Security Analysis and Improvement of an Access Control Scheme for Wireless Body Area Networks

被引:0
作者
Dadkhah, Parichehr [1 ]
Dakhilalian, Mohammad [1 ]
Rastegari, Parvin [2 ]
机构
[1] Isfahan Univ Technol, Dept Elect & Comp Engn, Esfahan, Iran
[2] Isfahan Univ Technol, Golpayegan Coll Engn, Elect & Comp Engn Grp, Golpayegan, Iran
来源
ISECURE-ISC INTERNATIONAL JOURNAL OF INFORMATION SECURITY | 2023年 / 15卷 / 03期
关键词
Access Control; ROM; Signcryption; WBANs; CERTIFICATELESS SIGNATURE SCHEME; EFFICIENT;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Wireless Body Area Networks (WBANs) have attracted a lot of attention in recent researches as they play a vital role in diagnosing, controlling and treating diseases. These networks can improve the quality of medical services by following the health status of people and providing online medical advice for them, momentarily. Despite the numerous advantages of these networks, they may cause irrecoverable problems for patients, if security considerations are not properly met. So, it is very important to find solutions for satisfying security requirements in these networks. A signcryption scheme can be considered as one of the most important cryptographic tools for providing the security requirements in WBANs. Recently, Kasyoka et al. proposed a signcryption scheme based on which they designed an access control protocol for WBANs. They proved the security of their proposals in the random oracle model (ROM). In this paper, we concentrate on Kasyoka et al.'s proposals and show that their proposed signcryption scheme and consequently their proposed access control protocol for WBANs are vulnerable against various attacks, in contrast to their claims. Afterward, we fix the scheme to be secure against our proposed attacks. (c) 2023 ISC. All rights reserved.
引用
收藏
页码:1 / 8
页数:8
相关论文
共 50 条
[41]   Access control scheme in a wireless sensor network [J].
Liu Y. ;
Pei Q.-Q. .
Xi'an Dianzi Keji Daxue Xuebao/Journal of Xidian University, 2010, 37 (03) :507-512+528
[42]   Access control in wireless sensor networks [J].
Zhou, Yun ;
Zhang, Yanchao ;
Fang, Yuguang .
AD HOC NETWORKS, 2007, 5 (01) :3-13
[43]   SAMAKA: Secure and Anonymous Mutual Authentication and Key Agreement Scheme for Wireless Body Area Networks [J].
Narwal, Bhawna ;
Mohapatra, Amar Kumar .
ARABIAN JOURNAL FOR SCIENCE AND ENGINEERING, 2021, 46 (09) :9197-9219
[44]   An Energy Efficient and Reliable Routing Scheme to enhance the stability period in Wireless Body Area Networks [J].
Ullah, Farman ;
Khan, M. Zahid ;
Faisal, Mohammad ;
Rehman, Haseeb Ur ;
Abbas, Sohail ;
Mubarek, Foad S. .
COMPUTER COMMUNICATIONS, 2021, 165 :20-32
[45]   Anonymous mutual authentication and key agreement scheme for wearable sensors in wireless body area networks [J].
Li, Xiong ;
Ibrahim, Maged Hamada ;
Kumari, Saru ;
Sangaiah, Arun Kumar ;
Gupta, Vidushi ;
Choo, Kim-Kwang Raymond .
COMPUTER NETWORKS, 2017, 129 :429-443
[46]   A NOVEL EFFICIENT ACCESS CONTROL SCHEME FOR LARGE-SCALE DISTRIBUTED WIRELESS SENSOR NETWORKS [J].
Das, Ashok Kumar ;
Chatterjee, Santanu ;
Sing, Jamuna Kanta .
INTERNATIONAL JOURNAL OF FOUNDATIONS OF COMPUTER SCIENCE, 2013, 24 (05) :625-653
[47]   A Communication Link Analysis Based on Biological Implant Wireless Body Area Networks [J].
Liao, Yangzhe ;
Leeson, Mark S. ;
Higgins, Matthew D. .
APPLIED COMPUTATIONAL ELECTROMAGNETICS SOCIETY JOURNAL, 2016, 31 (06) :619-628
[48]   Access control and authentication for converged wireless networks [J].
Fu, Zhi Judy ;
Strassner, John C. .
2006 THIRD ANNUAL INTERNATIONAL CONFERENCE ON MOBILE AND UBIQUITOUS SYSTEMS: NETWORKING & SERVICES, 2006, :289-+
[49]   Access control and authentication for converged wireless networks [J].
Fu, Zhi ;
Strassner, John C. .
2006 3RD ANNUAL INTERNATIONAL CONFERENCE ON MOBILE AND UBIQUITOUS SYSTEMS - WORKSHOPS, 2006, :300-+
[50]   Dynamic Access Control In Wireless Sensor Networks [J].
Iqbal, Ummer .
2017 4TH INTERNATIONAL CONFERENCE ON ADVANCED COMPUTING AND COMMUNICATION SYSTEMS (ICACCS), 2017,