e-ISSN 2231-8526
ISSN 0128-7680
Insozhan Nagasundharamoorthi, Prabhu Venkatesan and Parthasarathy Velusamy
Pertanika Journal of Science & Technology, Volume 32, Issue 6, October 2024
DOI: https://doi.org/10.47836/pjst.32.6.25
Keywords: Data privacy, medical data, secure data aggregation, transmission system, Twofish symmetric key generation, wireless body area network
Published on: 25 October 2024
Nowadays, Wireless Body Area Networks (WBANs) are mostly used in the healthcare industry. They represent a portable, inexpensive network that exhibition adaptability. The data developed using WBAN devices is vulnerable to transmission-related internal and external attacks; nevertheless, this vulnerability arises due to resource restrictions; by employing data aggregation technologies to conduct statistical analyses of medical data while protecting patient privacy, medical professionals can enhance the precision of diagnoses and assist medical insurance firms in selecting optimal plans for their clients. Maintaining the confidentiality and integrity of sensitive health information becomes more stimulating at the stages of aggregation and transmission due to security issues. This study proposes a novel method, Twofish Symmetric Key Generation (TFSKG), combined into a Secure Data Aggregation (SDA) and transmission system intended for WBANs. The Twofish technique is animatedly employed to make the secure symmetric keys chosen for its robust encryption capabilities. These keys are used to encrypt and decrypt aggregated health data through transmission. The proposed TFSKG-SDA method implements effective algorithms for aggregating data to safeguard end-to-end privacy and preserve data accuracy while reducing bandwidth consumption. Thus, for improved performance, an innovative genetic algorithm for data security is presented in this study. This paper introduces TFSKG-SDA, a system that, by employing rigorous simulation testing, enhances security protocols, resistance against recognized threats, and data transmission efficacy in the context of resource-constrained WBANs. We assess the encryption strength, computational cost, and communication efficiency of the TFSKG- SDA method to prove its significance to real-world healthcare applications.
Abualsaud, K., Mohamed, A., Khattab, T., Yaacoub, E., Hasna, M., & Guizani, M. (2018). Classification for imperfect EEG epileptic seizure in IoT applications: A comparative study. In 2018 14th International Wireless Communications & Mobile Computing Conference (IWCMC) (pp. 364-369). IEEE Publishing. https://doi.org/10.1109/IWCMC.2018.8450279
Anh, B. T., Quoc, D. D., & Hiep, P. T. (2023). Optimizing transmission power for uplink data in cell-free wireless body area networks. In 2023 IEEE Statistical Signal Processing Workshop (SSP) (pp. 275-279). IEEE Publishing. https://doi.org/10.1109/SSP53291.2023.10208084
Apoorva, Y. K. (2013). Comparative study of different symmetric key cryptography algorithms. International Journal of Application or Innovation in Engineering & Management, 2(7), 10-15. https://doi.org/10.4236/jis.2020.113009
Azees, M., Vijayakumar, P., Karuppiah, M., & Nayyar, A. (2021). An efficient anonymous authentication and confidentiality preservation schemes for secure communications in wireless body area networks. Wireless Network, 27(3), 2119–2130. https://doi.org/10.1007/s11276-021- 02560-y
Dangi, K. G., Bhagat, A., & Panda, S. P. (2020). Emergency vital data packet transmission in hospital centered wireless body area network. Procedia Computer Science, 171, 2563-2571. https://doi.org/10.1016/j.procs.2020.04.278
Geetha, B. T., Mohan, P., Mayuri, A. V. R., Jackulin, T., Aldo Stalin, J. L., & Anitha, V. (2022). Pigeon inspired optimization with encryption based secure medical image management system. Computational Intelligence and Neuroscience, 2022(1), Article 2243827. https://doi.org/10.1155/2022/2243827
He, D., Zeadally, S., Kumar, M., & Lee, J. H. (2017). Anonymous authentication for wireless body area networks with provable security, IEEE Systems Journal, 11(4), 2590-2601. https://doi.org/10.1109/JSYST.2016.2544805
Hu, C., Li, H., Huo, Y., Xiang, T., & Liao, X. (2016). Secure and efficient data communication protocol for wireless body area networks. IEEE Transactions on Multi-Scale Computing Systems, 2(2), 94-107. https://doi.org/10.1109/TMSCS.2016.2525997
Kaleem, M., & Devarajan, G. G. (2023). Wireless body area networks utilizing data transmission techniques based on prediction. In 2023 10th International Conference on Computing for Sustainable Global Development (INDIACom) (pp. 1586-1591). IEEE Publishing.
