PERTANIKA JOURNAL OF SCIENCE AND TECHNOLOGY

 

e-ISSN 2231-8526
ISSN 0128-7680

Home / Regular Issue / JST Vol. 32 (6) Oct. 2024 / JST-5054-2024

 

Secure Data Aggregation and Transmission System for Wireless Body Area Networks Using Twofish Symmetric Key Generation

Insozhan Nagasundharamoorthi, Prabhu Venkatesan and Parthasarathy Velusamy

Pertanika Journal of Science & Technology, Volume 32, Issue 6, October 2024

DOI: https://doi.org/10.47836/pjst.32.6.25

Keywords: Data privacy, medical data, secure data aggregation, transmission system, Twofish symmetric key generation, wireless body area network

Published on: 25 October 2024

Nowadays, Wireless Body Area Networks (WBANs) are mostly used in the healthcare industry. They represent a portable, inexpensive network that exhibition adaptability. The data developed using WBAN devices is vulnerable to transmission-related internal and external attacks; nevertheless, this vulnerability arises due to resource restrictions; by employing data aggregation technologies to conduct statistical analyses of medical data while protecting patient privacy, medical professionals can enhance the precision of diagnoses and assist medical insurance firms in selecting optimal plans for their clients. Maintaining the confidentiality and integrity of sensitive health information becomes more stimulating at the stages of aggregation and transmission due to security issues. This study proposes a novel method, Twofish Symmetric Key Generation (TFSKG), combined into a Secure Data Aggregation (SDA) and transmission system intended for WBANs. The Twofish technique is animatedly employed to make the secure symmetric keys chosen for its robust encryption capabilities. These keys are used to encrypt and decrypt aggregated health data through transmission. The proposed TFSKG-SDA method implements effective algorithms for aggregating data to safeguard end-to-end privacy and preserve data accuracy while reducing bandwidth consumption. Thus, for improved performance, an innovative genetic algorithm for data security is presented in this study. This paper introduces TFSKG-SDA, a system that, by employing rigorous simulation testing, enhances security protocols, resistance against recognized threats, and data transmission efficacy in the context of resource-constrained WBANs. We assess the encryption strength, computational cost, and communication efficiency of the TFSKG- SDA method to prove its significance to real-world healthcare applications.

  • Abualsaud, K., Mohamed, A., Khattab, T., Yaacoub, E., Hasna, M., & Guizani, M. (2018). Classification for imperfect EEG epileptic seizure in IoT applications: A comparative study. In 2018 14th International Wireless Communications & Mobile Computing Conference (IWCMC) (pp. 364-369). IEEE Publishing. https://doi.org/10.1109/IWCMC.2018.8450279

  • Anh, B. T., Quoc, D. D., & Hiep, P. T. (2023). Optimizing transmission power for uplink data in cell-free wireless body area networks. In 2023 IEEE Statistical Signal Processing Workshop (SSP) (pp. 275-279). IEEE Publishing. https://doi.org/10.1109/SSP53291.2023.10208084

  • Apoorva, Y. K. (2013). Comparative study of different symmetric key cryptography algorithms. International Journal of Application or Innovation in Engineering & Management, 2(7), 10-15. https://doi.org/10.4236/jis.2020.113009

  • Azees, M., Vijayakumar, P., Karuppiah, M., & Nayyar, A. (2021). An efficient anonymous authentication and confidentiality preservation schemes for secure communications in wireless body area networks. Wireless Network, 27(3), 2119–2130. https://doi.org/10.1007/s11276-021- 02560-y

  • Dangi, K. G., Bhagat, A., & Panda, S. P. (2020). Emergency vital data packet transmission in hospital centered wireless body area network. Procedia Computer Science, 171, 2563-2571. https://doi.org/10.1016/j.procs.2020.04.278

  • Geetha, B. T., Mohan, P., Mayuri, A. V. R., Jackulin, T., Aldo Stalin, J. L., & Anitha, V. (2022). Pigeon inspired optimization with encryption based secure medical image management system. Computational Intelligence and Neuroscience, 2022(1), Article 2243827. https://doi.org/10.1155/2022/2243827

