An Anonymous Authentication Scheme Based on Chinese Residue Theorem in Wireless Body Area Networks

被引:1
|
作者
Zhong, Jian [1 ]
Zhao, Tao [1 ]
Xiong, Ling [1 ]
Lin, Ruixing [1 ]
Wang, Zexin [1 ]
机构
[1] Xihua Univ, Sch Comp & Software Engn, Chengdu 610039, Peoples R China
关键词
privacy-preserving; anonymous authentication; Chinese residual theorem; formal verification; KEY AGREEMENT SCHEME; USER AUTHENTICATION; MUTUAL AUTHENTICATION; SECURE; PROTOCOL; DESIGN; MANAGEMENT;
D O I
10.3390/math11132951
中图分类号
O1 [数学];
学科分类号
0701 ; 070101 ;
摘要
Considering the resource limitations of low-cost wireless sensors, there is a growing inclination to utilize cryptographic primitives that are optimized for efficiency, such as symmetric key encryption/decryption and hash functions, when designing authentication schemes. However, designing a lightweight authentication scheme that can meet various security requirements poses a significant challenge. In recent years, numerous lightweight authentication schemes have been proposed in order to address these security needs. Nevertheless, recent research has revealed that many of these schemes exhibit security vulnerabilities and design deficiencies, including challenges related to asynchronization and impractical gateway-node search operations. Due to the inadequate security of existing schemes, this study introduces a novel privacy-preserving authentication scheme that aims to provide adaptive resilience against desynchronization attacks in wireless body area networks (WBANs). The proposed scheme utilizes lightweight cryptographic modules to optimize efficiency. To ensure user anonymity, the Chinese Remainder Theorem technique is employed, whereas forward secrecy and resistance to desynchronization attacks are achieved through the use of one-way hash chains and serial numbers, respectively. Through extensive analysis and comparisons, the proposed scheme is demonstrated to strike a fine balance between security and efficiency.
引用
收藏
页数:19
相关论文
共 50 条
  • [41] Efficient Anonymous Authenticated Key Agreement Scheme for Wireless Body Area Networks
    Li, Tong
    Zheng, Yuhui
    Zhou, Ti
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2017,
  • [42] An ECG-Based Authentication Scheme for Body Area Networks
    Ivanciu, Liliana
    Ivanciu, Iustin-Alexandru
    Farago, Paul
    Hintea, Sorin
    [J]. 2019 IEEE 25TH INTERNATIONAL SYMPOSIUM FOR DESIGN AND TECHNOLOGY IN ELECTRONIC PACKAGING (SIITME 2019), 2019, : 114 - 117
  • [43] An Improved Two-Layer Authentication Scheme for Wireless Body Area Networks
    Xiaoguang Liu
    Chunhua Jin
    Fagen Li
    [J]. Journal of Medical Systems, 2018, 42
  • [44] Enabling Secure Communication in Wireless Body Area Networks with Heterogeneous Authentication Scheme
    Ullah, Insaf
    Khan, Muhammad Asghar
    Abdullah, Ako Muhammad
    Noor, Fazal
    Innab, Nisreen
    Chen, Chien-Ming
    [J]. SENSORS, 2023, 23 (03)
  • [45] New Authentication Scheme for Wireless Body Area Networks Using the Bilinear Pairing
    Chunzhi Wang
    Yanmei Zhang
    [J]. Journal of Medical Systems, 2015, 39
  • [46] An Improved Two-Layer Authentication Scheme for Wireless Body Area Networks
    Liu, Xiaoguang
    Jin, Chunhua
    Li, Fagen
    [J]. JOURNAL OF MEDICAL SYSTEMS, 2018, 42 (08)
  • [47] New Authentication Scheme for Wireless Body Area Networks Using the Bilinear Pairing
    Wang, Chunzhi
    Zhang, Yanmei
    [J]. JOURNAL OF MEDICAL SYSTEMS, 2015, 39 (11)
  • [48] Efficient and privacy-preserving authentication scheme for wireless body area networks
    Shuai, Mengxia
    Liu, Bin
    Yu, Nenghai
    Xiong, Ling
    Wang, Changhui
    [J]. JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2020, 52
  • [49] An efficient anonymous authentication and confidentiality preservation schemes for secure communications in wireless body area networks
    Azees, Maria
    Vijayakumar, Pandi
    Karuppiah, Marimuthu
    Nayyar, Anand
    [J]. WIRELESS NETWORKS, 2021, 27 (03) : 2119 - 2130
  • [50] Secure anonymous mutual authentication for star two-tier wireless body area networks
    Ibrahim, Maged Hamada
    Kumari, Saru
    Das, Ashok Kumar
    Wazid, Mohammad
    Odelu, Vanga
    [J]. COMPUTER METHODS AND PROGRAMS IN BIOMEDICINE, 2016, 135 : 37 - 50