Kareem, S. M., & Rahma, A. M. S. (2020). A novel approach for the development of the Twofish algorithm based on multi-level key space. Journal of Information Security and Applications, 50, Article 102410. https://doi.org/10.1016/j.jisa.2019.102410
Khan, S., Iqbal, W., Waheed, A., Mehmood, G., Khan, S., Zareei, M., & Biswal, R. R. (2022). An efficient and secure revocation-enabled attribute-based access control for eHealth in smart society. Sensors, 22(1), Article 336. https://doi.org/10.3390/s22010336
Kumar, M., & Chand, S. (2020). A secure and efficient cloud-centric internet-of-medical-things-enabled smart healthcare system with public verifiability. IEEE Internet of Things Journal, 7(10), 10650-10659. https://doi.org/10.1109/JIOT.2020.3006523
Kumar, M., & Chand, S. (2021). A lightweight cloud-assisted identity-based anonymous authentication and key agreement protocol for secure wireless body area network. In IEEE Systems Journal, 15(2), 2779-2786. https://doi.org/10.1109/JSYST.2020.2990749
Kumar, M., (2020). Cryptanalysis and improvement of anonymous authentication for wireless body area networks with provable security. Cryptology ePrint Archive. https://eprint.iacr.org/2020/936
Lee, C., & Lee, J. (2017). Harvesting and energy aware adaptive sampling algorithm for guaranteeing self-sustainability in wireless sensor networks. In 2017 International Conference on Information Networking (ICOIN) (pp. 57-62). IEEE Publishing. https://doi.org/10.1109/ICOIN.2017.7899475
Liu, Q., Mkongwa, K. G., & Zhang, C. (2021). Performance issues in wireless body area networks for the healthcare application: A survey and future prospects. SN Applied Sciences, 3(2), Article 155. https://doi.org/10.1007/s42452-020-04058-2
Mathews, R., & Jose, D. V. (2024). Hybrid homomorphic‐asymmetric lightweight cryptosystem for securing smart devices: A review. Transactions on Emerging Telecommunications Technologies, 35(1), Article e4866. https://doi.org/10.1002/ett.4866.
Mehmood, G., Khan, M. Z., Fayaz, M., Faisal, M., Rahman, H. U., & Gwak, J. (2022). An energy-efficient mobile agent-based data aggregation scheme for wireless body area networks. Computers, Materials & Continua, 70(3), 5929-5948. https://doi.org/10.32604/cmc.2022.020546
Mehmood, G., Khan, M. Z., Waheed, A., Zareei, M., & Mohamed, E. M. (2020). A trust-based energy-efficient and reliable communication scheme (trust-based ERCS) for remote patient monitoring in wireless body area networks. IEEE Access, 8, 131397-131413. https://doi.org/10.1109/ACCESS.2020.3007405
Mohapatra, D., Kumar, S., Bhoi., Jena, K. K., Nayak, S. N., Singh, A., (2022). A blockchain security scheme to support fog-based internet of things. Microprocessors and Microsystems, 89, Article 104455. https://doi.org/10.1016/j.micpro.2022.104455
Paulraj, D., & Baburaj, E. (2023). Admission control policy and key agreement based on anonymous identity in cloud computing. Journal of Cloud Computing: Advances, Systems and Applications, 12(1), 1-18. https://doi.org/10.1186/s13677-023-00446-2
Rane, D. D. (2016). Superiority of twofish over blowfish. International Journal of scientific research and management, 4(11), 4744-4746. https://doi.org/10.18535/ijsrm/v4i11.01
Roy, M., Chowdhury, C., & Aslam, N. (2021). Designing GA based effective transmission strategies for intra-wban communication. Biomedical Signal Processing and Control, 70, Article 102944. https://doi.org/10.1016/j.bspc.2021.102944
Salem, O., Alsubhi, K., Mehaoua, A., & Boutaba, R. (2020). Markov models for anomaly detection in wireless body area networks for secure health monitoring. IEEE Journal on Selected Areas in Communications, 39(2), 526-540. https://doi.org/10.1109/JSAC.2020.3020602.
