An efficient and secure CLAKA protocol for blockchain-aided wireless body area networks

被引:5
作者
Singh, Anuj Kumar [1 ]
Kumar, Sachin [2 ]
机构
[1] Amity Univ Madhya Pradesh, Amity Sch Engn & Technol, Gwalior, India
[2] South Ural State Univ, Natl Res Univ, Big Data & Machine Learning Lab, Chelyabinsk, Russia
基金
俄罗斯科学基金会;
关键词
Authentication; WBAN; Key-agreement; Decentralized; CLAKA; Blockchain; Security; AUTHENTICATED KEY AGREEMENT; SCHEME;
D O I
10.1016/j.eswa.2023.122740
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
The effective usage of a WBAN elaborated as a wireless body area network in remote healthcare services is made conceivable by the speedy progression of wireless transmission technologies. Wearable sensors are used in WBANs to gather patient health information and communicate it over a public channel to the controller node. Due to the wireless nature of communication, many attacks can be attempted over WBAN communication. This necessitates an appropriately authenticated key agreement mechanism and protected information transfer be-tween the user's device and the controller node. The key escrow issue plagues identity-based systems and is avoided by certificateless authenticated key agreement (CLAKA) protocols, which also eliminate certificateless operational overheads in public key infrastructure. This paper proposes an efficient and secure protocol named ES-CLAKA for WBANs based on blockchain, which satisfies multiple security features. Informal analysis confirms that the attributes of forward security, key security, known temporary key security, key control security, key escrow, anonymity, verifiability, consensus, immutability, and unknown key share are fulfilled by ES-CLAKA. The security of the authenticated key-establishment phase and the concealment of the established key have been established through a formal analysis of the ES-CLAKA protocol utilizing the BAN logic and the ROR model, respectively. Results show that compared to the other most effective CLAKA protocols, ES-CLAKA consumes 47.4% less computational time, 20% less communication bandwidth, and 16.67% less storage overhead under reasonable assumptions. Comparative assessment of the security attributes has revealed that, when equated to other analogous schemes, the proposed ES-CLAKA protocol offers the highest level of security.
引用
收藏
页数:15
相关论文
共 50 条
[1]  
Abdalla M, 2005, LECT NOTES COMPUT SC, V3386, P65
[2]  
Ajaz F., 2021, AI and Machine Learning Paradigms for Health Monitoring System, P95
[3]   Survey of main challenges (security and privacy) in wireless body area networks for healthcare applications [J].
Al-Janabi, Samaher ;
Al-Shourbaji, Ibrahim ;
Shojafar, Mohammad ;
Shamshirband, Shahaboddin .
EGYPTIAN INFORMATICS JOURNAL, 2017, 18 (02) :113-122
[4]  
Al-Riyami SS, 2003, LECT NOTES COMPUT SC, V2894, P452
[5]   Secure and Efficient WBAN Authentication Protocols for Intra-BAN Tier [J].
Almuhaideb, Abdullah M. ;
Alghamdi, Huda A. .
JOURNAL OF SENSOR AND ACTUATOR NETWORKS, 2022, 11 (03)
[6]  
[Anonymous], 2011, Encyclopedia of Cryptography and Security
[7]  
Arya K. V., 2020, INTELLIGENT DATA SEC, P205, DOI [DOI 10.1016/B978-0-12-819511-6.00011-X, 10.1016/B978-0-12-819511-6.00011-X]
[8]   Impersonation attack on CertificateLess key agreement protocol [J].
Bala, Suman ;
Sharma, Gaurav ;
Verma, Anil K. .
INTERNATIONAL JOURNAL OF AD HOC AND UBIQUITOUS COMPUTING, 2018, 27 (02) :108-120
[9]   A non-interactive certificateless two-party authenticated key agreement protocol for wireless sensor networks [J].
Bala, Suman ;
Verma, Anil K. .
INTERNATIONAL JOURNAL OF AD HOC AND UBIQUITOUS COMPUTING, 2016, 21 (02) :140-155
[10]  
Boneh D., 1998, Algorithmic Number Theory. Third International Symposium, ANTS-III. Proceedings, P48, DOI 10.1007/BFb0054851