Privacy Preserving Three-factor Authentication Protocol for Secure Message Forwarding in Wireless Body Area Networks

被引:36
作者
Nyangaresi, Vincent Omollo [1 ]
机构
[1] Tom Mboya Univ, Fac Biol & Phys Sci, Homabay 19940300, Kenya
关键词
Authentication; WBAN; privacy; security; anonymous; performance; ANONYMOUS MUTUAL AUTHENTICATION; KEY AGREEMENT PROTOCOL; USER AUTHENTICATION; PROVABLY SECURE; SCHEME; SYSTEMS; PROTECTION;
D O I
10.1016/j.adhoc.2023.103117
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Wireless body area networks have gained popularity due to their ability to enhance efficiency, flexibility, con-venience and the quality of life. In this environment, the patient physiological data is collected by the biosensors and transmitted over public channels to remote servers. Here, the data is analyzed to facilitate decision making such as injection of some drugs into the patient's body. During the message exchange over public channels, numerous active and passive attacks can be launched. Although many protocols have been developed to address these issues, many vulnerabilities and performance constraints are inherent in these schemes. As such, the design of secure and efficient security protocols suitable for wireless body area networks is still a challenging task. In this paper, a three-factor authentication protocol is developed which encompass patient biometric data, smart card and password. Its formal analysis using both Real-Or-Random (ROR) model and Burrows-Abadi-Needham (BAN) logic shows that it is provably secure. In addition, the semantic security analysis shows that it is secure under the Dolev-Yao (DY) and Canetti-Krawczyk (CK) threat models. In terms of performance, it is demonstrated to result in a 43.98% reduction in computation overheads, 18.18% in number of supported security character-istics and a 19.05% reduction in space complexities.
引用
收藏
页数:15
相关论文
共 67 条
[1]  
Al Shayokh M, 2016, 2016 INTERNATIONAL CONFERENCE ON CONTROL, ELECTRONICS, RENEWABLE ENERGY AND COMMUNICATIONS (ICCEREC), P12, DOI 10.1109/ICCEREC.2016.7814973
[2]   Survey of main challenges (security and privacy) in wireless body area networks for healthcare applications [J].
Al-Janabi, Samaher ;
Al-Shourbaji, Ibrahim ;
Shojafar, Mohammad ;
Shamshirband, Shahaboddin .
EGYPTIAN INFORMATICS JOURNAL, 2017, 18 (02) :113-122
[3]   A secure ECC-based RFID mutual authentication protocol for internet of things [J].
Alamr, Amjad Ali ;
Kausar, Firdous ;
Kim, Jongsung ;
Seo, Changho .
JOURNAL OF SUPERCOMPUTING, 2018, 74 (09) :4281-4294
[4]   A robust authentication and access control protocol for securing wireless healthcare sensor networks [J].
Ali, Zeeshan ;
Ghani, Anwar ;
Khan, Imran ;
Chaudhry, Shehzad Ashraf ;
Islam, S. K. Hafizul ;
Giri, Debasis .
JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2020, 52
[5]   Cryptanalysis and Enhancement of Anonymity Preserving Remote User Mutual Authentication and Session Key Agreement Scheme for E-Health Care Systems [J].
Amin, Ruhul ;
Islam, S. K. Hafizul ;
Biswas, G. P. ;
Khan, Muhammad Khurram ;
Li, Xiong .
JOURNAL OF MEDICAL SYSTEMS, 2015, 39 (11)
[6]   A Perspective Review of Security Challenges in Body Area Networks for Healthcare Applications [J].
Ananthi, J. Vijitha ;
Jose, P. Subha Hency .
INTERNATIONAL JOURNAL OF WIRELESS INFORMATION NETWORKS, 2021, 28 (04) :451-466
[7]   A Survey of Authentication Schemes in Telecare Medicine Information Systems [J].
Aslam, Muhammad Umair ;
Derhab, Abdelouahid ;
Saleem, Kashif ;
Abbas, Haider ;
Orgun, Mehmet ;
Iqbal, Waseem ;
Aslam, Baber .
JOURNAL OF MEDICAL SYSTEMS, 2017, 41 (01)
[8]   Security and privacy issues in e-health cloud-based system: A comprehensive content analysis [J].
Azeez, Nureni Ayofe ;
Van der Vyver, Charles .
EGYPTIAN INFORMATICS JOURNAL, 2019, 20 (02) :97-108
[9]   Design of an Anonymity-Preserving Group Formation Based Authentication Protocol in Global Mobility Networks [J].
Banerjee, Soumya ;
Odelu, Vanga ;
Das, Ashok Kumar ;
Chattopadhyay, Samiran ;
Kumar, Neeraj ;
Park, Youngho ;
Tanwar, Sudeep .
IEEE ACCESS, 2018, 6 :20673-20693
[10]  
Basnet A., 2019, International Journal of Communication Networks and Information Security, V11, P93