An Adaptive Synchronous Lightweight AKA Protocol With Authority Management for Wireless Medical Sensor Networks

被引:0
作者
Zhang, Lei [1 ]
Wu, Ting [1 ]
Liu, Jianwei [2 ]
Guan, Zhenyu [2 ]
Yin, Xiaodong [3 ]
机构
[1] Beihang Univ, Res Ctr Cyberspace Secur, Hangzhou Innovat Inst, Hangzhou 310052, Peoples R China
[2] Beihang Univ, Sch Cyber Sci & Technol, Beijing 100083, Peoples R China
[3] Zhejiang Elect Informat Prod Inspect & Res Inst, Key Lab Informat Secur Zhejiang Prov, Hangzhou 310000, Peoples R China
来源
IEEE SYSTEMS JOURNAL | 2024年
关键词
Authentication; Security; Protocols; Passwords; Medical services; Wireless sensor networks; Wireless communication; Biometrics; Cryptography; Communication system security; Authentication and key agreement (AKA); healthcare; lightweight; real-or-random (RoR) model; wireless medical sensor networks (WMSNs); ANONYMOUS MUTUAL AUTHENTICATION; KEY AGREEMENT PROTOCOL; PROVABLY SECURE; SCHEME; EFFICIENT; ROBUST;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The advancement of wireless network technology has propelled wireless medical sensor networks (WMSNs) to transform healthcare, offering efficient communication for enhanced quality of life. These networks employ sensitive and resource-efficient sensors to monitor and transmit patients' vital health data to medical professionals through wireless channels. However, the openness of these channels risks unauthorized access and data tampering, jeopardizing patient privacy and treatment efficacy. Ensuring the integrity and confidentiality of health data is crucial. Current authentication and key agreement (AKA) protocols have limitations, including susceptibility to sensor information disclosure and security flaws due to excessive user authority and mismatched pseudorandom identities. Given the resource constraints of WMSNs, traditional cryptographic methods are not always suitable. To overcome these challenges, a lightweight AKA protocol with self-adaptive synchronization and authority management is proposed. Formal verification through the real-or-random model, BAN logic, and ProVerif tool confirms its security and availability, while informal analysis demonstrates its robust security features. Comparative analysis with recent schemes also highlights its superiority and fitness for WMSNs.
引用
收藏
页数:12
相关论文
共 36 条
[1]  
Abdalla M, 2005, LECT NOTES COMPUT SC, V3386, P65
[2]   An enhanced three factor based authentication protocol using wireless medical sensor networks for healthcare monitoring [J].
Ali R. ;
Pal A.K. ;
Kumari S. ;
Sangaiah A.K. ;
Li X. ;
Wu F. .
Journal of Ambient Intelligence and Humanized Computing, 2024, 15 (01) :1165-1186
[3]   A Lightweight and Secure Anonymity Preserving Protocol for WBAN [J].
Almuhaideb, Abdullah M. ;
Alqudaihi, Kawther S. .
IEEE ACCESS, 2020, 8 :178183-178194
[4]   Securing the IoT-enabled smart healthcare system: A PUF-based resource-efficient authentication mechanism [J].
Alruwaili, Omar ;
Tanveer, Muhammad ;
Alotaibi, Faisal Mohammed ;
Abdelfattah, Waleed ;
Armghan, Ammar ;
Alserhani, Faeiz M. .
HELIYON, 2024, 10 (18)
[5]   A secure and efficient remote patient-monitoring authentication protocol for cloud-IoT [J].
Alzahrani, Bander A. ;
Irshad, Azeem ;
Alsubhi, Khalid ;
Albeshri, Aiiad .
INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2020, 33 (11)
[6]   An efficient cryptographic protocol verifier based on prolog rules [J].
Blanchet, B .
14TH IEEE COMPUTER SECURITY FOUNDATIONS WORKSHOP, PROCEEDINGS, 2001, :82-96
[7]  
Boyko V, 2000, LECT NOTES COMPUT SC, V1807, P156
[8]  
BURROWS M, 1990, ACM T COMPUT SYST, V8, P18, DOI [10.1145/77648.77649, 10.1145/74851.74852]
[9]   An extended ECC-based anonymity-preserving 3-factor remote authentication scheme usable in TMIS [J].
Chandrakar, Preeti ;
Om, Hari .
INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2018, 31 (08)
[10]  
Dolev D., 1981, 22nd Annual Symposium on Foundations of Computer Science, P350, DOI 10.1109/SFCS.1981.32