Lightweight and privacy-preserving authentication scheme with the resilience of desynchronisation attacks for WBANs

被引:16
|
作者
Shuai, Mengxia [1 ]
Xiong, Ling [2 ]
Wang, Changhui [3 ]
Yu, Nenghai [1 ]
机构
[1] Univ Sci & Technol China, CAS Key Lab Electromagnt Space Informat, Hefei 230026, Peoples R China
[2] Xihua Univ, Sch Comp & Software Engn, Chengdu 610039, Peoples R China
[3] Chengdu Text Coll, Dept Fundamental Courses, Chengdu 611731, Peoples R China
关键词
cryptographic protocols; patient monitoring; health care; wireless channels; data privacy; body area networks; message authentication; desynchronisation attack; privacy-preserving authentication scheme; WBAN; wireless communication; Internet of things; wireless body area networks; health care services; patient; miniaturised medical sensors; remote health care monitoring services; wireless channel; sensitivity; security; personal data; authentication schemes; adaptive resilience; lightweight crypto-module; asynchronisation attack; KEY AGREEMENT SCHEME; WIRELESS SENSOR NETWORKS; USER AUTHENTICATION; AREA NETWORKS; PROTOCOL; ANONYMITY; SECURITY;
D O I
10.1049/iet-ifs.2019.0491
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
With the advances in wireless communication and Internet of things, wireless body area networks (WBANs) have attracted more and more attention because of the potential in improving the quality of health care services. With the help of WBANs, the user can access the patient's life-critical data generated by miniaturised medical sensors, and remote health care monitoring services are provided. Since the open nature of wireless channel and sensitivity of transmitted information, the security and privacy of such personal data are becoming important issues that must be dealt with. In the past few years, a large number of authentication schemes had been proposed to solve these issues. However, most of the existing schemes are not secure enough. As a step toward this direction, in this study, the authors present a privacy-preserving authentication scheme with adaptive resilience of desynchronisation attacks for WBANs, in which lightweight crypto-modules are adopted to pursue the best efficiency. The proposed scheme adopts the pseudonym identity technique to provide user anonymity, and one-way hash chain technique and serial number method are employed to ensure forward secrecy and resist desynchronisation attack, respectively. Analysis and comparison results demonstrate that the proposed scheme achieves a delicate balance between security and efficiency.
引用
收藏
页码:380 / 390
页数:11
相关论文
共 50 条
  • [31] A Lightweight and Privacy-Preserving Authentication Protocol for Mobile Edge Computing
    Kaur, Kuljeet
    Garg, Sahil
    Kaddoum, Georges
    Guizani, Mohsen
    Jayakody, Dushantha Nalin K.
    2019 IEEE GLOBAL COMMUNICATIONS CONFERENCE (GLOBECOM), 2019,
  • [32] A Lightweight and Secure Three-Factor Authentication Protocol With Adaptive Privacy-Preserving Property for Wireless Sensor Networks
    Li, Yi
    Tian, Yuling
    IEEE SYSTEMS JOURNAL, 2022, 16 (04): : 6197 - 6208
  • [33] Towards Identity-Based Conditional Privacy-Preserving Authentication Scheme for Vehicular Ad Hoc Networks
    Al-Shareeda, Mahmood A.
    Anbar, Mohammed
    Manickam, Selvakumar
    Hasbullah, Iznan Husainy
    IEEE ACCESS, 2021, 9 : 113226 - 113238
  • [34] An efficient privacy-preserving authentication scheme with enhanced security for IoMT applications
    Xu, Feihong
    Liu, Shubo
    Yang, Xu
    COMPUTER COMMUNICATIONS, 2023, 208 : 171 - 178
  • [35] An efficient privacy-preserving authentication scheme that mitigates TA dependency in VANETs
    Su, Huadong
    Dong, Shi
    Wang, Ning
    Zhang, Ting
    VEHICULAR COMMUNICATIONS, 2024, 45
  • [36] NECPPA: A novel and efficient conditional privacy-preserving authentication scheme for VANET
    Pournaghi, Seyed Morteza
    Zahednejad, Behnam
    Bayat, Majid
    Farjami, Yaghoub
    COMPUTER NETWORKS, 2018, 134 : 78 - 92
  • [37] A Survey on Privacy-Preserving Authentication Schemes in VANETs: Attacks, Challenges and Open Issues
    Jan, Sagheer Ahmed
    Ul Amin, Noor
    Othman, Mohamed
    Ali, Mazhar
    Umar, Arif Iqbal
    Basir, Abdul
    IEEE ACCESS, 2021, 9 : 153701 - 153726
  • [38] A Provable and Privacy-Preserving Authentication Scheme for UAV-Enabled Intelligent Transportation Systems
    Khan, Muhammad Asghar
    Ullah, Insaf
    Alkhalifah, Ali
    Rehman, Sajjad Ur
    Shah, Jawad Ali
    Uddin, Irfan
    Alsharif, Mohammed H.
    Algarni, Fahad
    IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2022, 18 (05) : 3416 - 3425
  • [39] Privacy-Preserving Authentication Scheme for Wireless Networks
    Hazazi, Manal
    Tian, Yuan
    Al-Rodhaan, Mznah
    2018 21ST SAUDI COMPUTER SOCIETY NATIONAL COMPUTER CONFERENCE (NCC), 2018,
  • [40] A lightweight privacy-preserving scheme with data integrity for smart grid communications
    Bao, Haiyong
    Chen, Le
    CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2016, 28 (04): : 1094 - 1110