A Secure Framework for Data Sharing in Private Blockchain-Based WBANs

被引:22
作者
Xiao, Lijun [1 ,2 ]
Han, Dezhi [2 ]
Meng, Xiangwei [3 ]
Liang, Wei [4 ]
Li, Kuan-Ching [5 ]
机构
[1] Guangzhou Coll Technol & Business, Big Data Dev & Res Ctr, Guangzhou 511442, Peoples R China
[2] Shanghai Maritime Univ, Sch Informat Engn, Shanghai 411201, Peoples R China
[3] Hunan Univ Sci & Technol, Sch Comp Sci & Engn, Xiangtan 425100, Peoples R China
[4] Hunan Univ, Coll Comp Sci & Elect Engn, Changsha 410082, Peoples R China
[5] Providence Univ, Dept Comp Sci & Informat Engn, Taichung 43301, Taiwan
基金
中国国家自然科学基金;
关键词
WBANs; private blockchain; dynamic; authentication; blind signature; AUTHENTICATION SCHEME; INTERNET;
D O I
10.1109/ACCESS.2020.3018119
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
With the development of sensor devices, wireless sensor networks have been widely used, and Wireless Body Area Networks (WBANs) are relatively common application scenarios in wireless sensor networks. The wearable device is used to collect physiological data of the human body, and the server device is adopted to store physiological data of the human body. The openness of the network environment and network devices' dynamic nature make WBANs vulnerable to security threats from attackers. The centralized two-hop architecture contains only one hub node, and the data stored in the hub node may be tampered with by attackers. Once attackers occupy the node, the entire network will be paralyzed. To tackle such an issue, it is proposed in this article a model in WBANs architecture based on Blockchain technology, where the authentication protocol and blind signature protocol between nodes are designed in the new WBANs model, making the Blockchain data transmission system in a wireless network environment secure and reliable. Experimental results show that the proposed method is promising and shows higher levels of safety and stability than other methods.
引用
收藏
页码:153956 / 153968
页数:13
相关论文
共 28 条
[1]   A Novel Security Protocol for Wireless Sensor Networks with Cooperative Communication [J].
Al Hayajneh, Abdullah ;
Bhuiyan, Md Zakirul Alam ;
McAndrew, Ian .
COMPUTERS, 2020, 9 (01)
[2]   Survey of main challenges (security and privacy) in wireless body area networks for healthcare applications [J].
Al-Janabi, Samaher ;
Al-Shourbaji, Ibrahim ;
Shojafar, Mohammad ;
Shamshirband, Shahaboddin .
EGYPTIAN INFORMATICS JOURNAL, 2017, 18 (02) :113-122
[3]  
Amofa S., 2018, P IEEE 20 INT C E HL, P1
[4]  
[Anonymous], 2019, IEEE ACCESS, DOI DOI 10.1109/ACCESS.2019.2929205
[5]  
[Anonymous], 2019, 2019 IEEE 5 INTL C, DOI DOI 10.1109/BIGDATASECURITY-HPSC-IDS.2019.00017
[6]  
[Anonymous], 2005, LECT NOTES COMPUT SC
[7]  
[Anonymous], 2012, 80215 IEEE
[8]  
Crosby M, 2016, APPL INNOV REV, V2, P6
[9]  
Demsar J, 2013, J MACH LEARN RES, V14, P2349
[10]   Dendritic Cell Algorithm with Optimised Parameters using Genetic Algorithm [J].
Elisa, Noe ;
Yang, Longzhi ;
Naik, Nitin .
2018 IEEE CONGRESS ON EVOLUTIONARY COMPUTATION (CEC), 2018, :2546-2553