Skip to main content
Sensors (Basel, Switzerland) logoLink to Sensors (Basel, Switzerland)
. 2017 Dec 15;17(12):2919. doi: 10.3390/s17122919

Internet of Things (IoT) Based Design of a Secure and Lightweight Body Area Network (BAN) Healthcare System

Yong-Yuan Deng 1, Chin-Ling Chen 1,2,*, Woei-Jiunn Tsaur 3, Yung-Wen Tang 4, Jung-Hsuan Chen 5
PMCID: PMC5751047  PMID: 29244776

Abstract

As sensor networks and cloud computation technologies have rapidly developed over recent years, many services and applications integrating these technologies into daily life have come together as an Internet of Things (IoT). At the same time, aging populations have increased the need for expanded and more efficient elderly care services. Fortunately, elderly people can now wear sensing devices which relay data to a personal wireless device, forming a body area network (BAN). These personal wireless devices collect and integrate patients’ personal physiological data, and then transmit the data to the backend of the network for related diagnostics. However, a great deal of the information transmitted by such systems is sensitive data, and must therefore be subject to stringent security protocols. Protecting this data from unauthorized access is thus an important issue in IoT-related research. In regard to a cloud healthcare environment, scholars have proposed a secure mechanism to protect sensitive patient information. Their schemes provide a general architecture; however, these previous schemes still have some vulnerability, and thus cannot guarantee complete security. This paper proposes a secure and lightweight body-sensor network based on the Internet of Things for cloud healthcare environments, in order to address the vulnerabilities discovered in previous schemes. The proposed authentication mechanism is applied to a medical reader to provide a more comprehensive architecture while also providing mutual authentication, and guaranteeing data integrity, user untraceability, and forward and backward secrecy, in addition to being resistant to replay attack.

Keywords: sensor network, cloud computation, healthcare, body area network, mutual authentication, privacy, untraceability

1. Introduction

1.1. Background

Due to the rapid development of network hardware technology, a variety of services and applications that make use of wireless connections such as the LTE, 3G, Wi-Fi, Bluetooth and ZigBee communication technologies have become popular in daily life. One such service is remote medical monitoring and care [1,2]. At the same time, governments have formulated new policies in order to respond to the healthcare requirements of aging populations. Their aim is to build a comprehensive medical network using new wireless technologies such as sensor networks and cloud computation [3]. Their goal is to drive the medical industry, combined with the Internet of Things (IoT), to the next phase of application [4].

In current medical fields, information technology is already used for the secure management of drugs via radio-frequency identification (RFID), patient information and blood information, as well as remote medical monitoring of newborns, and many other applications [5,6,7,8]. However, as populations continue to age, the need for expanded medical care-related applications for elderly people has also grown. Examples of technologies in this field include smart wheelchairs, rural medical care, GPS location, and mobile healthcare, signifying very important development needs. On the other hand, the rapid development of a variety of physiological sensing devices has reduced these in size and improved their energy efficiency, making them suitable for long-term wear by the elderly. These body sensors combined with personal wireless devices form a body area network (BAN) [9,10,11,12]. The personal wireless device collects and integrates personal physiological data, and then transmits the data to the backend of the network for related diagnostics and applications.

This means that when people go to a hospital, the medical staff can obtain relevant medical data from their body sensors using a medical reader. The body sensors will transmit the related sensing data to the personal wireless device, which will transmit the data to the medical reader [13,14,15,16]. The medical staff can then provide these data to a doctor for future reference or immediate medical diagnosis. These data can also be sent to the national medical server to be stored for related statistical big data analysis through cloud technology.

Fortino et al. [17] proposed BodyCloud architecture for body sensor networks (BSN). Their scheme defined a network communication protocol for the communication between the body sensors and the cloud server. Subsequently, Fortino et al. [18] proposed another C-SPINE architecture for body-sensor networks. Their scheme defined a network communication protocol for the communication between different body sensors. They also made the hardware implementation for C-SPINE architecture. Gravina et al. [19] proposed a survey for existing BSN environments, including BodyCloud and C-SPINE architecture.

However, many people still seek to violate the privacy of others, or even harm them. For example, a malicious attacker could send incorrect sensing data to a medical reader, causing an incorrect diagnosis. This could delay treatment, or even result in the death of the patient. In addition, attackers may seek to obtain the sensing data of public figures for blackmail or extortion. Therefore, there must be a complete set of encryption and authentication mechanisms that make it impossible for attackers to obtain and modify such sensitive information in order to protect people’s safety and privacy [20,21,22,23].

