A Secure and Anonymous Authentication Protocol Based on Three-Factor Wireless Medical Sensor Networks

被引:9
|
作者
Lee, JoonYoung [1 ]
Oh, Jihyeon [1 ]
Park, Youngho [1 ,2 ]
机构
[1] Kyungpook Natl Univ, Sch Elect & Elect Engn, Daegu 41566, South Korea
[2] Kyungpook Natl Univ, Sch Elect Engn, Daegu 41566, South Korea
基金
新加坡国家研究基金会;
关键词
WMSN; PUF; biometrics; authentication; AVISPA; ROR; KEY EXCHANGE; SYSTEMS;
D O I
10.3390/electronics12061368
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Wireless medical sensor networks (WMSNs), a type of wireless sensor network (WSN), have enabled medical professionals to identify patients' health information in real time to identify and diagnose their conditions. However, since wireless communication is performed through an open channel, an attacker can steal or manipulate the transmitted and received information. Because these attacks are directly related to the patients' lives, it is necessary to prevent these attacks upfront by providing the security of WMSN communication. Although authentication protocols are continuously developed to establish the security of WMSN communication, they are still vulnerable to attacks. Recently, Yuanbing et al. proposed a secure authentication scheme for WMSN. They emphasized that their protocol is able to resist various attacks and can ensure mutual authentication. Unfortunately, this paper demonstrates that Yuanbing et al.'s protocol is vulnerable to smart card stolen attacks, ID/password guessing attacks, and sensor node capture attacks. In order to overcome the weaknesses and effectiveness of existing studies and to ensure secure communication and user anonymity of WMSN, we propose a secure and anonymous authentication protocol. The proposed protocol can prevent sensor capture, guessing, and man-in-the-middle attacks. To demonstrate the security of the proposed protocol, we perform various formal and informal analyses using AVISPA tools, ROR models, and BAN logic. Additionally, we compare the security aspects with related protocols to prove that the proposed protocol has excellent security. We also prove the effectiveness of our proposed protocol compared with related protocols in computation and communication costs. Our protocol has low or comparable computation and communication costs compared to related protocols. Thus, our protocol can provide services in the WMSN environment.
引用
收藏
页数:27
相关论文
共 50 条
  • [1] A Light and Anonymous Three-Factor Authentication Protocol for Wireless Sensor Networks
    Zhu, Lianghong
    Xiang, Huaikun
    Zhang, Kai
    [J]. SYMMETRY-BASEL, 2022, 14 (01):
  • [2] A Provably Secure Three-Factor Authentication Protocol for Wireless Sensor Networks
    Wu, Tsu-Yang
    Yang, Lei
    Lee, Zhiyuan
    Chu, Shu-Chuan
    Kumari, Saru
    Kumar, Sachin
    [J]. WIRELESS COMMUNICATIONS & MOBILE COMPUTING, 2021, 2021
  • [3] Secure and Efficient Three-Factor Protocol for Wireless Sensor Networks
    Ryu, Jihyeon
    Lee, Hakjun
    Kim, Hyoungshick
    Won, Dongho
    [J]. SENSORS, 2018, 18 (12)
  • [4] A secure and efficient three-factor multi-gateway authentication protocol for wireless sensor networks
    Guo, Hua
    Gao, Ya
    Xu, Tongge
    Zhang, Xiyong
    Ye, Jianfeng
    [J]. AD HOC NETWORKS, 2019, 95
  • [5] An efficient three-factor authentication protocol for wireless healthcare sensor networks
    Saini, Khushil Kumar
    Kaur, Damandeep
    Kumar, Devender
    Kumar, Bijendra
    [J]. MULTIMEDIA TOOLS AND APPLICATIONS, 2024, 83 (23) : 63699 - 63721
  • [6] A Secure and Privacy-Preserving Three-Factor Anonymous Authentication Scheme for Wireless Sensor Networks in Internet of Things
    Xie, Qi
    Ding, Zixuan
    Hu, Bin
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2021, 2021
  • [7] A Secure Three-Factor User Authentication Protocol With Forward Secrecy for Wireless Medical Sensor Network Systems
    Li, Xiong
    Peng, Jieyao
    Obaidat, Mohammad S.
    Wu, Fan
    Khan, Muhammad Khurram
    Chen, Chaoyang
    [J]. IEEE SYSTEMS JOURNAL, 2020, 14 (01): : 39 - 50
  • [8] A secure three-factor authentication protocol for mobile networks
    Kumar, Devender
    Chand, Satish
    Kumar, Bijendra
    [J]. INTERNATIONAL JOURNAL OF INFORMATION AND COMPUTER SECURITY, 2024, 23 (02)
  • [9] On the Design of Secure and Efficient Three-Factor Authentication Protocol Using Honey List for Wireless Sensor Networks
    Lee, Joonyoung
    Yu, Sungjin
    Kim, Myeonghyun
    Park, Youngho
    Das, Ashok Kumar
    [J]. IEEE ACCESS, 2020, 8 : 107046 - 107062
  • [10] A secure three-factor authentication scheme for wireless sensor networks using ECC
    Kumar, Devender
    Singh, Harsh Kumar
    Ahlawat, Chhahat
    [J]. JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY, 2020, 23 (04): : 879 - 900