Home            Contact us            FAQs
    
      Journal Home      |      Aim & Scope     |     Author(s) Information      |      Editorial Board      |      MSP Download Statistics

     Research Journal of Applied Sciences, Engineering and Technology


Security Analysis in Body Area Networks using Attribute-based Ring Signcryption Scheme

A. Arul Jothi and Dr. B. Srinivasan
Department of Computer Science, Gobi Arts and Science College, Gobichettipalayam, Tamil Nadu-638453, India
Research Journal of Applied Sciences, Engineering and Technology  2016  1:48-56
http://dx.doi.org/10.19026/rjaset.13.2889  |  © The Author(s) 2016
Received: December ‎13, ‎2015  |  Accepted: March ‎1, ‎2016  |  Published: July 05, 2016

Abstract

At present, Body Area Networks (BANs) are budding as one of the major research interests, predominantly in the field of personal health monitoring. In view of the fact that health data are extremely private and includes sensitive details, the security of data transmission inside a BAN turns out to be a critical issue that needs instant attention. In this study, Attribute-based Ring Signcryption Scheme (ARSS) is proposed for body area network security. The initial process of proposed system is preprocessed the patient’s dataset using Independent Component Analysis (ICA). Then interoperability is defined by semantics and the semantic interoperability among body area sensor networks is used Ant Colony Optimization based Fuzzy Ontology (ACO-FO). The ACO-FO is used to improve the interoperability of BAN system. Then the proposed ARSS is simultaneously providing the characteristics of message confidentiality, authentication, integrity, remembrance, non-repudiation, verifiability in public and forward secrecy of message confidentiality. ARSS can make use of any speedy and safe symmetric algorithm for the encryption of messages, it offers huge benefits in order to be employed in establishments involving security in the fields of health monitoring and while managing with resource constrained devices. Theoretically it proves that ARSS is efficient and feasible. And also its security level is analyzed and compared to existing Elliptic Curve Cryptography with Fuzzy Ontology (ECC with FO) signcryption and Fuzzy Attribute-Based Signcryption Schemes.

Keywords:

Attribute-based ring signcryption scheme, ant colony optimization, body area networks, fuzzy ontology, independent component analysis, interoperability , security,


