1. Introduction
Wireless body area network (WBAN) is an underlying technology that can monitor and record human health signals for a long time. Its early application is mainly used to continuously monitor and record health parameters of patients with chronic diseases (such as diabetes, asthma, and heart disease) and provide some form of automatic therapy control. For example, once a diabetic’s insulin level drops, the WBAN in their body will immediately activate a pump that automatically injects insulin into the patient, which allows the patient to keep insulin at a normal level without a doctor [1,2,3]. In the future, it can be widely used in consumer electronics, entertainment, sports, environmental intelligence, ubiquitous computing, military, or security fields. Not only these applications but also the so-called “smart dust” (microscopic devices with processing power and wireless communications), which is currently stuck in the realm of science fiction, is entirely possible in the future [4,5,6].
Wireless body area network in the world has been widely studied, including medical technology providers, hospitals, and insurance companies, as well as the industry parties that are carrying out strategic cooperation. WBANs have become a very popular research topic and are applied to many applications. They provide pervasive computing services and techniques in various potential applications for the internet of things (IoT) [7,8]. However, WBAN is still in its early stage, which faces challenges in the milliwatts level network energy consumption, interoperability, system equipment, security, sensor validation, data consistency, and so forth. The IEEE802.15 task group completed the world’s first WBAN standard, IEEE 802.15.6, in 2012. In 1998, the IEEE 802.15 working group was established to specialize in wireless personal area network (WPAN) standardization. Its mission was to develop a standard for short-range wireless communications, a wireless personal area network (WPAN), as it is commonly called. The technology is a major health care breakthrough when adopted [9,10].
Although the wireless body area network brings great conveniences, it also brings some hidden dangers. As WBAN stores and processes personal health information (e.g., health, history, vital signs, etc.), it raises several privacy and safety concerns [11,12,13,14,15]. In general, two types of threats exist [16]:
(1)
Unauthorized access: The unauthorized attackers hack into the WBAN and steal user data. Such attacks will violate users’ privacy, for example, if the attacker sells users’ information to an insurance company.
(2)
Tampering with the messages: The attacker modifies signals in the WBAN so that the data collector receives fake users’ data. This will affect the safety of users, for example, if the user is a patient, and the patient data received by the doctor is false data, which would lead to the wrong treatment by the doctor.
For the above two threats, this paper adopts blockchain technology and a particular digital signature to solve these problems. Our contribution is the following two points:
1. Blockchain: We use blockchain to store the WBAN user’s data which can prevent the data from being tampered with.
2. The DVSSA scheme: We propose a sequential aggregate signature scheme with a designated verifier. It ensures that the user’s data can only be viewed by the administrator, and in other hands it can be compressed to the size of the blockchain storage space, which solves the illegal access problem.
We organized the rest of our paper as follows. Section 2 first introduces the basic knowledge of WBAN and then introduces the blockchain structure and characteristics. Section 3 presents the security requirements of WBAN. In Section 4, our system model is shown. Section 5 presents our DVSSA scheme. In Section 6, the DVSSA scheme in blockchain and the energy consumption for message computation and transmission are evaluated. Finally, our paper is concluded in Section 7.
2. Related Work 2.1. Wireless Body Area Network
2.1.1. Network Architecture
The WBAN network architecture is an important part of the system architecture. It is the logical organization of communication devices (such as sensor nodes) in the system. Common network architectures include star topology, mesh topology, ring topology, and bus topology. The choice of network architecture is affected by the characteristics of the system and can affect many aspects of the system’s performance, such as energy consumption, traffic load handling capacity, node failure robustness, and MAC (Media Access Control Address) protocol selection. The purpose of choosing the WBAN network architecture is to better ensure low energy consumption and reliable data transmission of wireless communication. The selection of the architecture needs to consider the following factors: energy consumption, transmission delay, inter-user interference, node failure, and mobility [17,18,19].
In general, the star topology network structure corresponds to a one-hop wireless communication mode, while a mesh topology structure corresponds to a multiple-hop wireless communication mode. Traditional WBAN network topologies generally use simple star topologies, but there may be network or mixed topologies. For example, when the nodes are far away from the body or blocked by the body, the multi-hop communication mode is required. The choice of network architecture is not a single-hop communication mode. From the perspective of the practical application, in general, the size and complexity of the WBAN network are the main basis for architecture selection, for example, the WBAN physiological data acquisition system for monitoring patient health, the WBAN application architecture for a healthcare system based on ultra-bandwidth communication, or the WBAN system for realizing low energy consumption or a lightweight wireless communication protocol. In contrast, for a WBAN network with many nodes or of a large scale, the mesh topology or mixed topology should be selected.
WBAN networks with a network or mixed topology structure have more research value, and there is a lot of work to be done on such networks. On the one hand, the probabilistic connection model is proposed in multi-hop WBAN networks instead of the circular coverage model to solve the wireless communication connection problem. Furthermore, in a multiple-hop communication architecture, there may not be various communication links between the two entities. Thus, the corresponding mesh topology, which requires more complex multi-hop communication, will also facilitate the wearable sensors and sensors around them and recycle distributed reasoning methods or strategies to implement intelligent identification and monitoring. Larger multi-hop wireless communication is another possible role for the WBAN network control system [20,21,22,23].
