Security in wireless body area networks via anonymous authentication: Comprehensive literature review, scheme classification, and future challenges

被引:0
|
作者
Wang, Dan [1 ,2 ,3 ]
Zhou, Jincheng [2 ,3 ,4 ]
Masdari, Mohammad [5 ]
Qasem, Sultan Noman [6 ,7 ]
Sayed, Biju Theruvil [8 ]
机构
[1] Qiannan Normal Univ Nationalities, Sch Math & Stat, Duyun 558000, Guizhou, Peoples R China
[2] Key Lab Complex Syst & Intelligent Optimizat Guizh, Duyun 558000, Guizhou, Peoples R China
[3] Key Lab Complex Syst & Intelligent Optimizat Qiann, Duyun 558000, Peoples R China
[4] Qiannan Normal Univ Nationalities, Sch Comp & Informat, Duyun 558000, Guizhou, Peoples R China
[5] Islamic Azad Univ, Dept Comp Engn, Urmia Branch, Orumiyeh, Iran
[6] Imam Mohammad Ibn Saud Islamic Univ IMSIU, Coll Comp & Informat Sci, Comp Sci Dept, Riyadh 11432, Saudi Arabia
[7] Taiz Univ, Fac Appl Sci, Comp Sci Dept, Taizi 6803, Yemen
[8] Dhofar Univ, Dept Comp Sci, POB 2509, Salalah 211, Oman
基金
中国国家自然科学基金;
关键词
WBANs; Anonymous authentication; Elliptic curve cryptography; Bilinear pairings; Security; KEY AGREEMENT SCHEME; MUTUAL AUTHENTICATION; EFFICIENT; PROTOCOL; LIGHTWEIGHT; INTERNET; ROBUST; SIGNATURE; ATTACKS; SYSTEMS;
D O I
10.1016/j.adhoc.2023.103332
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Authentication is a security practice that seeks to validate a user identity to various entities, yet doing so across a wireless network poses inherent risks. Wireless Body Area Networks (WBANs) are a unique form of network that contains e-healthcare patient data, thus WBANs require a high level of privacy and security. There are several anonymous WBAN authentication systems in the literature, but this is the first paper to conduct a complete review of all the various schemes, then tabulate and compare the results. Doing so reveals a number of research avenues that need either greater depth, or systems development. This article presents a thorough taxonomy and survey of the anonymous authentication methods, illustrating the security services and vulnerabilities, and then the properties of an ideal anonymous authentication scheme. The various schemes reviewed are also classified by their main encryption algorithm, such as bilinear parings-based schemes, elliptic curve cryptography-based solutions, lattice-based methods, and XOR-based approaches. The main authentication capabilities, cryptographic features, security advantages, evaluation metrics, and shortcomings are all specified and discussed. A thorough comparison of anonymous authentication methods is presented to demonstrate each scheme's resistance to a variety of security threats. The study concludes that very few schemes have addressed the group authentication problem, which is very important in healthcare systems. Also, in the multi-factor authentication context, which provides a higher level of security, only 11% of the schemes used three factors, and 1% of them utilized four factors. Besides, DDoS attacks, as a growing concern in all computing environments, are handled by a narrow number of schemes. At last, a set of recommendations for further research based on identified literature gaps.
引用
收藏
页数:27
相关论文
共 50 条
  • [1] Anonymous Authentication for Wireless Body Area Networks With Provable Security
    He, Debiao
    Zeadally, Sherali
    Kumar, Neeraj
    Lee, Jong-Hyouk
    IEEE SYSTEMS JOURNAL, 2017, 11 (04): : 2590 - 2601
  • [2] Efficient and Anonymous Authentication Scheme for Wireless Body Area Networks
    Libing Wu
    Yubo Zhang
    Li Li
    Jian Shen
    Journal of Medical Systems, 2016, 40
  • [3] Efficient and Anonymous Authentication Scheme for Wireless Body Area Networks
    Wu, Libing
    Zhang, Yubo
    Li, Li
    Shen, Jian
    JOURNAL OF MEDICAL SYSTEMS, 2016, 40 (06)
  • [4] Lightweight anonymous and mutual authentication scheme for wireless body area networks
    Attir, Azeddine
    Nait-Abdesselam, Farid
    Faraoun, Kamel Mohamed
    COMPUTER NETWORKS, 2023, 224
  • [5] LGAAFS: A lightweight group anonymous mutual authentication and forward security scheme for wireless body area networks
    Peng, Shuangrong
    Tang, Xiaohu
    Xiong, Ling
    Zhu, Hui
    PEER-TO-PEER NETWORKING AND APPLICATIONS, 2023, 16 (5) : 2474 - 2491
  • [6] LGAAFS: A lightweight group anonymous mutual authentication and forward security scheme for wireless body area networks
    Shuangrong Peng
    Xiaohu Tang
    Ling Xiong
    Hui Zhu
    Peer-to-Peer Networking and Applications, 2023, 16 : 2474 - 2491
  • [7] An Efficient Certificateless Remote Anonymous Authentication Scheme for Wireless Body Area Networks
    Liu, Jingwei
    Zhang, Zonghua
    Sun, Rong
    Kwak, Kyung Sup
    2012 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC), 2012,
  • [8] Efficient Anonymous Authentication for Wireless Body Area Networks
    Li, Chuang
    Xu, Chunxiang
    IEEE ACCESS, 2022, 10 : 80015 - 80026
  • [9] A bilinear pairing based anonymous authentication scheme in wireless body area networks for mHealth
    Jiang, Qi
    Lian, Xinxin
    Yang, Chao
    Ma, Jianfeng
    Tian, Youliang
    Yang, Yuanyuan
    JOURNAL OF MEDICAL SYSTEMS, 2016, 40 (11)
  • [10] A bilinear pairing based anonymous authentication scheme in wireless body area networks for mHealth
    Qi Jiang
    Xinxin Lian
    Chao Yang
    Jianfeng Ma
    Youliang Tian
    Yuanyuan Yang
    Journal of Medical Systems, 2016, 40