Previously, while researchers proposed schemes based on the IoT environment, these schemes were either not for healthcare environments [2,4] or lacked the comprehensive security required for healthcare environments [1,3]. Jr. et al. [2] proposed a session-key establishment scheme between an initiator and a responder for the IoT environment, but they did not mention how the initiator and responder would authenticate each other’s legality. Ray et al. [4] proposed an RFID ownership transfer protocol based on the IoT environment with a comprehensive protocol related to the ownership transfer between two RFID tags; while their protocol achieved mutual authentication between RFID tag and RFID reader, the framework differs from our healthcare environment. The title of Moosavi et al.’s study [1] stated that they were proposing a secure scheme for mobility healthcare based on the IoT environment, but actually they only proposed a challenge-response concept for mobile sensor, smart gateway, and end-user; there is no detailed cryptography description in their article. Yang et al. [3] also proposed a framework for healthcare based on the IoT environment, but their protocol only focuses on the server and the user; they did not make a comprehensive protocol for a body sensor, personal reader, medical reader, and medical server.

He et al. [24] proposed a security mechanism to protect sensitive personal information based on a medical care system such as that alluded to above; their scheme provided a generalized architecture. However, this study found that their proposed scheme still had some vulnerability. First, their proposed security mechanism is not complete; it only considers the protocol between body sensors and personal wireless devices, ignoring the protocol between a personal wireless hub and medical readers. Furthermore, in their proposed scheme, only personal wireless devices authenticate body sensors; since body sensors do not authenticate personal wireless devices, mutual authentication is not achieved.

Based on He et al.’s scheme [24], this study addresses the above vulnerabilities, and adds to this by proposing novel extension architecture, namely an IoT-based design of a secure and lightweight BAN health-care system. The proposed authentication mechanism achieves security, privacy and efficiency.

1.2. Security Requirements

The security requirements of a secure and lightweight body area network based on the Internet of Things are listed as follows:

1.2.1. Mutual Authentication

In the information-transmission process, the message receiver must be able to verify the identity legitimacy of the sender. Thus, each party must be able to verify the identity legitimacy of the other party in a BAN authentication environment. If both parties can confirm each other’s identities, then mutual authentication can be achieved [25].

1.2.2. Data Integrity

Any information transferred in an unencrypted network environment is vulnerable to malicious attack in the form of modification, where the message delivered to the receiver is not the original message transmitted by the sender. The integrity of the transmitted data must, therefore, be ensured, and protected against tampering in transit [25].

1.2.3. User Untraceability

Malicious attacks may also attempt to determine a person’s physical location by tracing their personal reader. Thus, a secure BAN authentication environment must prevent such positional tracking [26].

1.2.4. Resisting Replay Attacks

Malicious attacks may also intercept the transmitted message between the personal reader and the medical reader, and then impersonate a legitimate transmitter in order to send the same message to the intended receiver. This constitutes a serious breach of personal data security, and must be prevented by a secure BAN authentication environment [27].

1.2.5. Forward and Backward Secrecy

If the session key between the personal reader and the medical reader is compromised at any point by an attacker, the attacker may use the session key for future malicious communications, or use it to obtain previous messages. A secure BAN authentication environment should thus achieve forward and backward secrecy [27].

The remainder of this paper is arranged as follows. Section 2 gives a brief preliminary introduction and a review of He et al.’s scheme [24]. Section 3 presents the proposed improved secure and lightweight body sensor network based on the Internet of Things for cloud healthcare environments. Section 4 presents a security analysis, efficiency calculation and feature comparison of the proposed scheme and He et al.’s scheme [24], while Section 5 offers conclusions.

2. Preliminary Introduction and a Review of He et al.’s Scheme

2.1. Preliminary Introduction

Elliptic Curve Group

Digital network systems are an indispensable technology in daily life, with massive numbers of documents and information being transmitted over networks every day; thus, measures guaranteeing the security of these messages are very important. Several digital encryption systems have, therefore, been proposed to ensure the security of important documents. In 1985, elliptic curve cryptography [28] was proposed, with a message length shorter than the Rivest–Shamir–Adleman (RSA) encryption system. The following is a brief introduction of the elliptic curve group, and its corresponding mathematical hard problems.

Let Fq be a prime finite field, E/Fq an elliptic curve defined over Fq, and P a generator for a cyclic additive group of composite order q. The point on E/Fq together with an extra point Θ, called the point at infinity, form a group G={(x,y):x,yFq;(x,y)E/Fq}{Θ}. G is a cyclic additive group of composite order q. Scalar multiplication over E/Fq can be computed as follows: tP=P+P++P t times.

The following problems exist for the elliptic curve group:

  • Computational Diffie–Hellman (CDH) Problem: Given aP and bP, where a,bR, Z×q and P are the generator of G, compute the value abP.

  • Decisional Diffie-Hellman (DDH) Problem: Given aP, bP and cP, where a,b,cR, Z×q and P are the generator of G, confirm whether or not cP=abP, which is equal to confirming whether or not c=ab mod q.

