| Literature DB >> 31130649 |
Yongjun Ren1,2, Yan Leng3,4, Fujian Zhu5,6, Jin Wang7,8, Hye-Jin Kim9.
Abstract
Wireless body area networks (WBANs) are expected to play a vital role in the field of patient-health monitoring shortly. They provide a convenient way to collect patient data, but they also bring serious problems which are mainly reflected in the safe storage of the collected data. The privacy and security of data storage in WBAN devices cannot meet the needs of WBAN users. Therefore, this paper adopts blockchain technology to store data, which improves the security of the collected data. Moreover, a storage model based on blockchain in WBAN is proposed in our solution. However, blockchain storage brings new problems, for example, that the storage space of blockchain is small, and the stored content is open to unauthorized attackers. To solve the problems above, this paper proposed a sequential aggregate signature scheme with a designated verifier (DVSSA) to ensure that the user's data can only be viewed by the designated person and to protect the privacy of the users of WBAN. In addition, the new signature scheme can also compress the size of the blockchain storage space.Entities:
Keywords: blockchain; data storage; digital signature; wireless body area network
Year: 2019 PMID: 31130649 PMCID: PMC6566160 DOI: 10.3390/s19102395
Source DB: PubMed Journal: Sensors (Basel) ISSN: 1424-8220 Impact factor: 3.576
Figure 1The basic structure of blockchain.
Security threats and solutions in the WBAN.
| Security Threats: | Security Requirements | Possible Solutions |
|---|---|---|
| Unverified or unauthorized access | Verified or authorized access | Random key distribution |
| Information leakage | Confidentiality | Link layer or network layer encryption |
| Tampering with message | Integrity | Type a secure hash function |
| Denial-of-service attack (DoS) | Usability | Intrusion detection |
| Node capture, damaged nodes | The resilience of the damaged node | Consistency checking and node undo |
| Routing attacks | Secure Routing | Security routing protocol |
| Intrusions and advanced security attacks | Security group management, | Secure group communication, |
Figure 2A wireless body area network (WBAN) architecture of a health care application.
Figure 3Data storage model.
Figure 4Data verification chart.
Figure 5Communication overhead vs. security level.
Energy consumption on communications.
| The Schemes | Total Size | Energy Consumption (mJ) |
|---|---|---|
| DVSSA scheme | P = 30 bytes | 13.52 W |
| Certificate-based scheme | N = 512 | 146.99 W |
| Merkle hash tree scheme | N = 512 | 144.56 W |
| ID-based scheme | N = 512 | 111.02 W |
Figure 6Energy consumption on communications with regard to the number of users.
Figure 7Size of the Bitcoin blockchain with and without DVSSA signatures.