| With the commercial deployment of the Fifth Generation(5G)technology,it will be deeply integrated with various traditional fields,forming a wider range of innovative applications in vertical fields.Among them,the integration of 5G and the medical field is mainly reflected in the Wireless Body Area Network(WBAN)composed of a number of wearable or implantable medical devices,transmission nodes and processing nodes.The application of WBAN in remote medical care,special population care,community medical care and other scenarios makes it become a research hotspot,and its security has also been widely concerned.Because of the characteristics of open channel,limited node resources,special application scenarios,dynamic network structure and so on,security of WBAN faces great challenges,such as the strict physical environment,limited resources,legacy compatibility and emergency authentication.This thesis focuses on the possible attacks and key security technologies in WBAN,and the main contributions and innovation are as follows:Furthermore,according to the requirements of security in normal mode and accessibility in emergency mode for implantable medical devices,the authentication request filtering protocols for corresponding scenarios are designed respectively.The simulation results show that within a certain threshold range,the authentication response rate of implantable medical devices to attackers is as low as 2.4%,while that of legitimate devices is as high as 99.2%,and the authentication response rate of emergency devices can reach up to 96.3%in a single attempt.Therefore,this protocol can achieve a tradeoff between the requirements of normal mode and emergency mode.Finally,an intelligent location spoofing attack is proposed for medical body area network location system.The mathematical model of the intelligent position spoofing attack is built and the feasibility of the attack is verified by simulation.According to the simulation results,the factors influencing the success rate of the attack and the feasible position of the attack are analyzed,and the insightful guidances are provided to defend intelligent location spoofing attacks as well as evaluate and improve the security design in future wireless body area network. |