Switch Pattern Encryption Based WBAN Security in an IoT Environment

Data security is a major challenge in E health monitoring research. Nowadays Wireless body area networks faces various security threats. Authentication is very much required in health care domain, as an open IOT environment is accessed by all. In this article, we have proposed efficient Light weight embedded cryptographic architecture using switch pattern encryption for WBAN security. The security is ensured to the wearable sensors in such a way that any external unknown entity cannot access patient’s physiological data and deceive the medical professionals. The main aim of this work is to improvise the security and privacy of E healthcare monitoring systems when compared with the existing findings. Proposed algorithm overcomes DoS attacks in the BAN environment and reduces the runtime for the switch pattern encryption algorithm. Signcryption can be included along with switch pattern encryption as a future work in order to achieve confidentiality and authentication in a single step.


Introduction
Nowadays people who are unknown to each other communicate in an open insecure environment.To ensure privacy we always encrypt the message with a key to produce a cipher text, and only the authenticated person can decrypt the cipher text.This ensures that the data transmitted in the insecure channel is not tampered.By receiving the enciphered text, receiver uses the decryption key to retrieve the original text.There is a need to secure patient medical data in the IoT environment.In wireless Body area networks, nodes are very closely placed on the cloth or sometimes implanted in the skin to improve ant to monitor the health of the patient.Use of WBAN's overcomes the condition that the patient has to stay in the hospital.In order to protect the sensitive medical information.We construct a switch pattern encryption scheme that provides a greater efficiency when compared to previous methodologies.By doing this, information transmitted from the BAN is totally secured from unauthorized parties.Proposed method is basically based on linear algebra and number theory.Switch pattern encryption h prevents denial of service attacks.A Chipcon CC1000 radio is used, which consumes 28.6 μJ and 59.2 μJ respectively to receive and transmit one byte.Attribute-based encryption paradigm has been proposed work for the secure WBAN domain which also reduces the cost of certificate verification.

ivacy we alwa
s encrypt the message with a key to produce a cipher text, and only the authenticated person can decrypt the cipher text.This ensures that the data transmitted in the insecure channel is not tampered.By receiving the enciphered text, receiver uses the decryption key to retrieve the original text.There is a need to secure patient medical data in the IoT environment.In wireless Body area networks, nodes are very closely placed on the cloth or sometimes implanted in the skin to improve ant to monitor the health of the patient.Use of WBAN's overcomes the condition that the patient has to stay in the hospital.In order to protect the sensitive medical information.We construct a switch pattern encryption scheme that provides a greater efficiency when compared to previous methodologies.By doing this, information transmitted from the BAN is totally secured from unauthorized parties.Proposed method is basically based on linear algebra and number theory.Switch pattern encryption h prevents denial of service attacks.A Chipcon CC1000 radio is used, which consumes 28.6 μJ and 59.2 μJ respectively to receive and transmit one byte.Attribute-based encryption paradigm has been proposed work for the secure WBAN domain which also reduces the cost of certificate verification.


Related Work

The Fuzzy attribute based signcryption proposed in 1 , provides both security and authentication for BAN's.Game t

Related Work
The Fuzzy attribute based signcryption proposed in 1 , provides both security and authentication for BAN's.Game theory is applied to address the power control problem.In a cooperate power control game, as long as each node in the WBANs follows the game rules, a equilibrium solution can be reached, which is optimal for all individuals.The inter-network interference mitigation for WBANs has been studied in this paper.Due to the fact that WBANs are carried by human bodies, the internetwork interference occurs when people are close to each other.Thus, the social interaction information will play an important role in inter-network interference mitigation.Zhang 2 considered both social interaction information and the movement of individuals when a power game is used to mitigate the inter-network interference.
eory is applied to address the power control problem.In a cooperate po

r control gam
, as long as each node in the WBANs follows the game rules, a equilibrium solution can be reached, which is optimal for all individuals.The inter-network interference mitigation for WBANs has been studied in this paper.Due to the fact that WBANs are carried by human bodies, the internetwork interference occurs when people are close to each other.Thus, the social interaction information will play an important role in inter-network interference mitigation.Zhang 2 considered both social interaction information and the movement of individuals when a power game is used to mitigate the inter-network interference.

