A Hybrid Cryptography and Authentication based Security Model for Clustered WBAN


Aarti Sangwan,Partha Pratim Bhattacharya,




Body Area Network,Clustered,Secure, RSA,Hashcode,


The communication in a clustered WBAN is performed at different levels through multiple nodes and controllers. This kind of multi-level involvement of nodes opens the nodes for security leaks. In this paper, a dual level security is integrated using hybrid cryptography method. A hybrid authentication and cryptography based method is defined for identity and information level security. The hybridization of security for clustered WBAN is achieved using RSA and hash key encoder. The RSA is here applied for node to controller for identification and verification whereas SHA is applied for reliable symmetric message encoding for node-to-controller and controller-to-controller communication. The proposed security model is applied in an integrated form to the clustered WBAN network to improve communication reliability. The proposed secure communication model has improved the performance of the network. The simulation is applied on clustered WBANs with different number of WBANs. The comparative simulation results show that the proposed model has effectively improved the packet communication and network life.


I.Ali, A. and Khan, F. A. (2015a). Key Agreement Schemes in Wireless Body Area Networks: Taxonomy and State-of-the-Art. Journal of Medical Systems.

II.Ali, A. and Khan, F. A. (2013b). Energy-efficient cluster-based security mechanism for intra-WBAN and inter-WBAN communications for healthcare applications. EURASIP Journal on Wireless Communications and Networking, 2013:216.

III.Al-Janabi, S., Al-Shourbaji, I., Shojafar, M. and Shamshirband, S. (2017). Survey of main challenges (security and privacy) in wireless body area networks for healthcare applications. Egyptian Informatics Journal, 18(2), 113-122.

IV.Alsadhan,A.,andKhan, N. (2013). An LBP Based Key Management for Secure Wireless Body Area Network (WBAN), IEEE 14th ACIS International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing, Honolulu, HI, 2013,pp. 85-88.

V.Alshamsi, A. Z., and Barka, E. S. (2017). Implementation of energy efficient/lightweight encryption algorithm for wireless body area networks,” In Proc IEEE International Conference on Informatics, Health & Technology (ICIHT), Riyadh, 2017, pp.1-7.

VI.Challa, S., Das, A. K., Odelu, V., Kumar, N., Kumari, S., Khan, M. K., and Vasilakos, A. V. (2017). An efficient ECC-based provably secure three-factor user authentication and key agreement protocol for wireless healthcare sensor networks. Computers & Electrical Engineering.

VII.Drira, W., Renault, E. and Zeghlache, D. (2012). A Hybrid Authentication and Key Establishment Scheme for WBAN, IEEE 11th International Conference on Trust, Security and Privacy in Computing and Communications, Liverpool, 2012, pp. 78-83.

VIII.Fan, C., Wang, J., Huang, J., Tseng, Y., Juang, W., and Kikuchi, H. (2016). Flexible Authentication Protocol with Key Reconstruction in WBAN Environments, 6th International Conference on IT Convergence and Security (ICITCS), Prague, 2016, pp. 1-5.

IX.He, D., Zeadally, S., Kumar, N., and Lee, J. (2017). Anonymous Authentication for Wireless Body Area Networks With Provable Security. IEEE Systems Journal, 11(4), 2590-2601.

X.Khernane, N., Potop-Butucaru, M., and Chaudet, C. (2016). BANZKP: A Secure Authentication Scheme Using Zero Knowledge Proof for WBANs, IEEE 13th International Conference on Mobile Ad Hoc and Sensor Systems (MASS), Brasilia, 2016, pp. 307-315.

XI.Kompara, M., and Hölbl, M. (2018). Survey on security in intra-body area network communication. Ad Hoc Networks, 70, 23-43.

XII.Latre, B., Braem, B., Moerman, I., Blondia, C., and Demeester, P. (2011). A survey on wireless body area networks. Wireless Networks, 17(1), 1-18.

XIII.Li, X., Ibrahim, M. H., Kumari, S., Sangaiah, A. K., Gupta, V., and Choo, K. R.(2017). Anonymous mutual authentication and key agreement scheme for wearable sensors in wireless body area networks. Computer Networks, vol. 129, Part 2, 429-443.

XIV.Liu, J., Li, Q., Yan, R., and Sun, R. (2015). Efficient authenticated key exchange protocols for wireless body area networks. EURASIP Journal on Wireless Communications and Networking, 2015:188.

XV.Li, X., Peng, J., Kumari, S., Wu, F., Karuppiah, M., and Choo, K. R. (2017). An enhanced 1-round authentication protocol for wireless body area networks with user anonymity. Computers & Electrical Engineering, 61, 238-249.

XVI.Li, Z., and Wang, H. (2016). A key agreement method for wireless body area networks. IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS), San Francisco, CA, 2016, pp. 690-695.

XVII.Li, Z., Wang, H., Daneshmand, M., and Fang, H. (2017). Secure and efficient key generation and agreement methods for wireless body area networks, IEEE International Conference on Communications (ICC), Paris, 2017, pp. 1-6.

XVIII.Li, Z., Wang, H., and Fang, H. (2017). Group-based Cooperation on Symmetric Key Generation for Wireless Body Area Networks. IEEE Internet of Things Journal, 4(6), 1955-1963.

XIX.Masdari, M., Ahmadzadeh, S., and Bidaki, M. (2017). Key management in wireless Body Area Network: Challenges and issues. Journal of Network and Computer Applications, 91, 36-51.

XX.Mehmood, A., Umar, M. M., and Song, H. (2017). ICMDS: Secure inter-cluster multiple-key distribution scheme for wireless sensor networks. Ad Hoc Networks, 55, 97-106.

XXI.Mukhtar, T. and Chaudhary, S. (2016). Energy efficient cluster formation and secure data outsourcing using TEOSCC and ECDH-IBT technique in WBAN. International Conference on Wireless Communications, Signal Processing and Networking (WiSPNET), Chennai, 2016, pp. 596-602.

XXII.Prameela, S., and Ponmuthuramalingam, P. (2016). A robust energy efficient and secure data dissemination protocol for wireless body area networks, International Conference on Advances in Computer Applications (ICACA), Coimbatore, 2016, pp. 131-134.

XXIII.Raja, K. S. and Kiruthika, U. (2015). An Energy Efficient Method for Secure and Reliable Data Transmission in Wireless Body Area Networks Using RelAODV. Wireless Personal Communications, 83(4), 2975–2997.

XXIV.Salehi, S. A., Razzaque, M. A., Tomeo-Reyes, I., Hussain, N., and Kaviani, V. (2016). Efficient high-rate key management technique for wireless body area networks, 22nd Asia-Pacific Conference on Communications (APCC), Yogyakarta, 2016, pp. 529-534.

XXV.Shen, J., Chang, S., Shen, J., Liu, Q., and Sun, X. (2018). A lightweight multi-layer authentication protocol for wireless body area networks. Future Generation Computer Systems, 78(3), 956-963.

XXVI.Ullah, S., Higgins, H., Braem, B., Latre, B., Blondia, C., Moerman, I., Saleem, S., and Rahman, Z. (2012). A Comprehensive Survey of Wireless Body Area Networks. Journal of Medical Systems, 36(3), 1065-1094.

XXVII.Wei, F., Vijayakumar, P., Shen, J., Zhang, R., and Li, L. (2018). A provably secure password-based anonymous authentication scheme for wireless body area networks. Computers & Electrical Engineering, 65, 322-331.

Autho(s): Aarti Sangwan, Partha Pratim Bhattacharya View Download