key: cord-0796484-t8tf5k3z authors: V, Anusuya Devi; V, Kalaivani title: Enhanced BB84 quantum cryptography protocol for secure communication in wireless body sensor networks for medical applications date: 2021-03-18 journal: Pers Ubiquitous Comput DOI: 10.1007/s00779-021-01546-z sha: 90b0396dd5761289b1a7f652bb77290c60ebf24f doc_id: 796484 cord_uid: t8tf5k3z Wireless body sensor network (WBSN) is an interdisciplinary field that could permit continuous health monitoring with constant clinical records updates through the Internet. WBAN is a special category of wireless networks. Coronavirus disease 2019 (COVID-19) pandemic creates the situation to monitor the patient remotely following the social distance. WBSN provides the way to effectively monitor the patient remotely with social distance. The data transmitted in WBSN are vulnerable to attacks and this is necessary to take security procedure like cryptographic protocol to protect the user data from attackers. Several physiological sensors are implanted in the human body that will collect various physiological updates to monitor the patient’s healthcare data remotely. The sensed information will be transmitted wirelessly to doctors all over the world. But it has too many security threats like data loss, masquerade attacks, secret key distribution problems, unauthorized access, and data confidentiality loss. When any attackers are attacking the physiological sensor data, there is a possibility of losing the patient’s information. The creation, cancellation, and clinical data adjustment will produce a mass effect on the healthcare monitoring system. Present-day cryptographic calculations are highly resistant to attacks, but the only weak point is the insecure movement of keys. In this paper, we look into critical security threats: secure key distribution. While sharing the secret key between communicating parties in the wireless body sensor networks in the conventional method like via phone or email, the attackers will catch the private key. They can decrypt and modify more sensitive medical data. It can cause a significant effect like death also. So need an effective, secure key distribution scheme for transmission of human body health related data to medical professional through wireless links. Moreover, a new enhanced BB84 Quantum cryptography protocol is proposed in this paper for sharing the secret key among communicating parties in a secure manner using quantum theory. Besides, a bitwise operator is combined with quantum concepts to secure the patient’s sensed information in the wireless environment. Instead of mail and phone via sharing secret key, quantum theory with the bitwise operator is used here. Therefore, it is not possible to hack the secret key of communication. The body sensor’s constrained assets as far as battery life, memory, and computational limit are considered for showing the efficiency of the proposed security framework. Based on experimental results, it is proven that the proposed algorithm EBB84QCP provides high secure key distribution method without direct sharing the secret key and it used the quantum mechanism and bitwise operator for generating and distributing secret key value to communicating parties for sensitive information sharing in the wireless body sensor networks. In the wireless communication network, cryptography is used to provide data secure with the help of encryption and decryption process. WBSN are using to monitor the patient effectively and this is useful especially in coronavirus disease 2019 (COVID- 19) following the social distance to monitor the patient. The cryptographic protocol is required to effectively protect the privacy of user in data transmission from WBSN. The devices in WBSN are low constraint devices and vulnerable for attacks and cryptographic protocol is required to apply to protect the data. When the sensed medical record data is in the network, eavesdroppers may modify the contents of encrypted messages; classical cryptosystems are using mathematical functions and different numerical techniques for encrypting the data. Instead of classical cryptography, quantum cryptography (QC) can safely trade an enciphering key over a private channel. Quantum computation is used in the wireless body sensor network to guarantee the security of the information transmission. Quantum key distribution (QKD) is to provide a secure communication scheme that uses a quantum mechanism. It will produce a shared random secret key known only to communicating parties. The known private key is used to encrypt and decrypt messages. In the BB84 protocol, two basis sequences are used, that is, (i) a rectilinear basis (+), (ii) diagonal basis (×). In rectilinear, basis is divide into horizontal polarization (0°) and vertical polarization (90°). Diagonal basis contains two polarization states, 45°and 135°. Table 1 shows the bit value of the BB84 protocol. Photon polarization state has been used to transmit the medical record data. In 1984, this convention was created by Charles Bennett and Gilles Brassard. In Table 1 , the quantum polarization node is represented in the form of + and ×, and qubits are represented in the form of ↗, ↖, ↑, and →. The light has a photon; it carries a rigid amount of energy and polarization physical property. Polarization node is classified into two types [1] . One is a rectilinear polarization node; another one is the diagonal polarization node. The polarization directions for rectilinear are 0°or 90°, and the diagonal polarization node is 45°or 135°. Polarization node is called a "Quantum