Skip to main content
Top

2021 | OriginalPaper | Chapter

A Novel Authentication Scheme for Wireless Body Area Networks with Anonymity

Authors : Upasna Singh, Bhawna Narwal

Published in: Progress in Advanced Computing and Intelligent Engineering

Publisher: Springer Singapore

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

Increasing crossover of information and wireless network technologies in the medical field embarks a major revolution. Wire body area network (WBAN) is one such result of crossover. Low-cost, lightweight, multipurpose sensors can be easily integrated into a wireless communication network for health monitoring. It is a wireless networking technology based on radio frequency, consisting of small sensors, transmitting the data which could be further used for medical or safeguarding measures, and thus, there is a need to introduce better safety measures in WBAN schemes. In this paper, we proposed a novel authentication scheme for WBAN with anonymity and provided a formal security proof through BAN logic.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
1.
go back to reference Van Dam K, Pitchers S, Barnard M (2001) Body area networks: towards a wear-able future. In: Proc. WWRF kick off meeting, Munich, Germany, pp 6–7 Van Dam K, Pitchers S, Barnard M (2001) Body area networks: towards a wear-able future. In: Proc. WWRF kick off meeting, Munich, Germany, pp 6–7
2.
go back to reference Li M, Lou W, Ren K (2010) Data security and privacy in wireless body area networks. In: IEEE wireless communications, vol 17, No 1 Li M, Lou W, Ren K (2010) Data security and privacy in wireless body area networks. In: IEEE wireless communications, vol 17, No 1
3.
go back to reference Toorani M (2015) On vulnerabilities of the security association in the ieee 802.15. 6standard. In: International conference on financial cryptography and data security, Springer, pp 245–260 Toorani M (2015) On vulnerabilities of the security association in the ieee 802.15. 6standard. In: International conference on financial cryptography and data security, Springer, pp 245–260
4.
go back to reference Narwal B, Mohapatra AK, Usmani KA (2019) Towards a taxonomy of cyber threats against target applications. J Stat Manage Sys 22(2):301–325 Narwal B, Mohapatra AK, Usmani KA (2019) Towards a taxonomy of cyber threats against target applications. J Stat Manage Sys 22(2):301–325
5.
go back to reference Li X, Ibrahim MH, Kumari S, Sangaiah AK, Gupta V, Choo K-KR (2017) Anonymous mutual authentication and key agreement scheme for wearable sensors in wireless body area networks. Computer networks, vol 129, pp 429–443 Li X, Ibrahim MH, Kumari S, Sangaiah AK, Gupta V, Choo K-KR (2017) Anonymous mutual authentication and key agreement scheme for wearable sensors in wireless body area networks. Computer networks, vol 129, pp 429–443
6.
go back to reference Wang C, Zhang Y (2015) New authentication scheme for wireless body area net-works using the bilinear pairing. J Med Sys 39(11):136 Wang C, Zhang Y (2015) New authentication scheme for wireless body area net-works using the bilinear pairing. J Med Sys 39(11):136
7.
go back to reference Jiang Q, Lian X, Yang C, Ma J, Tian Y, Yang Y (2016) A bilinear pairing based anonymous authentication scheme in wireless body area networks for mhealth. J Med Sys 40(11):231 Jiang Q, Lian X, Yang C, Ma J, Tian Y, Yang Y (2016) A bilinear pairing based anonymous authentication scheme in wireless body area networks for mhealth. J Med Sys 40(11):231
8.
go back to reference Xiong H (2014) Cost-effective scalable and anonymous certificateless remote authentication protocol. IEEE Trans Inform Forensics Secur 9(12):2327–2339 Xiong H (2014) Cost-effective scalable and anonymous certificateless remote authentication protocol. IEEE Trans Inform Forensics Secur 9(12):2327–2339
9.
go back to reference Xiong H, Qin Z (2015) Revocable and scalable certificateless remote authentication protocol with anonymity for wireless body area networks. IEEE Trans Inform Forensics Secur 10(7):1442–1455 Xiong H, Qin Z (2015) Revocable and scalable certificateless remote authentication protocol with anonymity for wireless body area networks. IEEE Trans Inform Forensics Secur 10(7):1442–1455
10.
