Wireless body area network: Architecture and security mechanism for healthcare using internet of things

被引:0
作者
Kumar, Arun [1 ]
Dewan, Ritu [1 ]
Al-Dayyeni, Wisam Subhi [2 ]
Bhushan, Bharat [3 ]
Giri, Jayant [4 ]
Islam, Sardar M. N. [5 ,6 ]
Elaraby, Ahmed [7 ,8 ]
机构
[1] Galgotias Coll Engn & Technol, Greater Noida, India
[2] ADA Univ, Sch Informat Technol & Engn, Ahmadbey Aghaoghlu Str 61, AZ-01008 Baku, Azerbaijan
[3] Sharda Univ, Greater Noida, India
[4] Yeshwantrao Chavan Coll Engn, Dept Mech Engn, Nagpur, India
[5] Victoria Univ, ISILC, Melbourne, Vic, Australia
[6] Victoria Univ, Decis Sci & Modelling Program, Melbourne, Vic, Australia
[7] Buraydah Private Coll, Coll Engn & Informat Technol, Dept Cybersecur, Buraydah, Saudi Arabia
[8] South Valley Univ, Fac Comp & Informat, Dept Comp Sci, Qena, Egypt
来源
INTERNATIONAL JOURNAL OF ENGINEERING BUSINESS MANAGEMENT | 2025年 / 17卷
关键词
IoT; DoS; security; CoAP; healthcare; SCHEME; TRUST;
D O I
10.1177/18479790251315317
中图分类号
F [经济];
学科分类号
02 ;
摘要
Internet of Things (IoT) enabled wireless body area network (WBAN) is a novel technology that combines medical, wireless, and non-medical devices for healthcare management applications. Indoor healthcare institutions, such as hospitals, may employ IoT devices to manage medical equipment, maintain inventory, and monitor patients. In addition to monitoring temperature, humidity, and air quality, IoT sensors may help prevent the spread of sickness. The data generated by small sensor devices need strong security methods for secure transmission over a public network. Security of the data sent from source to destination is handled by transport layer security (TLS) protocol and prevent message loss or reordering. The most difficult component of TLS is determining how to handle reliability. Low-power wireless networks employ the Datagram Transport Layer Security (DTLS) protocol to solve this problem. But if the Server is exposed to a malicious attack (i.e., flooded with ClientHello messages, the DTLS protocol may no longer serve the purpose) as it may lead to Denial-of-Service (DoS). The paper proposes an intelligent gateway-based verification and approval system to protect health data from IoT wearable devices, a key worldwide data security risk. Paper used Contiki Network Simulator for designing an advanced smart gateway-based constrained application Improved DTLS (CoAP I-DTLS) security protocol. To assess the effectiveness of the proposed work, the packet loss ratio is computed for the CoAP, CoAP-DTLS, and CoAP I-DTLS protocols. To assess the effectiveness of the improved CoAP I-DTLS, calculations are also made for data transfer and handshake time. Paper will also look at ways to increase security by integrating the CoAP I-DTLS protocol with the Secure Hash Algorithm (SHA-256) and utilizing Certificate Authority (CA) improvements. Evaluation parameters such as Packet loss ratio, Data transmission time, and Energy consumption average are considered and detailed simulation results have been presented.
引用
收藏
页数:14
相关论文
共 59 条
[1]   Remote Health Monitoring Using IoT-Based Smart Wireless Body Area Network [J].
Aadil, Farhan ;
Mehmood, Bilal ;
Ul Hasan, Najam ;
Lim, Sangsoon ;
Ejaz, Sadia ;
Zaman, Noor .
CMC-COMPUTERS MATERIALS & CONTINUA, 2021, 68 (02) :2499-2513
[2]  
Ali T, 2018, INT J ADV COMPUT SC, V9, P330
[3]   Enhancing Internet of Things Security using Software-Defined Networking [J].
Alzahrani, Bander ;
Fotiou, Nikos .
JOURNAL OF SYSTEMS ARCHITECTURE, 2020, 110 (110)
[4]   Game-based adaptive anomaly detection in wireless body area networks [J].
Arfaoui, Amel ;
Kribeche, Ali ;
Senouci, Sidi Mohammed ;
Hamdi, Mohamed .
COMPUTER NETWORKS, 2019, 163
[5]  
Arfeen NU., 2024, P 1 INT C COMP TECHN, P44
[6]  
Arya V., 2024, J Opt Commun, V9, P1
[7]  
Atadoga A., 2024, Int J Sci Res Arch, V11, P1511
[8]   A Personalized Eccentric Cyber-Physical System Architecture for Smart Healthcare [J].
Balakrishnan, Amutha ;
Kadiyala, Ramana ;
Dhiman, Gaurav ;
Ashok, Gokul ;
Kautish, Sandeep ;
Yadav, Kusum ;
Prasad, J. Maruthi Nagendra .
SECURITY AND COMMUNICATION NETWORKS, 2021, 2021
[9]  
Biersteker S., 2024, Evaluating security and performance of CoAP protocol on Raspberry Pi 4 for IoT applications
[10]  
Bravo-Zanoguera M., 2019, Multidisciplinary Digital Publishing Institute Proceedings, V42, P49