The Gaussian Process (GP) framework is used as a principle performance inference parameter for the data obtained from wearable sensors in the noisy environment.The notion of GP as a distribution over funct The Gaussian Process (GP) framework is used as a principle performance inference parameter for the data obtained from wearable sensors in the noisy environment.The notion of GP as a distribution over functions, is well suited to the analysis of time series of patient physiological data, in which we perform inference over functions.The approach proposed in 3 , contrasts with conventional probabilistic approaches which define distributions over individual data points.
ons, is well suited to the analysis of time series of patient physiological data, in which we perform inference over functions.The approach proposed in 3 , contrasts with conventional probabilistic approaches which define distributions over individual data points.

Garth, et al. 4 proposed a security solution in biomedical sensor network to achieve link-layer encryption and data authentication.The data packet is encrypted with a group key common to the sensor nodes and Garth, et al. 4 proposed a security solution in biomedical sensor network to achieve link-layer encryption and data authentication.The data packet is encrypted with a group key common to the sensor nodes and computes a message authentication code (MAC) for the entire packet including the header.This group key is shared networkwide and manually programmed into the nodes prior to deployment.This network-wide key presents a single point of vulnerability.If a node is compromised and the keying material is revealed, the entire network can be compromised.
computes a message authentication code (MAC) for the entire packet including the header.This group key is shared networkwide and manually programmed into the nodes prior to deployment.This network-wide key presents a single point of vulnerability.If a node is compromised and the keying material is revealed, the entire network can be compromised.

Raghav V, et al. presented a security suite for WBANs comprised of IAMKeys, and KEMESIS, a key management scheme for security 5 .

Detailed description of intrusion detection system based on local reputation sch Raghav V, et al. presented a security suite for WBANs comprised of IAMKeys, and KEMESIS, a key management scheme for security 5 .
Detailed description of intrusion detection system based on local reputation scheme is presented in 6 .The System also includes concept of fading, drawback is, it allows the nodes which are previously considered as malicious to become a part of the network again.The biomedical data, collected by wearable sensors will be transmitted using cell phones towards the corresponding health monitoring centers via various wireless networks.The Elliptic Curve Cryptography (ECC) Algorithm is used for encryption.Subsequently, Ren 9 enables the opportunity for innovative use of clinical monitoring devices to exchange wirelessly patient health information.Healthcare policies have various blockers that state how data should be protected.
me is presented in 6 .The System also includes concept of fading, drawback is, it allows the nodes which are previously considered as malicious to become a part of the network again.The biomedical data, collected by wearable sensors will be transmitted using cell phones towards the corresponding health monitoring centers via various wireless networks.The Elliptic Curve Cryptography (ECC) Algorithm is used for encryption.Subsequently, Ren 9 enables the opportunity for innovative use of clinical monitoring devices to exchange wirelessly patient health information.Healthcare policies have various blockers that state how data should be protected.

Al Ameen, et al. discussed the security and privacy issues of wireless sensor networks within healthcare perspective and the possible measures are suggested 10 .The issues of privacy and security continues to be a major concern.With data transmission, the data leave the area of control by a specific user, which may have Al Ameen, et al. discussed the security and privacy issues of wireless sensor networks within healthcare perspective and the possible measures are suggested 10 .The issues of privacy and security continues to be a major concern.With data transmission, the data leave the area of control by a specific user, which may have implications on privacy and security.The light weight identity based cryptography is employed by Wang 11 in which a person's identity is used to perform cryptography.

plications on
rivacy and security.The light weight identity based cryptography is employed by Wang 11 in which a person's identity is used to perform cryptography.


