Lightweight Healthcare Wireless Body Area Network Scheme With Amplified Security

With the rapid economic development and the increasing pressure of work and life, people are increasingly eager to obtain real-time intelligent healthcare to monitor their sub-healthy bodies. Healthcare wireless body area network (HWBAN) is one of the key infrastructures to realize intelligent healt...

Full description

Saved in:
Bibliographic Details
Published in:IEEE access Vol. 9; pp. 125739 - 125752
Main Authors: Jiang, Zhengliang, Liu, Wei, Ma, Ruijiang, Shirazi, Syed Hamad, Xie, Yong
Format: Journal Article
Language:English
Published: Piscataway IEEE 2021
The Institute of Electrical and Electronics Engineers, Inc. (IEEE)
Subjects:
Online Access:Get full text
Tags: Add Tag
No Tags, Be the first to tag this record!
Description
Summary:With the rapid economic development and the increasing pressure of work and life, people are increasingly eager to obtain real-time intelligent healthcare to monitor their sub-healthy bodies. Healthcare wireless body area network (HWBAN) is one of the key infrastructures to realize intelligent healthcare. Health data is extremely private information, which makes adversaries prefer to carry out data-related interception, modification, and destruction attacks against the HWBAN system. To provide secure protection for HWBAN, many researchers have proposed various HWBAN schemes, but there are still deficiencies in security, performance, and availability. Our paper proposes a lightweight and amplified secure scheme for HWBAN by using fewer Elliptic Curve Cryptography(ECC) operations and Physically Unclonable Function(PUF) to improve security and efficiency at the same time. Furthermore, we allow users to know their health status in real-time through their mobile phones without initiating additional requests to the medical server in our system to achieve better availability. In addition, we provide strict formal security proof to demonstrate the proposed scheme meets the security and reliability requirements in this paper. The detailed comparative analysis illustrates that the proposed scheme has certain advantages in computing, communication, and security.
ISSN:2169-3536
2169-3536
DOI:10.1109/ACCESS.2021.3111292