Skip to main content
Top
Published in: Wireless Personal Communications 4/2020

11-04-2020

SEEMAKA: Secured Energy-Efficient Mutual Authentication and Key Agreement Scheme for Wireless Body Area Networks

Authors: Bhawna Narwal, Amar Kumar Mohapatra

Published in: Wireless Personal Communications | Issue 4/2020

Log in

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

With the empowerment of wireless networking technologies and medical sensors, WBAN is playing a major part in modern medical systems. As a key application of IoT, WBAN has shown swift growth and adoption in recent years because of its capabilities such as continuous and seamless monitoring of patients and collection of their biomedical data in real-time which is further used by doctors for clinical diagnosis and treatment. Despite numerous benefits, WBAN lacks a clear in-depth defense line because of the vulnerability caused by its openness and mobility raising issues like privacy leakage, complicated requirements and security concerns from unauthenticated or malicious adversaries. To alleviate the aforementioned issues and prevent adversaries from intimidating legitimate users or exploiting WBAN services, a secured energy-efficient mutual authentication, and key agreement scheme (SEEMAKA) for two-tier WBAN is propounded. In particular, SEEMAKA achieves desirable security features and thwarts different security attacks using fewer hash invocations and bitwise XOR operations, nicely meeting the need for sensor nodes equipped with limited capability. More importantly, the security of SEEMAKA is assessed through sound informal analysis as well as using Automated Validation of Internet Security Protocols and Applications (AVISPA). For verifying the correctness of SEEMAKA, widely-accepted Burrows–Abadi–Needham (BAN) Logic is used. For a better understanding, SEEMAKA is evaluated over NS2 along with counterpart schemes for End-to-End Delay and Throughput. Finally, a set of thorough relative analyses between SEEMAKA and other relevant schemes are performed and the outcomes manifest that SEEMAKA attains superior efficiency concerning processing overhead, energy dissipation, and security features. Relative to Li et al.’s scheme, SEEMAKA outperforms with a reduction of 2 XOR operations in processing cost at master node, includes master key update phase (to make the system safe from master node spoofing attack) and counters sensor node spoofing attack.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
1.
go back to reference Zimmerman, T. G. (1996). Personal area networks: Near-field intrabody communication. IBM Systems Journal.,35(34), 609–617.CrossRef Zimmerman, T. G. (1996). Personal area networks: Near-field intrabody communication. IBM Systems Journal.,35(34), 609–617.CrossRef
2.
go back to reference Narwal, B., & Mohapatra, A. K. (2018). A review on authentication protocols in wireless body area networks (WBAN). In 2018 3rd International Conference on Contemporary Computing and Informatics (IC3I), Gurgaon, pp. 227–232. Narwal, B., & Mohapatra, A. K. (2018). A review on authentication protocols in wireless body area networks (WBAN). In 2018 3rd International Conference on Contemporary Computing and Informatics (IC3I), Gurgaon, pp. 227–232.
3.
go back to reference He, D., Chen, C., Chan, S., Bu, J., & Zhang, P. (2013). Secure and lightweight network admission and transmission protocol for bodysensor networks. IEEE Journal of Biomedical Health Informatics,17(3), 664–674.CrossRef He, D., Chen, C., Chan, S., Bu, J., & Zhang, P. (2013). Secure and lightweight network admission and transmission protocol for bodysensor networks. IEEE Journal of Biomedical Health Informatics,17(3), 664–674.CrossRef
4.
go back to reference Khan, F. H., Shams, R., Rizvi, H. H., & Qazi, F. (2018). A secure crypto base authentication and communication suite in wirelessbody area network (wban) for iot applications. Wireless Personal Communications,103(1), 2877–2890. Khan, F. H., Shams, R., Rizvi, H. H., & Qazi, F. (2018). A secure crypto base authentication and communication suite in wirelessbody area network (wban) for iot applications. Wireless Personal Communications,103(1), 2877–2890.
5.
go back to reference Shaik, M. F., Komanapalli, V. L. N., & Subashini, M. M. (2018). (2018) A comparative study of interference and mitigation techniques in wireless body area networks. Wireless Personal Communications.,98(2), 2333–2365.CrossRef Shaik, M. F., Komanapalli, V. L. N., & Subashini, M. M. (2018). (2018) A comparative study of interference and mitigation techniques in wireless body area networks. Wireless Personal Communications.,98(2), 2333–2365.CrossRef
6.
go back to reference S. S. . K. A. Sagar, A.K., “Energy-aware wban for health monitoring using critical data routing (cdr),”Wireless PersCommun, pp. 1–30, 2020. S. S. . K. A. Sagar, A.K., “Energy-aware wban for health monitoring using critical data routing (cdr),”Wireless PersCommun, pp. 1–30, 2020.
7.
go back to reference Narwal, B., & Mohapatra, A. (2016). Energy efficient vertical handover algorithm for heterogeneous wireless networks. International Journal of Control Theory and Applications,9(19), 9221–9225. Narwal, B., & Mohapatra, A. (2016). Energy efficient vertical handover algorithm for heterogeneous wireless networks. International Journal of Control Theory and Applications,9(19), 9221–9225.
8.
go back to reference AL-Rassan, I. A., & Khan, N. (2011). Energy efficient key management scheme for wban-a hybrid approach. IJCSNS,11(6), 169. AL-Rassan, I. A., & Khan, N. (2011). Energy efficient key management scheme for wban-a hybrid approach. IJCSNS,11(6), 169.
