| Literature DB >> 36236687 |
Somasundaram Muthuvel1, Sivakumar Rajagopal2, Shamala K Subramaniam3.
Abstract
Body Area Network (BAN) is one of the most important techniques for observing patient health in real time and identifying and analyzing diseases. For effective implementation of this technology in practice and to benefit from it, there are some key issues which are to be addressed, and among those issues, security is highly critical. WBAN will have to operate in a cooperative networking model of multiple networks such as those of homogeneous networks, for the purpose of performance and reliability, or those of heterogeneous networks, for the purpose of data transfer and processing from application point of view, with the other networks such as the networks of hospitals, clinics, medical experts, etc. and the patient himself/herself, who may be moving from one network to another. This paper brings out the issues related to security in WBAN in separate networks as well as in multiple networks. For WBAN working in a separate network, the IEEE 802.15.6 standard is considered. For WBANs working in multiple networks, especially heterogeneous networks, the security issues are considered. Considering the advancements of artificial intelligence (AI), the paper describes how AI is addressing some challenges faced by WBAN. The paper describes possible approaches which can be taken to address these issues by modeling a security mechanism using various artificial intelligence techniques. The paper proposes game theory with Stackelberg security equilibrium (GTSSE) for modeling security in heterogeneous networks in WBAN and describes the experiments conducted by the authors and the results proving the suitability of the modeling using GTSSE.Entities:
Keywords: Body Area Network (BAN); eHealthcare; game theory; heterogeneous networking; network security
Mesh:
Year: 2022 PMID: 36236687 PMCID: PMC9571783 DOI: 10.3390/s22197588
Source DB: PubMed Journal: Sensors (Basel) ISSN: 1424-8220 Impact factor: 3.847
Figure 1IEEE 802.15.6 standard-based body sensor networks applications.
Figure 2Structure of Body Area Networks.
“WBAN Security attacks and defences” [3].
| Layers | DoS Attacks | Defenses |
|---|---|---|
| Physical | Jamming | Lower duty cycle, spread-spectrum, mode change, region mapping and priority messages |
| Interfering | Hiding and temper proofing | |
| Link | Smash | Error correction code |
| Unfairness | Small frames | |
| Collapse | Limitation rate | |
| Network | Negligence and greediness | Searching and redundancy |
| Homing | Encryption | |
| Misdirection | Monitoring authorization | |
| Black holes | Redundancy, observing and authentication | |
| Transport | Flooding and de-synchronization | Dilemmas between clients and authentication |
IEEE 802.14.6 standard-related security.
| Name | Explanation | Access | Confidentiality | Frame | Sequential Freshness |
|---|---|---|---|---|---|
| Null | No security | ||||
| AES-CBC-MAC-32 | MAC-32 bit | ✓ | ✓ | ||
| AES-CCM-32 | MAC-32 bit and Encryption | ✓ | ✓ | ✓ | ✓ |
| AES-CTR | CTR and Encryption | ||||
| AES-CCM-64 | MAC-64bit and Encryption | ✓ | ✓ | ✓ | ✓ |
| AES-CBC-MAC-64 | MAC-64bit | ✓ | ✓ | ||
| AES-CCM-128 | MAC128bitand Encryption | ✓ | ✓ | ✓ | ✓ |
| AES-CBC-MAC-128 | MAC-128 bit | ✓ | ✓ |
Security in IEEE 802.15.6 standard.
| Level-0 | Insecure communication | Here, data has been broadcasted in an unsafe frame, which means no proper security mechanism is followed to maintain privacy, confidentiality, integrity and authentication. |
| Level-1 | Authentication only | Here, data is transmitted only in a secured manner, but this process not support the privacy and confidentiality. |
| Level-3 | Encryption and authentication | Data is transmitted in secured authentication and encryption frames, addressing all problems not covered in the above levels 0 and 1 (see |
Figure 3IEEE 802.15.6 standard security structure.
Figure 4Beacon enable mode-based IEEE 802.15.4 communication structure.
Figure 5System architecture in cooperative networking in medical applications.
Figure 6Internetworking of cooperative heterogeneous networks.
Figure 7Conceptual architecture for WBANs with MCC capability.
Figure 8Scheme for two headers.
Figure 9Scheme for single header.
Figure 10Result of security ratio for GTSSE model compared to other existing models.
Application of Machine Learning Algorithms for IoT.
| No. | Models | Inputs | Processing | ML Algorithms | Outputs |
|---|---|---|---|---|---|
| 1 | Traffic Profiling | Backbone, Wireless, Mobile networks | Data Capture: (tcpdump, etc.), | Clustering, Bayesian, Frequent item set mining, etc. | Traffic patterns, Traffic engineering, App identification, |
| 2 | Device identification model | PC/Laptop, Mobile phone, sensors, network camera, IoT device | Data capture: Sensors data, network trace, etc., | Clustering, kNN, k-means, SVM, etc. | Unique device identification, adverting, network/security engineering, etc. |
| 3 | IoT Security Model | Gateway, device, controller | Data capture: traffic, signal, events, configuration, | ANN, SVM, Bayes network, Decision tree, k-means | Intrusion detection, anomaly, privacy, authentication, |
| 4 | Edge computing in IoT network model | Sensors, edge devices, cloud | Data capture: Sensor data, traffic data, etc. | Clustering, Bayesian, SVM, Deep learning, Markov, etc. | Intrusion detection, image detection, diseases identification, traffic engineering, etc. |
| 5 | Software-defined networking in IoT network model, | Sensors, network devices, controller | Data capture: sensors data, traffic data, etc. | Clustering, neural network, SVM, Bayesian, etc. | Intrusion detection, traffic management, fault detection, DDoS attack detection, etc. |
| 6 | IoT application model | Wearable devices, mobile phone sensors, network camera, wireless sensor network | Data capture: vital signs, environment data, etc. | Decision tree, logistic regression, SVM, Markov model, Bayes network, clustering, random forest. | Human health condition, human activity, fraud detection, object detection |
Figure 11AI techniques in various stages of WBAN in the heterogeneous network.