An efficient and secure mutual authentication protocol in wireless body area network

被引:0
作者
Kumar M. [1 ]
Hussain S.Z. [1 ]
机构
[1] Department of Computer Science, Jamia Millia Islamia
基金
中国国家自然科学基金; 中国博士后科学基金;
关键词
BAN logic; Scyther tool; cryptographic hash functions; formal verification; key agreement; mutual authentication; wearable bio-sensors; wireless body area network; XOR operations;
D O I
10.4108/eetpht.9.3114
中图分类号
学科分类号
摘要
INTRODUCTION: Wireless Body Area Network (WBAN) is an emerging field which is gaining a lot of attention in healthcare sector. It facilitates remote monitoring by gathering health related data using wearable bio-sensors based on Internet of Things (IoT). This technological advancement would significantly improve the tracking of fitness, health care delivery, medical diagnostics, early disease prediction, and associated medical dealings of any individual. Several challenges persist in WBAN due to its openness and mobility. OBJECTIVES: The medical data is extremely sensitive and personal in nature therefore it must be protected at any cost while being communicated between nodes. Highly resource constrained tiny sized bio-sensors restrict the usage of energy seeking traditional cryptographic techniques and hence require lightweight schemes to be evolved to authenticate the sensor nodes for secure communication. METHODS: Proposed lightweight mutual authentication based key agreement scheme is dependent on XOR operations and irreversible cryptographic hash functions. Scheme generates a session key to validate a pair of legitimate sensor nodes. BAN logic is used for formal verification and automatic security verification tool Scyther is used for the analysis of security protocol. RESULTS: Proposed scheme lived up to expectation when tested using BAN logic and Scyther tool. The scheme is successfully tested on 15 security parameters which are identified after a careful literature survey whereas other peer works have testified no better than 67% of the total number of security parameters. The result indicates that the proposed scheme is lightweight as the communication cost and storage requirement of the scheme have outperformed rest of the 7 schemes during performance analysis. CONCLUSION: Hence the proposed scheme is lightweight and efficient which is robust against modern attacks and performs better in comparison of its peers. © 2023 Kumar et al.
引用
收藏
页码:1 / 13
页数:12
相关论文
共 52 条
[1]  
Riazul Islam S. M., Kwak D., Kabir M. H., Hossain M., Kyung-Sup Kwak A., The Internet of Things for Health Care: A Comprehensive Survey, IEEE Access, 3, pp. 678-708, (2015)
[2]  
Wu K., Laghari R. A., Ali M., Khan A. A., A Review and State of Art of Internet of things(IoT), Archives of Computational Methods in Engineering, 29, 3, pp. 1395-1413, (2022)
[3]  
Huang I. S., Lu Y.H., Shafiq M., Laghari A. A., Yadav R., A Generative Adversarial Network Model Based on Intelligent Data Analytics for Music Emotion Recognition under IoT, Mobile Information Systems, 2021, (2021)
[4]  
Kumar M., Security Issues and Privacy Concerns in the Implementation of Wireless Body Area Network, 2014 International Conference on Information Technology, pp. 58-62, (2014)
[5]  
Kompara M., Holbl M., Survey on Security in Intra-body Area Network Communication, Ad Hoc Networks, 70, pp. 23-43, (2018)
[6]  
Gravina R., Fortino G., Wearable Body Sensor Networks: State-of-the-Art and Research Directions, IEEE Sensors Journal, 21, 11, pp. 12511-12522, (2021)
[7]  
Delgado-Vargas K. A., Gallegos-Garcia G., Escamilla-Ambrosio P. J., Cryptographic Protocol with Keyless Sensors Authentication for WBAN in Healthcare Applications, Applied Sciences, 13, 3, (2023)
[8]  
Izza S., Benssalah M., Drouiche K., An enhanced scalable and secure RFID authentication protocol for WBAN within an IoT environment, Journal of Information Security and Applications, 58, (2021)
[9]  
Waqas M., Kumar K., Laghari A. A., Saeed U., Rind M. M., Shaikh A. A., Hussain F., Rai A., Qazi A. Q., Botnet attack detection in Internet of Things devices over cloud environment via machine learning, Concurrency and Computation Practice and Experience, 34, 4, (2022)
[10]  
Nazir Rashid, Laghari A.A., Kumar K., David S., Ali M., Survey on Wireless Network Security, Archives of Computational Methods in Engineering, 29, 3, pp. 1-20, (2022)