2.2. Notations

q A k-bit prime
Fq A prime finite field
E/Fq An elliptic curve E over Fq
G A cyclic additive group of composite order q
P A generator for the group G
s A secret key of the system
PK A public key of the system, PK=sP
f(x,y) A polynomial function that f(x,y) equal to f(y,x)
Hi() ith one-way hash function
h() A one-way hash function
ri,a,b x’s identity, like a universally unique identifier (UUID) code
IDx A random number of the elliptic curve group
Sx x’s elliptic curve group signature
TID A transaction number which changes every round
Ki A polynomial function or elliptic curve-related information
PEK A session key established by personal reader and medical reader
Ex(m) Use a session key x to encrypt the message m
Dx(m) Use a session key x to decrypt the message m
CHKx x’s verified message
A=?B Determines if A is equal to B
data Body sensor’s related sensing information
ci The session key and transaction number encrypted sensing data

2.3. Review of He et al.’s Scheme

In 2013, He et al. proposed a secure lightweight network admission and transmission protocol for body sensor networks [24]. In their proposed scheme, there are three parties: a body sensor, a personal wireless hub, and a BSN administrator.

2.3.1. Body-Sensor Registration Phase

The body sensor must register with the BSN administrator. The body-sensor registration phase of He’s proposed scheme is shown in Figure 1.

Figure 1.

Figure 1

Body sensor registration phase of He et al.’s proposed scheme.

  • Step 1:

    The body sensor chooses an identity sid, and sends it to the BSN Administrator.

  • Step 2:

    The BSN Administrator generates the polynomial f(x,y), calculates f(sid,y), and then sends f(sid,y) to the body sensor.

  • Step 3:

    The body sensor stores f(sid,y) in its memory.

2.3.2. Personal Wireless Hub Registration Phase

The personal wireless hub must register with the BSN administrator. The personal wireless hub registration phase of He et al.’s proposed scheme [24] is shown in Figure 2.

Figure 2.

Figure 2

Personal wireless hub registration phase of He et al.’s proposed scheme.

  • Step 1:

    The personal wireless hub chooses an identity pid, and sends it to the BSN Administrator.

  • Step 2:

    The BSN Administrator generates the polynomial f(x,y), calculates f(pid,y), and then sends f(pid,y) to the personal wireless hub.

  • Step 3:

    The personal wireless hub stores f(pid,y) to its memory.

2.3.3. Authentication Phase

When the personal wireless hub requires related sensor data from a body sensor, it must authenticate the legality of the body sensor. The authentication phase of the proposed scheme is shown in Figure 3.

Figure 3.

Figure 3

Authentication phase of He et al.’s proposed scheme.

  • Step 1:

    When the personal wireless hub requires related health data from the body sensor, it sends pid to the body sensor.

  • Step 2:

    The body sensor calculates K=f(sid,pid), c=EK(phi,r), e=h(phi,K), and then sends (sid,pid,c,e) to the personal wireless hub.

  • Step 3:

    The personal wireless hub calculates K=f(sid,pid), (phi,r)=DK(c), and verifies e=?h(phi,K) to check the legality of the body sensor. If it passes the verification, the personal wireless hub authenticates the legality of the body sensor, and receives the related health data phi successfully.

2.4. Weakness Analysis of He et al.’s Scheme

He et al. proposed a novel scheme for body-sensor network environments [24], but this study found two major shortcomings to their scheme. First, their proposed protocol only focuses on the front end of the BSN environment. They proposed a security protocol between the personal wireless hub and the body sensor. At the back end, the personal wireless hub should also authenticate with the healthcare center in order to protect the health-related data against illegal access. Second, when the personal wireless hub requests related health data, the body sensor sends the encrypted health data directly, without first authenticating the personal wireless hub. In other words, only the personal wireless hub authenticates the legality of the body sensor in their scheme, which means it does not achieve mutual authentication. The attacker may use his/her personal wireless hub to get someone’s health data from that person’s body sensor. A secure BSN environment must achieve mutual authentication between each party.

3. The Proposed Scheme

3.1. System Architecture

The BAN system framework of the scheme proposed in this study is shown in Figure 4.

Figure 4.

Figure 4

Body area network (BAN) system framework of the proposed scheme.

There are four parties in the scheme:

  • (1)

    Body sensor: a small sensing device to measure various physiological data of a human body.

  • (2)

    Personal reader: a personal reading device carried by an individual; it can receive relevant data from a body-sensor unit, and transmit that data to a medical reader for analysis.

  • (3)

    Medical reader: a device carried by medical staff in a medical facility, or by caregivers in a care center; it can receive relevant data from a personal reader for diagnosis by a medical doctor.

  • (4)

    Medical cloud server: a cloud server belonging to a national medical institution manages all medical readers and personal readers; all medical readers and personal readers must be registered on the medical cloud server.

  1. All personal readers and medical readers must be registered with the medical cloud server through a secure channel. The personal reader and medical reader send their IDs (e.g., universally unique identifier, UUID) to the medical cloud server. The medical cloud server returns information that includes parameters calculated by elliptic curve group technology.

  2. All personal readers and body sensors must register with medical readers through a secure channel. The personal reader and body sensor send their IDs (e.g., UUID) to the medical reader. The medical reader returns information that includes parameters calculated by lightweight polynomial function.

  3. When a personal reader needs to send related health data to a medical reader, it must first obtain the data from body sensors. After mutual authentication between the personal reader and the body sensor, the personal reader receives the encrypted health data.