2.1.2. Wireless Communication Technique in WBAN
According to the position of the radio signal, the communication in the WBAN includes two kinds: in vivo communication and in vitro communication. Body-coupled communication is a new method for in vivo communication, using the human body as the transmission medium [24]. The literature [25] studied the relevant simulation method of in vivo communication. In the literature [26], this method is applied to identity recognition in the body domain network. In the WBAN, most devices are placed on the human body, so the external communication mainly refers to the short-distance and low-power communication around the human body. At present, the commonly used wireless communication technologies in WBAN include Bluetooth and IEEE802.15.4 (Zigbee) [27], ANT [28], Zarlink [29], and so forth. Zigbee technology is currently the most commonly used communication technology in the research of volume domain networks due to its characteristics of low speed, low power consumption, and low cost [30,31,32,33]. Furthermore, UWB (ultra-wide WBAN) communication technology, due to its characteristics of a high transmission rate, low cost, low power consumption, strong anti-interference ability, and strong multi-path resolution, has also been attracting more and more attention from scholars [34,35,36]. The IEEE launched 802.15.4 in 2007. The team [37] is responsible for the development of the body domain communication standard, the establishment of which will further promote the development of the WBAN.
2.1.3. Management System and Database
As an integral part of the management of WBAN applications, the database is responsible for the sensory storage data collected by the WBAN network. A database management system can be used in a small choice of small-scale WBAN network DBMS (Database Management System, such as MySQL, Microsoft Access, and the Adaptive Server Anywhere) and medium-sized DBMS (e.g., Informix), as well as for mass WBAN networks of large-scale DBMS (such as DB2, Oracle, Sybase). Of course, text files can also be used to store data, such as the digital human pulse wave sample data stored in a local TXT (Plain text) file in the WBAN system of wireless traditional telemedicine. The database can adopt local centralized storage. In the WBAN system of wireless traditional telemedicine, the decoded and analyzed data can be connected to the specified database through the JDBC (Java DataBase Connectivity) interface, and a remotely distributed storage can also be adopted [37,38,39,40].
The management system can not only visualize the stored data but also manage the data, which includes the operations of adding, modifying, deleting, querying, and so forth. According to the requirements of the WBAN application, developers can choose the development tools and programming languages suitable for the management system, such as the Internet and local area network (LAN) ASP and JSP development environment or independent languages such as Delphi, Visual Basic. Development tools can include Python, C, C++ programming languages, etc. Developers can also choose monitoring functions and visual display interfaces in MATLAB to provide data analysis and intelligent processing. In the future, especially for the WBAN application of long-term continuous monitoring or the information-sharing platform built by multiple BSN (Body Sensors Network), considering the system performance and traffic demand, large amounts of data should be stored in a large distributed database for efficient management, and high-performance computing technology for these data should be developed in WBAN. Moreover, data can be further analyzed and processed (generating decisions, data mining, etc.).
2.2. Blockchain
2.2.1. Structure of Blockchain
P2P (Peer-to-Peer) networks are responsible for ensuring the freedom of communication within blockchain nodes, which are geographically dispersed but have equally privileged participants in the application. There is no centralized server in the P2P network, and each node is an informed consumer and information provider. Each node participates in the routing process of the entire network, which is the discovery and maintenance of connections to neighboring nodes, the propagation and validation of transactions, and the synchronization of blocks of data (both transactions and blocks are data structures of the blockchain, as described below). This ‘flat’ topology of P2P networks is the key reflection of blockchain and the decentralized nature of the base. Blockchain applications provide APIs (application programming interfaces) for various scenarios. Users interact directly with them through these APIs without having to worry about the underlying technical details.
In general, a blockchain is an appended database, maintained by a peer-to-peer network node. As shown in Figure 1, the basic structure of blockchain can be divided into three levels, namely P2P network, database, and various applications.
2.2.2. Key Characteristics of the Blockchain
From the research [41], we have summarized four attributes which describe a basic blockchain architecture as a general, decentralized ledger, offering data integrity and traceability. We describe these characteristics next.
(1)
Autonomy: One important feature of blockchain is that there is no separate entity control or control network. In the public settings, any node can sign and publish transactions, and if they are accepted, the blockchain will check other nodes in their decentralized network at any time. In addition, everyone can join the consensus process to extend new blocks to the blockchain.
(2)
Distributed: A blockchain system is built on a P2P network to which the source node broadcasts each signed single row of transactions. The adjacent peer then validates these incoming transactions: the valid transaction is forwarded further, and the invalid transaction is discarded. Eventually, these transactions can be extended to the entire P2P network. The system can process notifications and synchronizes networks for newly generated blocks.
(3)
Non-tampering: All valid blocks and transactions recorded in the global ledger are virtually immutable due to the need for validation by other nodes and traceability of changes. Furthermore, the entire global ledger is synchronized between blockchain nodes according to a consensus mechanism, giving users greater confidence in the authenticity and accuracy of the data in the blockchain.
(4)
Contractual: The process of consensus (for example, mining or voting) depends on the state of the data in question. The consensus is reached through the implementation of rules, i.e., the blockchain of the smart contract, for example, does not have any central authorization. The rules defined by these codes ensure that actions in any currency are executed promptly and correctly without human intervention.
3. Problem Statement 3.1. Security Requirements of WBAN
The security elements of a WBAN consist of four main parts:
1. Data confidentiality: In WBAN, data confidentiality is one of the most important problems; it can protect the user from data leaks. In medical applications, when the node collects and sends sensitive information to the coordinator, the enemy can eavesdrop on some key information in the communication, which will reveal the patient’s privacy. This kind of eavesdropping may bring serious damage to the patient. The traditional method is to encrypt the data and then retransmit to ensure the communication security of the external sensor node and the network coordinator, and only allow the receiver to be authorized to decrypt the WBAN node, but this is difficult to implement for the sensor node with poor computational performance.
