Secure Quantum Key Distribution Encryption method for Efficient Data Communication in Wireless Body Area Sensor Net-works

  • Authors

    • Y Sai Suguna
    • B Kavya Reddy
    • V Keerthi Durga
    • A Roshini
    2018-05-31
    https://doi.org/10.14419/ijet.v7i2.32.15706
  • Wireless Body Area Networks (WBAN), Message Authentication Code (MAC), Quantum key distribution, Base Server (BS), BAN Nodes (BNs).
  • Wireless sensor networks has found its advancement in sensing the physiological parameters of human body through WBAN. Such nodes are either implanted or surface mounted on the human body in a particular position. The main purpose of these networks is to send the data generated by the wearable device outside the WLAN or the Internet. The BAN will continuously monitor the psychological changes like blood volume pressure (BVP), Brain signals etc. Uncertainty in the normal values will result in transmit all the information to the respective recipient to take required treatment. If an emergency is detected, the doctor instantly updates the patient’s health by sending a specific message. There is limited confidentiality, so the intruders will gather sensitive data. Public key cryptography can be used to create an unprotected communication channel. It also provides a convenient way to implement keys. This paper is focusing on a unique key generation technique called Quantum key distribution, which is used to create symmetric key method by using quantum properties of optics to transfer information from one Client to another in One-Time Pad manner. The special feature of the technique is to guarantee that the key cannot be intercepted during transmission without alerting the users to provide high authentication for received data.

     

     

     
  • References

    1. [1] William Stallings, “Cryptography and network security design and principlesâ€, Pearson Education, 2008.

      [2] R.Lalu Naik, Dr.P.Chenna Reddy, U.Sathish Kumar, Dr.Y.V.Narayana, “Provely Secure Quantum Key distribution protocol in 802.11 Wireless Networksâ€, International Journal of Computer Science and Information Technologies, Vol. 2 (6), PP.2811-2815, 2011.

      [3] Hybrid unified-slot access protocol for wireless body area networks. Int. J. Wireless Inform. Networks, 17: 150-161. DOI: 10.1007/s10776- 010- 0120-2 Mohanavalli, S.S. and S. Anand, 2011.

      [4] Preventing impersonation attacks using digital certificates in WBAN. Int. J. Adv. Engin. Sci. Technol., 9: 31-35. Shelby, Z. and C. Bormann, 2011.

      [5] A study of MAC protocols for WBANs. Rev. Literature Arts Am., 10: 128-145. DOI:10.3390/s10010012,Venkatasubramanian, K.K. and S.K.S. Gupta, 2010.

      [6] KeyRev: An efficient key revocation scheme for wireless sensor networks. IEEE International Conference on Communications, Jun. 24-28, IEEE Xplore Press, Glasgow, pp: 1260-1265. DOI: 10.1109/ICC.2007.213 Zimmerman, T.G., 1996.

      [7] Xu Huang, Shirantha Wijesekera, and Dharmendra Sharma, “Implementation of Quantum Key Distribution in Wi-Fi (IEEE 802.11) Wireless Networksâ€, ISBN 978- 89-5519-136-3 ICACT, PP.17-20, Feb 2008.

      [8] IBELite: A light weight identity based cryptography for wireless body area networks. IEEE Trans. Inform. Technol. Biomed., 13: 926-932. DOI: 10.1109/TITB.2009.2033055 Ullah, S., B. Shen, S.M.R. Islam, P. Khanemail and S. Saleem et al., 2009.

      [9] Gehrmann, C., C.J. Mitchell and K. Nyberg, 2004.Manual authentication for wireless devices.Cryptobytes, 7: 29-37.Khan, P., M.A. Hussain and K.S. Kwak, 2009.

      [10] Medical applications of wireless body area networks. Int. J.Digital Content Technol. Appli.,Li, C., J. Li, B. Zhen, H.B. Li and R. Kohno, 2010.

      [11] Security architecture for at-home medical care using body sensor network. Int. J. Ad-hoc, Sensor, Ubiquitous Comput., 2: 60-69.Nabi, M., T. Basten, M. Geilen, M. Blagojevic and T.Hendriks, 2010.

      [12] A Robust Protocol Stack for Multihop Wireless Body Area Networks with Transmit Power Adaptation. In 5th International Conference on Body Area Networks, (BAN’ 10), ACM Press,New York, USA, pp: 77-83. DOI:10.1145/2221924.2221941Raazi, S.M.K.U.R. and H. Lee, 2009.

      [13] BARI: ADistributed Key Management Approach for WirelessBody Area Networks. IEEE InternationalConference on Computational Intelligence andSecurity, Dec. 11-14, IEEE Xplore Press, Beijing,pp: 324-329. DOI: 10.1109/CIS.2009.186Saleem, S., S. Ullah and H.S. Yoo, 2009.

      [14] On the SecurityIssues in Wireless Body Area Networks. Int. J.JDCTA, 3: 178-184. DOI:10.4156/jdcta.vol3.issue3.2Saleem, S., S. Ullah and K.S. Kwak, 2011.

      [15] A study ofIEEE 802.15.4 security frame work for wirelessbody area networks. Sensors, 11: 1383-1395. Sharma, N. and E.M. Bansal, 2011.

      [16] 6LoWPAN: The Wireless Embedded Internet. 2nd Edn., John Wileyand Son , ISBN-10: 1119965349, pp: 244.Singelee, D. and B. Preneel, 2007.

      [17] A secure low delay protocol for multihop wireless body area network. Ad Hoc Sensor 8 Wireless Netw., 9: 953-72. Tan, C.C., H. Wang, S. Zhong, Q. Li, 2009.

      [18] P. W. Shor, "Algorithms for quantum computation: Discrete logarithms and factoring", Proc. 35th Annu. Symp. Found. Comput. Sci., pp. 124-134, Nov. 1994.

      [19] M. Blum and S. Micali, “How to Generate Cryptographically Strong Sequences of Pseudo Random Bitsâ€, 23rd IEEE-FOCS, 112–117 (1982).

      [20] Halder, M., Beveratos, A., Gisin, N., Scarani, V., Simon, C., Zbinden, H.: Entangling independent photons by time measurement. Nature Physics 3, 659–692 (2007).

  • Downloads

  • How to Cite

    Sai Suguna, Y., Kavya Reddy, B., Keerthi Durga, V., & Roshini, A. (2018). Secure Quantum Key Distribution Encryption method for Efficient Data Communication in Wireless Body Area Sensor Net-works. International Journal of Engineering & Technology, 7(2.32), 331-335. https://doi.org/10.14419/ijet.v7i2.32.15706