  4. The personal reader sends its ID and parameters calculated by elliptic curve group technology to the medical reader for authentication. After mutual authentication between the personal reader and the medical reader, the personal reader sends the encrypted health data to the medical reader.

3.2. System Initialization Phase

In the system initialization stage, the medical cloud server calculates some parameters, and publishes the public parameters for medical readers and personal readers.

  • Step 1:

    The medical cloud server chooses a k-bit prime p, and determines the tuple of elliptic curve group (Fp,E/Fp,G,P).

  • Step 2:
    The medical cloud server then chooses s as a secret key, and computes:
    PK=sP (1)
    as a public system key.
  • Step 3:

    Finally, the medical cloud server chooses hash function (H1(),H2(),H3(),H4()), and then publishes (Fp,E/Fp,G,P,PK,H1(),H2(),H3(),H4()) to all medical readers and personal readers.

3.3. Body-Sensor Registration Phase

The body sensor must register with the medical reader. The body-sensor registration phase of the proposed scheme is shown in Figure 5.

Figure 5.

Figure 5

Body-sensor registration phase of the proposed scheme.

  • Step 1:

    The body sensor chooses an identity IDHS (e.g., UUID), and sends it to the medical reader.

  • Step 2:
    The medical reader generates the polynomial f(x,y), and calculates:
    HPHS=f(IDHS,y) (2)
    c=h(SID) (3)
    and then sends (HPHS,SID) to the body sensor.
  • Step 3:

    The body sensor stores (HPHS,SID) in its memory.

3.4. Personal-Reader Registration Phase

The personal reader must register with the medical reader and the medical cloud server. The personal-reader registration phase of the proposed scheme is shown in Figure 6 and Figure 7.

Figure 6.

Figure 6

Personal-reader registration phase of the proposed scheme with medical reader.

Figure 7.

Figure 7

Personal-reader registration phase of the proposed scheme with medical cloud server.

  • Step 1:

    The personal reader chooses an identity IDPR (e.g., UUID), and sends it to the medical reader.

  • Step 2:
    The medical reader generates the polynomial f(x,y), and calculates:
    HPPR=f(IDPR,y) (4)
    c=h(SID) (5)
    and then sends (HPPR,SID) to the personal reader.
  • Step 3:

    The personal reader stores (HPPR,SID) to its memory.

  • Step 4:

    The personal reader chooses an identity IDPR (e.g., UUID), and sends it to the medical cloud server.

  • Step 5:
    The medical cloud server chooses a random number r, and calculates:
    RPR=rP (6)
    hPR=H1(IDPR  RPR) (7)
    SPR=r+hPRs (8)
    and then sends (RPR,SPR) to the personal reader.
  • Step 6:
    The personal reader verifies:
    SPRP=?RPR+H1(IDPR  RPR)PK (9)

If it passes the verification, the personal reader stores (RPR,SPR).

3.5. Medical-Reader Registration Phase

The medical reader must register with the medical cloud server. In the proposed scheme, the personal reader and the medical reader can authenticate each other directly without connecting to the medical cloud server. The medical-reader registration phase of the proposed scheme is shown in Figure 8.

Figure 8.

Figure 8

Medical-reader registration phase of the proposed scheme.

  • Step 1:

    The medical reader chooses an identity IDMR (e.g., UUID), and sends it to the medical cloud server.

  • Step 2:
    The medical cloud server chooses a random number r, and calculates:
    RMR=rP (10)
    hMR=H1(IDMR  RMR) (11)
    SMR=r+hMRs (12)
    and then sends (RMR,SMR) to the medical reader.
  • Step 3:
    The medical reader verifies:
    SMRP=?RMR+H1(IDMR  RMR)PK (13)

If it passes the verification, the medical reader stores (RMR,SMR).

3.6. Authentication and Communication Phase

When the personal reader wants to connect to the medical reader for some services, both parties must authenticate each other. In addition, when the personal reader requires related data from the body sensor, they must also authenticate each other. The authentication and communication phase of the proposed scheme is shown in Figure 9 and Figure 10.

Figure 9.

Figure 9

Authentication and communication phase of the proposed scheme for a personal reader and body sensor.

Figure 10.

Figure 10

Authentication and communication phase of the proposed scheme for a personal reader and medical reader.