2. Data integrity: The confidentiality of the data does not guarantee that the data will not be tampered with. After the data is stolen by the opponent, it can be tampered or destroyed by adding or reducing data segments, and then the data will be sent to the network coordinator. Vital information can be compromised, which can be very dangerous to users. The data integrity mechanism ensures that the data transmitted between BSN and BSNC (Body sensors network coordinators) is not changed by the adversary. The sender uses a one-way algorithm to compute the MAC frame, generates the integrity code for the frame, and sends it attached to the packet. The receiver uses the same process to calculate the MAC frame and compares the calculated result with the one given by the sender, to judge whether the data was maliciously tampered with in the sending process.
3. Data authentication: Data authentication is necessary for medical and non-medical applications. It enables the BSN and BSNC to verify that data is sent by trusted sensor nodes. This prevents hostile parties from sending false messages to trick BSN and BSNC data authentication.
4. Data freshness: The freshness of the data can prevent the retransmission attack. The hostile party may capture the frame in the transmission process and resend the data after a period of delay to achieve the purpose of confusing the BSNC.
3.2. Possible Security Threats and Attacks on WBAN
WBAN is vulnerable to a significant number of attacks, which are carried out in different ways, such as denial-of-service attacks (DoS), privacy invasions, and physical attacks. Countering these attacks is challenging, as it is limited by the power consumption of sensor nodes. A robust sensor can easily block sensor nodes and prevent them from aggregating patient data.
The attacks on WBAN can be roughly divided into three types: (1) confidentiality and authentication attacks, in which the hostile party conducts eavesdropping and attempts reply attacks or electronic spoofing; (2) attack on service integrity; network forced to accept wrong information; (3) network availability attack and denial-of-service (DoS) attack affect network capacity and performance.
3.3. Security Solution for WBAN
For the security threats discussed in the previous section, Table 1 lists possible solutions:
For patients in WBAN, the privacy of their own data is important. For example, patients do not want their data to be collected by insurance companies who can use the data for their purposes, such as selling patient information. In addition, the integrity and correctness of the patient data are also very important. If the data reviewed and analyzed by the manager (doctor or hospital) is incomplete or tampered, the medical judgment made by the doctor is likely to be wrong, which is extremely unsafe for patients.
Thus, we propose the DVSSA signature scheme to solve the problem of unauthorized access in WBAN, so as to ensure that only the specified verifier can view and analyze the data of WBAN users. Moreover, we used blockchain to store WBAN user data to account for the problem of data tampering and guarantee the integrity of the data, based on the non-tamper property of blockchain.
4. System Model 4.1. WBAN Model
We designed the WBAN system as shown in Figure 2. There are three main entities in this system:
(1)
WBAN: the WBAN consists of a WBAN controller and several (implantable or wearable) devices. These devices are often sensors that monitor important body parameters or movements and control the body by providing life support, visual/auditory feedback, and so forth. The WBAN device communicates with the WBAN controller directly or through multi-hop communication. The WBAN controller communicates not only with the WBAN device but also with Cloud. Also, the close-range WBAN controller can form a self-organizing network using a wireless personal area network (WPAN) technology.
(2)
External administrator: external entities are mainly doctors or hospitals that we called administrators. Administrators can view the data of WBAN users stored in the blockchain and manage and analyze the data.
(3)
Cloud: cloud servers can provide the function of cloud storage service. Users can easily access data at anytime and anywhere through any internet-connected device connected to the cloud. More importantly, the cloud server cluster has a large number of storage resources, which can provide infinite storage space for the edge networks with limited resources.
The WBAN controller is used to send the collected user data to the cloud via Bluetooth or GPRS. After receiving the data, the cloud uses the DVSSA signature scheme to write the signed data into the blockchain. Administrators can view and analyze users’ data with their private keys.
4.2. Cloud-Blockchain Model
4.2.1. The Advantage of Blockchain Storage
Traditional data storage solutions rely heavily on centralized databases to maintain security. For hackers, the targets are more specific. Once a hacker successfully executes a script attack on a centralized database, the hacker has access to a large amount of data. However, with blockchain and distributed ledger technology, cracking is much harder. Many blockchain projects aim to make data storage more secure. The potential benefit is ground-breaking for the end user. The blockchain project not only has the potential to create an architecture for inherently more secure data storage systems but also allows individual users to have full access to their data. In many cases, blockchain projects are using the original cryptocurrency as part of the markup model. This allow users to monetize any third-party data, while also preventing identity theft and other problems that have emerged in recent years due to large-scale data breaches. By using digital signatures, blockchain system transactions ensure the integrity and non-repudiation of messages.
4.2.2. The Defect of Blockchain Storage
Blockchain is a data chain that is made up of multiple blocks, in which all transactions are stored. The blocks in the bitcoin blockchain were set initially to be 1M in size, but as the volume of transactions on the bitcoin blockchain has increased dramatically, 1M block has fallen far short of demand. The most direct way to solve this problem is block expansion, which is vulnerable to DDoS attacks (distributed denial of service) and thus has not been supported by the core development team of bitcoin. Furthermore, block expansion will significantly increase the cost of mining and cannot be supported by most mining pools. Hence, there are more and more digital signature schemes to compress the size of the blockchain.
4.2.3. Our Solution
The DVSSA signature scheme proposed in this paper makes the size of the signature written into the blockchain equal to the size of a single person’s signature through the sequential aggregation of all people’s signatures, which greatly saves the storage space.
