A lightweight and secure two-factor authentication scheme for wireless body area networks in health-care IoT

被引:160
作者
Fotouhi, Mahdi [1 ]
Bayat, Majid [1 ]
Das, Ashok Kumar [3 ]
Far, Hossein Abdi Nasib [1 ]
Pournaghi, S. Morteza [2 ]
Doostari, M. A. [1 ]
机构
[1] Shahed Univ, Dept Comp Engn, Tehran, Iran
[2] Univ Qom, Dept Comp Engn, Qom, Iran
[3] Int Inst Informat Technol, Ctr Secur Theory & Algorithm Res, Hyderabad 500032, India
关键词
Authentication; Wireless Body Area Networks; Forward Secrecy; Formal Security; ProVerif; OPNET; KEY MANAGEMENT PROTOCOL; USER AUTHENTICATION; PROVABLY SECURE; MUTUAL AUTHENTICATION; INDUSTRIAL INTERNET; AGREEMENT SCHEME; ANONYMITY;
D O I
10.1016/j.comnet.2020.107333
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
The widespread use of mobile devices, sensors, and wireless sensor networks and the progressive development of the Internet of Things (IoT) has motivated medical and health-care societies to employ IoT to monitor, collect data, and communicate with patients using the wireless body area networks (WBANs). The collected data will make a lot of medical diagnosis applications of WBANs, which are obtained directly from the patients' bodies. Therefore, because of the nature of wireless networks and freely accessible data feature over the public channel, the security and privacy of WBANs is the most critical concern for those who use it for health-care purposes. Accordingly, there is a need for an authentication scheme for letting a trusted user such as doctors or clinical personnel access to the sensor's data from patients. In this paper, we propose a new lightweight hash-chain-based and forward secure authentication scheme for wireless body area networks in health-care IoT. Our scheme is secure against various known attacks obliged for WBANs. Additionally, we perform the formal security analysis using Real-or Random (ROR) model, and informal security on the proposed scheme, also, security verification of our scheme is validated by the ProVerif tool. Besides, our scheme is simulated by the OPNET network simulator and compared with several new schemes in terms of security and performance requirements. The simulation results and comparisons confirm that the proposed scheme is suitable for WBANs, and it supports more security features compared to related schemes.
引用
收藏
页数:16
相关论文
共 65 条
[1]   Password-based authenticated key exchange in the three-party setting [J].
Abdalla, M. ;
Fouque, P.-A. ;
Pointcheval, D. .
IEE Proceedings: Information Security, 2006, 153 (01) :27-39
[2]  
Abdalla M., 2012, IEEE S SEC PRIV S P, P538
[3]   A robust and anonymous patient monitoring system using wireless medical sensor networks [J].
Amin, Ruhul ;
Islam, S. K. Hafizul ;
Biswas, G. P. ;
Khan, Muhammad Khurram ;
Kumar, Neeraj .
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2018, 80 :483-495
[4]  
[Anonymous], 2017, COMPUTER INFORM SECU, V3
[5]  
[Anonymous], INT J COMMUNICATION
[6]  
[Anonymous], 2019, HOSSEIN73 PROVERIF
[7]   A Provably Secure and Lightweight Anonymous User Authenticated Session Key Exchange Scheme for Internet of Things Deployment [J].
Banerjee, Soumya ;
Odelu, Vanga ;
Das, Ashok Kumar ;
Srinivas, Jangirala ;
Kumar, Neeraj ;
Chattopadhyay, Samiran ;
Choo, Kim-Kwang Raymond .
IEEE INTERNET OF THINGS JOURNAL, 2019, 6 (05) :8739-8752
[8]  
Bayat M., 2015, INT J ELECT INF ENG, V2, P10
[9]  
Blanchet B., 2008, AUTOMATED FORMAL ANA
[10]  
Blanchet Bruno., 2005, PROVERIF AUTOMATIC C