Channel characteristics aware zero knowledge proof based authentication scheme in body area networks

被引:10
作者
Umar, Mubarak [1 ,2 ,3 ]
Wu, Zhenqiang [1 ,2 ]
Liao, Xuening [1 ,2 ]
机构
[1] Shaanxi Normal Univ, Sch Comp Sci, Xian 710062, Peoples R China
[2] Minist Educ, Key Lab Modern Teaching Technol, Xian 710062, Peoples R China
[3] Bayero Univ, Dept Comp Sci, Kano 3011, Nigeria
基金
中国博士后科学基金; 中国国家自然科学基金;
关键词
Wireless body area network (WBAN); Authentication; Channel characteristic; Zero knowledge proof (ZKP); KEY AGREEMENT SCHEME; ANONYMOUS MUTUAL AUTHENTICATION; IOT DEVICES; SECURE; INTERNET;
D O I
10.1016/j.adhoc.2020.102374
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Wireless body area network (WBAN) is a network of wearable devices placed on the body of patients to collect and transmit their biomedical data to medical servers through open wireless channels. These collected data are sensitive and their transmission via the open wireless channels makes them vulnerable to attacks by unauthorized users. Therefore, secure authentication and data encryption mechanisms in WBAN are essential. In the past few years, several zero knowledge proof (ZKP) and commitment technique based schemes for WBAN were proposed to provide lightweight authentication and data encryption for intra-WBAN communication. However, these schemes are susceptible to node compromise and impersonation attacks and cannot provide security for inter-WBAN communication. Motivated by these limitations, we first propose a compromise and impersonation attacks resistant (CIAR) authentication scheme based on ZKP, commitment technique, and received signal strength (RSS), which could identify attackers that have compromised nodes and attempt to impersonate them. To ensure the security of the inter-WBAN communication, we then propose a channel characteristic aware (CCA) authentication scheme based on the ZKP and commitment technique. We performed security and performance analyses to validate the resilience of the schemes to various attacks and their effectiveness in terms of resources. Moreover, we conducted extensive experiments in indoor and outdoor areas to demonstrate the security strength of our schemes. The experimental results as well as the performance and security analyses show that our CIAR-ZKP scheme overcomes the security weaknesses in previous schemes at an equal cost. Moreover, the results of the CCA-ZKP scheme indicate that it can effectively identify 92% of attack attempts while triggering false alarms on merely 11% of legitimate traffic.
引用
收藏
页数:17
相关论文
共 45 条
[1]   BAN-GZKP: Optimal Zero Knowledge Proof based Scheme for Wireless Body Area Networks [J].
Bu, Gewu ;
Potop-Butucaru, Maria .
AD HOC NETWORKS, 2018, 77 :28-41
[2]  
Canetti R, 2002, LECT NOTES COMPUT SC, V2332, P337
[3]   An improved and provably secure privacy preserving authentication protocol for SIP [J].
Chaudhry, Shehzad Ashraf ;
Naqvi, Husnain ;
Sher, Muhammad ;
Farash, Mohammad Sabzinejad ;
ul Hassan, Mahmood .
PEER-TO-PEER NETWORKING AND APPLICATIONS, 2017, 10 (01) :1-15
[4]   Biometric Authentication Using Noisy Electrocardiograms Acquired by Mobile Sensors [J].
Choi, Hyun-Soo ;
Lee, Byunghan ;
Yoon, Sungroh .
IEEE ACCESS, 2016, 4 :1266-1273
[5]   Design of Secure and Lightweight Authentication Protocol for Wearable Devices Environment [J].
Das, Ashok Kumar ;
Wazid, Mohammad ;
Kumar, Neeraj ;
Khan, Muhammad Khurram ;
Choo, Kim-Kwang Raymond ;
Park, YoungHo .
IEEE JOURNAL OF BIOMEDICAL AND HEALTH INFORMATICS, 2018, 22 (04) :1310-1322
[6]   A biometric security scheme for wireless body area networks [J].
Dodangeh, Peyman ;
Jahangir, Amir Hossein .
JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2018, 41 :62-74
[7]   ON THE SECURITY OF PUBLIC KEY PROTOCOLS [J].
DOLEV, D ;
YAO, AC .
IEEE TRANSACTIONS ON INFORMATION THEORY, 1983, 29 (02) :198-208
[8]   Anonymous Authentication for Wireless Body Area Networks With Provable Security [J].
He, Debiao ;
Zeadally, Sherali ;
Kumar, Neeraj ;
Lee, Jong-Hyouk .
IEEE SYSTEMS JOURNAL, 2017, 11 (04) :2590-2601
[9]   Authenticating On-Body IoT Devices: An Adversarial Learning Approach [J].
Huang, Yong ;
Wang, Wei ;
Wang, Hao ;
Jiang, Tao ;
Zhang, Qian .
IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 2020, 19 (08) :5234-5245
[10]   Secure anonymous mutual authentication for star two-tier wireless body area networks [J].
Ibrahim, Maged Hamada ;
Kumari, Saru ;
Das, Ashok Kumar ;
Wazid, Mohammad ;
Odelu, Vanga .
COMPUTER METHODS AND PROGRAMS IN BIOMEDICINE, 2016, 135 :37-50