Skip to main content
Erschienen in: Peer-to-Peer Networking and Applications 6/2021

14.06.2021

A lightweight continuous authentication scheme for medical wireless body area networks

verfasst von: Tao Wan, Luyao Wang, Weichuan Liao, Shixin Yue

Erschienen in: Peer-to-Peer Networking and Applications | Ausgabe 6/2021

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

With the development of the Internet of Things (IoT), mobile medical systems based on wireless body area networks (WBAN) have aroused extensive attention. Wearable wireless medical devices have emerged to meet the demand for high-quality medical services that brought great convenience to people’s lives. However, attackers pose a latent threat to users’ medical information privacy, and identity is easy to leak due to wireless networks’ openness. It can be seen that the authentication phase is a vital part. In this paper, we proposed a lightweight continuous authentication protocol in medical WBAN environments. Our protocol overcomes the shortcomings of sensor node impersonation attack by using physiological signals, cutting energy consumption by using lightweight technology, saving time and energy by reducing computation complexity, and ensuring the current sensor node is the original one through continuous authentication. Finally, our performance analysis has shown that our protocol is provided with the superiority of lightweight, mutuality, low cost. It has a considerable application prospect in medical WBAN.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Zimmerman TG (1996) Personal area networks: near-field intrabody communication. IBM Syst J 35(3.4):609–617CrossRef Zimmerman TG (1996) Personal area networks: near-field intrabody communication. IBM Syst J 35(3.4):609–617CrossRef
2.
Zurück zum Zitat Latré B, Braem B, Moerman I, Blondia C, Demeester P (2011) A survey on wireless body area networks. Wirel Netw 17(1):1–18CrossRef Latré B, Braem B, Moerman I, Blondia C, Demeester P (2011) A survey on wireless body area networks. Wirel Netw 17(1):1–18CrossRef
3.
Zurück zum Zitat Buduru AB, Yau SS (2015) A effective approach to continuous user authentication for touch screen smart devices. IEEE, pp 219–226 Buduru AB, Yau SS (2015) A effective approach to continuous user authentication for touch screen smart devices. IEEE, pp 219–226
4.
Zurück zum Zitat Wayman J, Jain A, Maltoni D, Maio D (2005) An introduction to biometric authentication systems. Springer Wayman J, Jain A, Maltoni D, Maio D (2005) An introduction to biometric authentication systems. Springer
5.
Zurück zum Zitat Traoré I, Woungang I, Nakkabi Y, Obaidat MS, Ahmed AAE, Khalilian B (2012) Dynamic sample size detection in learning command line sequence for continuous authentication. IEEE Trans Syst Man Cybern Part B 42(5):1343–1356CrossRef Traoré I, Woungang I, Nakkabi Y, Obaidat MS, Ahmed AAE, Khalilian B (2012) Dynamic sample size detection in learning command line sequence for continuous authentication. IEEE Trans Syst Man Cybern Part B 42(5):1343–1356CrossRef
6.
Zurück zum Zitat Yeh KH, Su C, Chiu W, Zhou L (2018) I walk, therefore i am: continuous user authentication with plantar biometrics. IEEE Commun Mag 56(2):150–157CrossRef Yeh KH, Su C, Chiu W, Zhou L (2018) I walk, therefore i am: continuous user authentication with plantar biometrics. IEEE Commun Mag 56(2):150–157CrossRef
7.
Zurück zum Zitat Chuang YH, Lo NW, Yang CY, Tang SW (2018) A lightweight continuous authentication protocol for the internet of things. Sensors 18(4):1104CrossRef Chuang YH, Lo NW, Yang CY, Tang SW (2018) A lightweight continuous authentication protocol for the internet of things. Sensors 18(4):1104CrossRef
8.
Zurück zum Zitat Ramli SN, Ahmad R (2011) Surveying the wireless body area network in the realm of wireless communication. In: IAS. IEEE, pp 58–61 Ramli SN, Ahmad R (2011) Surveying the wireless body area network in the realm of wireless communication. In: IAS. IEEE, pp 58–61
9.
Zurück zum Zitat Sanchez EM, Hernandez JF, Blasco JM, Hervé T, Micallef J, Grech I, Brincat A, Salcedo VT (2008) Body area network for wireless patient monitoring. IET Commun 2(2):215–222CrossRef Sanchez EM, Hernandez JF, Blasco JM, Hervé T, Micallef J, Grech I, Brincat A, Salcedo VT (2008) Body area network for wireless patient monitoring. IET Commun 2(2):215–222CrossRef