Basis." Quantum basis are the match up to binary values; it will produce qubit. It is accustomed to surrounding the mystery sharing key in the correspondence condition. The main idea of this paper is to produce the quantum key, which is at both the sender side and beneficiary side is a similar mystery key. This key can be utilized for additional encryption and decoding of clinical record information, which is in the remote body sensor network. BB84 convention re-enactment contains the accompanying strides to share the shared key in the WBSN. Alice and Bob both are communicating parties; they can communicate through two kinds of the communication channel; that channels are the quantum channel (it can be fiber optics) and other one channel is public (it can be a telephone line or internet connection). Figure 1 shows the communication channel of key generation method. Wireless body sensor network (WBSN) offers human body monitoring techniques remotely. WBAN includes body automation, medical healthcare monitoring, and pacemaker interactions with implant medical devices and military applications. A WBSN consists of a small set of biomedical sensors around the human body to monitor and collect vital signs like temperature, heartbeat, and brain signal. Then, it will be transmitted wirelessly to a hospital database, doctor, and relatives. Figure 2 shows the architecture of WBSN. The attackers may modify this human body sensitive data, which is present in the wireless communication medium. Small changes in medical data make it mass effective in human body health. So, security plays a vital role in the wireless body sensor networks. The proposed EBB84QCP model for the wireless body sensor network environment consists of seven main steps that are: 1. Qubit generation converts the binary format of random number and quantum basis into qubit with quantum mechanism techniques. This process is done by the sender (Alice) and sends it to the receiver (Bob). 2. The second step is done by the receiver (Bob). Bob guesses the random quantum basis and a binary format of random number and then generates the check bits. He (Bob) sends his check bits to the sender (Alice). 3. In the third step, Alice compares her qubit with Bob's check bits. Here, the secret key value for the cryptographic process is shared with the communicating parties securely. The attackers will not predict the key value because quantum theory and bitwise operators are making a secure key value. This work's major contribution is to provide a secure secret key for communication in the wireless body area network in medical applications. For this purpose, a quantum cryptography protocol that uses a quantum basis and random number binary values and bitwise operators is used to share the secret key for the cryptographic process. The proposed EBB84QCP is providing a secured transmission of medical data in WBSN, which prevents passive and active attacks in wireless communication. The remaining of this work is organized as follows. Section 2 discusses the related work. The working flow of the proposed system is explained in Section 3. The results are discussed in Section 4. Finally, Section 5 concludes the proposed work with the future direction. Recent researches involved in applying the cryptography protocol for secure communication in wearable devices are reviewed in this section. Recent researches in WBSN were reviewed with advantages and limitations. R.M., S.P. et al. [2] developed effective and efficient IDS in IoMT environment using the DNN algorithm to classify and predict unforeseen cyberattacks to avoid post-effects intrusion in sensitive cloud data storage. This system's merit is to reduce the number of features and instances extracted for the classification process in the DNN model. The work's demerit is that too many machine learning techniques are used for detecting the intruders in the IoMT environment. G. T. Reddy et al. [3] proposed an ensemble-based machine learning model and analyzed the performance against the individual machine learning algorithms for diabetic retinopathy classification. Machine learning (ML) algorithms random forest classifiers, decision tree classifier, AdaBoost classifier, Knearest neighbor classifier, and logistic regression classifier are applied for diabetic retinopathy dataset. The limitations of the proposed work are tested on a limited size of the dataset. This work may consider the huge number of the dataset for diabetic retinopathy classification. Chowdhary, C.L. et al. [4] analyzed the performance of hybridization of various symmetric and asymmetric cryptography algorithms for image encryption and decryption. The hybrid process elliptic curve cryptography (ECC) with Hill cipher (H.C.), ECC with Advanced Encryption Standard (AES), and ElGamal with Double Playfair Cipher (DPC) involved the speed implementation of symmetric algorithms. The hybrid encryption techniques provided the right solution for image encryption. The advantage of work has implemented the better encryption time, decryption time, and entropy. This work may consider the various images of varying sizes in pixels. P. G. Shynu et al. [1] proposed a fuzzy-based data transformation technique to preserve privacy by using privacy-preserving data mining (PPDM) in the database. Privacy-preserving data mining is used to transform fuzzy data original dataset. The proposed model is to determine the privacy level of each data. This work considered the fuzzier decision support framework to ensure privacy. G. T. Reddy et al. [5] developed a prediction model using principal