A provably secure and efficient anonymous mutual authentication and key agreement protocol for wearable devices in WBAN

被引:40
|
作者
Gupta, Ankur [1 ]
Tripathi, Meenakshi [1 ]
Sharma, Aakar [2 ]
机构
[1] Malaviya Natl Inst Technol Jaipur, Jaipur, Rajasthan, India
[2] Indian Inst Technol Jammu, Jammu, Jammu & Kashmir, India
关键词
WBAN; Healthcare; Mutual authentication; Anonymity; BAN-Logic; ROR model; AVISPA tool; 2-FACTOR USER AUTHENTICATION; BODY AREA NETWORKS; ENERGY-CONSUMPTION; SMART CARD; SCHEME; CRYPTANALYSIS; EXCHANGE; INTERNET;
D O I
10.1016/j.comcom.2020.06.010
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Wireless body area networks (WBAN) is a novel paradigm that is gaining popularity in a scenario of current wireless communication systems. It plays an essential role in healthcare applications like remote monitoring of health data. For instance, the crucial and confidential data about the condition of the patient's physical health can be gathered and transferred through WBAN. Therefore, authentication and session key-agreements are integral security concerns for wearable sensors in WBAN. Moreover, as the wearable devices are resource-constraints, there is a need to develop a lightweight protocol to ensure authenticity, confidentiality, and integrity of the information. Li et al. presented an anonymous mutual authentication protocol to establish a session-key among wearable sensor nodes and the local hub node. However, after an in-depth analysis, we found that their scheme is susceptible to an intermediate node capture attack, and sensor node/hub node impersonation with intermediate node capture attacks. The scheme also does not provide anonymity with unlinkable sessions. This paper proposes a new anonymous mutual authentication and key agreement protocol in WBAN to overcome the security weaknesses in Li et al.'s protocol. The proposed protocol uses only basic symmetric cryptosystems like simple XOR and cryptographic hash functions; hence, it is efficient and lightweight. The validly and the correctness of the proposed protocol are evaluated using BAN-Logic, Real-Or-Random (ROR) model, and the broadly accepted AVISPA tool. The performance comparison of the proposed protocol with the existing related protocols shows the efficiency regarding communication and computational complexities. Hence, it is suitable to be used in real-life applications.
引用
收藏
页码:311 / 325
页数:15
相关论文
共 50 条
  • [21] An anonymous and secure authentication and key agreement scheme for session initiation protocol
    Hao Lin
    Fengtong Wen
    Chunxia Du
    [J]. Multimedia Tools and Applications, 2017, 76 : 2315 - 2329
  • [22] A Provably Secure Identity-based Authentication Multiple Key Agreement Protocol
    Tan Zuowen
    [J]. CHINA COMMUNICATIONS, 2011, 8 (02) : 26 - 33
  • [23] A new provably secure authentication and key agreement protocol for SIP using ECC
    Wu, Liufei
    Zhang, Yuqing
    Wang, Fengjiao
    [J]. COMPUTER STANDARDS & INTERFACES, 2009, 31 (02) : 286 - 291
  • [24] Provably secure and efficient anonymous ID-based authentication protocol for mobile devices using bilinear pairings
    Jia-Lun Tsai
    Nai-Wei Lo
    [J]. Wireless Personal Communications, 2015, 83 : 1273 - 1286
  • [25] Secure and Efficient Anonymous Authentication Key Agreement Scheme for Smart Industry
    Su, Xing
    Xie, Yong
    Wang, Hui
    Liu, Wei
    Shui, Dingyi
    [J]. 2022 IEEE 28TH INTERNATIONAL CONFERENCE ON PARALLEL AND DISTRIBUTED SYSTEMS, ICPADS, 2022, : 250 - 257
  • [26] Provably secure and efficient anonymous ID-based authentication protocol for mobile devices using bilinear pairings
    Tsai, Jia-Lun
    Lo, Nai-Wei
    [J]. WIRELESS PERSONAL COMMUNICATIONS, 2015, 83 (02) : 1273 - 1286
  • [27] Provably secure and efficient identification and key agreement protocol with user anonymity
    Wang, Ren-Chiun
    Juang, Wen-Shenq
    Lei, Chin-Laung
    [J]. JOURNAL OF COMPUTER AND SYSTEM SCIENCES, 2011, 77 (04) : 790 - 798
  • [28] Provably secure and efficient certificateless authenticated tripartite key agreement protocol
    Xiong, Hu
    Chen, Zhong
    Li, Fagen
    [J]. MATHEMATICAL AND COMPUTER MODELLING, 2012, 55 (3-4) : 1213 - 1221
  • [29] Improving an Anonymous and Provably Secure Authentication Protocol for a Mobile User
    Moon, Jongho
    Lee, Youngsook
    Kim, Jiye
    Won, Dongho
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2017,
  • [30] Secure and Efficient Certificateless Authentication Key Agreement Protocol in VANET
    Wei, Guoheng
    Qin, Yanlin
    Fu, Wei
    [J]. EMERGING INFORMATION SECURITY AND APPLICATIONS, EISA 2022, 2022, 1641 : 160 - 172