Skip to main content

A Novel Privacy Preservation Mechanism for Wireless Medical Sensor Networks

  • Conference paper
  • First Online:
Advances in Electronics, Communication and Computing (ETAEERE 2020)

Abstract

Wireless Medical Sensors Networks (WMSNs) are mainly used to track and collect health data from patients using body sensors which are implanted on the patient body. This helps to reduce the cost of treatment, provide reliable resources and services, provide accurate diagnostic results, and quicker diagnosis. Security and privacy are the most significant challenges in such networks while the healthcare information is transferred via wireless communication to the medical server. Security requirements such as confidentiality, honesty, and authenticity should be maintained throughout the entire process. This paper proposes a robust privacy preservation framework based on homomorphic encryption. The randomness in encrypted data provides different ciphertexts which enhances the privacy of the processed data. The network and encryption performance of the proposed monitoring system are evaluated using an OPNET-based simulation model. It demonstrated that the proposed framework achieves better throughput and less delay as compared to previous works.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 299.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 379.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 379.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Amin, R., Hafizul Islam, S. K., Biswas, G. P., Khurram Khan, M., & Kumar, N. (2018). A robust and anonymous patient monitoring system using wireless medical sensor networks. Future Generation Computer Systems, 80, 483–495.

    Google Scholar 

  2. Surendar, A., & Kavitha, M. (2017). Secure patient data transmission in sensor networks. Journal of Pharmaceutical Sciences and Research, 9(2), 230.

    Google Scholar 

  3. Rawat, P., Singh, K. D., Chaouchi, H., & Bonnin, J. M. (2013). Wireless sensor networks: A survey on recent developments and potential synergies. The Journal of Supercomputing, 68(1), 1–48. https://doi.org/10.1007/s11227-013-1021-9.

    Article  Google Scholar 

  4. Akyildiz, I. F., Su, W., Sankarasubramaniam, Y., & Cayirci, E. (2002). Wireless sensor networks: A survey. Computer Networks, 38(4), 393–422.

    Google Scholar 

  5. Alemdar, H., & Ersoy, C. (2010). Wireless sensor networks for healthcare: A survey. Computer Networks, 54(15), 2688–2710.

    Article  Google Scholar 

  6. El Gamal, T. (1985). A public key cryptosystem and a signature scheme based on discrete logarithms. In Proceedings of CRYPTO 84 on Advances in Cryptology (pp. 10–18). New York, NY, USA: Springer-Verlag New York, Inc.

    Google Scholar 

  7. Rivest, R. L., Shamir, A., & Adleman, L. (1978). A method for obtaining digital signatures and public-key cryptosystems. Communications of the ACM, 21(2), 120–126.

    Article  MathSciNet  Google Scholar 

  8. Guo, P., Wang, J., Geng, X. H., Kim, C. S., & Kim, J.-U. (2014). A variable threshold-value authentication architecture for wireless mesh networks. Journal of Internet Technology, 15(6), 929–935.

    Google Scholar 

  9. Shen, J., Tan, H.-W., Wang, J., Wang, J.-W., & Lee, S.-Y. (2015). A novel routing protocol providing good transmission reliability in underwater sensor networks. Journal of Internet Technology, 16(1), 171–178.

    Google Scholar 

  10. Shi, L., Yuan, J., Yu, S., & Li, M. (2013). Ask-ban: Authenticated secret key extraction utilizing channel characteristics for body area networks. In Proceedings of the Sixth ACM Conference on Security and Privacy in Wireless and Mobile Networks, WiSec ′13 (pp. 155–166), New York, NY, USA: ACM.

    Google Scholar 

  11. Yessad, N., Bouchelaghem, S., Ouada, F.-S., & Omar, M. (2017). Secure and reliable patient body motion based authentication approach for medical body area networks. Pervasive and Mobile Computing, 42(C), 351–370.

