Adaptive Anonymous Authentication for Wearable Sensors in Wireless Body Area Networks

被引:0
作者
Arfaoui, Amel [1 ,2 ]
ben Letaifa, Asma [3 ]
Kribeche, Ali [2 ]
Senouci, Sidi Mohammed [2 ]
Hamdi, Mohamed [1 ]
机构
[1] Univ Carthage, SupCom, Digital Secur Unit, Tunis, Tunisia
[2] Univ Bourgogne Franche Comte, DRIVE, EA1859, Besancon, France
[3] Univ Carthage, SupCom, MEDIATRON Lab, Tunis, Tunisia
来源
2018 14TH INTERNATIONAL WIRELESS COMMUNICATIONS & MOBILE COMPUTING CONFERENCE (IWCMC) | 2018年
关键词
WBAN; Anonymous Authentication; Adaptive security; Key agreement; Scyther; PROTOCOL;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Wireless body area networks (WBANs) are perceived as an emerging key technology for the next generation ubiquitous healthcare systems. However, the openness and mobility of wireless sensor technologies make the sensor-controller communication vulnerable to be eavesdropped and linked to the sensors in transmission of patient's information. Furthermore, in such resource-constrained environment, authenticating sensor nodes anonymously with the controller node while considering their limited capabilities is a paramount security requirement. In this paper, we propose a lightweight and adaptive anonymous authentication and key agreement scheme for the two-tier WBAN. The proposed protocol enables an anonymous mutual authentication and a session key establishment between the controller node and the body sensor nodes while taking into account the dynamic context changes. From a security perspective, we demonstrate that the proposed key agreement scheme achieves the desired security properties such as anonymity, unlinkability, perfect forward secrecy, etc. Performance analysis proves that the proposed protocol outperforms benchmark schemes in terms of communication and computational
引用
收藏
页码:606 / 611
页数:6
相关论文
共 19 条
[1]   Co-LAEEBA: Cooperative link aware and energy efficient protocol for wireless body area networks [J].
Ahmed, S. ;
Javaid, N. ;
Yousaf, S. ;
Ahmad, A. ;
Sandhu, M. M. ;
Imran, M. ;
Khan, Z. A. ;
Alrajeh, N. .
COMPUTERS IN HUMAN BEHAVIOR, 2015, 51 :1205-1215
[2]  
[Anonymous], [No title captured]
[3]  
[Anonymous], IEEE INT C COMM ICC
[4]   An Efficient Next Hop Selection Algorithm for Multi-Hop Body Area Networks [J].
Ayatollahitafti, Vahid ;
Ngadi, Md Asri ;
Sharif, Johan bin Mohamad ;
Abdullahi, Mohammed .
PLOS ONE, 2016, 11 (01)
[5]   A LOGIC OF AUTHENTICATION [J].
BURROWS, M ;
ABADI, M ;
NEEDHAM, RM .
PROCEEDINGS OF THE ROYAL SOCIETY OF LONDON SERIES A-MATHEMATICAL PHYSICAL AND ENGINEERING SCIENCES, 1989, 426 (1871) :233-271
[6]  
Cremers CJF, 2008, LECT NOTES COMPUT SC, V5123, P414
[7]   A Realistic Lightweight Anonymous Authentication Protocol for Securing Real-Time Application Data Access in Wireless Sensor Networks [J].
Gope, Prosanta ;
Hwang, Tzonelih .
IEEE TRANSACTIONS ON INDUSTRIAL ELECTRONICS, 2016, 63 (11) :7124-7132
[8]   Anonymous Authentication for Wireless Body Area Networks With Provable Security [J].
He, Debiao ;
Zeadally, Sherali ;
Kumar, Neeraj ;
Lee, Jong-Hyouk .
IEEE SYSTEMS JOURNAL, 2017, 11 (04) :2590-2601
[9]  
Hu CQ, 2013, IEEE INFOCOM SER, P2274
[10]  
Huang JJ, 2013, INT J INNOV COMPUT I, V9, P4247