Santos, M. A., Munoz, R., Olivares, R., Rebouças Filho, P. P., Del Ser, J., & de Albuquerque, V. H. C. (2020). Online heart monitoring systems on the internet of health things environments: A survey, a reference model and an outlook. Information Fusion, 53, 222-239. https://doi.org/10.1016/j.inffus.2019.06.004
Shyja, V., Irine., Ranganathan, G., & Bindhu., V. (2023). Link quality and energy efficient optimal simplified cluster-based routing scheme to enhance lifetime for wireless body area networks. Nano Communication Networks, 37, Article 100465. https://doi.org/10.1016/j.nancom.2023.100465.
Subramani, J., Azees, M., Rajasekaran, A. S., & Al-Turjman, F. (2023). EPF-FDA: Efficient pairing free and confidentiality preserving fog-based data aggregation scheme for WBANs. IEEE Instrumentation & Measurement Magazine, 26(8), 10-16. https://doi.org/10.1109/MIM.2023.10292620
Subramani, J., Maria, A., Rajasekaran, A.S., and Al-Turjman. F. (2022). Lightweight privacy and confidentiality preserving anonymous authentication scheme for WBANs. IEEE Transactions on Industrial Informatics, 18(5), 484-3491. https://doi.org/10.1109/TII.2021.3097759
Thippun, P., Sasiwat, Y., Buranapanichkit, D., Booranawong, A., Jindapetch, N., & Saito, H. (2023). Implementation and experimental evaluation of dynamic capabilities in wireless body area networks: Different setting parameters and environments. Journal of Engineering and Applied Science, 70(1), Article 1. https://doi.org/10.1186/s44147-022-00171-8
Tseng, T. W., Wu, C. T., & Lai, F. (2019). Threat analysis for wearable health devices and environment monitoring internet of things integration system. IEEE Access, 7, 144983-144994. https://doi.org/10.1109/ACCESS.2019.2946081
Wang, C., Qin, Y., Jin, H., Kim, I., Vergara, J. D. G., Dong, C., Jiang, Y., Zhou, Q., Li, J., He, Z., Zou, Z., Zheng, L. R., Wu, X., & Wang, Y. (2019). A low power cardiovascular healthcare system with cross-layer optimization from sensing patch to cloud platform. IEEE Transactions on Biomedical Circuits and Systems, 13(2), 314-329. https://doi.org/10.1109/TBCAS.2019.2892334
Wang, L., Zhang, G., Li, J., & Lin, G. (2020). Joint optimization of power control and time slot allocation for wireless body area networks via deep reinforcement learning. Wireless Networks, 26, 4507-4516. https://doi.org/10.1007/s11276-020-02353-9
Zhang, J., & Dong, C. (2022). Secure and lightweight data aggregation scheme for anonymous multi-receivers in WBAN. IEEE Transactions on Network Science and Engineering, 10(1), 81-91. https://doi.org/10.1109/TNSE.2022.3205044
Zhong, L., He, S., Lin, J., Wu, J., Li, X., Pang, Y., & Li, Z. (2022). Technological requirements and challenges in wireless body area networks for health monitoring: A comprehensive survey. Sensors, 22(9), Article 3539. https://doi.org/10.3390/s22093539
ISSN 0128-7680
e-ISSN 2231-8526