The private data received by each user is stored in a different data block in the cloud, which is stored in the form of a linked list in the cloud. Then, the data of users in the cloud are signed through the DVSSA signature scheme and sent to the blockchain, as shown in Figure 3.
The WBAN controller sends the collected patient data to the cloud, which firstly divides the data of each patient into data1, data2…, datan, and each patient has its public key pair (PKiSKi) which is distributed by the administer. First, the first patient signs the corresponding data1 using his private keySK1and gets the signature sign1. Then, the second patient signs the data2 using his private keySK2and the first patient’s signature sign1 to get the signature sign(1,2), and so forth to get the signature sign(1,2..., n−1). Finally, the private keySKnof the n-th patient and the signature of the previous patient sign(1,2..., n−1) sign the datan to get the signature sign(1,2..., n). We add the manager’s public key attribute to get the final signature and write it into the blockchain.
4.3. Data Validation Model
After the data are uploaded to the cloud server, we partition the data and write it into the blockchain using the DVSSA signature scheme. However, there are some security problems. How can we ensure that the data uploaded to the cloud is original data without any tampering? Therefore, we propose a data validation model as shown in Figure 4.
The WBAN controller hashes the blocks of data collected from each patient to get a hash value and stores it in the controller. Then each patient’s data is sent to the cloud server. The cloud server first blocks each patient’s data, then hashes each data block and returns the value compared with the hash value in the WBAN controller. If the value is the same, the next digital signature is performed. Otherwise the service is terminated.
5. Sequential Aggregate Signature with Designated Verifier 5.1. Preliminaries
5.1.1. Bilinear Pairings
Letlbe a security parameter,qis a prime order ofl-bit,G1is a circulation additive group of the prime orderqwhich is generated byP.G2is a circulation additive group of the prime orderq, which is generated byQ.Gris a cyclic multiplicative group of prime orderq. Our proposed DVSSAgg makes use of a bilinear map:e: G1× G2→Gr, with the following properties:
1. Bilinear: ∀a,b∈Zq*, there ise(aP,bQ)=e(P,Q)ab.
2. Non-degeneracy:e(P,Q)≠1.
3. Computability: There is an efficient algorithm to computee(P,Q).
In the above definition,e: G1× G2→Gris an asymmetric bilinear pair ifG1≠G2; e: G1 × G2→Gris a symmetric bilinear pair if G1=G2=Gr, symmetric bilinear pairs can be regarded as special cases of asymmetric bilinear pairs. Bilinear mapsecan be constructed by Weil pairs or Tate pairs on a hypersingular elliptic curve over a finite domain.
5.1.2. Bilinear Diffie-Hellman Problem (BDH)
Given two groupsG1andG2, with the same prime orderq, lete: G1 × G1→G2be a bilinear map andgbe a generator ofG1. The objective of BDH is to computee(g,g)abcin(G1, G2,e)from the given(g, ga,gb,gc), wherea,b,c∈Zq.
5.1.3. Sequential Aggregate Signature Model
In the sequential aggregate signature, each signer must aggregate his signature into the current signature in a certain order. After each signer has signed, the aggregate signature is sent to the next signer, and the next signer can aggregate his signature only if they receive the aggregate signature. The specific steps are as follows:
Step1 Setup (1λ): input security parameter 1λ, output public parameter (Pa).
Step2 KeyGen (Pa): input public parameter Pa, output public keyPK, and private keySK.
Step3 AggSign(σ′,M¯,PK¯,M,SK,PK,Pa): inputM¯=(M1,M2,……Mk)andσ′andPK¯=(PK1,PK2,……,PKk), the messageMk+1, private keySK, and public parameter Pa generate a new aggregate signatureσ.
Step4 AggVerify (σ,M¯, PK¯,Pa): inputM¯=(M1,M2,……Mn), aggregate signatureσ,PK¯=(PK1,PK2,……,PKk), and public parameter Pa, the output of a 1 or 0 indicates whether the signature is valid or invalid.
5.2. Our Scheme
Step1 Setup(1λ): First, generate a bilinear groupGandGrof prime order p (length λ bit),G=〈g1〉,Gr=〈g2〉, randomly chooseY∈G, output public parameterPa=(P,G,Gr,e,g,Y).
Step2 SKeyGen (Pa): Input public parameter Pa, randomly choosex∈Zp, letX=g1 x, outputSKA=x,PKA=X.
Step3 VKeyGen (Pa): Input public parameter Pa, randomly choosed∈Zp, letD=g1 d, outputSKB=d, PKB=D.
Step4 DVSSAgg-Sign (σ′M′¯,PK’¯, M,SKA,PKB, Pa): Input messageM′¯=(M1,M2,……Mk)and its aggregate signatureσ′=(A′,B′,C′), input PK’=(X1,X2,……,Xk)and public parameter isPa. Input the MessageMk+1(M is the last message) and its private keySKA, and verifier’s public key PKBwhich generates a new sequential aggregation signature for the specified verifierσ=(A,B,C)D.A=(A′)’,B=(B′)’,C=(C′ (A′)’ (B′)xM)r.
Step5 DVSSAgg-Verify (σ,M¯, PKA¯,SKB,Pa): InputM¯=(M1,M2,……Mn)and its sequential aggregation signature for the specified verifier σ=(A,B,C)D, public chain is Pthe KA¯=(X1,X2,……,Xn), check if the each public keyXiappears only once in PKA¯. If it is, then verify whether the following formula is true:
e(A,Y)=e(B,g)e(C,g)=e(A,∏i=1n Xi) · e(B,∏i=1n Xi Mi)
If verified, the algorithm outputs 1, otherwise 0.