  • Step 1:
    When the personal reader requires related health data from the body sensor, it calculates:
    c=h(SID) (14)
    and sends (IDPR,c) to the body sensor.
  • Step 2:
    The body sensor verifies:
    c=?h(SID) (15)
    to check the legality of the personal reader. If it passes the verification, the body sensor calculates:
    KHP=f(IDHS,IDPR) (16)
    d=EKHP(data) (17)
    e=h(data  KHP) (18)
    and then sends (IDHS,d,e) to the personal reader.
  • Step 3:
    The personal reader calculates:
    KHP=f(IDPR,IDHS) (19)
    data=DKHP(d) (20)
    and verifies:
    e=?h(data  KHP) (21)
    to check the legality of the body sensor. If it passes the verification, the personal reader sends the related health data to the medical reader.
  • Step 4:
    The personal reader chooses a random number a, and calculates:
    TPR=aP (22)
    and then sends (IDPR,RPR,TPR) to the medical reader.
  • Step 5:
    The medical reader chooses a random number b, and calculates:
    TMR=bP (23)
    PKPR=RPR+H1(IDPR  RPR)PK (24)
    KMP1=SMRTPR+bPKPR (25)
    KMP2=bTPR (26)
    and the session key:
    PEK=H2(KMP1  KMP2) (27)
  • Step 6:
    The medical reader then chooses a transaction number TID, and calculates:
    g=EPEK(TID) (28)
    CHKPM=H3(PEK  TPR) (29)
    and sends (IDMR,RMR,TMR,g,CHKPM) to the personal reader.
  • Step 7:
    The personal reader calculates
    PKMR=RMR+H1(IDMR  RMR)PK (30)
    KPM1=SPRTMR+aPKMR (31)
    KPM2=aTMR (32)
    and the session key:
    PEK=H2(KPM1  KPM2) (33)
    The personal reader verifies:
    CHKPM=?H3(PEK  TPR) (34)
    to check the legality of the medical reader. If it passes the verification, the personal reader calculates:
    TID=DPSK(c) (35)
    ci=E(PEK||TID)(data) (36)
    CHKMP=H3(PEK  TMR  TID) (37)
    TIDnew=H4(TID) (38)
    and sends (IDPR,CHKMP,ci) to the medical reader.
  • Step 8:
    The medical reader verifies:
    CHKMP=?H3(PEK  TMR  TID) (39)
    to check the legality of the personal reader. If it passes the verification, the session key PEK between the personal reader and the medical reader is established successfully. The medical reader calculates:
    data=D(PEK||TID)(ci) (40)
    and also updates the transmission number TID to TIDnew by:
    TIDnew=H4(TID) (41)
    for future communication.

4. Security Analysis

4.1. Mutual Authentication

In the proposed scheme, when the personal reader wants to communicate with the medical reader, they must authenticate each other. The personal reader uses:

CHKPM=?H3(PEK  TPR) (42)

to verify the legality of the medical reader, and the medical reader uses:

CHKMP=?H3(PEK  TMR  TID) (43)

to verify the legality of the personal reader. Only a legal personal reader or medical reader can calculate the correct session key PEK. The legal medical reader calculates the session key:

PEK=H2(KMP1  KMP2) (44)

and the legal personal reader calculates the session key:

PEK=H2(KPM1  KPM2) (45)
KPM1=SPRTMR+aPKMR=SPRbP+aSMRP=bSPRP+SMRaP=bPKPR+SMRTPR=KMP1KPM2=aTMR=abP=baP=bTPR=KMP2 (46)

Thus, the personal reader can verify the legality of the medical reader, and the medical reader also can verify the legality of the personal reader. The proposed scheme thus guarantees mutual authentication.

  • Scenario:

    A malicious attacker uses an illegal medical reader to obtain a patient’s health data from a legal personal reader.

  • Analysis:

    The attacker will not succeed because the illegal medical reader has not been registered to the medical cloud server, and it cannot calculate the correct session key PEK. Thus, it will fail when the legal personal reader attempts to authenticate the illegal medical reader. In the proposed scheme, the attacker cannot achieve his/her purpose using an illegal medical reader. In the same scenario, the proposed scheme can also defend against a malicious attack using an illegal personal reader to send fake health data to a legal medical reader because the illegal personal reader has not been registered to the medical cloud server, and it cannot calculate the correct session key PEK. Thus, the attack will fail when the legal medical reader attempts to authenticate the illegal personal reader.

4.2. Data Integrity

To ensure the integrity of transaction data, this study uses elliptic curve cryptography to calculate the session key PEK, as well as to ensure data integrity. The malicious attacker cannot use the signatures (KPM1,KPM2) and (KMP1,KMP2) to calculate the correct session key PEK. Only the correct session key will allow successful communication. Thus, attackers cannot modify the transmitted message; therefore, the proposed scheme achieves data integrity.

  • Scenario:

    A malicious attacker intercepts the transmitted message from the medical reader to the personal reader, and sends a modified message to the personal reader.

  • Analysis:
    The attacker will not succeed because the legal personal reader will use:
    CHKPM=?H3(PEK  TPR) (47)
    to check the data integrity. The attacker cannot calculate the correct session key PEK. Thus, the attack will fail when the legal personal reader authenticates the received message. In the proposed scheme, the attacker cannot achieve his/her purpose by sending a modified message to the personal reader. For the same reason, the attack will fail when the legal medical reader uses:
    CHKMP=?H3(PEK  TMR  TID) (48)
    to check the data integrity. Therefore, attackers cannot achieve their purpose by sending a modified message to the medical reader.

