Lightweight and privacy-preserving authentication scheme with the resilience of desynchronisation attacks for WBANs

被引:16
|
作者
Shuai, Mengxia [1 ]
Xiong, Ling [2 ]
Wang, Changhui [3 ]
Yu, Nenghai [1 ]
机构
[1] Univ Sci & Technol China, CAS Key Lab Electromagnt Space Informat, Hefei 230026, Peoples R China
[2] Xihua Univ, Sch Comp & Software Engn, Chengdu 610039, Peoples R China
[3] Chengdu Text Coll, Dept Fundamental Courses, Chengdu 611731, Peoples R China
关键词
cryptographic protocols; patient monitoring; health care; wireless channels; data privacy; body area networks; message authentication; desynchronisation attack; privacy-preserving authentication scheme; WBAN; wireless communication; Internet of things; wireless body area networks; health care services; patient; miniaturised medical sensors; remote health care monitoring services; wireless channel; sensitivity; security; personal data; authentication schemes; adaptive resilience; lightweight crypto-module; asynchronisation attack; KEY AGREEMENT SCHEME; WIRELESS SENSOR NETWORKS; USER AUTHENTICATION; AREA NETWORKS; PROTOCOL; ANONYMITY; SECURITY;
D O I
10.1049/iet-ifs.2019.0491
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
With the advances in wireless communication and Internet of things, wireless body area networks (WBANs) have attracted more and more attention because of the potential in improving the quality of health care services. With the help of WBANs, the user can access the patient's life-critical data generated by miniaturised medical sensors, and remote health care monitoring services are provided. Since the open nature of wireless channel and sensitivity of transmitted information, the security and privacy of such personal data are becoming important issues that must be dealt with. In the past few years, a large number of authentication schemes had been proposed to solve these issues. However, most of the existing schemes are not secure enough. As a step toward this direction, in this study, the authors present a privacy-preserving authentication scheme with adaptive resilience of desynchronisation attacks for WBANs, in which lightweight crypto-modules are adopted to pursue the best efficiency. The proposed scheme adopts the pseudonym identity technique to provide user anonymity, and one-way hash chain technique and serial number method are employed to ensure forward secrecy and resist desynchronisation attack, respectively. Analysis and comparison results demonstrate that the proposed scheme achieves a delicate balance between security and efficiency.
引用
收藏
页码:380 / 390
页数:11
相关论文
共 50 条
  • [41] Lightweight and Fine-Grained Privacy-Preserving Data Aggregation Scheme in Edge Computing
    Li, Hongyang
    Cheng, Qingfeng
    Li, Xinghua
    Ma, Siqi
    Ma, Jianfeng
    IEEE SYSTEMS JOURNAL, 2022, 16 (02): : 1832 - 1841
  • [42] A novel privacy-preserving biometric authentication scheme
    Mao, Xuechun
    Chen, Ying
    Deng, Cong
    Zhou, Xiaqing
    PLOS ONE, 2023, 18 (05):
  • [43] Chaotic Map based Privacy Preservation User Authentication Scheme for WBANs
    Sahoo, Shreeya Swagatika
    Mohanty, Sujata
    PROCEEDINGS OF THE 2019 IEEE REGION 10 CONFERENCE (TENCON 2019): TECHNOLOGY, KNOWLEDGE, AND SOCIETY, 2019, : 1037 - 1042
  • [44] A lightweight conditional privacy-preserving authentication and access control scheme for pervasive computing environments
    Tan, Zuowen
    JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2012, 35 (06) : 1839 - 1846
  • [45] A lightweight and privacy-preserving mutual authentication scheme for wearable devices assisted by cloud server
    Wu, Fan
    Li, Xiong
    Xu, Lili
    Kumari, Saru
    Karuppiah, Marimuthu
    Shen, Jian
    COMPUTERS & ELECTRICAL ENGINEERING, 2017, 63 : 168 - 181
  • [46] A comprehensive survey on authentication and privacy-preserving schemes in VANETs
    Mundhe, Pravin
    Verma, Shekhar
    Venkatesan, S.
    COMPUTER SCIENCE REVIEW, 2021, 41
  • [47] Development of a provably secure and privacy-preserving lightweight authentication scheme for roaming services in global mobility network
    Sadhukhan, Dipanwita
    Ray, Sangram
    Dasgupta, Mou
    Khan, Muhammad Khurram
    JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2024, 224
  • [48] An Efficient Conditional Privacy-Preserving Authentication Scheme for the Prevention of Side-Channel Attacks in Vehicular Ad Hoc Networks
    Alshudukhi, Jalawi Sulaiman
    Mohammed, Badiea Abdulkarem
    Al-Mekhlafi, Zeyad Ghaleb
    IEEE ACCESS, 2020, 8 : 226624 - 226636
  • [49] A secure and privacy-preserving key agreement and mutual authentication scheme
    Li, Hui
    Jing, Tao
    Qian, Jin
    INTERNATIONAL JOURNAL OF SENSOR NETWORKS, 2020, 34 (04) : 201 - 213
  • [50] Privacy-preserving and tokenless chaotic revocable face authentication scheme
    Muhammad Khurram Khan
    Khaled Alghathbar
    Jiashu Zhang
    Telecommunication Systems, 2011, 47 : 227 - 234