10.
Zurück zum Zitat Seyedi M, Kibret B, Lai DTH, Faulkner M (2013) A survey on intrabody communications for body area network applications. IEEE Trans Biomed Eng 60(8):2067–2079CrossRef Seyedi M, Kibret B, Lai DTH, Faulkner M (2013) A survey on intrabody communications for body area network applications. IEEE Trans Biomed Eng 60(8):2067–2079CrossRef
11.
Zurück zum Zitat Koya AM, Deepthi PP (2018) Anonymous hybrid mutual authentication and key agreement scheme for wireless body area network. Comput Netw 140:138–151CrossRef Koya AM, Deepthi PP (2018) Anonymous hybrid mutual authentication and key agreement scheme for wireless body area network. Comput Netw 140:138–151CrossRef
12.
Zurück zum Zitat Li CT, Hwang MS (2010) An efficient biometrics-based remote user authentication scheme using smart cards. J Netw Comput Appl 33(1):1–5CrossRef Li CT, Hwang MS (2010) An efficient biometrics-based remote user authentication scheme using smart cards. J Netw Comput Appl 33(1):1–5CrossRef
13.
Zurück zum Zitat Ramli SN, Ahmad R, Abdollah MF, Dutkiewicz E (2013) A biometric-based security for data authentication in wireless body area network (wban). In: 2013 15th International Conference on Advanced Communications Technology (ICACT). IEEE, pp 998–1001 Ramli SN, Ahmad R, Abdollah MF, Dutkiewicz E (2013) A biometric-based security for data authentication in wireless body area network (wban). In: 2013 15th International Conference on Advanced Communications Technology (ICACT). IEEE, pp 998–1001
14.
Zurück zum Zitat Bhargav Spantzel A, Squicciarini AC, Modi SK, Young M, Bertino E, Elliott SJ (2007) Privacy preserving multi-factor authentication with biometrics. J Comput Secur 15(5):529–560CrossRef Bhargav Spantzel A, Squicciarini AC, Modi SK, Young M, Bertino E, Elliott SJ (2007) Privacy preserving multi-factor authentication with biometrics. J Comput Secur 15(5):529–560CrossRef
15.
Zurück zum Zitat Ranganathan V, Rose SL (2019) Personal authentication mechanism based on finger knuckle print. J Med Syst 43(8):232CrossRef Ranganathan V, Rose SL (2019) Personal authentication mechanism based on finger knuckle print. J Med Syst 43(8):232CrossRef
16.
Zurück zum Zitat He D, Kumar N, Chilamkurti N, Lee J-H (2014) Lightweight ecc based rfid authentication integrated with an id verifier transfer protocol. J Med Syst 38(10):116CrossRef He D, Kumar N, Chilamkurti N, Lee J-H (2014) Lightweight ecc based rfid authentication integrated with an id verifier transfer protocol. J Med Syst 38(10):116CrossRef
17.
Zurück zum Zitat Lu Y, Li L, Peng H, Yang Y (2015) An enhanced biometric-based authentication scheme for telecare medicine information systems using elliptic curve cryptosystem. J Med Syst 39(3):32CrossRef Lu Y, Li L, Peng H, Yang Y (2015) An enhanced biometric-based authentication scheme for telecare medicine information systems using elliptic curve cryptosystem. J Med Syst 39(3):32CrossRef
18.
Zurück zum Zitat Han L, Tan X, Wang S, Liang X (2018) An efficient and secure three-factor based authenticated key exchange scheme using elliptic curve cryptosystems. Peer-to-peer Netw Appl 11(1):63–73CrossRef Han L, Tan X, Wang S, Liang X (2018) An efficient and secure three-factor based authenticated key exchange scheme using elliptic curve cryptosystems. Peer-to-peer Netw Appl 11(1):63–73CrossRef
19.
Zurück zum Zitat Hayajneh T, Mohd BJ, Imran M, Almashaqbeh G, Vasilakos AV (2016) Secure authentication for remote patient monitoring with wireless medical sensor networks. Sensors 16(4):424CrossRef Hayajneh T, Mohd BJ, Imran M, Almashaqbeh G, Vasilakos AV (2016) Secure authentication for remote patient monitoring with wireless medical sensor networks. Sensors 16(4):424CrossRef
20.
Zurück zum Zitat Xu G, Qiu S, Ahmad H, Xu G, Guo Y, Zhang M, Xu H (2018) A multi-server two-factor authentication scheme with un-traceability using elliptic curve cryptography. Sensors 18(7):2394CrossRef Xu G, Qiu S, Ahmad H, Xu G, Guo Y, Zhang M, Xu H (2018) A multi-server two-factor authentication scheme with un-traceability using elliptic curve cryptography. Sensors 18(7):2394CrossRef
21.