component analysis and a deep neural network for uninterrupted marine environment monitoring to alert the technologists by predicting the battery's life well in advance. The model uses the raw data of a real-time marine monitoring system, and the results are compared with linear regression and XGBoost Table 2 The sender (Alice) side process Alice's quantum basis + + X + X + X + + Alice's binary bit (secret bit stream) 1 0 1 1 0 0 1 1 1 Alice's qubit ↑ → ↗ ↑ ↖ → ↗ ↑ ↑ techniques. This model is reducing the time complexity and eliminated the negative impact features. The prediction accuracy is increased by 12%. This prediction model is used to predict battery life for dynamic IoT sensors and can support in replacement of the battery at a prior stage without loss of any monitoring activity. This work may use the bio-inspired algorithm in the dimensionality reduction phase. Muhammad Usman et al. [6] divided the wireless body area networks (WBAN) into four tiers, including in vivo nano-communications. The research challenges confidentiality, integrity, and availability of all tiers are discussed. The authors may simulate physiological signals in vivo nano-communications to get a better solution for end-end security in the WBAN. Y.Sai Suguna et al. [7] focused on a high pseudo number for generating the quantum key value. The communicating parties can be disseminated pseudo number as a quantum key value. In this work, they did that three types of key distribution schemes. The unique feature of this technique is used to ensure high authentication without any attacks. The quantum key value with an on-time padding scheme produced a better packet delivery ratio, less overhead and delay, and secure data delivery with no loss. The system considered the classical cryptography techniques for encryption and decryption process to strengthen the security of the system. Guang He Zhang et al. [8] proposed that the biometric method appropriated the biological channels to secure data transmission in the body area networks and discussed the possible attacks of the resource-constrained BAN. When compared to public-key encryption techniques with secret key encryption (SKE), SKE will provide a better solution in the BAN. The strong key distribution method is the only solution for delivering security in BAN. Doha AL-Mubayedh et al. [9] defines a quantum key distribution protocol BB84 and provides a practical implementation of it on IBM QX software. This proposed scheme provided a statistical analysis of detecting/not detecting third-party eavesdropping. This work ensured the quantum key distribution protocol BB84 practical implementation as well as eavesdropping attacks possibility. Same AI Janabi et al. [10] reviewed that WBSN architecture design security needs in WBSN. The primary security requirements, data confidentiality, data freshness, data authentication, and secure management, are discussed. The current security solutions are ZigBee security services. Bluetooth security protocols, biometrics techniques, merits, and demerits are discussed. The authors provided safety measures such as trust, audit, and digital forensics about WBSN for healthcare services. Miralem muhic et al. [11] described the simulation environment of the quantum key distribution network with multiple links and nodes. The proposed scheme analyzed several routing protocols, routing packets, and packet delivery ratio. QKD network provided a better solution for the large amount of routing data flooded throughout the network. Bingzhen Zhao et al. [12] tested and evaluated quantum key distribution (QKD) systems from six aspects: distance loss, galloping loss, splice loss, data traffic, encryption algorithm, and system stability. QKD technologies can meet large-scale applications. This scheme's advantage is shorter quantum signal state's correction time and the higher the quantum key rate efficiency. Bennett C.H. et al. [13] have introduced the first QKD convention and utilized two-dimensional quantum frameworks or qubits as data transporters. This work ensured that no one (third party) was not listening to the communication in the insecure channel. Manish Kalra et al. [14] proposed a new protocol, which is an over BB84 protocol. The new protocol provided a better capacity and error estimation when compared with the BB84 protocol. The proposed scheme is generating the quantum key that is multiplying two keys instead of adding the keys. The disadvantage of this work is to alter the other quantum cryptography protocols and compare the proposed system's performance. V. E. Rodimin et al. [15] implemented the decoy-state protocol for secure long-distance quantum communications. The authors used Python code for post-processing procedures, and external applications are implemented using the open-source protocol. The proposed work detected the mismatch problem in the decoy-state protocol. The authors may speed up the parallelization post-processing procedure and investigation work. Abidi, Bahae, Jilbab, et al. [16] proposed routing protocol for wireless body area networks to transfer data with less Table 3 The receiver (Bob) side process Bob's random guess of quantum basis X + + X X X X + X Bob's random guess binary bit (secret bit stream) 1 0 [17] proposed that data access control techniques in data storage of patient medical data. The authors considered that the two issues are distributed data storage and distributed data access control patient sensitive data. The proposed system may consider the on-demand access policy during emergency healthcare. Haibat Khan et