A Combined Approach of PUF and Physiological Data for Mutual Authentication and Key Agreement in WMSN

被引:2
作者
Rai, Shanvendra [1 ]
Paul, Rituparna [2 ]
Banerjee, Subhasish [1 ]
Meher, Preetisudha [2 ]
Sah, Gulab [3 ]
机构
[1] Natl Inst Technol Arunachal Pradesh, Dept Comp Sci & Engn, Jote, India
[2] Natl Inst Technol Arunachal Pradesh, Dept Elect & Commun Engn, Jote, India
[3] B V Raju Inst Technol, Dept Comp Sci & Engn Artificial Intelligence & Mac, Narsapur, Telangana, India
关键词
WMSN; PUF; Authentication; Key Agreement; ECG; USER AUTHENTICATION; 2-FACTOR AUTHENTICATION; SCHEME; PROTOCOL; LIGHTWEIGHT; INTERNET; EFFICIENT; IOT;
D O I
10.1007/s10723-023-09731-5
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Wireless Medical Sensor Network (WMSN) is a kind of Ad-hoc Network that is used in the health sector to continuously monitor patients' health conditions and provide instant medical services, over a distance. This network facilitates the transmission of real-time patient data, sensed by resource-constrained biosensors, to the end user through an open communication channel. Thus, any modification or alteration in such sensed physiological data leads to the wrong diagnosis which may put the life of the patient in danger. Therefore, among many challenges in WMSN, the security is most essential requirement that needs to be addressed. Hence, to maintain the security and privacy of sensitive medical data, this article proposed a lightweight mutual authentication and key agreement (AKA) scheme using Physical Unclonable Functions (PUFs) enabled sensor nodes. Moreover, to make the WMSN more secure and reliable, the physiological data like the electrocardiogram (ECG) of the patients are also considered. In order to establish its accuracy and security, the scheme undergoes validation through the Real or Random (RoR) Model and is further confirmed through simulation using the Automated Validation of Internet Security Protocols and Applications (AVISPA) tool. A thorough examination encompassing security, performance, and a comparative assessment with existing related schemes illustrates that the proposed scheme not only exhibits superior resistance to well-known attacks in comparison to others but also upholds a cost-effective strategy at the sensor node, specifically, a reduction of 35.71% in computational cost and 49.12% in communication cost.
引用
收藏
页数:22
相关论文
共 57 条
  • [1] Key Agreement Schemes in Wireless Body Area Networks: Taxonomy and State-of-the-Art
    Ali, Aftab
    Khan, Farrukh Aslam
    [J]. JOURNAL OF MEDICAL SYSTEMS, 2015, 39 (10)
  • [2] An enhanced three factor based authentication protocol using wireless medical sensor networks for healthcare monitoring
    Ali R.
    Pal A.K.
    Kumari S.
    Sangaiah A.K.
    Li X.
    Wu F.
    [J]. Journal of Ambient Intelligence and Humanized Computing, 2024, 15 (01) : 1165 - 1186
  • [3] Authentication in the Internet of Medical Things: Taxonomy, Review, and Open Issues
    Alsaeed, Norah
    Nadeem, Farrukh
    [J]. APPLIED SCIENCES-BASEL, 2022, 12 (15):
  • [4] A Privacy-Preserving and Scalable Authentication Protocol for the Internet of Vehicles
    Aman, Muhammad Naveed
    Javaid, Uzair
    Sikdar, Biplab
    [J]. IEEE INTERNET OF THINGS JOURNAL, 2021, 8 (02) : 1123 - 1139
  • [5] Two-Factor Authentication for IoT With Location Information
    Aman, Muhammad Naveed
    Basheer, Mohamed Haroon
    Sikdar, Biplab
    [J]. IEEE INTERNET OF THINGS JOURNAL, 2019, 6 (02): : 3335 - 3351
  • [6] A robust and anonymous patient monitoring system using wireless medical sensor networks
    Amin, Ruhul
    Islam, S. K. Hafizul
    Biswas, G. P.
    Khan, Muhammad Khurram
    Kumar, Neeraj
    [J]. FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2018, 80 : 483 - 495
  • [7] Armando A, 2005, LECT NOTES COMPUT SC, V3576, P281
  • [8] AVISPA S, 2019, the Security Protocol ANimator for AVISPA
  • [9] End-To-End Design of a PUF-Based Privacy Preserving Authentication Protocol
    Aysu, Aydin
    Gulcan, Ege
    Moriyama, Daisuke
    Schaumont, Patrick
    Yung, Moti
    [J]. CRYPTOGRAPHIC HARDWARE AND EMBEDDED SYSTEMS - CHES 2015, 2015, 9293 : 556 - 576
  • [10] Physically Secure Lightweight Anonymous User Authentication Protocol for Internet of Things Using Physically Unclonable Functions
    Banerjee, Soumya
    Odelu, Vanga
    Das, Ashok Kumar
    Chattopadhyay, Samiran
    Rodrigues, Joel J. P. C.
    Park, Youngho
    [J]. IEEE ACCESS, 2019, 7 : 85627 - 85644