Advertisement

Enhanced Secure Transmission of Data in Wireless Body Area Network for Health Care Applications

Conference paper
  • 1.3k Downloads
Part of the Communications in Computer and Information Science book series (CCIS, volume 828)

Abstract

The advent of new technologies like cloud computing, Internet of Things and Wireless Body Area Networks (WBAN) have largely promoted the e-healthcare management. E-healthcare eases the life of patients in society and provides them freedom from going to hospital physically on regular intervals. Presently, E-healthcare is facing the challenges including authenticity and privacy of information during transmission. To maintain secrecy of messages knapsack cryptosystem have been applied in WBAN. For authentication of data transmitted in WBAN, we have recommended a modified and improved recovery based digital signature scheme with batch verification of messages that improve the performance of underlying algorithm in terms of computation. Proposed algorithm does not require computing one way hash for digital signature generation. Security analysis of proposed work has been presented to validate the privacy and security of message against various attacks. The results demonstrate performance improvement in digital signature verification scheme.

Keywords

Wireless Body Area Network Batch verification Recovery based digital signature Knapsack crypto system Security Privacy and authentication 

References

  1. 1.
    Al-Janabi, S., Al-Shourbaji, I., Shojafar, M., Shamshirband, S.: Survey of main challenges (security and privacy) in wireless body area networks for healthcare applications. Egypt. Inf. J. 18(2), 113–122 (2017)CrossRefGoogle Scholar
  2. 2.
    Sangari, S., Manickam, J.M.L.: Public key cryptosystem based security in wireless body area network. In: International Conference on Circuits, Power and Computing Technologies (ICCPCT 2014), Nagercoil, pp. 1609–1612 (2014)Google Scholar
  3. 3.
    Shieh, S.P., Lin, C.T., Yang, W.B., Sun, H.M.: Digital multisignature schemes for authenticating delegates in mobile code systems. IEEE Trans. Veh. Technol. 49, 1464–1473 (2000)CrossRefGoogle Scholar
  4. 4.
    Chang, C.C., Lu, E.-H., Pon, S.-F., Lee, J.-Y.: Applying Harn-Kiesler multisignature scheme to electronic document systems. In: Proceedings of National Information Security Conference, pp. 35–38 (1995)Google Scholar
  5. 5.
    Zhang, F.G.: Cryptanalysis of Chang et al’.s signature scheme with message recovery. IEEE Commun. Lett. 9(4), 358–359 (2005)MathSciNetCrossRefGoogle Scholar
  6. 6.
    Chien, H.Y.: Forgery attacks on digital signature schemes without sing one-way hash and message redundancy. IEEE Commun. Lett. 10(5), 324–325 (2006)CrossRefGoogle Scholar
  7. 7.
    Chang, C.-C., Chang, Y.-F.: Signing a digital signature without using one-way hash functions and message redundancy schemes. IEEE Commun. Lett. 8(8), 485–487 (2004)CrossRefGoogle Scholar
  8. 8.
    Kang, L., Tang, X.H.: Digital signature scheme without hash functions and message redundancy. J. Commun. 27(5), 18–20 (2006). (in Chinese)Google Scholar
  9. 9.
    Wong, C.K., Lam, S.S.: Digital signatures for flows and multicasts. In: Proceedings of the Sixth International Conference on Network Protocols (ICNP 1998), pp. 198–209 (1998)Google Scholar
  10. 10.
    Zhu, W.T.: A comment on “MABS: multicast authentication based on batch signature”. IEEE Trans. Mob. Comput. 11(11), 1775–1776 (2012)CrossRefGoogle Scholar
  11. 11.
    Park, J.M., Chong, E.K.P., Siegel, H.J.: Efficient multicast packet authentication using signature amortization. In: Proceedings of IEEE Symposium on Security and Privacy (SP 2002), pp. 227–240 (2002)Google Scholar
  12. 12.
    Bellare, M., Garay, J.A., Rabin, T.: Fast batch verification for modular exponentiation and digital signatures. In: Nyberg, K. (ed.) EUROCRYPT 1998. LNCS, vol. 1403, pp. 236–250. Springer, Heidelberg (1998).  https://doi.org/10.1007/BFb0054130CrossRefGoogle Scholar
  13. 13.
    He, D., Zeadally, S., Kumar, N., Lee, J.-H.: Anonymous authentication for wireless body area networks with provable security. IEEE Syst. J. 11(4), 2590–2601 (2017)CrossRefGoogle Scholar
  14. 14.
    Li, X., Ibrahim, M.H., Kumari, S., Sangaiah, A.K., Gupta, V., Choo, K.-K.R.: Anonymous mutual authentication and key agreement scheme for wearable sensors in wireless body area networks. Comput. Netw. 129, 429–443 (2017)CrossRefGoogle Scholar
  15. 15.
    Goodman, R.M.F., McAuley, A.J.: New trapdoor-knapsack public-key cryptosystem. IEE Proc. E – Comput. Digit. Tech. 132(6), 289–292 (1985)CrossRefGoogle Scholar

Copyright information

© Springer Nature Singapore Pte Ltd. 2018

Authors and Affiliations

  1. 1.School of Computer Science and Engineering, College of Engineering StudiesUniversity of Petroleum and Energy StudiesDehradunIndia

Personalised recommendations