References

  1. Alsadhan, A. and N. Khan, 2013. An LBP based key management for secure Wireless Body Area Network (WBAN). Proceeding of the 14th ACIS International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing. Honolulu, HI, pp: 85-88.
    CrossRef    
  2. Guizzardi, G., 2005. Ontological foundations for structural conceptual models. Ph.D. Thesis, University of Twente.
  3. Hanson, M.A., H.C. Powell Jr., A.T. Barth, K. Ringgenberg, B.H. Calhoun, J.H. Aylor and J. Lach, 2009. Body area sensor networks: Challenges and opportunities. Computer, 42(1): 58-65.
    CrossRef    
  4. Hu, C., X. Cheng, F. Zhang, D. Wu, X. Liao and D. Chen, 2013a. OPFKA: Secure and efficient ordered-physiological-feature-based key agreement for wireless body area networks. Proceeding of the IEEE INFOCOM. Turin, pp: 2274-2282.
    CrossRef    
  5. Hu, C., N. Zhang, H. Li, X. Cheng and X. Liao, 2013b. Body area network security: A fuzzy attribute-based signcryption scheme. IEEE J. Sel. Area. Comm., 31(9): 37-46.
    CrossRef    
  6. Jovanov, E., A. Milenkovic, C. Otto and P.C. de Groen, 2005. A wireless body area network of intelligent motion sensors for computer assisted physical rehabilitation. J. NeuroEng. Rehabil., 2(1): 6.
    CrossRef    PMid:15740621 PMCid:PMC552302    
  7. Li, M., W. Lou and K. Ren, 2010. Data security and privacy in wireless body area networks. IEEE Wirel. Commun., 17(1): 51-58.
    CrossRef    
  8. Liu, J. and K.S. Kwak, 2010. Hybrid security mechanisms for wireless body area networks. Proceeding of the 2nd International Conference on Ubiquitous and Future Networks (ICUFN, 2010). Jeju Island, Korea (South), pp: 98-103.
  9. Liu, J., Z. Zhang, R. Sun and K.S. Kwak, 2012. An efficient certificateless remote anonymous authentication scheme for wireless body area networks. Proceeding of the IEEE International Conference on Communications (ICC, 2012). Ottawa, ON, pp: 3404-3408.
    CrossRef    
  10. Lorincz, K., D.J. Malan, T.R.F. Fulford-Jones, A. Nawoj, A. Clavel, V. Shnayder, G. Mainland, M. Welsh and S. Moulton, 2004. Sensor networks for emergency response: Challenges and opportunities. IEEE Pervas. Comput., 3(4):16-23.
    CrossRef    
  11. Malasri, K. and L. Wang, 2007. Addressing security in medical sensor networks. Proceeding of the 1st ACM SIGMOBILE International Workshop on Systems and Networking Support for Healthcare and Assisted Living Environments (HealthNet'07), pp: 7-12.
    CrossRef    
  12. Morchon, O.G., H. Baldus and D.S. Sanchez, 2006. Resource-efficient security for medical body sensor networks. Proceeding of the International Workshop on Wearable and Implantable Body Sensor Networks (BSN'06). Cambridge, MA, pp: 80-83.
    CrossRef    
  13. O'Donovan, T., J. O'Donoghue, C. Sreenan, D. Sammon, P. O'Reilly and K.A. O'Connor, 2009. A context aware wireless Body Area Network (BAN). Proceeding of the 3rd International Conference on Pervasive Computing Technologies for Healthcare. London, pp: 1-8.
    CrossRef    PMid:19554351    
  14. Ouksel, A.M. and A. Sheth, 1999. Semantic interoperability in global information systems. ACM SIGMOD Rec., 28(1): 5-12.
    CrossRef    
  15. Ramli, S.N., R. Ahmad, M.F. Abdollah and E. Dutkiewicz, 2013. A biometric-based security for data authentication in Wireless Body Area Network (WBAN). Proceeding of the 15th International Conference on Advanced Communication Technology (ICACT, 2013), PyeongChang, pp: 998-1001.
  16. Sahai, A. and B. Waters, 2005. Fuzzy Identity-Based Encryption. In: Cramer, R. (Ed.), Advances in Cryptology – EUROCRYPT 2005. Lecture Notes in Computer Science, Springer-Verlag, Berlin, Heidelberg, 3494: 457-473.
    CrossRef    
  17. Sampangi, R.V., S. Dey, S.R. Urs and S. Sampalli, 2012. A security suite for wireless body area networks. Int. J. Netw. Secur. Appl., 4(1): 97-116.
    CrossRef    
  18. Tan, C.C., H. Wang, S. Zhong and Q. Li, 2009. IBE-Lite: A lightweight identity-based cryptography for body sensor networks. IEEE T. Inf. Technol. B., 13(6): 926-932.
    CrossRef    PMid:19789117    
  19. Zhang, Z., H. Wang, A.V. Vasilakos and H. Fang, 2012. ECG-cryptography and authentication in body area networks. IEEE T. Inf. Technol. B., 16(6): 1070-1078.
    CrossRef    PMid:22752143    

Competing interests

The authors have no competing interests.

Open Access Policy

This article is distributed under the terms of the Creative Commons Attribution 4.0 International License (http://creativecommons.org/licenses/by/4.0/), which permits unrestricted use, distribution, and reproduction in any medium, provided you give appropriate credit to the original author(s) and the source, provide a link to the Creative Commons license, and indicate if changes were made.

Copyright

The authors have no competing interests.

ISSN (Online):  2040-7467
ISSN (Print):   2040-7459
Submit Manuscript
   Information
   Sales & Services
Home   |  Contact us   |  About us   |  Privacy Policy
Copyright © 2024. MAXWELL Scientific Publication Corp., All rights reserved