A lightweight and secure two-factor authentication scheme for wireless body area networks in health-care IoT

被引:160
作者
Fotouhi, Mahdi [1 ]
Bayat, Majid [1 ]
Das, Ashok Kumar [3 ]
Far, Hossein Abdi Nasib [1 ]
Pournaghi, S. Morteza [2 ]
Doostari, M. A. [1 ]
机构
[1] Shahed Univ, Dept Comp Engn, Tehran, Iran
[2] Univ Qom, Dept Comp Engn, Qom, Iran
[3] Int Inst Informat Technol, Ctr Secur Theory & Algorithm Res, Hyderabad 500032, India
关键词
Authentication; Wireless Body Area Networks; Forward Secrecy; Formal Security; ProVerif; OPNET; KEY MANAGEMENT PROTOCOL; USER AUTHENTICATION; PROVABLY SECURE; MUTUAL AUTHENTICATION; INDUSTRIAL INTERNET; AGREEMENT SCHEME; ANONYMITY;
D O I
10.1016/j.comnet.2020.107333
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
The widespread use of mobile devices, sensors, and wireless sensor networks and the progressive development of the Internet of Things (IoT) has motivated medical and health-care societies to employ IoT to monitor, collect data, and communicate with patients using the wireless body area networks (WBANs). The collected data will make a lot of medical diagnosis applications of WBANs, which are obtained directly from the patients' bodies. Therefore, because of the nature of wireless networks and freely accessible data feature over the public channel, the security and privacy of WBANs is the most critical concern for those who use it for health-care purposes. Accordingly, there is a need for an authentication scheme for letting a trusted user such as doctors or clinical personnel access to the sensor's data from patients. In this paper, we propose a new lightweight hash-chain-based and forward secure authentication scheme for wireless body area networks in health-care IoT. Our scheme is secure against various known attacks obliged for WBANs. Additionally, we perform the formal security analysis using Real-or Random (ROR) model, and informal security on the proposed scheme, also, security verification of our scheme is validated by the ProVerif tool. Besides, our scheme is simulated by the OPNET network simulator and compared with several new schemes in terms of security and performance requirements. The simulation results and comparisons confirm that the proposed scheme is suitable for WBANs, and it supports more security features compared to related schemes.
引用
收藏
页数:16
相关论文
共 65 条
[61]   A novel and provably secure authentication and key agreement scheme with user anonymity for global mobility networks [J].
Wu, Fan ;
Xu, Lili ;
Kumari, Saru ;
Li, Xiong ;
Das, Ashok Kumar ;
Khan, Muhammad Khurram ;
Karuppiah, Marimuthu ;
Baliyan, Renuka .
SECURITY AND COMMUNICATION NETWORKS, 2016, 9 (16) :3527-3542
[62]   Secure Key Agreement and Key Protection for Mobile Device User Authentication [J].
Wu, Libing ;
Wang, Jing ;
Choo, Kim-Kwang Raymond ;
He, Debiao .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2019, 14 (02) :319-330
[63]   A Secure Authentication Scheme for Telecare Medicine Information Systems [J].
Wu, Zhen-Yu ;
Lee, Yueh-Chun ;
Lai, Feipei ;
Lee, Hung-Chang ;
Chung, Yufang .
JOURNAL OF MEDICAL SYSTEMS, 2012, 36 (03) :1529-1535
[64]   A comparison of active queue management algorithms using the OPNET modeler [J].
Zhu, C ;
Yang, OWW ;
Aweya, J ;
Ouellette, M ;
Montuno, DY .
IEEE COMMUNICATIONS MAGAZINE, 2002, 40 (06) :158-167
[65]   A new authentication scheme with anonymity for wireless environments [J].
Zhu, JM ;
Ma, JF .
IEEE TRANSACTIONS ON CONSUMER ELECTRONICS, 2004, 50 (01) :231-235