and smart mobile device,” Cryptography, vol. 3, no. 3, p. 24, 2019.
  22. M. H. Ibrahim, S. Kumari, A. K. Das, M. Wazid, and V. Odelu, “Secure anonymous mutual authentication for star two-tier wireless body area networks,” Computer methods and programs in biomedicine, vol. 135, pp. 37– 50, 2016.
  23. C. Vorakulpipat, S. Pichetjamroen, and E. Rattanalerdnu- sorn, “Usable comprehensive-factor authentication for a secure time attendance system,” peerJ computer science, vol. 7, p. e678, 2021.
  24. A. Alghamdi, “A verification system for multi-factor authentication for e-healthcare architectures,” Arab Jour- nal for Scientific Publishing (AJSP), vol. 2663, p. 5798, 2021.