Proposed Work

The proposed approach offers data confidentiality and integrity in WBANs.WBAN acts as an interface network between IoT environment and the wearable sensors placed on the human body that measures temperature, heart rate etc.It forwards the patient data to the hospital which has to avoid any misinterpretation of information.The processing and analysis of patient signals is performed using discrete me

Proposed Work
The proposed approach offers data confidentiality and integrity in WBANs.WBAN acts as an interface network between IoT environment and the wearable sensors placed on the human body that measures temperature, heart rate etc.It forwards the patient data to the hospital which has to avoid any misinterpretation of information.The processing and analysis of patient signals is performed using discrete meyer wavelet transform.Security parameters such as confidentiality, authenticity and collusion resistance ensures authenticated transmission of health information.

r wavelet transform.Securi
y parameters such as confidentiality, authenticity and collusion resistance ensures authenticated transmission of health information.


Switch Pattern Encryption

Symmetric key primitives is used to perform pattern matching on encryp

Switch Pattern Encryption
Symmetric key primitives is used to perform pattern matching on encrypted data, without making the data vulnerable to the adversaries.The key for pattern based encryption is any matrix.For eg: or pattern based encryption is any matrix.For eg:


→

In the above case, we have taken the matrix size to be 3 × 3, however it can be any size (as long as it is square for pattern matrix).To encipher, we need to break the message into chunks of 3. We now take the first 3 characters from our plaintext, ATT

→
In the above case, we have taken the matrix size to be 3 × 3, however it can be any size (as long as it is square for pattern matrix).To encipher, we need to break the message into chunks of 3. We now take the first 3 characters from our plaintext, ATT and create a vector that corresponds to the letters.(Replace A with 0, B with 1 ... Z with 25 etc.) to get:

d create a vector that corre
ponds to the letters.(Replace A with 0, B with 1 ... Z with 25 etc.) to get:


[0 19 19] (this is [' A' 'T' 'T']).

A matrix multiplication process is performed: This is implemented for all 3 letter blocks in the plaintex

[0 19 19] (this is [' A' 'T' 'T']).
A matrix multiplication process is performed: This is implemented for all 3 letter blocks in the plaintext.The plaintext may have to be padded with some extra letters to make sure that there is a whole number of blocks.
.The plaintext may have to be padded with some extra letters to make sure that there is a whole number of blocks.

By doing this, information transmitted from the BAN is secured from unauthorized parties.It thus achieves authenticity and the dat By doing this, information transmitted from the BAN is secured from unauthorized parties.It thus achieves authenticity and the data is unaltered.This prevents denial of service attacks and the patient's information is not disclosed to anyone.
is unaltered.This prevents denial of service attacks and the patient's information is not disclosed to anyone.

The inbuilt internet access within the CC3200 chip avoids delay in transferring the signals.The data encrypted using discrete meyer wavelet is transmitted to the hospital.This preserves the privacy of the information.CC3200 especially designed for IoT is us The inbuilt internet access within the CC3200 chip avoids delay in transferring the signals.The data encrypted using discrete meyer wavelet is transmitted to the hospital.This preserves the privacy of the information.CC3200 especially designed for IoT is used which has a simple link Wi-Fi internet-on chip that has a reduced computation cost with an inbuilt Wifi.

which has a simple li
k Wi-Fi internet-on chip that has a reduced computation cost with an inbuilt Wifi.


Simulation Parameters

To simulate and analyze the patients signals the Discrete Meyer Wavelet transform (DWT), is used which is implemented in Matlab.This provides sufficient information both for analysis and synthesis of the original signal, with a significant reduction in the computation time.The DWT is considerably easier to implement when compared with Continous Wavelet Transform (CWT).It is a tool that separates data into different frequencies, components, and then studies each component with resolution matched to its scale.The frequency components are analyzed which consists of the important information hidden in

Simulation Parameters
To simulate and analyze the patients signals the Discrete Meyer Wavelet transform (DWT), is used which is implemented in Matlab.This provides sufficient information both for analysis and synthesis of the original signal, with a significant reduction in the computation time.The DWT is considerably easier to implement when compared with Continous Wavelet Transform (CWT).It is a tool that separates data into different frequencies, components, and then studies each component with resolution matched to its scale.The frequency components are analyzed which consists of the important information hidden inside it.The patient data can be diagnosed more easily when the frequency content is analyzed clearly.

de it.The patient data
an be diagnosed more easily when the frequency content is analyzed clearly.