4.3. User Untraceability

Another form of privacy attack involves attempting to obtain a person’s physical location by tracing any personal device (in this case, the personal reader). If the personal reader sends the same message continuously, an attacker can trace its location. In the proposed architecture, the response message of the personal reader includes the parameters CHKMP=H3(PEK  TMR  TID). The random transaction number TID is used for every communication round in order to avoid location-tracing. Thus, location privacy is protected, and user untraceability is achieved.

4.4. Resisting Replay Attack

Attackers may also intercept the message transmitted between the personal reader and the medical reader. They can attempt to impersonate a legal personal reader or medical reader, and then send the same message again to the intended receiver for a replay attack. Because the transmitted messages are changed every round in the proposed scheme, the same message cannot be sent twice; thus, the replay attack cannot succeed.

4.5. Forward and Backward Secrecy

Even if the session key PEK between the personal reader and the medical reader is compromised at any point by an attacker, the system still satisfies forward and backward secrecy. An attacker may use the session key PEK for future communication, or use it to obtain previous messages. However, in the proposed scheme, the session key PEK is randomly chosen by the personal reader and the medical reader, and may only be used in the current round. The attacker cannot use the same session key PEK for future communication, or to obtain previous messages. Thus, a secure BAN authentication environment achieves forward and backward secrecy.

4.6. Computation Cost

Table 1 shows the computation costs of the proposed scheme.

Table 1.

Computation cost of the proposed scheme.

Party Medical Cloud Server Medical Reader Personal Reader Body Sensor
Phase
Body Sensor Registration Phase N/A 1TP+1TH N/A N/A
Personal Reader Registration Phase 2TMul+1TH 1TP+1TH 2TMul+1TH+1TCmp N/A
Medical Reader Registration Phase 2TMul+1TH 2TMul+1TH+1TCmp N/A N/A
Authentication and Communication Phase N/A 5TMul+5TH+1TCmp+2TEnc 1TP+5TMul+7TH+2TCmp+3TEnc 1TP+2TH+1TCmp+1TEnc

TP: Polynomial function operation; TMul: Multiplication operation; TH: Hash function operation; TCmp: Comparison operation; TEnc: Symmetric encryption operation.

From Table 1, the proposed scheme’s computation costs for the medical cloud server, medical reader, personal reader and body sensor in each phase are analyzed. For the highest computation cost in the authentication and communication phase, a medical reader needs five multiplication operations, five hash-function operations, one comparison operation and two symmetric encryption operations. A personal reader needs one polynomial function operation, five multiplication operations, seven hash-function operations, two comparison operations and three symmetric encryption operations. A body sensor needs one polynomial function operation, two hash-function operations, one comparison operation and one symmetric encryption operation. The computation cost and complexity are acceptable.

4.7. Communication Performance

The communication cost of the proposed scheme is shown in Table 2.

Table 2.

Communication cost of the proposed scheme.

Item Message Length Round 3.5 G (14 Mbps) 4 G (100 Mbps)
Phase
Body Sensor Registration Phase 400 bits 2 0.029 ms 0.004 ms
Personal Reader Registration Phase 880 bits 4 0.063 ms 0.009 ms
Medical Reader Registration Phase 480 bits 2 0.034 ms 0.005 ms
Authentication and Communication Phase 2448 bits 5 0.175 ms 0.024 ms

The communication efficiency of the proposed scheme during the transaction process of each phase was also analyzed. It was assumed that a polynomial function operation required 160 bits, an elliptic curve modular operation required 160 bits, a hash operation required 160 bits, and an advanced encryption standard (AES) operation required 256 bits, while other messages like id, pid, random number, etc., required 80 bits. For example, the authentication and communication phase of the proposed scheme requires four elliptic curve modular messages, four hash messages, three AES messages and five other messages. It thus requires 160 × 4 + 160 × 4 + 256 × 3 + 80 × 5 = 2448 bits. In a 3.5 G environment, the maximum transmission speed is 14 Mbps. This study also considered the authentication and communication phase of the proposed scheme, which only takes 0.175 ms to transfer all messages. In a 4 G environment, the maximum transmission speed is 100 Mbps, and the transmission time is reduced to 0.024 ms (ITU 2016).

4.8. Feature Comparison

Table 3 shows the feature comparison of the proposed scheme and He et al.’s scheme [24], and Table 4 is a more detailed mutual authentication comparison of the proposed scheme and He et al.’s scheme.

Table 3.

Feature comparison of the proposed scheme and He et al.’s scheme.

Scheme Proposed Scheme He et al.’s Scheme
Feature
Mutual Authentication Yes No
Data Integrity Yes Yes
User Untraceability Yes Yes
Resist Replay Attack Yes Yes
Forward and Backward Secrecy Yes No
Comprehensive Scheme Yes No

Table 4.

Mutual authentication comparison of the proposed scheme and He et al.’s scheme.