al. [18] proposed a system that used symmetric cryptography for a key agreement protocol for wireless body area networks. It provides good performance and offers the privacy attributes of node anonymity and session. The proposed system's drawback may consider the public-key privacy features for any platform. Libing Wu et al. [19] proposed a mysterious anonymous authentication method for WBSN and demonstrate that it is safe under an arbitrary oracle model. The proposed system may be considered an impersonation attack. The author implemented the novel anonymous authentication scheme for the WBAN using the random oracle model. B. Archana et al. [20] focused that a procedure, which is quantum key distribution (QKD), is utilized to share an irregular shared key by enciphering the data in quantum states. Photons are the quantum substance which is assuming an essential job in encoding the key. QKD gives security not reachable some other old-style cryptographic strategies. When adding Eve's attack and detectors problems in the proposed system, the performance will be improved. The proposed security framework is explained in this section with the necessary justification briefly. The proposed system uses the quantum cryptography protocol BB84 with enhancement. It will produce the secret key for communication in the wireless environment, and this work will protect the medical data in the network from the attackers. Any unauthorized third party or man in the middle attacks may interrupt the communicating parties but not catch the secret key information. The steps of the proposed Enhanced BB84 Quantum Cryptography protocol are as follows: (i) qubit generation, (ii) check bit generation, (iii) discussion in the public communication channel, (iv) quantum key generation with the bitwise operator, (v) discussion about the key generation process to receiver (Bob). Input : Quantum Basis, Random Number Output : Qubit Step 1: Firstly, Sender (Alice) takes a random quantum basis and binary format of random Number Step 2: If the quantum basis is rectilinear polarization with horizontal direction and binary value is 0, then the qubit value is else If the quantum basis is rectilinear polarization with vertical direction and binary value is 1 , then qubit value is If the quantum basis is diagonal polarization with 45° direction and binary value is 0, then qubit value is else If the quantum basis is diagonal polarization with 135°direction and binary value is 1, then the qubit value is Step 3: Finally, Sender (Alice) sends her qubit to Bob. If the quantum basis is diagonal polarization with 135°direction and binary value is 1, then the qubit value is Step 3: Finally, Receiver (Bob) sends his check bit to Alice. Table 3 shows the check bit generating process which is used in this work. In this step, communicating parties can use the public two-way communication channel. Bob sends his detected qubits (check bits) to Alice through a classical channel. After discussing the classical channel, Alice must compare her quantum key generation scheme with Bob's scheme. Alice can identify which polarization basis and binary format of the random number is commonly used on the sender and receiver sides. Alice can use that corresponding common bit to generate the secret key in the encryption process. Table 4 shows how communicating parties can identify their matched bit value for the further cryptographic process. The sender (Alice) can perform an XoR operation between matched bits value and her remaining not matched bits of quantum key generation. After that, Alice (sender) framed the quantum secret key value and discussed the key generation process to Bob (receiver) via the communication channel. Now, the receiver (Bob) will identify the secret key value for the cryptographic function. This proposed model does not directly distribute the secret key value to the communicating parties, so eavesdropping does not catch the secret key during communication in the wireless link. In Fig. 3 , the sender and the receiver can share their quantum secret key based on enhanced BB84 quantum cryptography; they can encrypt their medical sensed data with the encryption algorithm. The sender side process as follows: Step 1 Compare (Alice's Quantum Basis , Alice's Binary Bits ) Alice's Qubit (1) Step 2 Compare (Bob's Quantum Basis , Bob's Binary Bits ) Bob's Qubit (2) Step 3 If Alice's Qubit = Bob's Qubit Then the matched qubit's binary value will frame the secret key else Go to Step 1 and step 2 (repeately do the step 1 and step 2 process until matched qubit found) Step 4 Matched bits (XOR ) Alice's Not matched bit = Quantum Secret Key Value (4) The receiver side process is as follows: Step 1 : Firstly, the Patient's body sensor sensed the medical data and sent it to the encryption process. Step 2: Encryption Process C (MSD) =EQSK (MSD) is done. Step 3: After the encryption process, the ciphertext (C(MSD)) is sent it the receiver side. In receiver side process Input : Cipher text of WBAN sensed Data (C(MSD)) Step 1 : The Patient's body sensor data that is cipher text format of medical data is sent it to the decryption process. Step 2 : Decryption Process O (MSD)=DQSK(C(MSD)) is done. Step 3 : After the decryption process, the original Medical Sensed Data (MSD) is received by the receiver. The proposed model is used to distribute the shared secret key for encryption and decryption in the communication links. If a hacker tries to attack the secret key in the WBSN network, there is a chance of serious issues, because the patient's medical data is completely sensitive. Suppose