A provably secure and efficient anonymous mutual authentication and key agreement protocol for wearable devices in WBAN

被引:40
|
作者
Gupta, Ankur [1 ]
Tripathi, Meenakshi [1 ]
Sharma, Aakar [2 ]
机构
[1] Malaviya Natl Inst Technol Jaipur, Jaipur, Rajasthan, India
[2] Indian Inst Technol Jammu, Jammu, Jammu & Kashmir, India
关键词
WBAN; Healthcare; Mutual authentication; Anonymity; BAN-Logic; ROR model; AVISPA tool; 2-FACTOR USER AUTHENTICATION; BODY AREA NETWORKS; ENERGY-CONSUMPTION; SMART CARD; SCHEME; CRYPTANALYSIS; EXCHANGE; INTERNET;
D O I
10.1016/j.comcom.2020.06.010
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Wireless body area networks (WBAN) is a novel paradigm that is gaining popularity in a scenario of current wireless communication systems. It plays an essential role in healthcare applications like remote monitoring of health data. For instance, the crucial and confidential data about the condition of the patient's physical health can be gathered and transferred through WBAN. Therefore, authentication and session key-agreements are integral security concerns for wearable sensors in WBAN. Moreover, as the wearable devices are resource-constraints, there is a need to develop a lightweight protocol to ensure authenticity, confidentiality, and integrity of the information. Li et al. presented an anonymous mutual authentication protocol to establish a session-key among wearable sensor nodes and the local hub node. However, after an in-depth analysis, we found that their scheme is susceptible to an intermediate node capture attack, and sensor node/hub node impersonation with intermediate node capture attacks. The scheme also does not provide anonymity with unlinkable sessions. This paper proposes a new anonymous mutual authentication and key agreement protocol in WBAN to overcome the security weaknesses in Li et al.'s protocol. The proposed protocol uses only basic symmetric cryptosystems like simple XOR and cryptographic hash functions; hence, it is efficient and lightweight. The validly and the correctness of the proposed protocol are evaluated using BAN-Logic, Real-Or-Random (ROR) model, and the broadly accepted AVISPA tool. The performance comparison of the proposed protocol with the existing related protocols shows the efficiency regarding communication and computational complexities. Hence, it is suitable to be used in real-life applications.
引用
收藏
页码:311 / 325
页数:15
相关论文
共 50 条
  • [1] A lightweight and flexible mutual authentication and key agreement protocol for wearable sensing devices in WBAN
    Thota, Sandeep Kumar Reddy
    Mala, C.
    Krishnan, Geetha
    [J]. INTERNATIONAL JOURNAL OF PERVASIVE COMPUTING AND COMMUNICATIONS, 2022,
  • [2] An Anonymous Mutual Authentication and Key Agreement Scheme in WBAN
    Meng, Xiangwei
    Xu, Jianbo
    Liang, Wei
    Li, Kuan-Ching
    [J]. 2019 IEEE 5TH INTL CONFERENCE ON BIG DATA SECURITY ON CLOUD (BIGDATASECURITY) / IEEE INTL CONFERENCE ON HIGH PERFORMANCE AND SMART COMPUTING (HPSC) / IEEE INTL CONFERENCE ON INTELLIGENT DATA AND SECURITY (IDS), 2019, : 31 - 36
  • [3] A provably secure anonymous mutual authentication scheme with key agreement for SIP using ECC
    Xu, Dongqing
    Zhang, Shu
    Chen, Jianhua
    Ma, Mimi
    [J]. PEER-TO-PEER NETWORKING AND APPLICATIONS, 2018, 11 (05) : 837 - 847
  • [4] A provably secure anonymous mutual authentication scheme with key agreement for SIP using ECC
    Dongqing Xu
    Shu Zhang
    Jianhua Chen
    Mimi Ma
    [J]. Peer-to-Peer Networking and Applications, 2018, 11 : 837 - 847
  • [5] A lightweight anonymous mutual authentication and key agreement scheme for WBAN
    Xu, Zisang
    Xu, Cheng
    Chen, Haixian
    Yang, Fang
    [J]. CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2019, 31 (14):
  • [6] A lightweight and anonymous mutual authentication and key agreement scheme for WBAN
    Marandi, Saba
    Moazami, Farokhlagha
    Malekinezhad, Amir
    [J]. PEER-TO-PEER NETWORKING AND APPLICATIONS, 2024, 17 (04) : 2555 - 2571
  • [7] An Efficient and Provably Secure Anonymous User Authentication and Key Agreement for Mobile Cloud Computing
    Mo, Jiaqing
    Hu, Zhongwang
    Chen, Hang
    Shen, Wei
    [J]. WIRELESS COMMUNICATIONS & MOBILE COMPUTING, 2019, 2019
  • [8] An efficient provably secure authentication and key agreement protocol for satellite communication networks
    Thakur, Garima
    Obaidat, Mohammad S.
    Sharma, Piyush
    Prajapat, Sunil
    Kumar, Pankaj
    [J]. SECURITY AND PRIVACY, 2024,
  • [9] ISAKA: Improved Secure Authentication and Key Agreement protocol for WBAN
    Javad Alizadeh
    Masoumeh Safkhani
    Amir Allahdadi
    [J]. Wireless Personal Communications, 2022, 126 : 2911 - 2935
  • [10] ISAKA: Improved Secure Authentication and Key Agreement protocol for WBAN
    Alizadeh, Javad
    Safkhani, Masoumeh
    Allahdadi, Amir
    [J]. WIRELESS PERSONAL COMMUNICATIONS, 2022, 126 (04) : 2911 - 2935