  • He, D., Zeadally, S., Kumar, M., & Lee, J. H. (2017). Anonymous authentication for wireless body area networks with provable security, IEEE Systems Journal, 11(4), 2590-2601. https://doi.org/10.1109/JSYST.2016.2544805

  • Hu, C., Li, H., Huo, Y., Xiang, T., & Liao, X. (2016). Secure and efficient data communication protocol for wireless body area networks. IEEE Transactions on Multi-Scale Computing Systems, 2(2), 94-107. https://doi.org/10.1109/TMSCS.2016.2525997

  • Kaleem, M., & Devarajan, G. G. (2023). Wireless body area networks utilizing data transmission techniques based on prediction. In 2023 10th International Conference on Computing for Sustainable Global Development (INDIACom) (pp. 1586-1591). IEEE Publishing.

  • Kareem, S. M., & Rahma, A. M. S. (2020). A novel approach for the development of the Twofish algorithm based on multi-level key space. Journal of Information Security and Applications, 50, Article 102410. https://doi.org/10.1016/j.jisa.2019.102410

  • Khan, S., Iqbal, W., Waheed, A., Mehmood, G., Khan, S., Zareei, M., & Biswal, R. R. (2022). An efficient and secure revocation-enabled attribute-based access control for eHealth in smart society. Sensors, 22(1), Article 336. https://doi.org/10.3390/s22010336

  • Kumar, M., & Chand, S. (2020). A secure and efficient cloud-centric internet-of-medical-things-enabled smart healthcare system with public verifiability. IEEE Internet of Things Journal, 7(10), 10650-10659. https://doi.org/10.1109/JIOT.2020.3006523

  • Kumar, M., & Chand, S. (2021). A lightweight cloud-assisted identity-based anonymous authentication and key agreement protocol for secure wireless body area network. In IEEE Systems Journal, 15(2), 2779-2786. https://doi.org/10.1109/JSYST.2020.2990749

  • Kumar, M., (2020). Cryptanalysis and improvement of anonymous authentication for wireless body area networks with provable security. Cryptology ePrint Archive. https://eprint.iacr.org/2020/936

  • Lee, C., & Lee, J. (2017). Harvesting and energy aware adaptive sampling algorithm for guaranteeing self-sustainability in wireless sensor networks. In 2017 International Conference on Information Networking (ICOIN) (pp. 57-62). IEEE Publishing. https://doi.org/10.1109/ICOIN.2017.7899475

  • Liu, Q., Mkongwa, K. G., & Zhang, C. (2021). Performance issues in wireless body area networks for the healthcare application: A survey and future prospects. SN Applied Sciences, 3(2), Article 155. https://doi.org/10.1007/s42452-020-04058-2

  • Mathews, R., & Jose, D. V. (2024). Hybrid homomorphic‐asymmetric lightweight cryptosystem for securing smart devices: A review. Transactions on Emerging Telecommunications Technologies, 35(1), Article e4866. https://doi.org/10.1002/ett.4866.

  • Mehmood, G., Khan, M. Z., Fayaz, M., Faisal, M., Rahman, H. U., & Gwak, J. (2022). An energy-efficient mobile agent-based data aggregation scheme for wireless body area networks. Computers, Materials & Continua, 70(3), 5929-5948. https://doi.org/10.32604/cmc.2022.020546

  • Mehmood, G., Khan, M. Z., Waheed, A., Zareei, M., & Mohamed, E. M. (2020). A trust-based energy-efficient and reliable communication scheme (trust-based ERCS) for remote patient monitoring in wireless body area networks. IEEE Access, 8, 131397-131413. https://doi.org/10.1109/ACCESS.2020.3007405

  • Mohapatra, D., Kumar, S., Bhoi., Jena, K. K., Nayak, S. N., Singh, A., (2022). A blockchain security scheme to support fog-based internet of things. Microprocessors and Microsystems, 89, Article 104455. https://doi.org/10.1016/j.micpro.2022.104455

  • Paulraj, D., & Baburaj, E. (2023). Admission control policy and key agreement based on anonymous identity in cloud computing. Journal of Cloud Computing: Advances, Systems and Applications, 12(1), 1-18. https://doi.org/10.1186/s13677-023-00446-2

