DOI QR코드

DOI QR Code

TF-CPABE: An efficient and secure data communication with policy updating in wireless body area networks

  • Received : 2018.06.17
  • Accepted : 2019.03.12
  • Published : 2019.08.02

Abstract

The major challenge in wireless body area networks (WBAN) is setting up a protected communication between data consumers and a body area network controller while meeting the security and privacy requirements. This paper proposes efficient and secure data communication in WBANs using a Twofish symmetric algorithm and ciphertext-policy attribute-based encryption with constant size ciphertext; in addition, the proposed scheme incorporates policy updating to update access policies. To the best of the author's knowledge, policy updating in WBAN has not been studied in earlier works. The proposed scheme is evaluated in terms of message size, energy consumption, and computation cost, and the results are compared with those of existing schemes. The result shows that the proposed method can achieve higher efficiency than conventional methods.

Keywords

References

  1. C. Hu et al., Secure and efficient data communication protocol for wireless body area networks, IEEE Trans. Multi‐Scale Comput. Syst., 2 (2016), 94-107. https://doi.org/10.1109/TMSCS.2016.2525997
  2. S. Duraisamy and P. G. Kumar, Secured remote health monitoring system, Healthcare Technol. Lett., 4 (2017), 228-232. https://doi.org/10.1049/htl.2017.0033
  3. H. Qinlong, L. Wang, and Y. Yang, DECENT: secure and fine‐grained data access control with policy updating for constrained IoT devices, World Wide Web, 21 (2018), 151-167. https://doi.org/10.1007/s11280-017-0462-0
  4. S. Ruj and A. Nayak, A decentralized security framework for data aggregation and access control in smart grids, IEEE Trans. Smart Grid, 4 (2013), 196-205. https://doi.org/10.1109/TSG.2012.2224389
  5. H. Li et al., Enabling fine‐grained access control with efficient attribute revocation and policy updating in smart grid, KSIITIIS, 9, (2015), 1404-1423.
  6. B. Chandrasekaran and R. Balakrishnan, Efficient pairing computation for attribute based encryption using MBNR for Big Data in cloud, in Appl. Theoretical Comput. Comm. Technol. (iCATccT), Int. Conf., Bangalore, India, July 2016, pp. 243-247.
  7. B. Schneier et al., The Twofish encryption algorithm: a 128‐bit block cipher, John Wiley & Sons Inc, Vol. 1999.
  8. Y. Zhang et al., Computationally efficient ciphertext‐policy attribute‐based encryption with constant‐size ciphertexts, Int. Conf. Provable Security, Hong Kong, China, Oct. 9-10, 2014, pp. 259-273.