Authenticated health monitoring scheme for wireless body sensor networks
نویسندگان
چکیده
Security and privacy are the main concern for patients to seek wireless body sensor network monitoring their health. Considering the limitations of power, computation capability and storage resources, it is a big challenge to find out suitable secure scheme for patients when relying on wireless body sensor networks to monitor their healthy information. Many schemes based on asymmetric and symmetric have been investigated for such kind problems. In this paper, we present an authenticated identity-based key encryption scheme for patients to secure their healthy privacy based on wireless body sensor networks monitoring their health. We review briefly about identity-based encryption and decryption first, and then describe an authenticated key establishment and encryption scheme based on the basic Boneh-Franklin algorithm for wireless body sensor networks. Finally we compare the proposed scheme with other technique with analysis and simulations. The results show that the proposed scheme is efficient and secure. Key Words—identity-based cryptography, network security, wireless body sensor network.
منابع مشابه
Security Analysis of Lightweight Authentication Scheme with Key Agreement using Wireless Sensor Network for Agricultural Monitoring System
Wireless sensor networks have many applications in the real world and have been developed in various environments. But the limitations of these networks, including the limitations on the energy and processing power of the sensors, have posed many challenges to researchers. One of the major challenges is the security of these networks, and in particular the issue of authentication in the wireles...
متن کاملکاربردهای شبکههای حسگر بدنی در حوزه ی سلامت: مروری بر منابع
Background and Aim: Nowadays, one of the most important areas of application of information technology in the health sector is monitoring patients' condition. Recently utilization of body area sensor networks in healthcare had significant advances. The purpose of this article is to examine the applications of wireless health sensor networks in the field of health. Materials and Methods: This ...
متن کاملLPKP: location-based probabilistic key pre-distribution scheme for large-scale wireless sensor networks using graph coloring
Communication security of wireless sensor networks is achieved using cryptographic keys assigned to the nodes. Due to resource constraints in such networks, random key pre-distribution schemes are of high interest. Although in most of these schemes no location information is considered, there are scenarios that location information can be obtained by nodes after their deployment. In this paper,...
متن کاملHybrid Key pre-distribution scheme for wireless sensor network based on combinatorial design
Key distribution is an important problem in wireless sensor networks where sensor nodesare randomly scattered in adversarial environments.Due to the random deployment of sensors, a list of keys must be pre-distributed to each sensor node before deployment. To establish a secure communication, two nodes must share common key from their key-rings. Otherwise, they can find a key- path in which ens...
متن کاملCoverage Improvement In Wireless Sensor Networks Based On Fuzzy-Logic And Genetic Algorithm
Wireless sensor networks have been widely considered as one of the most important 21th century technologies and are used in so many applications such as environmental monitoring, security and surveillance. Wireless sensor networks are used when it is not possible or convenient to supply signaling or power supply wires to a wireless sensor node. The wireless sensor node must be battery powered.C...
متن کامل