  • Rane, D. D. (2016). Superiority of twofish over blowfish. International Journal of scientific research and management, 4(11), 4744-4746. https://doi.org/10.18535/ijsrm/v4i11.01

  • Roy, M., Chowdhury, C., & Aslam, N. (2021). Designing GA based effective transmission strategies for intra-wban communication. Biomedical Signal Processing and Control, 70, Article 102944. https://doi.org/10.1016/j.bspc.2021.102944

  • Salem, O., Alsubhi, K., Mehaoua, A., & Boutaba, R. (2020). Markov models for anomaly detection in wireless body area networks for secure health monitoring. IEEE Journal on Selected Areas in Communications, 39(2), 526-540. https://doi.org/10.1109/JSAC.2020.3020602.

  • Santos, M. A., Munoz, R., Olivares, R., Rebouças Filho, P. P., Del Ser, J., & de Albuquerque, V. H. C. (2020). Online heart monitoring systems on the internet of health things environments: A survey, a reference model and an outlook. Information Fusion, 53, 222-239. https://doi.org/10.1016/j.inffus.2019.06.004

  • Shyja, V., Irine., Ranganathan, G., & Bindhu., V. (2023). Link quality and energy efficient optimal simplified cluster-based routing scheme to enhance lifetime for wireless body area networks. Nano Communication Networks, 37, Article 100465. https://doi.org/10.1016/j.nancom.2023.100465.

  • Subramani, J., Azees, M., Rajasekaran, A. S., & Al-Turjman, F. (2023). EPF-FDA: Efficient pairing free and confidentiality preserving fog-based data aggregation scheme for WBANs. IEEE Instrumentation & Measurement Magazine, 26(8), 10-16. https://doi.org/10.1109/MIM.2023.10292620

  • Subramani, J., Maria, A., Rajasekaran, A.S., and Al-Turjman. F. (2022). Lightweight privacy and confidentiality preserving anonymous authentication scheme for WBANs. IEEE Transactions on Industrial Informatics, 18(5), 484-3491. https://doi.org/10.1109/TII.2021.3097759

  • Thippun, P., Sasiwat, Y., Buranapanichkit, D., Booranawong, A., Jindapetch, N., & Saito, H. (2023). Implementation and experimental evaluation of dynamic capabilities in wireless body area networks: Different setting parameters and environments. Journal of Engineering and Applied Science, 70(1), Article 1. https://doi.org/10.1186/s44147-022-00171-8

  • Tseng, T. W., Wu, C. T., & Lai, F. (2019). Threat analysis for wearable health devices and environment monitoring internet of things integration system. IEEE Access, 7, 144983-144994. https://doi.org/10.1109/ACCESS.2019.2946081

  • Wang, C., Qin, Y., Jin, H., Kim, I., Vergara, J. D. G., Dong, C., Jiang, Y., Zhou, Q., Li, J., He, Z., Zou, Z., Zheng, L. R., Wu, X., & Wang, Y. (2019). A low power cardiovascular healthcare system with cross-layer optimization from sensing patch to cloud platform. IEEE Transactions on Biomedical Circuits and Systems, 13(2), 314-329. https://doi.org/10.1109/TBCAS.2019.2892334

  • Wang, L., Zhang, G., Li, J., & Lin, G. (2020). Joint optimization of power control and time slot allocation for wireless body area networks via deep reinforcement learning. Wireless Networks, 26, 4507-4516. https://doi.org/10.1007/s11276-020-02353-9

  • Zhang, J., & Dong, C. (2022). Secure and lightweight data aggregation scheme for anonymous multi-receivers in WBAN. IEEE Transactions on Network Science and Engineering, 10(1), 81-91. https://doi.org/10.1109/TNSE.2022.3205044

  • Zhong, L., He, S., Lin, J., Wu, J., Li, X., Pang, Y., & Li, Z. (2022). Technological requirements and challenges in wireless body area networks for health monitoring: A comprehensive survey. Sensors, 22(9), Article 3539. https://doi.org/10.3390/s22093539

ISSN 0128-7680

e-ISSN 2231-8526

Article ID

JST-5054-2024

Download Full Article PDF

Share this article

Related Articles