We can notice that the public key chain is PKA¯=(X1,X2,……,Xn), in the sequential aggregation signature for the designated-verifierσ=(A,B,C)Dabout message chainM¯=(M1,M2,……Mn),A=gr,B=Yr,C=(gr)∑i=1n Xi⋅(Yr)∑i=1n Xi Mi.
5.3. Security Proof
Theorem 1.
The sequential aggregate signature scheme with a designated verifier generated by the signer with a valid signature algorithm must pass the validation algorithm.
Proof.
The correctness of the scheme is obvious, because:
e(A,Y)=e(gr,Y)=e(Yr,g)=e(B,g)
And:
e(C,g)=e((gr)∑i=1n Xi)·(Yr)∑i=1n Xi Mi,g)=e(gr,g∑i=1n Xi)·e(Yr,g∑i=1n Xi Mi)=e(A,∏i=1n Xi)· e(B,∏i=1n Xi Mi)
□
Theorem 2.
If (t′,q′,∈′) is unforgeable under G, we say DVSSAgg scheme(t, qC, qs, n, ∈)is unforgeable, and t′=t+O(qC+nqs+n), q′=qs, ∈′=∈.
Proof.
Suppose that there exists an adversary A which succeeds with advantage∈. We built an algorithm B to play the forgeability game against the DVSSAgg signature scheme. Given the challenge public keyPk=( P,G,Gr,e,X,Y), the interaction between Algorithm B and adversary A is as follows:
1. Setup. B First, get Pk = ( P,G,Gr,e,X,Y) of the challenger, then set the public parameterPa=(P,G,Gr,e,g,Y), public keyPK*=X, initializes the list of keys and sets it to an empty set.
2. Certification Queries. The adversary A provides a key pair(PKi,SKi)and adaptability requires public key authentication. B checks the validity of the key pair and adds it to the key list.
3. Signature Queries. The adversary A provides the message chainM′¯=(M1,M2,……Mk), the sequential aggregate signatureσ′under the public keyPK’=(X1,X2,……,Xk)and a new message M and public keyPK*, then B execute the signature query as follows:
(1)
Check the validity of the signatureσ′, and check that each component ofPK’=(X1,X2,……,Xk)exists in the key list.
(2)
Ask the signature oracle to get theσof M, and the signed public keys isPK*.
(3)
For each messageMi, run DVSSAggSign algorithm to get the sequential aggregate signature for the designated verifierσabout the messageM′¯||M, and send it to A.
4. Output. The adversary A outputs the forged sequential aggregate signature for the specific verifierσ*=(A*,B*,C*)Dabout the message chainM*¯=(M1,M2,……Mn). The public key isPK*¯=(PK1,PK2,……,PKn). We assume thatPK1=PK*, the forgery process of algorithm B is as follows:
(1)
B first runs the sequential aggregate validation algorithm for the designated verifier, then verifies the validity of the signatureσ*and at the same time confirms that the challenge public keyPK*must be in thePK*¯andM1must not have been questioned by adversary A about the signature oracle.
(2)
InPK*¯,PKi=Xi, retrieve the private keySKi=xifrom the key listPKi, then compute:
A=A*, B=B*, C=(C* ·((A*)∑i=2n Xi ·(B*)∑i=2n Xi Mi)−1
(3)
Output theσ*=(A,B,C)DaboutM*=M1.
Furthermore, we can prove the correctness ofσ*ofM1which is forged by the algorithm B:
e(C,g)=e(C* ·((A*)∑i=2n Xi ·(B*)∑i=2n Xi Mi)−1,g)=e((A*)∑i=1n Xi (B*)∑i=1n Xi Mi ·(A*)−∑i=2n Xi ·(B*)−∑i=2n Xi Mi,g)=e((A*)X1 ·(B*)X1 M1,g)= e(A*,gX1)·e(B*,gx1 M1)= e(A,X)·e(B,XM*)
□
6. Experiment
Our main concern was the energy consumption for message computation and transmission. In terms of communication, signcryption is a major contributor to the communication overhead. That is to say, the communication overhead is mainly related to the size of the signed message. For a typical WBAN, it is sufficient to be 2 bytes for each user. In our evaluation, the bilinear e employs the Tate pairing. The elliptic curve is defined overFp. The order q ofG1andG2is a 20-byte prime. In order to deliver a level of security equivalent to that of 1024-bit RSA algorithm, p should be a 64-byte prime ifG2is a q-order subgroup of the multiplicative group of the finite fieldFP2. In the following analysis, we set p to be 30 bytes in length for the finite fieldFP3 . The overhead in terms of p is 5|p| + 4 for signcryption and 1 for decryption. Figure 5 illustrates the relationship between communication overhead and security levels. We note that the communication overhead increases as the security level increases.
Furthermore, we used the method proposed in [42] to evaluate energy consumption in DVSSA. As shown in [43], a Chipcon CC1000 radio used in Crossbow MICA2DOT motes consumes 28.6 μJ and 59.2 μJ to respectively receive and transmit one byte. For our DVSSA scheme, the total message size is 30 bytes, leading to a total energy consumption (on both transmitting and receiving messages) of (5|p| + 4) ∗ (28.6 + 59.2) μJ = (0.439|p| + 0.3512) mJ for one user. When there are W users, the total energy consumption on communications is (W ∗ (0.439|p| + 0.3512)) mJ. We report the comparative results between DVSSA and the baseline approaches proposed in [42] on energy consumption in Table 2. Note that to evaluate the energy consumptions of the baseline approaches that make use of broadcasting, we adopted the model in [42].
