Preprint Article Version 1 Preserved in Portico This version is not peer-reviewed

Efficient Cryptographic Technique for Data Protection of Wireless Body Area Network

Version 1 : Received: 20 December 2023 / Approved: 21 December 2023 / Online: 21 December 2023 (06:32:09 CET)

How to cite: Javaid, S.; Ashraf, H.; Jhanjhi, N. Efficient Cryptographic Technique for Data Protection of Wireless Body Area Network. Preprints 2023, 2023121609. https://doi.org/10.20944/preprints202312.1609.v1 Javaid, S.; Ashraf, H.; Jhanjhi, N. Efficient Cryptographic Technique for Data Protection of Wireless Body Area Network. Preprints 2023, 2023121609. https://doi.org/10.20944/preprints202312.1609.v1

Abstract

WBAN is a blessing to mankind because it can monitor people's health and activities regardless of place or time. It brings feasibility in patients’ treatment. The main problems with WBAN, however, are related to the security and privacy of health data. To prevent data misuse, health information should be safeguarded. On the other hand, the medical professional needs to receive the patient's health information promptly. As security of health data impact human life greatly so secure an efficient method is required. Efficient cryptographic technique for data protection of wireless body area network is proposed. This research aims to provide data protection in WBAN to increase data security and efficient transmission. The suggested approach offers effective security with quick key generation, quick encryption, and secure data transmission across the network. The proposed methodology is considered to be secure and will consume less time. The proposed method further uses a less complex encryption algorithm. The less complex the approach is the higher performance it will provide in wireless network. The proposed methodology will prevent many attacks, which makes the proposed approach highly suitable for wireless body area network’s security.

Keywords

wireless body area networks; data security; internet; man-in-the-middle attack; efficient cryptographic technique; cryptography; DNA; ECC

Subject

Computer Science and Mathematics, Computer Science

Comments (0)

We encourage comments and feedback from a broad range of readers. See criteria for comments and our Diversity statement.

Leave a public comment
Send a private comment to the author(s)
* All users must log in before leaving a comment
Views 0
Downloads 0
Comments 0
Metrics 0


×
Alerts
Notify me about updates to this article or when a peer-reviewed version is published.
We use cookies on our website to ensure you get the best experience.
Read more about our cookies here.