Computer Science ›› 2018, Vol. 45 ›› Issue (5): 102-107.doi: 10.11896/j.issn.1002-137X.2018.05.018

Previous Articles     Next Articles

Data Security Mix Transmission Mechanism in Body Area Network

WANG Wei-xing   

  • Online:2018-05-15 Published:2018-07-25

Abstract: Wireless body area network,as a new type of network,is widely used in health care,emergency rescue and other fields.However,the data collected by wireless body area network are mostly related to user’s personal information.In the actual application of the deployment process,it is bound to face serious sensitive privacy data leakage or malicious tampering risks.In order to protect the privacy security of user data in the body area network environment,this paper proposed a data security mix transmission mechanism,which is a K-anonymous mix transmission algorithm based on single-loop model (AMT-ML).The main idea is to divide the communication nodes into several communication loop networks,and apply the K anonymous scheme to the perceptual layer and the transport layer of hierarchical model.In order to ensure that the user data in each layer are relatively safe,this paper used multiple K anonymous processing.The experimental results show that the privacy protection of AMT-ML is superior to K-anonymous mix transmission algorithm based on single-loop model (AMT-SL) algorithm,and the communication distance of the multi-loop mode in the two layer network is less than that of the single-loop mode.

Key words: Wireless body area network,Data security,Data transmission

[1] MAINANWAL V,GUPTA M,UPADHAYAY S K.A survey on wireless body area network:Security technology and its design methodology issue[C]∥International Conference on Innovations in Information,Embedded and Communication Systems.Coimbatore:IEEE Press,2015:1-5.
[2] GONG J B,WANG R,CUI L.Research Ddvances and Challenges of body Sensor network[J].Journal of Computer Research and Development,2010,7(5):737-753.(in Chinese) 宫继兵,王睿,崔莉.体域网BSN的研究进展及面临的挑战[J].计算机研究与发展,2010,7(5):737-753.
[3] LIU L,XUE X Q,LUO X L.Architecture and Challenges ofWireless Body Area Network[J].Computer Knowledge and Technology,2012,8(29):6918-6920.(in Chinese) 刘璐,薛秀芹,罗先露.无线体域网的体系结构及面临的挑战[J].电脑知识与技术,2012,8(29):6918-6920.
[4] ZHOU J,CAO Z,DONG X,et al.4S:A secure and privacy-preserving key management scheme for cloud-assisted wireless body area network in m-healthcare social networks[J].Information Sciences,2015,314(2):255-276.
[5] VENKATASUBRAMANIAN K K,BANERJEE A,GUPTA S K S.PSKA:usable and secure key agreement scheme for body area networks[J].Information Technology in Biomedicine,2010,14(1):60-68.
[6] LI X,IBRAHIM M H,KUMARI S,et al.Anonymous mutual authentication and key agreement scheme for wearable sensors in wireless body area networks[J].Computer Networks,2017,115(1):1-15.
[7] GALUBA W,PAPADIMITRATOS P,P OTURALSKI M,et al.Castor:scalable secure routing for ad hoc networks[C]∥Proceedings of IEEE INFOCOM.San Diego:IEEE Press,2010:1-9.
[8] DEFRAWY K E,TSUDIK G.Privacy-preserving location-based on-demand routing in MANETs[J].Selected Areas in Communications,2011,29(10):1926-1934.
[9] JARADAT T,BENHADDOU D,BALAKRISHNAN M,et al.Energy efficient cross-layer routing protocol in Wireless Sensor Networks based on fuzzy logic[C]∥Wireless Communications and Mobile Computing Conference.Sardinia:IEEE Press,2013:177-182.
[10] WANG H,YANG G,XU J,et al.A reliable data transmission protocol based on multipath routing for wireless sensor networks[J].Sensor Letters,2016,14(9):923-927.
[11] QUANG P T A,KIM D S.Clustering algorithm of hierarchical structures in large-scale wireless sensor and actuator networks[J].Journal of Communications & Networks,2015,17(5):473-481.
[12] REN J,ZHANG Y,ZHANG K,et al.Adaptive and channel-aware detection of selective forwarding attacks in wireless sensor networks[J].IEEE Transactions on Wireless Communications,2016,15(5):3718-3731.
[13] SHARMILEE K M,MUKESH R,DAMODARAM A,et al.Secure WBAN using rule-based IDS with biometrics and MAC authentication[C]∥International Conference on E-Health Networking.Singapore:IEEE Press,2008:102-107.
[14] SHAO M,YANG Y,ZHU S C,et al.Towards statisticallystrong source anonymity for sensor networks[C]∥The 27th Conference on Computer Communications(INFOCOM 2008).Phoenix:IEEE Press,2008:51-55.
[15] CHEN S L.A Power-Efficient Adaptive Fuzzy Resolution Control System for Wireless Body Sensor Networks[J].Access IEEE,2015,3:743-751.

No related articles found!
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!