Figure 6 shows the energy consumption on the communication as a function of the number of users. As can be seen from the figure, DVSSA consumes much less energy than the Merkle hash tree-based scheme, certificate-based scheme, and ID-based scheme [42].
Lastly, to analyze the impact of the sequential aggregate signature scheme with a designated verifier, we simulated the historical blockchain of bitcoin to determine whether our scheme has real potential to save space. Figure 7 shows the cumulative blockchain size to date, and what the blockchain size would be if all transaction signatures were replaced with an ordered aggregation signature for each transaction with only one specified verifier. Note that this includes only the overhead saved by using the ordered aggregation signature of the specified verifier, not the overhead saved by public key aggregation.
7. Conclusions
In this paper, we propose a data storage mechanism based on blockchain with privacy protection in a wireless body area network. In one hand, we designed a sequential aggregate signature scheme with a designated verifier which ensures the user’s data can only be viewed by the administrator and compresses the size of the blockchain storage space. When in other hands, we store the data in the blockchain through the blockchain technology. Through the tamper resistance characteristic of the blockchain, the integrity of the user data is guaranteed. Through experiments, we found that using our signature can compress the storage space of the block chain and achieves the purpose of saving resources. The novelty of our proposed method is mainly reflected in the use of blockchain as the storage space. In addition, we use digital signatures to ensure the security of the data collected in the WBAN. Finally, we also use Cloud technology for the intermediate transition.
[Image omitted. See PDF.]
[Image omitted. See PDF.]
[Image omitted. See PDF.]
[Image omitted. See PDF.]
[Image omitted. See PDF.]
[Image omitted. See PDF.]
[Image omitted. See PDF.]
Security Threats: | Security Requirements | Possible Solutions |
---|---|---|
Unverified or unauthorized access | Verified or authorized access | Random key distribution
Public key encryption |
Information leakage | Confidentiality | Link layer or network layer encryption
Access control |
Tampering with message | Integrity | Type a secure hash function
A digital signature |
Denial-of-service attack (DoS) | Usability | Intrusion detection
Redundant routing |
Node capture, damaged nodes | The resilience of the damaged node | Consistency checking and node undo
tamper-proof |
Routing attacks | Secure Routing | Security routing protocol |
Intrusions and advanced security attacks | Security group management,
intrusion detection | Secure group communication,
intrusion detection |
The Schemes | Total Size | Energy Consumption (mJ) |
---|---|---|
DVSSA scheme | P = 30 bytes | 13.52 W |
Certificate-based scheme | N = 512 | 146.99 W |
Merkle hash tree scheme | N = 512 | 144.56 W |
ID-based scheme | N = 512 | 111.02 W |
Author Contributions
Conceptualization, Y.L. and F.Z.; Methodology, Y.L. and Y.R.; Software, Y.L.; Validation, Y.L., Y.R. and F.Z.; Formal Analysis, Y.L.; Investigation, Y.L.; Resources, Y.R. and J.W.; Data Curation, Y.L.; Writing-Original Draft Preparation, Y.L.; Review & Editing, Y.R., J.W. and H.-J.K.; Funding Acquisition, Y.R., J.W. and H.-J.K.
Funding
This work was supported by the NSFC [61772280, 61772454, 61811530332, 61811540410], and the PAPD fund from NUIST.
Conflicts of Interest
The authors declare no conflict of interest.
1. Arvind, D.K.; Bates, A. The speckled golfer. In Proceedings of the BodyNets 2008, Tempe, AZ, USA, 13–15 March 2008.
2. Baker, C.R.; Armijo, K.; Belka, S.; Benhabib, M.; Bhargava, V. Wireless sensor networks for home healthcare. In Proceedings of the International Conference on Advanced Information Networking and Applications Workshops, Niagara Falls, ON, Canada, 21–23 March 2007; pp. 832–837.
3. Barth, A.; Wilson, S.; Hanson, M.; Powell, H.; Unluer, D.; Lach, J. Body-coupled communication for body sensor networks. In Proceedings of the 3rd International Conference on Body Area Networks, Tempe, AZ, USA, 13–15 March 2008.
4. Wang, J.; Cao, J.Y.; Ji, S.; Park, J.H. Energy efficient cluster-based dynamic routes adjustment approach for wireless sensor networks with mobile sinks. J. Supercomput. 2017, 73, 3277–3329.
5. Fleury, A.; Vacher, M.; Noury, N. SVM based multimodal classification of activities of daily living in health smart homes: Sensors, algorithms and first experimental results. IEEE Trans. Inf. Technol. Biomed. 2008, 14, 274–283.
6. Delgado, O.; Fuster, A.; Sierra, J.M. A lightweight authentication scheme for wireless sensor networks. Ad Hoc Netw. 2011, 9, 727–735.
7. Wang, J.; Gao, Y.; Liu, W.; Arun, K.S.; Kim, H.Y. An improved routing schema with special clustering using PSO algorithm for heterogeneous wireless sensor network. Sensors 2019, 19, 671.
8. Wang, J.; Gao, Y.; Liu, W.; Wu, W.B.; Lim, S.J. An asynchronous clustering and mobile data gathering schema based on timer mechanism in wireless sensor networks. Comput. Mater. Contin. 2019, 58, 711–725.
9. Li, M.; Yu, S.; Guttman, J.; Lou, W.; Ren, K. Secure ad-hoc trust initialization and key management in wireless body area networks. ACM Trans. Sens. Netw. 2013, 9, 18.