Scheme Proposed Scheme He et al.’s Scheme
Feature
Mutual authentication between body sensor and personal reader Yes No
Mutual authentication between personal reader and medical reader Yes N/A

5. Conclusions

Recent developments in sensor-network and cloud computation technology have given rise to what is known as the Internet of Things. Many services can be provided through network cloud environments, including medical care services. In addition, aging populations mean an increased need for expanded healthcare, which has resulted in a new technology development trend. Elderly people can now wear body sensors and personal wireless devices to establish a BAN, which can provide medical care workers and doctors with necessary patient data for diagnoses. However, malicious attackers may seek to obtain sensitive personal data for various reasons. Thus, a robust authentication mechanism for BAN environments that can provide security, privacy and efficiency is necessary.

Previously, He et al. proposed a security mechanism to protect people’s information security in BAN environments [24], but their proposed scheme exhibits vulnerability. This study, therefore, proposes an improved scheme based on their work, which consists of a secure and lightweight body-sensor network based on the Internet of Things for cloud healthcare environments. To sum up, this article mainly achieved the following three contributions: first, we proposed a comprehensive framework for a healthcare BAN environment, including body sensor, personal reader, medical reader, and medical cloud server. Second, we designed secure communication architecture for all roles, unlike the previous work that only mentioned the concept. Third, we showed how the proposed authentication mechanism ensures mutual authentication, data integrity, user untraceability, forward and backward secrecy, and security against replay attacks.

Acknowledgments

This research was supported by the Ministry of Science and Technology, Taiwan, R.O.C., under contract numbers MOST 106-2221-E-324-013, MOST 106-2622-E-305-001-CC2 and MOST 103-2632-E-324-001-MY3.

Author Contributions

Yong-Yuan Deng proposed the original idea and design protocol. Chin-Ling Chen designed the protocol and analyzed the security property. Woei-Jiunn Tsaur analyzed the security property and comparison analysis. Yung-Wen Tang proposed a reasonable health care environment infrastructure. Jung-Hsuan Chen surveyed related works.

Conflicts of Interest

The authors declare no conflict of interest.