Results and Discussion

The patient information is analyzed and encrypted using switch pattern encryption.The data rate of the encrypted information has been received at a faster rate and thereby reduces the delay considerably.The data along with the signals is transmitted and received at a data rate of 9600 bps.The encrypted signal using switch pa

Results and Discussion
The patient information is analyzed and encrypted using switch pattern encryption.The data rate of the encrypted information has been received at a faster rate and thereby reduces the delay considerably.The data along with the signals is transmitted and received at a data rate of 9600 bps.The encrypted signal using switch pattern encryption has been reproduced at the receiver which is free from password guessing attacks.
tern encryption has been reproduced at the receiver which is free from password guessing attacks.

As a r As a result, some of the problems like eaves dropping, data modifications are also reduced considerably.

ult, some of the problems
like eaves dropping, data modifications are also reduced considerably.


Graphical Interpretation

Comparison has been done for the delay parameter for DWT and CWT.The graph compares the performances of the applied algorithm in terms of run time (in seconds).The structure is analysed in the presence of DoS attacks (namely Gray hole attack).Due to the behavior of the malicious nodes in the body area network, high degree of packet drop is observed in this system.T

Graphical Interpretation
Comparison has been done for the delay parameter for DWT and CWT.The graph compares the performances of the applied algorithm in terms of run time (in seconds).The structure is analysed in the presence of DoS attacks (namely Gray hole attack).Due to the behavior of the malicious nodes in the body area network, high degree of packet drop is observed in this system.Thus, the delay is significantly decreased by using switch pattern encryption in the DWT mode .

s, the delay is significantly d
creased by using switch pattern encryption in the DWT mode .


R. Sujatha and M. Ramakrishnan

To counteract these DoS attacks in an IoT environment, Signcryption can also be used , thereby it introduces the data confidentiality and authenticity of the data pa

R. Sujatha and M. Ramakrishnan
To counteract these DoS attacks in an IoT environment, Signcryption can also be used , thereby it introduces the data confidentiality and authenticity of the data packet.By counteracting the malicious nodes, the delay in the network is significantly reduced.

et.By count
racting the malicious nodes, the delay in the network is significantly reduced.


Conclusion

The proposed switch pattern encryption based architecture enhances the security of body area network in an IoT environment .This scheme is realized in the presence of DoS attacks.In the future, this proposal may be extended to experiment by using signcryption along with switch pattern encryption to provide even stronger encryption techniques to completely avoid the adversaries who attack the network.The proposed work addresses the WBAN security of using switch Pattern Encryption in terms of Computational time, and Data delivery rate.There are many challenges that still

Conclusion
The proposed switch pattern encryption based architecture enhances the security of body area network in an IoT environment .This scheme is realized in the presence of DoS attacks.In the future, this proposal may be extended to experiment by using signcryption along with switch pattern encryption to provide even stronger encryption techniques to completely avoid the adversaries who attack the network.The proposed work addresses the WBAN security of using switch Pattern Encryption in terms of Computational time, and Data delivery rate.There are many challenges that still need to be addressed, especially based on signcryption and interoperability between BANs.

Figure 1 .
Figure 1.WBAN Architecture.Zhang, et al. examined possible attacks in BANs and presented key management schemes that are useful for BANs security.Biochannels are utilized to assist secure information transmission within a BAN 7 .

Figure 7 .
Figure 7. Data rate of the transmitted data.

Figure 8 .
Figure 8.Comparison of DWT and CWT based on Data rate.