Lightweight and privacy-preserving authentication scheme with the resilience of desynchronisation attacks for WBANs

被引:16
作者
Shuai, Mengxia [1 ]
Xiong, Ling [2 ]
Wang, Changhui [3 ]
Yu, Nenghai [1 ]
机构
[1] Univ Sci & Technol China, CAS Key Lab Electromagnt Space Informat, Hefei 230026, Peoples R China
[2] Xihua Univ, Sch Comp & Software Engn, Chengdu 610039, Peoples R China
[3] Chengdu Text Coll, Dept Fundamental Courses, Chengdu 611731, Peoples R China
关键词
cryptographic protocols; patient monitoring; health care; wireless channels; data privacy; body area networks; message authentication; desynchronisation attack; privacy-preserving authentication scheme; WBAN; wireless communication; Internet of things; wireless body area networks; health care services; patient; miniaturised medical sensors; remote health care monitoring services; wireless channel; sensitivity; security; personal data; authentication schemes; adaptive resilience; lightweight crypto-module; asynchronisation attack; KEY AGREEMENT SCHEME; WIRELESS SENSOR NETWORKS; USER AUTHENTICATION; AREA NETWORKS; PROTOCOL; ANONYMITY; SECURITY;
D O I
10.1049/iet-ifs.2019.0491
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
With the advances in wireless communication and Internet of things, wireless body area networks (WBANs) have attracted more and more attention because of the potential in improving the quality of health care services. With the help of WBANs, the user can access the patient's life-critical data generated by miniaturised medical sensors, and remote health care monitoring services are provided. Since the open nature of wireless channel and sensitivity of transmitted information, the security and privacy of such personal data are becoming important issues that must be dealt with. In the past few years, a large number of authentication schemes had been proposed to solve these issues. However, most of the existing schemes are not secure enough. As a step toward this direction, in this study, the authors present a privacy-preserving authentication scheme with adaptive resilience of desynchronisation attacks for WBANs, in which lightweight crypto-modules are adopted to pursue the best efficiency. The proposed scheme adopts the pseudonym identity technique to provide user anonymity, and one-way hash chain technique and serial number method are employed to ensure forward secrecy and resist desynchronisation attack, respectively. Analysis and comparison results demonstrate that the proposed scheme achieves a delicate balance between security and efficiency.
引用
收藏
页码:380 / 390
页数:11
相关论文
共 47 条
[1]  
Amin R., 2015, FUTURE GENER COMPUT, V80, P483
[2]  
[Anonymous], 2018, J AMBIENT INTELL HUM
[3]  
[Anonymous], 2020, LIGHTWEIGHT PRIVACY
[4]  
[Anonymous], WIREL PERS COMMUN
[5]   MAC PROTOCOL IN WIRELESS BODY AREA NETWORKS FOR E-HEALTH: CHALLENGES AND A CONTEXT-AWARE DESIGN [J].
Liu, Bin ;
Yan, Zhisheng ;
Chen, Chang Wen .
IEEE WIRELESS COMMUNICATIONS, 2013, 20 (04) :64-72
[6]   An efficient cryptographic protocol verifier based on prolog rules [J].
Blanchet, B .
14TH IEEE COMPUTER SECURITY FOUNDATIONS WORKSHOP, PROCEEDINGS, 2001, :82-96
[7]  
BURROWS M, 1990, ACM T COMPUT SYST, V8, P18, DOI [10.1145/77648.77649, 10.1145/74851.74852]
[8]   An efficient ECC-based provably secure three-factor user authentication and key agreement protocol for wireless healthcare sensor networks [J].
Challa, Sravani ;
Das, Ashok Kumar ;
Odelu, Vanga ;
Kumar, Neeraj ;
Kumari, Saru ;
Khan, Muhammad Khurram ;
Vasilakos, Athanasios V. .
COMPUTERS & ELECTRICAL ENGINEERING, 2018, 69 :534-554
[9]   ON THE SECURITY OF PUBLIC KEY PROTOCOLS [J].
DOLEV, D ;
YAO, AC .
IEEE TRANSACTIONS ON INFORMATION THEORY, 1983, 29 (02) :198-208
[10]   A Realistic Lightweight Anonymous Authentication Protocol for Securing Real-Time Application Data Access in Wireless Sensor Networks [J].
Gope, Prosanta ;
Hwang, Tzonelih .
IEEE TRANSACTIONS ON INDUSTRIAL ELECTRONICS, 2016, 63 (11) :7124-7132