References

  • 1.Moosavi S.R., Gia T.N., Nigussie E., Rahmani A.M., Virtanen S., Tenhunen H., Isoaho J. End-to-end security scheme for mobility enabled healthcare Internet of Things. Future Gener. Comput. Syst. 2016;64:108–124. doi: 10.1016/j.future.2016.02.020. [DOI] [Google Scholar]
  • 2.Simplicio M.A., Jr., Silva M.V.M., Alves R.C.A., Shibata T.K.C. Lightweight and escrow-less authenticated key agreement for the Internet of Things. Comput. Commun. 2017;98:43–51. doi: 10.1016/j.comcom.2016.05.002. [DOI] [Google Scholar]
  • 3.Yang Y., Zheng X., Tang C. Lightweight distributed secure data management system for health Internet of Things. J. Netw. Comput. Appl. 2017;89:26–37. doi: 10.1016/j.jnca.2016.11.017. [DOI] [Google Scholar]
  • 4.Ray B.R., Abawajy J., Chowdhury M., Alelaiwi A. Universal and secure object ownership transfer protocol for the Internet of Things. Future Gener. Comput. Syst. 2018;78:838–849. doi: 10.1016/j.future.2017.02.020. [DOI] [Google Scholar]
  • 5.Simplicio M., Oliveira B., Barreto P., Margi C., Carvalho T., Naslund M. Comparison of authenticated-encryption schemes in wireless sensor networks; Proceedings of the 36th IEEE Conference on Local Computer Networks (LCN); Bonn, Germany. 4–7 October 2011; pp. 454–461. [Google Scholar]
  • 6.Chiuchisan I., Dimian M. Internet of Things for e-Health: An approach to medical applications; Proceedings of the IEEE International Workshop on Computational Intelligence for Multimedia Understanding (IWCIM); Prague, Czech Republic. 29–30 October 2015; pp. 1–5. [Google Scholar]
  • 7.Khemissa H., Tandjaoui D. A Lightweight Authentication Scheme for E-Health Applications in the Context of Internet of Things; Proceedings of the International Conference on Next Generation Mobile Applications, Services and Technologies; Cambridge, UK. 9–11 September 2015; pp. 90–95. [Google Scholar]
  • 8.Yang Y., Ma M. Conjunctive keyword search with designated tester and timing enabled proxy re-encryption function for e-health clouds. IEEE Trans. Inf. Forensics Secur. 2016;11:746–759. doi: 10.1109/TIFS.2015.2509912. [DOI] [Google Scholar]
  • 9.Lee J., Kapitanova K., Son S. The price of security in wireless sensor networks. Comput. Netw. Int. J. Comput. Telecommun. Netw. 2010;54:2967–2978. doi: 10.1016/j.comnet.2010.05.011. [DOI] [Google Scholar]
  • 10.Abbas A., Khan S. A review on the state-of-the-art privacy preserving approaches in e-health clouds. IEEE J. Biomed. Health Inform. 2014;18:1431–1441. doi: 10.1109/JBHI.2014.2300846. [DOI] [PubMed] [Google Scholar]
  • 11.Liang K., Susilo W. Searchable attribute-based mechanism with efficient data sharing for secure cloud storage. IEEE Trans. Inf. Forensics Secur. 2015;10:1981–1992. doi: 10.1109/TIFS.2015.2442215. [DOI] [Google Scholar]
  • 12.Yang J., Li J., Niu Y. A hybrid solution for privacy preserving medical data sharing in the cloud environment. Future Gener. Comput. Syst. 2015;43–44:74–86. doi: 10.1016/j.future.2014.06.004. [DOI] [Google Scholar]
  • 13.He D., Chen C., Chan S., Bu J. SDRP: A secure and distributed reprogramming protocol for wireless sensor networks. IEEE Trans. Ind. Electron. 2012;59:4155–4163. doi: 10.1109/TIE.2011.2178214. [DOI] [Google Scholar]
  • 14.Han J., Susilo W., Mu Y. Improving privacy and security in decentralized ciphertext-policy attribute-based encryption. IEEE Trans. Inf. Forensics Secur. 2015;10:665–678. [Google Scholar]
  • 15.Zhao S., Aggarwal A., Frost R., Bai X. A survey of applications of identity-based cryptography in mobile ad-hoc networks. IEEE Commun. Surv. Tutor. 2012;14:380–400. doi: 10.1109/SURV.2011.020211.00045. [DOI] [Google Scholar]
  • 16.Whitmore A., Agarwal A., Xu L.D. The internet of things: A survey of topics and trends. Inf. Syst. Front. 2015;17:261–274. doi: 10.1007/s10796-014-9489-2. [DOI] [Google Scholar]
  • 17.Fortino G., Parisi D., Pirrone V., Fatta G.D. BodyCloud: A SaaS approach for community Body Sensor Networks. Future Gener. Comput. Syst. 2014;35:62–79. doi: 10.1016/j.future.2013.12.015. [DOI] [Google Scholar]
  • 18.Fortino G., Galzarano S., Gravina R., Li W. A framework for collaborative computing and multi-sensor data fusion in body sensor networks. Inf. Fusion. 2015;22:50–70. doi: 10.1016/j.inffus.2014.03.005. [DOI] [Google Scholar]
  • 19.Gravina R., Alinia P., Ghasemzadeh H., Fortino G. Multi-sensor fusion in body sensor networks: State-of-the-art and research challenges. Inf. Fusion. 2017;35:68–80. doi: 10.1016/j.inffus.2016.09.005. [DOI] [Google Scholar]
  • 20.Zhou Z., Huang D., Wang Z. Efficient privacy-preserving ciphertext-policy attribute based-encryption and broadcast encryption. IEEE Trans. Comput. 2015;64:126–138. doi: 10.1109/TC.2013.200. [DOI] [Google Scholar]
  • 21.Ali A., Irum S., Kausar F., Khan F. A cluster-based key agreement scheme using keyed hashing for body area networks. Multimedia Tools Appl. 2013;66:201–214. doi: 10.1007/s11042-011-0791-4. [DOI] [Google Scholar]
  • 22.Mollera S., Newe T., Lochmann S. Prototype of a secure wireless patient monitoring system for the medical community. Sens. Actuators A Phys. 2012;173:55–65. doi: 10.1016/j.sna.2011.10.016. [DOI] [Google Scholar]
  • 23.Kim H., Kim C.H., Chung J.M. A novel elliptical curve ID cryptography protocol for multi-hop ZigBee sensor networks. Wirel. Commun. Mob. Comput. 2012;12:145–157. doi: 10.1002/wcm.947. [DOI] [Google Scholar]
  • 24.He D., Chen C., Chan S., Bu J., Zhang P. Secure and lightweight network admission and transmission protocol for body sensor networks. IEEE J. Biomed. Health Inform. 2013;17:664–674. doi: 10.1109/JBHI.2012.2235180. [DOI] [PubMed] [Google Scholar]
  • 25.Yao X., Chen Z., Tian Y. A lightweight attribute-based encryption scheme for the internet of things. Future Gener. Comput. Syst. 2015;49:104–112. doi: 10.1016/j.future.2014.10.010. [DOI] [Google Scholar]
  • 26.He D., Chen C., Chan S., Bu J., Vasilakos A. A distributed trust evaluation model and its application scenarios for medical sensor networks. IEEE Trans. Inf. Technol. Biomed. 2012;16:1164–1175. doi: 10.1109/TITB.2012.2199996. [DOI] [PubMed] [Google Scholar]
  • 27.He D., Chen C., Chan S., Bu J., Vasilakos A. ReTrust: Attackresistant and lightweight trust management for medical sensor networks. IEEE Trans. Inf. Technol. Biomed. 2012;16:623–632. doi: 10.1109/TITB.2012.2194788. [DOI] [PubMed] [Google Scholar]
  • 28.Han W., Zhu Z. An ID-based mutual authentication with key agreement protocol for multiserver environment on elliptic curve cryptosystem. Int. J. Commun. Syst. 2014;27:1173–1185. doi: 10.1002/dac.2405. [DOI] [Google Scholar]

Articles from Sensors (Basel, Switzerland) are provided here courtesy of Multidisciplinary Digital Publishing Institute (MDPI)

RESOURCES