An efficient and secure mutual authentication protocol in wireless body area network

被引:0
|
作者
Kumar M. [1 ]
Hussain S.Z. [1 ]
机构
[1] Department of Computer Science, Jamia Millia Islamia
基金
中国国家自然科学基金; 中国博士后科学基金;
关键词
BAN logic; Scyther tool; cryptographic hash functions; formal verification; key agreement; mutual authentication; wearable bio-sensors; wireless body area network; XOR operations;
D O I
10.4108/eetpht.9.3114
中图分类号
学科分类号
摘要
INTRODUCTION: Wireless Body Area Network (WBAN) is an emerging field which is gaining a lot of attention in healthcare sector. It facilitates remote monitoring by gathering health related data using wearable bio-sensors based on Internet of Things (IoT). This technological advancement would significantly improve the tracking of fitness, health care delivery, medical diagnostics, early disease prediction, and associated medical dealings of any individual. Several challenges persist in WBAN due to its openness and mobility. OBJECTIVES: The medical data is extremely sensitive and personal in nature therefore it must be protected at any cost while being communicated between nodes. Highly resource constrained tiny sized bio-sensors restrict the usage of energy seeking traditional cryptographic techniques and hence require lightweight schemes to be evolved to authenticate the sensor nodes for secure communication. METHODS: Proposed lightweight mutual authentication based key agreement scheme is dependent on XOR operations and irreversible cryptographic hash functions. Scheme generates a session key to validate a pair of legitimate sensor nodes. BAN logic is used for formal verification and automatic security verification tool Scyther is used for the analysis of security protocol. RESULTS: Proposed scheme lived up to expectation when tested using BAN logic and Scyther tool. The scheme is successfully tested on 15 security parameters which are identified after a careful literature survey whereas other peer works have testified no better than 67% of the total number of security parameters. The result indicates that the proposed scheme is lightweight as the communication cost and storage requirement of the scheme have outperformed rest of the 7 schemes during performance analysis. CONCLUSION: Hence the proposed scheme is lightweight and efficient which is robust against modern attacks and performs better in comparison of its peers. © 2023 Kumar et al.
引用
下载
收藏
页码:1 / 13
页数:12
相关论文
共 50 条
  • [31] SAMAKA: Secure and Anonymous Mutual Authentication and Key Agreement Scheme for Wireless Body Area Networks
    Bhawna Narwal
    Amar Kumar Mohapatra
    Arabian Journal for Science and Engineering, 2021, 46 : 9197 - 9219
  • [32] SAMAKA: Secure and Anonymous Mutual Authentication and Key Agreement Scheme for Wireless Body Area Networks
    Narwal, Bhawna
    Mohapatra, Amar Kumar
    ARABIAN JOURNAL FOR SCIENCE AND ENGINEERING, 2021, 46 (09) : 9197 - 9219
  • [33] Secure anonymous mutual authentication for star two-tier wireless body area networks
    Ibrahim, Maged Hamada
    Kumari, Saru
    Das, Ashok Kumar
    Wazid, Mohammad
    Odelu, Vanga
    COMPUTER METHODS AND PROGRAMS IN BIOMEDICINE, 2016, 135 : 37 - 50
  • [34] A secure and efficient mutual authentication protocol using hash function
    Lin, Sida
    Xie, Qi
    2009 WRI INTERNATIONAL CONFERENCE ON COMMUNICATIONS AND MOBILE COMPUTING: CMC 2009, VOL 3, 2009, : 545 - +
  • [35] A secure and efficient mutual authentication scheme for session initiation protocol
    Lu, Yanrong
    Li, Lixiang
    Peng, Haipeng
    Yang, Yixian
    PEER-TO-PEER NETWORKING AND APPLICATIONS, 2016, 9 (02) : 449 - 459
  • [36] A secure and efficient mutual authentication scheme for session initiation protocol
    Yanrong Lu
    Lixiang Li
    Haipeng Peng
    Yixian Yang
    Peer-to-Peer Networking and Applications, 2016, 9 : 449 - 459
  • [37] A Secure and Efficient Handover Authentication Protocol for Wireless Networks
    Wang, Weijia
    Hu, Lei
    SENSORS, 2014, 14 (07) : 11379 - 11394
  • [38] An Enhanced Energy Efficient Protocol for Wireless Body Area Network
    Gupta, Smita Sagar
    Gupta, Neetesh
    Verma, Bhupendra
    2022 SECOND INTERNATIONAL CONFERENCE ON ADVANCES IN ELECTRICAL, COMPUTING, COMMUNICATION AND SUSTAINABLE TECHNOLOGIES (ICAECT), 2022,
  • [39] A secure key exchange and mutual authentication protocol for wireless mobile communications
    He Yijun
    Xu Nan
    Li Jie
    ARES 2007: SECOND INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY AND SECURITY, PROCEEDINGS, 2007, : 558 - +
  • [40] Anonymous hybrid mutual authentication and key agreement scheme for wireless body area network
    Koya, Aneesh M.
    Deepthi, P. P.
    COMPUTER NETWORKS, 2018, 140 : 138 - 151