| Literature DB >> 33425050 |
Tallat Jabeen1, Humaira Ashraf1, Ata Ullah2.
Abstract
Advances in remote interchanges, the internet of nano things have empowered the wireless body area networks (WBAN) to end up a promising systems of networking standard. It involves interconnected tiny sensors to gather ongoing biomedical data and transmit over the network for further analysis. Due to possibility of active and passive number of attacks, the healthcare data security is quite essential and challenging. This paper presents the systematic literature review (SLR) of the multiple security schemes for WBAN. We have identified a research question to analyses the possibility of several attacks while preserving the memory constraints. We have performed quality valuation to ensure the relevance of schemes with the research question. Moreover, the schemes are considered from 2016 to 2020 to focus on recent work. In literature, several existing schemes are explored to identify how the security is enhanced for exchanging patients' healthcare data. The data security schemes using AES, ECC, SHA-1 and hybrid encryption are analyzed based on influential traits. Several methodologies for data security in WBAN are considered and the most appropriate methodologies are appraised. We also analyses the security for different attack scenarios. © Springer-Verlag GmbH Germany, part of Springer Nature 2021.Entities:
Keywords: Attack mitigation; Data security; Healthcare; SLR; WBAN
Year: 2021 PMID: 33425050 PMCID: PMC7778405 DOI: 10.1007/s12652-020-02728-y
Source DB: PubMed Journal: J Ambient Intell Humaniz Comput
Fig. 1WBAN architecture
Fig. 2Research questions factor
Priority estimation (PE)
| Principles | PE |
|---|---|
| Routing protocol and detection system | × |
| Privacy enhanced protocols for WBAN | × |
| Security algorithm encryption/decryption | ✓ |
Prioritized articles
| Research Paper | PE |
|---|---|
| BAN-trust: an attack-resilient malicious Node detection scheme for WBAN (Wenjia | × |
| Efficient high-rate key management for WBAN (Salehi | ✓ |
| Delay-aware optimization of physical layer security in multi-hop WBAN (Moosavi | × |
| A robust energy efficient and secure data dissemination protocol for WBAN (Prameela and Ponmuthuramalingam | × |
| Secure and energy-efficient data sharing on chaotic compressive sensing in body-to-body networks (Haipeng et al. | ✓ |
| Implementation of energy efficient/lightweight encryption algorithm for WBAN (Alshamsi | ✓ |
| Lightweight secure ECG transmission in WBAN—PRESENT Cipher Based Implementation (Narmadha | |
| Privacy based data communication for WBAN (Gowtham | × |
| Anonymous authentication with provable security (He | ✓ |
| Group-based cooperation on symmetric key generation (Li | ✓ |
| A secure three-party authentication protocol for WBAN (Vishwakarma and Mohapatra | × |
| Security issues and wearable sensors in WBAN (Sawaneh | × |
| Secure lightweight routing strategy for WBAN (Roy | × |
| An implementation of a lightweight end-to-end secured communication system for patient monitoring system (Chowdhury | ✓ |
| Secure data sharing using digital signatures (Anwar et al. | ✓ |
| WBAN security and privacy issue in e-healthcare (Malik et al. | ✓ |
| Data storage mechanism based on blockchain with privacy protection in WBAN (Ren | ✓ |
| Biological key based security technique in WBAN (Rana | ✓ |
| Hybrid encryption algorithm in WBAN (Farooq | ✓ |
| Security framework for WBAN smart healthcare (Khan | ✓ |
| A survey on secure WBAN (Zou | ✓ |
| Data storage mechanism based on blockchain with privacy protection in WBAN (Ren et al. | ✓ |
| Hybrid encryption algorithm in WBAN (Farooq | ✓ |
| Energy efficient cluster formation and secure data outsourcing using TEOSCC and ECDH-IBT (Mukhtar | ✓ |
| Efficient and secure data delivery in software defined WBAN for virtual hospital (Shayokh | ✓ |
| BAN-trust: an attack-resilient malicious node detection (Li | × |
| Survey of main challenges (security and privacy) in WBAN (Al-Janabi | ✓ |
| Channel characteristic aware privacy protection mechanism (Zhang | ✓ |
| Group-based cooperation on symmetric key generation (Li | ✓ |
| Threats, challenges, security of WBAN using ZigBee (Tariq | × |
| A secure three-party authentication protocol for WBAN (Vishwakarma and Mohapatra | × |
