An efficient and secure mutual authentication protocol in wireless body area network

被引:0
|
作者
Kumar M. [1 ]
Hussain S.Z. [1 ]
机构
[1] Department of Computer Science, Jamia Millia Islamia
基金
中国国家自然科学基金; 中国博士后科学基金;
关键词
BAN logic; Scyther tool; cryptographic hash functions; formal verification; key agreement; mutual authentication; wearable bio-sensors; wireless body area network; XOR operations;
D O I
10.4108/eetpht.9.3114
中图分类号
学科分类号
摘要
INTRODUCTION: Wireless Body Area Network (WBAN) is an emerging field which is gaining a lot of attention in healthcare sector. It facilitates remote monitoring by gathering health related data using wearable bio-sensors based on Internet of Things (IoT). This technological advancement would significantly improve the tracking of fitness, health care delivery, medical diagnostics, early disease prediction, and associated medical dealings of any individual. Several challenges persist in WBAN due to its openness and mobility. OBJECTIVES: The medical data is extremely sensitive and personal in nature therefore it must be protected at any cost while being communicated between nodes. Highly resource constrained tiny sized bio-sensors restrict the usage of energy seeking traditional cryptographic techniques and hence require lightweight schemes to be evolved to authenticate the sensor nodes for secure communication. METHODS: Proposed lightweight mutual authentication based key agreement scheme is dependent on XOR operations and irreversible cryptographic hash functions. Scheme generates a session key to validate a pair of legitimate sensor nodes. BAN logic is used for formal verification and automatic security verification tool Scyther is used for the analysis of security protocol. RESULTS: Proposed scheme lived up to expectation when tested using BAN logic and Scyther tool. The scheme is successfully tested on 15 security parameters which are identified after a careful literature survey whereas other peer works have testified no better than 67% of the total number of security parameters. The result indicates that the proposed scheme is lightweight as the communication cost and storage requirement of the scheme have outperformed rest of the 7 schemes during performance analysis. CONCLUSION: Hence the proposed scheme is lightweight and efficient which is robust against modern attacks and performs better in comparison of its peers. © 2023 Kumar et al.
引用
下载
收藏
页码:1 / 13
页数:12
相关论文
共 50 条
  • [21] A Lightweight and Secure Anonymous User Authentication Protocol for Wireless Body Area Networks
    Zhang, Junsong
    Zhang, Qikun
    Li, Zhigang
    Lu, Xianling
    Gan, Yong
    SECURITY AND COMMUNICATION NETWORKS, 2021, 2021
  • [22] A Secure Three-Party Authentication Protocol for Wireless Body Area Networks
    Vishwakarma, Rahul
    Mohapatra, Ramesh Kumar
    2017 IEEE 3RD INTERNATIONAL CONFERENCE ON SENSING, SIGNAL PROCESSING AND SECURITY (ICSSS), 2017, : 99 - 103
  • [23] An Efficient Remote Authentication Scheme for Wireless Body Area Network
    Anyembe Andrew Omala
    Kittur P. Kibiwott
    Fagen Li
    Journal of Medical Systems, 2017, 41
  • [24] An Efficient Remote Authentication Scheme for Wireless Body Area Network
    Omala, Anyembe Andrew
    Kibiwott, Kittur P.
    Li, Fagen
    JOURNAL OF MEDICAL SYSTEMS, 2017, 41 (02)
  • [25] A secure mutual authentication protocol for roaming in wireless mesh networks
    Xiao, P. (xp1984@emails.bjut.edu.cn), 1600, Academy Publisher (07):
  • [26] Power efficient, Reliable and Secure Wireless Body Area Network
    Mohnani, Pooja
    Jabeen, Fathima
    PROCEEDINGS OF THE 10TH INDIACOM - 2016 3RD INTERNATIONAL CONFERENCE ON COMPUTING FOR SUSTAINABLE GLOBAL DEVELOPMENT, 2016, : 2722 - 2726
  • [27] MOLECULAR BIOLOGY INSPIRED MUTUAL AUTHENTICATION SCHEMES FOR WIRELESS BODY AREA NETWORK
    Ozkoc, Esma Erguner
    Mannion, Mike
    INTERNATIONAL JOURNAL ON INFORMATION TECHNOLOGIES AND SECURITY, 2021, 13 (02): : 101 - 116
  • [28] Secure and efficient roaming authentication protocol with controllable anonymity for heterogeneous wireless network
    Zhou Y.-W.
    Yang B.
    Zhang W.-Z.
    Ruan Jian Xue Bao/Journal of Software, 2016, 27 (02): : 451 - 465
  • [29] Protocol of secure mutual authentication
    Miloslavskaya, Natalia
    Tolstoy, Alexander
    Ushakov, Dmitriy
    2007 IEEE INFORMATION ASSURANCE WORKSHOP, 2007, : 43 - +
  • [30] Secure and Efficient Data Communication Protocol for Wireless Body Area Networks
    Hu, Chunqiang
    Li, Hongjuan
    Huo, Yan
    Xiang, Tao
    Liao, Xiaofeng
    IEEE TRANSACTIONS ON MULTI-SCALE COMPUTING SYSTEMS, 2016, 2 (02): : 94 - 107