any attacks on the data lead to severe and critical health issues, hence, we have to provide a secure platform using the proposed system enhanced BB84 quantum cryptography protocol for such a situation. The proposed system has been developed and implemented using JAVA programming, an Intel Core i7 processor, 500GB hard disk, 8GB random access memory with windows 2008 operating system. Figure 4 shows the time analysis of the quantum key generation with various quantum basis sizes. Here, the key generation time is increasing gradually. Table 6 shows that the EBB84QCP protocol will provide a better secret key generation time than the symmetric key cryptographic algorithm DES. Key generation time is measured in milliseconds, and the input size is in terms of kilobytes. The key generation time is demonstrated in Fig. 5 , which compares the key generation time of the proposed EBB84QCP and the standard symmetric key cryptographic algorithm DES. Here, the proposed system is better key generation time than the data encryption standard (DES). The reason for the achievement is to use the quantum mechanism along with the bitwise operator. Table 6 shows that the EBB84QCP protocol will provide a better secret key generation time than the symmetric key cryptographic algorithm RC4. Key generation time is measured in milliseconds, and the input size is in terms of kilobytes ( Table 7) . The key generation time is demonstrated in Fig. 6 , which compares the key generation time of the proposed EBB84QCP and the symmetric key cryptographic algorithm RC4. Here, 12 experiments have been carried out with the consideration of various file sizes: 170, 240, 320, 440, 550, 670, 720, 890, 920, 1300, 1423, 1570 kilobytes. The proposed system provided better key generation time than the RC4. The reason for the achievement is to use the quantum cryptography techniques. Attackers are ready to capture the secret key value in the wireless links. Symmetric key cryptographic algorithms, DES, AES, and RC4, are having a chance to lose their secret key value. But our proposed system is using quantum mechanics with a combination of the bitwise operator. From Table 8 , it is mentioned that all known attacks, wormhole attack, quantum attack, spoofing attack, black hole attack, and DoS attack, are possible in DES, AES.RC4, because of the key distribution problem, weak computation, and failure of authentication. But the proposed system provides outstanding security against all attacks because it will provide the quantum key with a bitwise operator. So, any attackers cannot predict or catch the secret key of the communicating parties. A novel enhanced BB84 quantum cryptography protocol provides strong security on the wireless body sensor networks in , qubit generation is done using a quantum basis and random number to guarantee the integrity and authenticity of the secret key. Second, on the receiver side (Bob), check bits are generated to strengthen the quantum cryptographic process. Third, the sender made a comparison of her qubit value with the receiver's check bit, and then the sender identified the matched bits of the qubit and check bit as well as not matched bits. Fourth, the sender has done an XoR operation between matched bits and not matched bits of Alice's (sender) qubit and frame the secret key value for the cryptographic process. Fifth, Alice (sender) discusses a matched bit and her not matched bit details with Bob via the communication medium. Sixth, Bob now identifies the secret key value based on Alice's information. Finally, Alice (sender) and receiver (Bob) shared a secret key without a direct method. Even attackers in the middle of the communication cannot predict the secret key value that much strength of communication is provided via quantum cryptography and a bitwise operator. In the future, our scheme should include a more mathematical and computational process of quantum key generation for protecting healthcare information in the wireless communication medium. A Fuzzy based data perturbation technique for privacy preserved data mining An effective feature engineering for DNN using hybrid PCA-GWO for intrusion detection in IoMT Architecture An ensemble based machine learning model for diabetic retinopathy classification Analytical study of hybrid techniques for image encryption and decryption A deep neural networks based model for uninterrupted marine environment monitoring Security in wireless body area netwoks: from in-body to off body communications Secure quantum key distribution encryption method for efficient data communication in wireless body area sensor net-works A review on body area networks security for healthcare Quantum cryptography on IBM QX Survey of main challenges (security and privacy) in wireless body area networks for healthcare applications Toward designing a quantum key distribution network simulation model Performance analysis of quantum key distribution technology for power business Quantum cryptography: public key distribution and coin tossing Design a new protocol and compare with BB84 protocol for quantum key distribution Modular quantum key distribution setup for research and development applications Wireless body area network for health monitoring Data security and privacy in wireless body area networks Highly efficient privacypreserving key agreement for wireless body area networks Efficient and anonymous authentication scheme for wireless body area networks Implementation of BB84 quantum key distribution using OptSim Publisher's note Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations