An enhanced 1-round authentication protocol for wireless body area networks with user anonymity

被引:57
作者
Li, Xiong [1 ]
Peng, Jieyao [1 ]
Kumari, Saru [2 ]
Wu, Fan [3 ]
Karuppiah, Marimuthu [4 ]
Choo, Kim-Kwang Raymond [5 ]
机构
[1] Hunan Univ Sci & Technol, Sch Comp Sci & Engn, Xiangtan 411201, Peoples R China
[2] Ch Charan Singh Univ, Dept Math, Meerut, Uttar Pradesh, India
[3] Xiamen Inst Technol, Dept Comp Sci & Engn, Xiamen 361021, Peoples R China
[4] VIT Univ, Sch Comp Sci & Engn, Vellore, Tamil Nadu, India
[5] Univ Texas San Antonio, Dept Informat Syst & Cyber Secur, San Antonio, TX 78249 USA
基金
中国国家自然科学基金;
关键词
Wireless body area networks; Authentication; Anonymous; Attacks; SCHEME;
D O I
10.1016/j.compeleceng.2017.02.011
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
The Wireless Body Area Networks (WBAN) emerges with the development of wearable devices and medical sensors, which can be used in healthcare monitoring to improve the quality of medical services. The data collected by WBAN usually be transmitted via wireless channel, and includes some sensitive information of the patients'. Therefore, how to design light-weight security protocols for WBAN with resource-constrained devices is a tough challenge. Recently, Liu et al. presented a lightweight authentication protocol for WBAN with less computation and communication cost. However, some weaknesses of this protocol are found through security analysis. In this paper, an improved single-round authentication protocol is proposed to remove the flaws of previous work. Meanwhile, the formal and informal security analysis of our protocol are discussed. The comparison results show that our protocol improves the security with equivalent cost. (C) 2017 Elsevier Ltd. All rights reserved.
引用
收藏
页码:238 / 249
页数:12
相关论文
共 25 条
  • [1] Al-Riyami SS, 2003, LECT NOTES COMPUT SC, V2894, P452
  • [2] [Anonymous], 2016, WIREL PERSON COMMUN
  • [3] [Anonymous], IEEE T COMPUT
  • [4] [Anonymous], INT J DISTRIBUTED SE, DOI DOI 10.1016/J.FIT0TE.2015.03.001
  • [5] A LOGIC OF AUTHENTICATION
    BURROWS, M
    ABADI, M
    NEEDHAM, RM
    [J]. PROCEEDINGS OF THE ROYAL SOCIETY OF LONDON SERIES A-MATHEMATICAL PHYSICAL AND ENGINEERING SCIENCES, 1989, 426 (1871): : 233 - 271
  • [6] A Multiserver Biometric Authentication Scheme for TMIS using Elliptic Curve Cryptography
    Chaudhry, Shehzad Ashraf
    Khan, Muhammad Tawab
    Khan, Muhammad Khurram
    Shon, Taeshik
    [J]. JOURNAL OF MEDICAL SYSTEMS, 2016, 40 (11)
  • [7] Achieving Efficient Cloud Search Services: Multi-Keyword Ranked Search over Encrypted Cloud Data Supporting Parallel Computing
    Fu, Zhangjie
    Sun, Xingming
    Liu, Qi
    Zhou, Lu
    Shu, Jiangang
    [J]. IEICE TRANSACTIONS ON COMMUNICATIONS, 2015, E98B (01) : 190 - 200
  • [8] A secure temporal-credential-based mutual authentication and key agreement scheme with pseudo identity for wireless sensor networks
    He, Debiao
    Kumar, Neeraj
    Chilamkurti, Naveen
    [J]. INFORMATION SCIENCES, 2015, 321 : 263 - 277
  • [9] Robust Biometrics-Based Authentication Scheme for Multiserver Environment
    He, Debiao
    Wang, Ding
    [J]. IEEE SYSTEMS JOURNAL, 2015, 9 (03): : 816 - 823
  • [10] Jiang Q., 2016, The Journal of Supercomputing, P1