    Google Scholar 

  12. Ali, A., & Khan, F. A. (2010). An improved EKG-based key agreement scheme for body area networks. In S. K. Bandyopadhyay, W. Adi, T. Kim, & Y. Xiao, (Eds.), Information Security and Assurance (pp. 298–308) Heidelberg: Springer Berlin.

    Google Scholar 

  13. Hu, C., Cheng, X., Zhang, F., Wu, D., Liao, X., & Chen, D. (2013). Opfka: Secure and efficient ordered-physiological-feature-based key agreement for wireless body area networks. In 2013 Proceedings IEEE INFOCOM (pp. 2274–2282).

    Google Scholar 

  14. Kim, S., Kyoung Sung, M., & Chung, Y. D. (2014). A framework to preserve the privacy of electronic health data streams. Journal of Biomedical Informatics, 50, 95–106.

    Google Scholar 

  15. Kundalwal, M. K., Chatterjee, K., & Singh, A. (2018). An improved privacy preservation technique in health-cloud. ICT Express.

    Google Scholar 

  16. Kundalwal, M. K., Singh, A., & Chatterjee, K. (2018). A privacy framework in cloud computing for healthcare data. In 2018 International Conference on Advances in Computing, Communication Control and Networking (ICACCCN) (pp. 58–63). IEEE.

    Google Scholar 

  17. Mir, O., Munilla, J., & Kumari, S. (2015). Efficient anonymous authentication with key agreement protocol for wireless medical sensor networks. Peer-to-Peer Networking and Applications, 10(1), 79–91. https://doi.org/10.1007/s12083-015-0408-1.

    Article  Google Scholar 

  18. Machanavajjhala, A., Gehrke, J., Kifer, D., & Venkitasubramaniam, M. (2006). L-diversity: Privacy beyond k-anonymity. In 22nd International Conference on Data Engineering (ICDE’06) (pp. 24–24).

    Google Scholar 

  19. Brakerski, Z. (2019). Fundamentals of fully homomorphic encryption. In Providing Sound Foundations for Cryptography: On the Work of Shafi Goldwasser and Silvio Micali (pp. 543–563).

    Google Scholar 

  20. Gentry, C., & Boneh, D. (2009). A fully homomorphic encryption scheme (Vol. 20). Stanford University Stanford.

    Google Scholar 

  21. Chaudhary, S., Singh, A., & Chatterjee, K. (2019). Wireless body sensor network (WBSN) security and privacy issues: A survey. International Journal of Computational Intelligence & IoT, 2(2).

    Google Scholar 

  22. Kumar, P., & Lee, H.-J. (2012). Security issues in healthcare applications using wireless medical sensor networks: A survey. Sensors, 12(1), 55–91.

    Google Scholar 

  23. Chen, M., Miao, Y., & Humar, I. (2019). Introduction to opnet network simulation. In OPNET IoT Simulation (pp. 77–153). Springer.

    Google Scholar 

  24. Liu, J., Zhang, Z., Chen, X., & Kwak, K. S. (2014). Certificateless remote anonymous authentication schemes for wireless body area networks. IEEE Transactions on Parallel and Distributed Systems, 25(2), 332–342.

    Article  Google Scholar 

  25. He, D., Zeadally, S., Kumar, N., & Lee, J.-H. (2016). Anonymous authentication for wireless body area networks with provable security. IEEE Systems Journal, 1–12.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Ravi Raushan Kumar Chaudhary .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2021 Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Singh, A., Chaudhary, R.R.K., Chatterjee, K. (2021). A Novel Privacy Preservation Mechanism for Wireless Medical Sensor Networks. In: Mallick, P.K., Bhoi, A.K., Chae, GS., Kalita, K. (eds) Advances in Electronics, Communication and Computing. ETAEERE 2020. Lecture Notes in Electrical Engineering, vol 709. Springer, Singapore. https://doi.org/10.1007/978-981-15-8752-8_18

Download citation

  • DOI: https://doi.org/10.1007/978-981-15-8752-8_18

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-15-8751-1

  • Online ISBN: 978-981-15-8752-8

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics