1. Introduction
The Wireless Body Area Network (WBAN) has become a vital technology with rapid advances in the medical field. However, WBAN faces security issues due to open-air communication of information. Apart from other challenges like energy efficiency, security is a major concern in WBAN in terms of data integrity, data security, and the need to protect from various external and internal attacks. Traditional authentication and encryption technology to protect nodes and data from external attacks are available, but this technology cannot be used in WBAN due to its node constraints [
1].
Trust plays an important role in healthcare as it directly influences the quality, adherence, and continuity of the relationship between doctors and patients. Trust is categorized into soft trust and hard trust. There have been models based on hard trust but not enough research related to soft trust even though soft trust plays a great role in dynamic decision-making [
2].
The traditional security for WBAN requires highly sophisticated software, hardware, large memory, and high computation and communication capability at the node. At the same time, this technique protects from internal attacks by malicious nodes. Therefore, trust-based security is used to protect the network from internal attacks. Various trust management techniques like Trust Computation, Trust reputation, Trust aggregation, and Trust propagation are there to protect data and nodes from various attacks from the malicious node. The trust computation using calculated with direct trust, the neighbor node’s direct observation, and indirectly recommended by the third node. The calculation of trust reputation is based on the history of communication between the nodes [
3].
Wireless Body Area Sensor Networks are used to sense body temperature, heart rates, and other human parameters. Protection and securing of data from various attacks like badmouthing attacks, whitewashing attack, on-off attack, Sybil attacks, ballot stuffing attacks, selective forwarding attacks, Message suppression attacks, selfishness attacks, and sleeper attacks, during internal communication also is a major role.
In this system, we have identified various trust metrics and models used in various technologies like Wireless Sensor Networks, Ad-Hoc Networks, and Wireless Body Area Networks. With existing technology and trust metric and models, a trust model is proposed to identify various malicious behavior with the help of multi-factor trust properties. To identify trusted nodes, we use the direct trust calculation, and using trust value we identify the cooperative and non-cooperative nodes. The second task is to communicate trusted data, the higher the confidence more the trusted data. The consistency of the node success is calculated as well as the freshness of data–more recent data is more trusted data. Summation of all the multi-factor trusted values gives final trust. That trust value is used for secure and quality data communication in WBAN. It detects and avoids attacks during communication, i.e., Message suppression attacks, selfishness attack, and sleeper attack, on off.
2. Literature Review
This system describes the importance of data quality, with various features and types to satisfy online customers [
1]. The paper also proposes a model prediction-based security routing for Wireless Body Area Networks (WBAN). This model increases reliability and prevents data injection attacks [
2].
Wireless body area networks (WBAN) are useful for performing cheap, unobtrusive, and constant real-time monitoring of medical applications. Wearable, implantable medical and mobile devices are responsible for controlling critical data, and ensuring security, a critical feature in WBAN. The paper proposes an autonomous mobile agent-based intrusion detection system addressing security in wireless body area networks. Mobile agent-based IDS proposed in other domains with WBAN systems, were compared, and the unique benefits of the proposed architecture were highlighted [
3].
In this article, the nodes do not compute and calculate trust values for all the nodes connected in the network. Instead, the nodes calculate the trust values of their neighboring nodes. To calculate the trust, it uses a set of factors such as location identification, nodal distance, sensing and communication, sensing results, consistency, battery level, and trust value. Consistency and sensing communication plays a major role and is used to identify selfishness and save battery power. Selfish nodes do not send data. The consistent level is used to identify malicious nodes, data success, and failure rate, where the range of consistency is −1 ≤ C ≤ 1 [
4].
(WBAN) is a collection of wireless sensor nodes that can be placed within or outside the human body monitoring the function and adjoining situations of the body. These devices access private patient medical data, therefore intruding into the subject of privacy protection [
5].
This system has designed a framework for WSN based on a beta reputation for trustworthiness, taking aging as one of the factors to identify malicious nodes. Aging measures node’s cooperation and also shows the most recent data. Good cooperation shows a good reputation. The range of aging is (0,1) [
6].
For secure WSN communication, this system has proposed a multi-angle trust model, for communication trust, data trust, and energy trust. The communication trust is calculated by the Beta probability distribution function. It’s used to calculate direct and indirect trust for successful and unsuccessful transactions. Data trust is calculated with the help of fault tolerance, credibility, and consistency [
7,
8].
The paper mentions monetary problems for healthcare and suggests Body Area Sensor Networks (BASNs) achieve universal healthcare solutions. But for these networks to be properly implemented, they need to be made highly secure and reliable. They present a trust-based aware model along with an entropy-based credibility evaluation model which provides testimony (past evidence-based) about neighbors to ensure security. The reputation of a node is derived from trustworthiness value, derived from aggregated trust pieces of evidence on the body network. This system is said to be viable [
9]. In this article, we look into two main factors important for secured data in WBAN, the first being distributed data storage and fine-grained data storage [
10].
Wireless Body Area Network, also known as WBAN, is one among many emerging phenomena in the field of medicine currently. Even though it is challenged by security issues for WSNs (Wireless Sensor Networks) and to overcome them. We need to propose a feasible hybrid security mechanism to meet the security requirements of WBANs with strict resource constraints. With the help of these mechanisms, characteristics are analyzed and the main risks of WBANs are and based on risks, the security requirements of WBANs are described and analyzed by available cryptographic algorithms. The proposed mechanism also has a good trade-off between security and resource constraints and provides primitive developed, efficient, and secure WBAN systems, proving beneficial and helpful in the future as well with regular updates and improvements [
11].
This system focuses on BAW-based transceivers targeting wireless networks for biomedical applications. BAW resonators are used for frequency synthesis and filtering of the receiver and transmitter paths. The receiver takes advantage of BAW selectivity to perform signal selection and amplification without requiring quadrature on the RF [
12].
Energy consumption, a major challenge in WBAN, was minimized using distributed inter-network interference algorithm using game theory [
13].
Wireless Body Area Network is known for its context-aware sensing and amplification in sensitivity and specificity. In this system, they have used several tiny wireless sensors placed on a human body. Those wireless sensors provide a methodical monitoring of various vital health signs. As this system collects personal data, the security and privacy of data are of the utmost importance. The difficulty has been faced in implementing security infrastructure on such lightweight protocols. This problem has been approached in such a way that physiological signals (electrocardiogram (ECG)) are exploited to address security issues in WBAN: a Trust Key Management Scheme for Wireless Body Area Networks. This approach manages the generation and distribution of symmetric cryptographic keys [
14].
A lightweight authentication scheme for body area networks–BANA, is proposed which does not depend on prior trust among nodes. It is achieved by exploiting characteristics of the physical layer unique to a BAN. Experimental validation of results shows that the clustering method is effective in distinguishing on-body sensors from off-body nodes. Prospects involve the exploration of a more effective solution to thwarting strategic attackers with an overwhelming number and studying the practicality of attacks using directional antenna [
15].
In this work, trust-based data is accessed from partners based on certain observations which guarantee the accuracy of the data. The confidence in trust values is calculated based on three factors, history of the previous experience with the neighbor node, age of experience, and the node’s good behavior in the initial stage, but later may not cooperate. Thus the recent experience imparts more trust value than the older one. Difference of experience, because the node may behave differently than expected. All this is considered, for trust calculation and confidence in trust data sharing from the partner node [
16].
Since almost all healthcare devices work on WSNs which makes these devices are vulnerable to security attacks. Also, there lies a possibility of data manipulation and monitoring. Hence data must be transmitted over a secure network and encrypting it which prevents data leaks or manipulation. Some tools used to accomplish this task are: HealthGear, MobiHealt, ewatch, Ubimon, Code Blue, The Vital Jacket, and many more [
17].
For resistant sensor data, this system focuses on data integrity and sensor trust for wireless sensor networks. Sensor trust uses the history of transactions and measures the current risk level to calculate the trust level for communication, robustness, and data integrity. To rate data, the integrity Gaussian model was used. The Gaussian model is used to estimate the accuracy of the data integrity [
18].
In this system, various trust metrics were used for node-changing behavior. To identify malicious nodes direct trust, confidence and reputation were utilized. The direct trust is calculated by the delayed Ack method in an organic computing system. Confidence helps to find the reliability of trust values. For that confidence calculation is done in three methods; several confidence and more interactions give high value; age confidence describes how fresh and recent the communication is. So old data reduces confidence. Variance confidence defines the difference in sensing data. The reading very close to the expected value gives more confidence and trust [
19].
In this system, the author has designed and analyzed a scalable, adaptive, and survivable trust management protocol for a community of interest-based dynamic social IoT. The protocol is distributed and each node only updates trust towards others of its interest upon encounter or interaction events. Dynamic adaptability is attained by selecting the best trust parameter setting in response to changes to communities of interest. It is also analyzed the trust protocol performance for a newly joined node to the network. Making use of existing trust information in the network, a newly joining node can quickly build up its trust relationship with desirable convergence and accuracy behaviour. Lastly, for scalability, they have proposed a storage management strategy to powerfully use the limited storage in IoT devices. The results show that using the proposed method, this trust protocol with limited storage space achieves a similar performance level as that with ideal (unlimited) storage space and can perform better in the trust convergence time [
20].
WBAN monitors the health and transmits data through wireless media. Since wireless media is prone to attacks various key-based cryptography techniques are used, which can be pretty expensive. So this system provides an energy-efficient cluster-based hybrid security framework [
21].
SEA-BAN: Semi-Autonomous, was proposed as a vitality effective cluster-based routing protocol for WBANs, named as semi-autonomous adaptive routing in wireless body area network (SEA-BAN). SEA BAN conveys vitality dispersal equitably among body networks and upgrades network lifetime. It is not just a cluster-based routing protocol; it likewise incorporates the advantages of direct transmission and multi-hop transmission techniques. It is contingent upon the vitality level and spatial data of body hubs, to formalize an adaptive routing. In addition, its centralized activity diminishes the computational weight of body networks [
22].
Wireless Body Area Network (WBAN) has gained importance as an essential part of medical service due to rapid advancement in medical technology. However, WBAN faces various security issues due to open-air information communication. In this system, the lightweight smart crypto solution was proposed, using authenticated key exchange coupled with cluster head formation and selection for the security of WBAN. The proposed solution logically combines cluster head selection with key agreement fulfilling the security requirement of a wireless body area network, efficient in terms of resource utilization [
23].
For data authentication within WBAN, a biometric-based security framework is proposed. Specifically, the sender’s electrocardiogram (ECG) is selected as the biometric key for the data authentication mechanism within the WBAN system. Therefore, patients’ records can only be sensed and derived personally from the patient’s dedicated WBAN system and cannot be mixed with other patients. The security system in WBAN is implemented with low computational complexity and high-power efficiency [
24].
This system proposed a Trust Evaluation (TE-model) for Wireless Body Area Network, containing two steps; the first being opinion generation and the second step opinion combination. The calculation of trustworthiness is based on subjective logic. The opinion is generated from sensor attributes, for example, body temperature and ECG values [
25].
A special purpose Wireless Sensor Network (WSN) enables remote monitoring termed WBAN. This protocol is used to minimize energy consumption [
26].
In this survey, a review of ongoing research in WBANs in terms of system architecture, address allocation, routing, channel modeling, PHY layer, MAC layer, security, and applications is provided [
27]. The paper explains that anomaly detection can improve efficiency and reliability [
28].
In this paper, we developed and analyzed an adaptive trust management protocol for social IoT systems and its application to service management. Our protocol is distributed and each node only updates trust towards others of its interest upon encounter or interaction events. The effect of α and β on the convergence, accuracy, and resiliency properties of our adaptive confidence management protocol through simulation was analyzed. The results demonstrate that the trust evaluation of adaptive trust management will converge and approach ground truth status, and one can tradeoff trust convergence speed for low trust fluctuation, and adaptive trust management is resilient to misbehaving attacks. It verified the effectiveness of adaptive trust management with two real-world social IoT applications. The adaptive trust-based service composition scheme outperforms random service composition and approaches the maximum achievable performance based on ground truth [
29]
In this survey, a comparison of various energy-efficient and reliable wireless communication protocols is provided. WBANs are used to enable healthcare professionals to monitor patients and elderly people continuously in their residential environments. A comparison of existing low-power communication technologies potentially supports the rapid development and deployment of WBAN systems [
30].
The WBAN is the latest technology used in monitoring health parameters for both normal individuals as well as for patients suffering issues, with privacy protection and security of the collected data of that particular individual. To help authenticate patients’ critical data and prevent data corruption during unauthorized access or data erasures during DoS attacks, distributed data access is used alongside other access control methods [
31].
In this system, an attack resistance and malicious node detection for BAN is developed based on collaborative filtering called BAN-Trust. The Body sensor data is detected with the detected data sent for data analysis. The data analysis contains two sections; the first one is malicious node detection, the set of malicious attackers considered as a simple attack, where nodes do not provide any necessary information about neighbour nodes. Bad-Mouth Attack nodes spread fake information about neighbour nodes so that malicious nodes will not be detected. On and off attack nodes change the pattern. The second one is trust management. Collaborative filtering can be used to calculate trust to recommend neighbouring nodes using cosine similarity. The recommendation trust contains trust rating formation, trusted neighbour node selection, and prediction trust calculation [
32].
Routing protocols are established to decide which path a data packet must travel to reach its destination (sink). In this system, an efficient alternative to the traditional ATTEMPT algorithm has been provided to come up with a routing protocol to save energy. The technique focuses on cluster head selection. If a cluster has not spent much energy and still has energy larger than the threshold level, it will remain cluster head for the next round. In this way, energy is saved rather than wasted in selecting a new cluster head and routing the packet through the new cluster. If the cluster head has lessor energy than the threshold level, it will get replaced by a new cluster head that has larger energy than the threshold level. Thus, saving a lot of energy required to transfer a packet from source to destination [
33].
In this system, a trusted communication approach is aimed at protecting the integrity and confidentiality of the WBAN. To ensure authenticity, an improved bilingual Trust Management System (PDATM) is used, whereas a cryptographic system is used to maintain anonymity. An advanced bilingual distribution-based trust-management system (BDTMS) for EH-WBAN is proposed. A MATLAB simulator is used to assess the effectiveness of the recommended program. In the simulation results, BDTMS has a faster detection period and larger accuracy than the conventional confidence program. Furthermore, BDTMS can defend against inadequate mouth attacks. In medical applications, WBAN allows for continuous monitoring of the patient, allowing for early detection of aberrant conditions and resulting in considerable improvements in quality of life [
34].
The WBAN applications and architecture in this article, highlighting current research themes and challenges. As sensor nodes in BANs have limited resources, energy efficiency and reliability are key considerations. We evaluated current advanced energy efficiency and reliability solutions, identifying their strengths and disadvantages. We have also identified several performance features which need to be taken into account when creating and evaluating WBAN solutions. Finally, we identified a number of issues and obstacles in terms of energy efficiency and reliability in WBANs that need to be addressed further in the development of new WBAN solutions. As part of our current study, we introduced a new, efficient and reliable routing strategy to improve the network’s stability period and service life in WBAN. In this research work, the emerging technology like edge computing, Fog computing, and AI techniques is not discussed [
35].
4. Results and Discussions
The research work is conducted with the help of Omnet++ Simulator, the simulator parameters as given in
Table 1.
The performance of the protocol is explained with a graphical representation. The various sensors used in WBAN and their range of the parameter is the Pulse rate sensor. To measure the Oxygen level Body Oxygen level sensor was used. To know the body temperature in the simulation temperature sensor was used = 30–40 °C, ECG = 0.5–5 mV, and EEG = 5–300 µVsensors. Respiratory 2–50 breaths/min, Blood Flow = 1–300 mL/s, Blood Pressure = 0–400 mm Hg.
Figure 1 shows the performance Throughput with increasing malicious nodes for TE (Trust Evaluation) protocol or WBAN, BAN-trust, and Proposed trust model. At the initial level, the percentage of malicious nodes is very less. The performance of the protocol is high, where trust value gradually increases. The identification of the percentage of malicious nodes increased, and the performance of data delivery decreased by the TE-WBAN and BAN Trust when compared to the proposed method.
The proposed method uses multi factors and packet drops are very less compared to other protocols. This calculates the sum of successful transmission over the channel without any error by the total number of transactions.
Figure 2 shows performance measures of packet delivery ratio, which is the percentage of the message delivered to the total number of messages generated. The performance of the proposed method is more with increasing malicious nodes compared to other protocols like TE-WBAN and BAN-Trust. TE-WBAN and BAN-Trust result in more packet dropped than the proposed trust model. The proposed model detects and avoids message suppression attacks and detects the selfishness nodes as malicious nodes increasing the number of packets delivered when compared with other protocols. The consistency of success rate is more in our model due to multi-factor trust classification, the identification of malicious nodes is faster, leading to a higher packet delivery ratio.
Figure 3 shows comparisons of End to end delay vs. Percentage of malicious nodes with various protocols. The delay is more when malicious nodes are fewer, and gradually reduces and lessens with more malicious nodes. The proposed protocol performs well in (25%to 50%) of malicious nodes compared to TE-WBAN and BAN-Trust. The proposed protocol avoids sleeper attacks and On-and Off attacks throughout the communication process. At all times the cooperative nodes perform well.
Figure 4 shows the performance of the protocol’s quick response in detecting malicious nodes. All nodes start with the same threshold trust value which is 0.5. During communication with the properties of multifactor, the trust values of nodes in the proposed model are increased gradually concerning the simulation in seconds, compared to TE-WBAN and BAN-Trust. At the same time, as soon as the node turns into the malicious node, trust values are drastically reduced immediately to less than 0.5 in the proposed trust model. As per the result in
Figure 4, the proposed model detected malicious nodes between 4 to 5 s, and immediately reduced its trust value to 0.3 at the 5th s, which is an untrusted range, further reducing to 0. But the BAN-Trust and TE-WBAN are detected at the 6th and 7th s respectively. The result shows Proposed Trust model detects malicious behavior faster than the other two protocols.