10. Al Ameen, M.; Liu, J.; Kwak, K. Security and privacy issues in wireless sensor networks for healthcare applications. J. Med. Syst. 2012, 36, 93–101.
11. Yin, C.Y.; Xi, J.W.; Sun, R.X.; Wang, J. Location privacy protection based on differential privacy strategy for big data in industrial internet of things. IEEE Trans. Ind. Inform. 2018, 14, 3628–3636.
12. Wang, D.; Cheng, H.B.; He, D.B.; Wang, P. On the challenges in designing identity-based privacy-preserving authentication schemes for mobile devices. IEEE Syst. J. 2018, 12, 916–925.
13. He, D.B.; Neeraj, K.; Muhammad, K.; Wang, L.N.; Shen, J. Efficient privacy-aware authentication scheme for mobile cloud computing services. IEEE Syst. J. 2018, 12, 1621–1631.
14. Li, X.; Liu, S.P.; Wu, F.; Saru, K.; Joel, J.P. Privacy preserving data aggregation scheme for mobile edge computing assisted IoT applications. IEEE Internet Things J. 2018.
15. Hu, C.; Zhang, N.; Li, H. Body area network security: A fuzzy attribute-based signcryption scheme. IEEE J. Sel. Areas Commun. 2013, 31, 37–46.
16. Kumar, A.; Fischer, C.; Tople, S. A traceability analysis of Monero’s blockchain. In Proceedings of the International Conference on European Symposium on Research in Computer Security, Oslo, Norway, 11–15 September 2017; Springer: Berlin, Germany, 2017; pp. 153–173.
17. Wang, J.; Cao, J.Y.; Sherratt, S.D.; Park, J.H. An improved ant colony optimization-based approach with mobile sink for wireless sensor networks. J. Supercomput. 2018, 74, 6633–6645.
18. Moser, M.; Soska, K.; Heilman, E. An empirical analysis of traceability in the Monero blockchain. In Proceedings of the 18th International Conference on Privacy Enhancing Technologies, Barcelona, Spain, 24–27 July 2018; Springer: Berlin, Germany, 2018; pp. 143–163.
19. Nakamoto, S. Bitcoin: A Peer-to-Peer Electronic Cash System. 2008. Available online: http://bitcoin.org/bitcoin.pdf (accessed on 25 May 2019).
20. Ren, Y.J.; Liu, Y.P.; Ji, S.; Arun, K.; Wang, J. Incentive mechanism of data storage based on blockchain for wireless sensor networks. Mob. Inf. Syst. 2018, 2018, 6874158.
21. Ren, Y.J.; Leng, Y.; Cheng, Y.P.; Wang, J. Secure data storage based on blockchain and coding in edge computing. Math. Biosci. Eng. 2019, 16, 1874–1892.
22. Wang, J.; Ju, C.W.; Gao, Y.; Arun, K.S.; Kim, G.J. A PSO based energy efficient coverage control algorithm for wireless sensor networks. Comput. Mater. Contin. 2018, 56, 433–446.
23. Polastre, J.; Szewczyk, R.; Culler, D. Telos: Enabling ultra-low power wireless research. In Proceedings of the Information Processing in Sensor Networks (IPSN 2005), Los Angeles, CA, USA, 24–27 April 2005; pp. 364–369.
24. Yu, J.; Tao, D.C.; Wang, M.; Rui, Y. Learning to rank using user clicks and visual features for image retrieval. IEEE Trans. Cybern. 2015, 45, 767–779.
25. Yong, S.; Baldus, H.; Espina, J. The simulation method of the galvanic coupling intrabody communication with different signal transmission paths. IEEE Trans. Instrum. Meas. 2011, 60, 1257–1266.
26. Falck, T.; Baldus, H.; Espina, J. Plug’n play simplicity for wireless medical body sensors. Mob. Netw. Appl. 2007, 12, 143–153.
27. Wang, J.; Gao, Y.; Yin, X.; Li, F.; Kim, H.Y. An enhanced PEGASIS algorithm with mobile sink support for wireless sensor networks. Wirel. Commun. Mob. Comput. 2018, 2018, 9472075.
28. Yin, Y.Y.; Song, A.H.; Gao, M.; Xu, Y.S.; Wang, S.P. QoS prediction for web service recommendation with network location-aware neighbor selection. Int. J. Softw. Eng. Knowl. Eng. 2016, 26, 611–632.
29. Yu, J.; Yang, X.K.; Gao, F.; Tao, D.C. Deep multimodal distance metric learning using click constraints for image ranking. IEEE Trans. Cybern. 2017, 47, 4014–4024.
30. Jia, G.Y.; Han, G.J.; Jiang, J.F.; Rodrigues, J.P.C. PARS: A scheduling of periodically active rank to optimize power efficiency for main memory. J. Netw. Comput. Appl. 2015, 58, 327–336.
31. Liang, X.; Li, X.; Shen, Q.; Lu, R.; Lin, X.; Shen, X.; Zhuang, W. Exploiting prediction to enable secure and reliable routing in wireless body area networks. In Proceedings of the IEEE INFOCOM, Orlando, FL, USA, 25–30 March 2012; pp. 388–396.
32. Tu, Y.; Lin, Y.; Wang, J.; Kim, J.U. Semi-supervised learning with generative adversarial networks on digital signal modulation classification. Comput. Mater. Contin. 2018, 55, 243–254.
33. Zeng, D.J.; Dai, Y.; Li, F.; Sherratt, R.S.; Wang, J. Adversarial learning for distant supervised relation extraction. Comput. Mater. Contin. 2018, 55, 121–136.