Zurück zum Zitat Dharminder, Mishra D, Li X (2020) Construction of rsa-based authentication scheme in authorized access to healthcare services - authorized access to healthcare services. J Med Syst 44(1):6CrossRef Dharminder, Mishra D, Li X (2020) Construction of rsa-based authentication scheme in authorized access to healthcare services - authorized access to healthcare services. J Med Syst 44(1):6CrossRef
22.
Zurück zum Zitat Khemissa H, Tandjaoui D (2015) A lightweight authentication scheme for e-health applications in the context of internet of things. In: Al-Begain K, AlBeiruti N (eds) NGMAST. IEEE, pp 90–95 Khemissa H, Tandjaoui D (2015) A lightweight authentication scheme for e-health applications in the context of internet of things. In: Al-Begain K, AlBeiruti N (eds) NGMAST. IEEE, pp 90–95
23.
Zurück zum Zitat Gope P, Hwang T (2016) A realistic lightweight anonymous authentication protocol for securing real-time application data access in wireless sensor networks. IEEE Trans Ind Electron 63(11):7124–7132CrossRef Gope P, Hwang T (2016) A realistic lightweight anonymous authentication protocol for securing real-time application data access in wireless sensor networks. IEEE Trans Ind Electron 63(11):7124–7132CrossRef
24.
Zurück zum Zitat Adavoudi-Jolfaei A, Ashouri-Talouki M, Aghili SF (2019) Lightweight and anonymous three-factor authentication and access control scheme for real-time applications in wireless sensor networks. Peer-to-Peer Netw Appl 12(1):43–59CrossRef Adavoudi-Jolfaei A, Ashouri-Talouki M, Aghili SF (2019) Lightweight and anonymous three-factor authentication and access control scheme for real-time applications in wireless sensor networks. Peer-to-Peer Netw Appl 12(1):43–59CrossRef
25.
Zurück zum Zitat Das AK, Wazid M, Kumar N, Khan MK, Choo K-KR, Park Y (2018) Design of secure and lightweight authentication protocol for wearable devices environment. IEEE J Biomed Health Inf 22 (4):1310–1322CrossRef Das AK, Wazid M, Kumar N, Khan MK, Choo K-KR, Park Y (2018) Design of secure and lightweight authentication protocol for wearable devices environment. IEEE J Biomed Health Inf 22 (4):1310–1322CrossRef
26.
Zurück zum Zitat Dhillon PK, Kalra S (2017) A lightweight biometrics based remote user authentication scheme for iot services. J Inf Secur Appl 34:255–270 Dhillon PK, Kalra S (2017) A lightweight biometrics based remote user authentication scheme for iot services. J Inf Secur Appl 34:255–270
27.
Zurück zum Zitat Xu L, Wu F (2019) A lightweight authentication scheme for multi-gateway wireless sensor networks under iot conception. Arab J Sci Eng 44(4):3977–3993CrossRef Xu L, Wu F (2019) A lightweight authentication scheme for multi-gateway wireless sensor networks under iot conception. Arab J Sci Eng 44(4):3977–3993CrossRef
28.
Zurück zum Zitat Ostad Sharif A, Abbasinezhad Mood D, Nikooghadam M (2019) A robust and efficient ecc-based mutual authentication and session key generation scheme for healthcare applications. J Med Syst 43(1):10CrossRef Ostad Sharif A, Abbasinezhad Mood D, Nikooghadam M (2019) A robust and efficient ecc-based mutual authentication and session key generation scheme for healthcare applications. J Med Syst 43(1):10CrossRef
29.
Zurück zum Zitat Yu S, Park K, Park Y, Kim H, Park Y (2020) A lightweight three-factor authentication protocol for digital rights management system. Peer-to-Peer Netw Appl:pp 1–17 Yu S, Park K, Park Y, Kim H, Park Y (2020) A lightweight three-factor authentication protocol for digital rights management system. Peer-to-Peer Netw Appl:pp 1–17
30.
Zurück zum Zitat Frank M, Biedert R, Ma E, Martinovic I, Song D (2012) Touchalytics: On the applicability of touchscreen input as a behavioral biometric for continuous authentication. IEEE Trans Inf Forens Secur 8(1):136–148CrossRef Frank M, Biedert R, Ma E, Martinovic I, Song D (2012) Touchalytics: On the applicability of touchscreen input as a behavioral biometric for continuous authentication. IEEE Trans Inf Forens Secur 8(1):136–148CrossRef
31.
Zurück zum Zitat Matsuyama Y, Shozawa M, Yokote R (2015) Brain signal’s low-frequency fits the continuous authentication. Neurocomputing 164:137–143CrossRef Matsuyama Y, Shozawa M, Yokote R (2015) Brain signal’s low-frequency fits the continuous authentication. Neurocomputing 164:137–143CrossRef
32.
