An Efficient Cross-Domain Data Transmission Scheme for Wireless Body Area Networks

Abstract

Wireless body area networks (WBANs) have become a prospective technology for the next generation healthcare services, in which tiny sensors are placed either on the skin or in the body of human to transmit real-time monitored data to the medical service provider (MSP). In order to protect the transmitted data from leakage, forgery or alteration, constructing a secure data transmission scheme for WBANs that achieves confidentiality, authentication and integrity is necessary. Also, in practical application of WBANs, patient and MSP are in different domain networks in general. In this article, we first design a cross-domain certificateless signcryption (CDCS) scheme, then an efficient cross-domain data transmission scheme for WBANs is proposed based on the new CDCS scheme. The data transmission scheme realizes authentication, confidentiality, anonymity, nonrepudiation, integrity, registration security and KSTI security. Compared to present two security schemes for the WBANs based on certificateless signcryption, our designed scheme entitles patient and MSP to use different cryptographic parameter in different domain networks. Moreover, the new scheme has advantages in communication overhead and computation cost.

This is a preview of subscription content, log in to check access.

Fig. 1
Fig. 2

References

  1. 1.

    Movassaghi, S., Abolhasan, M., Lipman, J., David, S., and Jamalipour, A., Wireless body area networks: a survey. IEEE Communications Surveys & Tutorials. 16(3):1658-1686, 2014.

    Article  Google Scholar 

  2. 2.

    Samaher, A., Ibrahim, A., Mohammad, S., Shahaboddin, S., Survey of main challenges (security and privacy) in wireless body area networks for healthcare applications. Egyptian Informatics Journal. 18(2):113-122, 2017.

    Article  Google Scholar 

  3. 3.

    Janani, V. S., Manikandan, M. S. K., Efficient trust management with Bayesian-Evidence theorem to secure public key infrastructure-based mobile ad hoc networks. Eurasip Journal on Wireless Communications and Networking. 1-27, 2018.

  4. 4.

    Jiang, W., Li H., Xu, G. et al., PTAS: Privacy-preserving Thin-client Authentication Scheme in blockchain-based PKI. Future Generation Computer Systems. 96:185-195, 2019.

    Article  Google Scholar 

  5. 5.

    Joel, H., Samuel, L., Martin, F., Shahid, R., PKI4IoT: Towards public key infrastructure for the Internet of Things. Computers & Security. 89:1-11, 2020.

    Google Scholar 

  6. 6.

    Li, H., Huang, Q., Shen, J. et al., Designated-server identity-based authenticated encryption with keyword search for encrypted emails. Information Sciences. 481:330-343, 2019.

    Article  Google Scholar 

  7. 7.

    Sun, Y., Mu, Y., Susilo, W. et al., Revocable identity-based encryption with server-aided ciphertext evolution. Theoretical Computer Science. 815:11-24, 2020.

    Article  Google Scholar 

  8. 8.

    Yao, Y., Li, Z., Guo, H., A unified framework of identity-based sequential aggregate signatures from 2-level HIBE schemes. Information Sciences. 516:505-514, 2020.

    Article  Google Scholar 

  9. 9.

    Zhang, Y., Deng, R., Zheng, D. et al., Efficient and Robust Certificateless Signature for Data Crowdsensing in Cloud-Assisted Industrial IoT. IEEE Transactions on Industrial Informatics. 15(9):5099-5108, 2019.

    Article  Google Scholar 

  10. 10.

    Xu, Z., He, D., Vijayakumar, P. et al., Efficient NTRU Lattice-Based Certificateless Signature Scheme for Medical Cyber-Physical Systems. Journal of Medical Systems. 92:1-8, 2020. https://doi.org/10.1007/s10916-020-1527-7.

    Article  Google Scholar 

  11. 11.

    Mandal, S., Bera, B., Sutrala, A. K. et al., Certificateless-Signcryption-Based Three-Factor User Access Control Scheme for IoT Environment. IEEE Internet of Things Journal. 7(4):3184-3197, 2020.

    Article  Google Scholar 

  12. 12.

    Liu, J., Zhang, Z., Chen, X. et al., Certificateless remote anonymous authentication schemes for wirelessbody area networks. IEEE Transactions on Parallel and Distributed Systems. 25(2):332-342, 2014.

    Article  Google Scholar 

  13. 13.

    He, D., Zeadally, S., Kumar, N. et al., Anonymous authentication for wireless body area networks with provable security. IEEE Systems Journal. 11(4):2590-2601,2017.

    Article  Google Scholar 

  14. 14.

    Wei, F., Vijayakumar, P., Shen,J. et al. A provably secure password-based anonymous authentication scheme for wireless body area networks. Computers & Electrical Engineering. 65:322–331, 2018.

  15. 15.

    Wang, C., Jing Liu, J., Attribute-Based Ring Signcryption Scheme and Its Application in Wireless Body Area Networks. International Conference on Algorithms and Architectures for Parallel Processing. 9532:521-530, 2015.

    Article  Google Scholar 

  16. 16.

    Lu, Y., Wang, X., Hu, C. et al. A traceable threshold attribute-based signcryption for mHealthcare social network. International Journal of Sensor Networks. 26(1): 43–53, 2018.

    Article  Google Scholar 

  17. 17.

    Omala, A. A., Robert, N., Li, F., A Provably-Secure Transmission Scheme for Wireless Body Area Networks. Journal of Medical Systems. 40(11):1-14, 2016.

    Article  Google Scholar 

  18. 18.

    Zhang, A., Wang, L., Ye, X. et al. Light-weight and robust security-aware D2D-assist data transmission protocol for mobile-health systems. IEEE Transactions on Information Forensics & Security. 12(3):662-675, 2017.

    Article  Google Scholar 

  19. 19.

    Zhou, C., Comments on “Light-Weight and Robust Security-Aware D2D-Assist Data Transmission Protocol for Mobile-Health Systems”. IEEE Transactions on Information Forensics & Security. 13(7):1869-1870, 2018.

    Article  Google Scholar 

  20. 20.

    Li, F., Han, Y., Jin, C., Cost-Effective and Anonymous Access Control for Wireless Body Area Networks. IEEE Systems Journal. 12(1):747-758, 2018.

    Article  Google Scholar 

  21. 21.

    Omala, A. A., Mbandu, A. S., Mutiria, K. D. et al. Provably Secure Heterogeneous Access Control Scheme for Wireless Body Area Network. Journal of Medical Systems. 42(6):1-14, 2018.

    Article  Google Scholar 

Download references

Funding

This study was funded by the National Natural Science Foundation of China (grant number 61662046), the Science and Technology Project of Jiangxi Province of China [grant numbers 20192BAB207020, YG2018239, 20192BAB207019, 20181BCD40005], and the postgraduate innovation foundation of Nanchang University (No. CX2019093).

Author information

Affiliations

Authors

Corresponding author

Correspondence to Ming Luo.

Ethics declarations

Conflict of Interest

The authors declare no conflict of interest.

Ethical Approval

This article does not contain any studies with human participants or animals performed by any of the authors.

Additional information

Publisher’s Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

This article is part of the Topical Collection on Mobile & Wireless Health

Rights and permissions

Reprints and Permissions

About this article

Verify currency and authenticity via CrossMark

Cite this article

Luo, M., Hu, X. & Luo, Y. An Efficient Cross-Domain Data Transmission Scheme for Wireless Body Area Networks. J Med Syst 44, 133 (2020). https://doi.org/10.1007/s10916-020-01598-3

Download citation

Keywords

  • Wireless body area networks
  • Data transmission
  • Signcryption
  • Cross-domain