go back to reference He D, Zeadally S, Kumar N, Lee J-H (2017) Anonymous authentication for wire-less body area networks with provable security. IEEE Sys J 11(4):2590–2601 He D, Zeadally S, Kumar N, Lee J-H (2017) Anonymous authentication for wire-less body area networks with provable security. IEEE Sys J 11(4):2590–2601
11.
go back to reference Liu J, Li Q, Yan R, Sun R (2015) Efficient authenticated key exchange protocol ls for wireless body area networks. EURASIP J Wirel Commun Networking 2015(1):188 Liu J, Li Q, Yan R, Sun R (2015) Efficient authenticated key exchange protocol ls for wireless body area networks. EURASIP J Wirel Commun Networking 2015(1):188
12.
go back to reference Arya A, Reddy C, Limbasiya T (2017) An improved remote user verification scheme in wireless body area networks. Procedia Comp Sci 113:113–120 Arya A, Reddy C, Limbasiya T (2017) An improved remote user verification scheme in wireless body area networks. Procedia Comp Sci 113:113–120
13.
go back to reference Xu C, Yang J, Gao J (2019) Coupled-learning convolutional neural networks for object recognition. Multimedia Tools Appl 78(1):573–589CrossRef Xu C, Yang J, Gao J (2019) Coupled-learning convolutional neural networks for object recognition. Multimedia Tools Appl 78(1):573–589CrossRef
14.
go back to reference Liu B, Wang M, Foroosh H, Tappen M, Pensky M (2015) Sparse convolutional neural networks. In: Proceedings of the IEEE conference on computer vision and pattern recognition, pp 806–814 Liu B, Wang M, Foroosh H, Tappen M, Pensky M (2015) Sparse convolutional neural networks. In: Proceedings of the IEEE conference on computer vision and pattern recognition, pp 806–814
15.
go back to reference Sun Y, Xue B, Zhang M, Yen GG (2019) Evolving deep convolutional neural networks for image classification. IEEE Trans Evol Comput Sun Y, Xue B, Zhang M, Yen GG (2019) Evolving deep convolutional neural networks for image classification. IEEE Trans Evol Comput
16.
go back to reference Zhao ZQ, Zheng P, Xu ST, Wu X (2019) Object detection with deep learning: a review. IEEE Trans Neural Netw Learn Syst Zhao ZQ, Zheng P, Xu ST, Wu X (2019) Object detection with deep learning: a review. IEEE Trans Neural Netw Learn Syst
17.
go back to reference Zhang X, Zhou X, Lin M, Sun J (2018) Shufflenet: an extremely efficient convolutional neural network for mobile devices. In: Proceedings of the IEEE conference on computer vision and pattern recognition, pp 6848–6856 Zhang X, Zhou X, Lin M, Sun J (2018) Shufflenet: an extremely efficient convolutional neural network for mobile devices. In: Proceedings of the IEEE conference on computer vision and pattern recognition, pp 6848–6856
18.
go back to reference Iandola FN, Han S, Moskewicz MW, Ashraf K, Dally WJ, Keutzer K (2016) SqueezeNet: Alexnet-level accuracy with 50× fewer parameters and <0.5 MB model size. arXiv:1602.07360 Iandola FN, Han S, Moskewicz MW, Ashraf K, Dally WJ, Keutzer K (2016) SqueezeNet: Alexnet-level accuracy with 50× fewer parameters and <0.5 MB model size. arXiv:​1602.​07360
19.
go back to reference Bharadwaj P, Pal H, Narwal B (2018) Proposing a key escrow mechanism for real-time access to end-to-end encryption systems in the interest of law enforcement. In: 3rd international conference on contemporary computing and informatics (IC3I), pp 233–237. IEEE Bharadwaj P, Pal H, Narwal B (2018) Proposing a key escrow mechanism for real-time access to end-to-end encryption systems in the interest of law enforcement. In: 3rd international conference on contemporary computing and informatics (IC3I), pp 233–237. IEEE
20.
go back to reference Malik M, Narwal B (2021) Automated malware identifier and analyzer. In: Deshpande P, Abraham A, Iyer B, Ma K (eds) Next generation information processing system. Advances in intelligent systems and computing, vol 1162. Springer, Singapore Malik M, Narwal B (2021) Automated malware identifier and analyzer. In: Deshpande P, Abraham A, Iyer B, Ma K (eds) Next generation information processing system. Advances in intelligent systems and computing, vol 1162. Springer, Singapore
21.
go back to reference Dhawan S, Shah S, Narwal B (2020) A walkthrough of blockchain technology and its potential applications. In: Batra U, Roy N, Panda B (eds) Data science and analytics. REDSET 2019. Communications in computer and information science, vol 1230. Springer, Singapore Dhawan S, Shah S, Narwal B (2020) A walkthrough of blockchain technology and its potential applications. In: Batra U, Roy N, Panda B (eds) Data science and analytics. REDSET 2019. Communications in computer and information science, vol 1230. Springer, Singapore