| WBAN: attacks and countermeasures (Niksaz | × |
Fig. 3Research selection process
Fig. 4Taxonomy of data security schemes
Comparative analysis of techniques in terms of security (attacks, time)
| Schemes | Impersonation | Eavesdropping | DOS | MN | Time |
|---|---|---|---|---|---|
| D-Sign (Anwar et al., | – | ✓ | – | – | ✓ |
| PMS (Chowdhury | – | – | – | – | ✓ |
| Biometric (Malik et al. | – | – | – | ✓ | – |
| SHA-1 (Prameela and Ponmuthuramalingam | – | – | – | ✓ | – |
| RSSI (Salehi | – | ✓ | – | – | – |
| MTFG (Hussein | – | ✓ | – | ✓ | |
| Chaos Baker Map (Prameela and Ponmuthuramalingam | – | – | – | ✓ | – |
| Chaotic compression (Haipeng et al. | ✓ | – | – | – | – |
| LEA (Alshamsi | – | – | – | – | ✓ |
| Homomorphic (Gowtham | – | – | ✓ | – | ✓ |
| DVSSA (Ren | – | – | – | ✓ | – |
| ECC (Farooq | – | – | – | ✓ | – |
| JS algorithm (Zou | ✓ | – | – | – | – |
| TEOSCC and ECDH-IBT (Mukhtar | – | – | – | – | – |
| SDN (Shayokh | ✓ | – | – | – | – |
| BAN-Trust (Wenjia | – | – | – | ✓ | ✓ |
| 802.15.4./ZIGBEE (Tariq | – | – | – | – | – |
| RSSI (Li | – | – | – | – | – |
| Channel aware security (Zhang | – | ✓ | – | ✓ | – |
Security analysis with criticism
| Scheme | Plaintext/key size | Technique | Avoided attacks | Criticism |
|---|---|---|---|---|
D-Sign (Anwar et al. SHA-1 (Prameela and Ponmuthuramalingam | 128 bits text/128, 192 and 256 bits (Anwar et al. | AES & MQTT (Anwar et al. | Data eavesdropping Data impairment (Anwar et al. | Theoretical like file type attacks are effective (Alsaid Dos, IoT attacks not suitable for sensors networks (Chowdhury |
| Biometric (Malik et al. | N/A | Fingerprint or palm scanning, JS Algorithm (Zou | Malevolent attacks (Malik et al. | Complex and costly (Malik et al. |
| RSSI (Salehi, | 128 symmetric KEYS (Salehi, | RSSI (Salehi, | Eavesdropping attacks (Salehi, | Complex algorithm, difficult to implement (Malik et al. |
| PHY (Hussein | N/A | MTFG Algorithm | Delay Time attack | Make system slow (Malik et al. |
| HASH Function (Prameela and Ponmuthuramalingam | 128 bits | Chaos baker map | Malevolent Attacks | Complex dynamical behavior (Haipeng et al. |
| PCI (Narmadha | 64 block text and 128 bits key | Cipher PRESENT-80 | – | Short block size and large number of rounds which make the process of encryption slow (Malik et al. |
| BBN (Haipeng et al. | N/A | Chaotic compressive sensing encryption | Impersonation attacks | Complex and long-distance distortion (Haipeng et al. |
| LEA (Alshamsi and Barka | 128.192 and 256 key size and text size 128 bits | LEA | – | Vulnerable to new kind of cryptanalysis and data accuracy effects (Alshamsi and barka |
| SHE (Gowtham | 18 bytes text size | Homomorphic encryption | Sinkhole attacks | This technique is risky because of connection (Malik et al. |
| Blockchain (Ren | Size depends on aggregate of single person sign | DVSSA | Tempering and unauthorized access attack | Time consumption and complex (Ren |
HEA (Farooq Counter Mode (Khan | 128,192 and 256 bits (Farooq | AES-CTR (Khan ECC and DDH (Rana and Kang | Unauthorized access | AES and ECC are difficult to implement (Rani |
| TEOSCC and ECDH-IBT (Mukhtar | – | TEOSCC and ECDH-IBT | – | Selection of cluster head is complex task and ECDH-IBT complex exponentiation operation (Mukhtar |
| SDN (Shayokh, | – | Software defined | Authentication (Shayokh | Security vulnerabilities, inconsistency (Niksaz |
| RMDS (Li | – | BAN-Trust | Malicious node attack | Trusted server can be a single point (Niksaz |
| ECC (Al-Janabi | – | ECC | Authentication | Replay attack, insecure data communication (Anwar et al. |
| CCPP (Zhang | 128–512 bits | Channel aware security mechanism | tempering, malevolent node attack | Authentication of each node is time consuming (Zhang |
| Survey (Tariq | – | 802.15.4./ZigBee | – | ZIGBEE technology is commonly used with low speed (Ren |
| STA (Vishwakarma and Mohapatra | – | ECC | – | Asymmetric cryptography takes more processing time (Farooq |
| KM encryption (Niksaz | – | Key management | – | Malicious attackers can steal the key through wiretapping key exchange (Zhang |
| PAP (Sandhu | – | Priority aware protocol | – | Energy consumption increases with increase of priority (Sandhu |
Fig. 5Consequences and prompt