34. Kim, E.; Park, S.; Cha, J. Improved performance of UWB system for wireless body area networks. IEEE Trans. Consum. Electron. 2010, 56, 1373–1379.
35. Yin, Y.Y.; Chen, L.; Xu, Y.S.; Wan, J.; Zhang, H.; Mai, Z.D. QoS prediction for service recommendation with deep feature learning in edge computing environment. Mob. Netw. Appl. 2019.
36. Yin, Y.Y.; Chen, L.; Xu, Y.S.; Wan, J. Location-aware service recommendation with enhanced probabilistic matrix factorization. IEEE Access 2018, 6, 62815–62825.
37. Zhang, J.L.; Wan, J.; Li, F.F.; Mao, J.; Zhuang, L. Efficient sparse matrix-vector multiplication using cache oblivious extension quadtree storage format. Future Gener. Comput. Syst. 2016, 54, 490–500.
38. Gao, Y.; Wang, J.; Wu, W.B.; Sangaiah, A.K.; Lim, S.-J. A hybrid method for mobile agent moving trajectory scheduling using ACO and PSO in WSNs. Sensors 2019, 19, 3.
39. Zhang, Y.; Dolmans, G. Priority-guaranteed MAC protocol for emerging wireless body area networks. Ann. Telecommun. 2010, 66, 229–241.
40. Cohn, J.M.; Finn, P.G.; Nair, S.P.; Panikkar, S.B.; Pureswaran, V.S. Autonomous Decentralized Peer-to-peer Telemetry. U.S. Patent Application No. 20170310747A1, 26 October 2017.
41. Feng, Q.; He, D.B.; Zeadally, S.K.; Muhammad, K.K. A survey on privacy protection in blockchain system. J. Netw. Comput. Appl. 2019, 126, 45–58.
42. Ren, K.; Lou, W.; Zeng, K.; Moran, P.J. On broadcast authentication in wireless sensor networks. IEEE Trans. Wirel. Commun. 2007, 6, 4136–4144.
43. Wander, A.; Gura, N.; Eberle, H.; Gupta, V.; Shantz, S. Energy analysis of public-key cryptography for wireless sensor networks. In Proceedings of the PerCom, Kauai Island, HI, USA, 8–12 March 2005.
1School of Computer and Software, Nanjing University of Information Science & Technology, Nanjing 210044, China
2Jiangsu Collaborative Innovation Center of Atmospheric Environment and Equipment Technology (CICAEET), Nanjing University of Information Science & Technology, Nanjing 210044, China
3School of Computer & Communication Engineering, Changsha University of Science & Technology, Changsha 410004, China
4School of Information Science and Engineering, Fujian University of Technology, Fujian 350118, China
5Business Administration Research Institute, Sungshin Women’s University, Seoul 02844, Korea
*Author to whom correspondence should be addressed.
You have requested "on-the-fly" machine translation of selected content from our databases. This functionality is provided solely for your convenience and is in no way intended to replace human translation. Show full disclaimer
Neither ProQuest nor its licensors make any representations or warranties with respect to the translations. The translations are automatically generated "AS IS" and "AS AVAILABLE" and are not retained in our systems. PROQUEST AND ITS LICENSORS SPECIFICALLY DISCLAIM ANY AND ALL EXPRESS OR IMPLIED WARRANTIES, INCLUDING WITHOUT LIMITATION, ANY WARRANTIES FOR AVAILABILITY, ACCURACY, TIMELINESS, COMPLETENESS, NON-INFRINGMENT, MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE. Your use of the translations is subject to all use restrictions contained in your Electronic Products License Agreement and by using the translation functionality you agree to forgo any and all claims against ProQuest or its licensors for your use of the translation functionality and any output derived there from. Hide full disclaimer
© 2019. This work is licensed under https://creativecommons.org/licenses/by/4.0/ (the “License”). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License.
Abstract
Wireless body area networks (WBANs) are expected to play a vital role in the field of patient-health monitoring shortly. They provide a convenient way to collect patient data, but they also bring serious problems which are mainly reflected in the safe storage of the collected data. The privacy and security of data storage in WBAN devices cannot meet the needs of WBAN users. Therefore, this paper adopts blockchain technology to store data, which improves the security of the collected data. Moreover, a storage model based on blockchain in WBAN is proposed in our solution. However, blockchain storage brings new problems, for example, that the storage space of blockchain is small, and the stored content is open to unauthorized attackers. To solve the problems above, this paper proposed a sequential aggregate signature scheme with a designated verifier (DVSSA) to ensure that the user’s data can only be viewed by the designated person and to protect the privacy of the users of WBAN. In addition, the new signature scheme can also compress the size of the blockchain storage space.
You have requested "on-the-fly" machine translation of selected content from our databases. This functionality is provided solely for your convenience and is in no way intended to replace human translation. Show full disclaimer
Neither ProQuest nor its licensors make any representations or warranties with respect to the translations. The translations are automatically generated "AS IS" and "AS AVAILABLE" and are not retained in our systems. PROQUEST AND ITS LICENSORS SPECIFICALLY DISCLAIM ANY AND ALL EXPRESS OR IMPLIED WARRANTIES, INCLUDING WITHOUT LIMITATION, ANY WARRANTIES FOR AVAILABILITY, ACCURACY, TIMELINESS, COMPLETENESS, NON-INFRINGMENT, MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE. Your use of the translations is subject to all use restrictions contained in your Electronic Products License Agreement and by using the translation functionality you agree to forgo any and all claims against ProQuest or its licensors for your use of the translation functionality and any output derived there from. Hide full disclaimer