Zurück zum Zitat Mondal S, Bours P (2015) Continuous authentication and identification for mobile devices: Combining security and forensics. IEEE:1–6 Mondal S, Bours P (2015) Continuous authentication and identification for mobile devices: Combining security and forensics. IEEE:1–6
33.
Zurück zum Zitat Peng G, Zhou G, Nguyen DT, Qi X, Yang Q, Wang S (2017) Continuous authentication with touch behavioral biometrics and voice on wearable glasses. IEEE Trans Hum-Mach Syst 47(3):404–416CrossRef Peng G, Zhou G, Nguyen DT, Qi X, Yang Q, Wang S (2017) Continuous authentication with touch behavioral biometrics and voice on wearable glasses. IEEE Trans Hum-Mach Syst 47(3):404–416CrossRef
34.
Zurück zum Zitat Mosenia A, Sur-Kolay S, Raghunathan A, Jha NK (2016) Caba: Continuous authentication based on bioaura. IEEE Trans Comput 66(5):759–772MathSciNetCrossRef Mosenia A, Sur-Kolay S, Raghunathan A, Jha NK (2016) Caba: Continuous authentication based on bioaura. IEEE Trans Comput 66(5):759–772MathSciNetCrossRef
35.
Zurück zum Zitat Alshehri A, Coenen F, Bollegala D (2018) Iterative keystroke continuous authentication: A time series based approach. KI-Künstliche Intell 32(4):231–243CrossRef Alshehri A, Coenen F, Bollegala D (2018) Iterative keystroke continuous authentication: A time series based approach. KI-Künstliche Intell 32(4):231–243CrossRef
36.
Zurück zum Zitat Acar A, Aksu H, Uluagac AS, Akkaya K (2018) Waca: Wearable-assisted continuous authentication. IEEE, pp 264–269 Acar A, Aksu H, Uluagac AS, Akkaya K (2018) Waca: Wearable-assisted continuous authentication. IEEE, pp 264–269
37.
Zurück zum Zitat Smith Creasey M, Rajarajan M (2019) A novel word-independent gesture-typing continuous authentication scheme for mobile devices. Comput Secur 83:140–150CrossRef Smith Creasey M, Rajarajan M (2019) A novel word-independent gesture-typing continuous authentication scheme for mobile devices. Comput Secur 83:140–150CrossRef
38.
Zurück zum Zitat Burrows M, Abadi M, Needham RM (1989) A logic of authentication. Proc R Soc Lond Math Phys Sci 426(1871):233–271MathSciNetMATH Burrows M, Abadi M, Needham RM (1989) A logic of authentication. Proc R Soc Lond Math Phys Sci 426(1871):233–271MathSciNetMATH
39.
Zurück zum Zitat Pereira GCCF, Alves RCA, da Silva FL, Azevedo RM, Albertini BC, Margi CB (2017) Performance evaluation of cryptographic algorithms over iot platforms and operating systems. Secur Commun Netw 2017:1–16CrossRef Pereira GCCF, Alves RCA, da Silva FL, Azevedo RM, Albertini BC, Margi CB (2017) Performance evaluation of cryptographic algorithms over iot platforms and operating systems. Secur Commun Netw 2017:1–16CrossRef
40.
Zurück zum Zitat Yeh KH, Su C, Choo KKR, Chiu W (2017) A novel certificateless signature scheme for smart objects in the internet-of-things. Sensors 17(5):1001CrossRef Yeh KH, Su C, Choo KKR, Chiu W (2017) A novel certificateless signature scheme for smart objects in the internet-of-things. Sensors 17(5):1001CrossRef
41.
Zurück zum Zitat Arshad H, Nikooghadam M (2016) An efficient and secure authentication and key agreement scheme for session initiation protocol using ecc. Multimed Tools Appl 75(1):181–197CrossRef Arshad H, Nikooghadam M (2016) An efficient and secure authentication and key agreement scheme for session initiation protocol using ecc. Multimed Tools Appl 75(1):181–197CrossRef
42.
Zurück zum Zitat Li X, Ibrahim MH, Kumari S, Sangaiah AK, Gupta V, Choo K-KR (2017) Anonymous mutual authentication and key agreement scheme for wearable sensors in wireless body area networks. Comput Netw 129:429–443CrossRef Li X, Ibrahim MH, Kumari S, Sangaiah AK, Gupta V, Choo K-KR (2017) Anonymous mutual authentication and key agreement scheme for wearable sensors in wireless body area networks. Comput Netw 129:429–443CrossRef
Metadaten
Titel
A lightweight continuous authentication scheme for medical wireless body area networks
verfasst von
Tao Wan
Luyao Wang
Weichuan Liao
Shixin Yue
Publikationsdatum
14.06.2021
Verlag
Springer US
Erschienen in
Peer-to-Peer Networking and Applications / Ausgabe 6/2021
Print ISSN: 1936-6442
Elektronische ISSN: 1936-6450
DOI
https://doi.org/10.1007/s12083-021-01190-7

Weitere Artikel der Ausgabe 6/2021

Peer-to-Peer Networking and Applications 6/2021 Zur Ausgabe

Premium Partner