22.
go back to reference Narwal B, Mohapatra AK (2018) A review on authentication protocols in wireless body area networks (WBAN). In: 3rd international conference on contemporary computing and informatics (IC3I), Gurgaon, India, pp 227–232 Narwal B, Mohapatra AK (2018) A review on authentication protocols in wireless body area networks (WBAN). In: 3rd international conference on contemporary computing and informatics (IC3I), Gurgaon, India, pp 227–232
23.
go back to reference Narwal B, Mohapatra AK (2020) SEEMAKA: secured energy-efficient mutual authentication and key agreement scheme for wireless body area networks. Wirel Pers Commun 1–24 Narwal B, Mohapatra AK (2020) SEEMAKA: secured energy-efficient mutual authentication and key agreement scheme for wireless body area networks. Wirel Pers Commun 1–24
24.
go back to reference Narwal B, Mohapatra AK (2020) SALMAKA: secured, anonymity preserving and lightweight mutual authentication and key agreement scheme for WBAN. Int J Sens Wirel Commun Control 10 Narwal B, Mohapatra AK (2020) SALMAKA: secured, anonymity preserving and lightweight mutual authentication and key agreement scheme for WBAN. Int J Sens Wirel Commun Control 10
25.
go back to reference Narwal B, Mohapatra AK (2018) Secured secret sharing and reconstruction algorithm for organizations. In: 3rd international conference on contemporary computing and informatics (IC3I), pp 223–226. IEEE Narwal B, Mohapatra AK (2018) Secured secret sharing and reconstruction algorithm for organizations. In: 3rd international conference on contemporary computing and informatics (IC3I), pp 223–226. IEEE
26.
go back to reference Narwal B (2019) Security analysis and verification of authenticated mobile payment protocols. In: 4th international conference on information systems and computer networks (ISCON), Mathura, India, pp 202–207 Narwal B (2019) Security analysis and verification of authenticated mobile payment protocols. In: 4th international conference on information systems and computer networks (ISCON), Mathura, India, pp 202–207
27.
go back to reference Rastegari M, Ordonez V, Redmon J, Farhadi A (2016, Oct). Xnor-net: imagenet classification using binary convolutional neural networks. In: European conference on computer vision. Springer, Cham, pp 525–542 Rastegari M, Ordonez V, Redmon J, Farhadi A (2016, Oct). Xnor-net: imagenet classification using binary convolutional neural networks. In: European conference on computer vision. Springer, Cham, pp 525–542
28.
go back to reference Giusti A, Cireşan DC, Masci J, Gambardella LM, Schmidhuber J (2013, Sept) Fast image scanning with deep max-pooling convolutional neural networks. In: 2013 IEEE international conference on image processing. IEEE, pp 4034–4038 Giusti A, Cireşan DC, Masci J, Gambardella LM, Schmidhuber J (2013, Sept) Fast image scanning with deep max-pooling convolutional neural networks. In: 2013 IEEE international conference on image processing. IEEE, pp 4034–4038
29.
go back to reference Miikkulainen R, Liang J, Meyerson E, Rawal A, Fink D, Francon O, Raju B, Shahrzad H, Navruzyan A, Duffy N, Hodjat B (2019) Evolving deep neural networks. In: Artificial intelligence in the age of neural networks and brain computing. Academic Press, pp 293–312 Miikkulainen R, Liang J, Meyerson E, Rawal A, Fink D, Francon O, Raju B, Shahrzad H, Navruzyan A, Duffy N, Hodjat B (2019) Evolving deep neural networks. In: Artificial intelligence in the age of neural networks and brain computing. Academic Press, pp 293–312
30.
go back to reference Geng X, Fu J, Zhao B, Lin J, Aly MMS, Pal C, Chandrasekhar V (2019) Dataflow-based joint quantization of weights and activations for deep neural networks. arXiv:1901.02064 Geng X, Fu J, Zhao B, Lin J, Aly MMS, Pal C, Chandrasekhar V (2019) Dataflow-based joint quantization of weights and activations for deep neural networks. arXiv:​1901.​02064
Metadata
Title
A Novel Authentication Scheme for Wireless Body Area Networks with Anonymity
Authors
Upasna Singh
Bhawna Narwal
Copyright Year
2021
Publisher
Springer Singapore
DOI
https://doi.org/10.1007/978-981-15-6584-7_29