9.
go back to reference Kumbhare, Y. L., Rangaree, P. H., & GM., D A. (2011). Wireless body area sensor network authentication using hmac function. In 2nd National Conference on Information and Communication Technology (NCICT). Kumbhare, Y. L., Rangaree, P. H., & GM., D A. (2011). Wireless body area sensor network authentication using hmac function. In 2nd National Conference on Information and Communication Technology (NCICT).
10.
go back to reference Liu, J., Zhang, Z., Sun, R., & Kwak, K. S. J. (2012) An efficient certificateless remote anonymous authentication scheme for wireless body area networks. In IEEE International Conference on Communications (ICC). IEEE, pp. 3404–3408. Liu, J., Zhang, Z., Sun, R., & Kwak, K. S. J. (2012) An efficient certificateless remote anonymous authentication scheme for wireless body area networks. In IEEE International Conference on Communications (ICC). IEEE, pp. 3404–3408.
11.
go back to reference He, D., Chen, C., Chan, S., Bu, J., & Zhang, P. (2013). Secure and lightweight network admission and transmission protocol for body sensor networks. IEEE Journal of Biomedical Health Informatics,17(3), 664–674.CrossRef He, D., Chen, C., Chan, S., Bu, J., & Zhang, P. (2013). Secure and lightweight network admission and transmission protocol for body sensor networks. IEEE Journal of Biomedical Health Informatics,17(3), 664–674.CrossRef
12.
go back to reference Ramli, S. N., Ahmad, R., & Abdollah, M. F. (2013). Electrocardiogram (ecg) signals as biometrics in securing wireless body area network. In 2013 8th International Conference for Internet Technology and Secured Transactions (ICITST); pp. 536–541. Ramli, S. N., Ahmad, R., & Abdollah, M. F. (2013). Electrocardiogram (ecg) signals as biometrics in securing wireless body area network. In 2013 8th International Conference for Internet Technology and Secured Transactions (ICITST); pp. 536–541.
13.
go back to reference Ma, L., Ge, Y., & Zhu, Y. (2014). Tinyzkp: A lightweight authentication scheme based on zero-knowledge proof for wireless bodyarea networks. Wireless Personal Communication,77(2), 1077–1090.CrossRef Ma, L., Ge, Y., & Zhu, Y. (2014). Tinyzkp: A lightweight authentication scheme based on zero-knowledge proof for wireless bodyarea networks. Wireless Personal Communication,77(2), 1077–1090.CrossRef
14.
go back to reference Li, X., Niu, J., Khan, M. K., & Liao, J. (2013). An enhanced smart card based remote user password authentication scheme. Journal of Network and Computer Applications,36(5), 1365–1371.CrossRef Li, X., Niu, J., Khan, M. K., & Liao, J. (2013). An enhanced smart card based remote user password authentication scheme. Journal of Network and Computer Applications,36(5), 1365–1371.CrossRef
15.
go back to reference Liu, J., Zhang, Z., Chen, X., & Kwak, K. S. (2014). Certificateless remote anonymous authentication schemes for wireless body areanetworks. IEEE Transactions of Parallel Distributed Systems,25(2), 332–342.CrossRef Liu, J., Zhang, Z., Chen, X., & Kwak, K. S. (2014). Certificateless remote anonymous authentication schemes for wireless body areanetworks. IEEE Transactions of Parallel Distributed Systems,25(2), 332–342.CrossRef
16.
go back to reference Zhao, Z. (2014). An efficient anonymous authentication scheme for wireless body area networks using elliptic curve cryptosystem. Journal of Medical Systems,38(2), 13.CrossRef Zhao, Z. (2014). An efficient anonymous authentication scheme for wireless body area networks using elliptic curve cryptosystem. Journal of Medical Systems,38(2), 13.CrossRef
17.
go back to reference Xiong, H. (2014). Cost-effective scalable and anonymous certificateless remote authentication protocol. IEEE Transactions of Infor-mation Forensics Security,9(12), 2327–2339.CrossRef Xiong, H. (2014). Cost-effective scalable and anonymous certificateless remote authentication protocol. IEEE Transactions of Infor-mation Forensics Security,9(12), 2327–2339.CrossRef
18.
go back to reference Liu, J., Li, Q., Yan, R., & Sun, R. (2015). Efficient authenticated key exchange protocols for wireless body area networks. EURASIP Journal on Wireless Communications and Networking,2015(1), 188.CrossRef Liu, J., Li, Q., Yan, R., & Sun, R. (2015). Efficient authenticated key exchange protocols for wireless body area networks. EURASIP Journal on Wireless Communications and Networking,2015(1), 188.CrossRef
19.
go back to reference Narwal, B., Mohapatra, A. K., & Usmani, K. A. (2019). Towards a taxonomy of cyber threats against target applications. Journal of Statistics and Management Systems,22(2), 301–325.CrossRef Narwal, B., Mohapatra, A. K., & Usmani, K. A. (2019). Towards a taxonomy of cyber threats against target applications. Journal of Statistics and Management Systems,22(2), 301–325.CrossRef
20.
go back to reference Wang, C., & Zhang, Y. (2015). New authentication scheme for wireless body area networks using the bilinear pairing. Journalof Medical Systems,39(11), 136.CrossRef Wang, C., & Zhang, Y. (2015). New authentication scheme for wireless body area networks using the bilinear pairing. Journalof Medical Systems,39(11), 136.CrossRef
21.
go back to reference He, D., & Zeadally, S. (2015). Authentication protocol for an ambient assisted living system. IEEE Communications Magazine,53(1), 71–77.CrossRef He, D., & Zeadally, S. (2015). Authentication protocol for an ambient assisted living system. IEEE Communications Magazine,53(1), 71–77.CrossRef
22.
go back to reference Ibrahim, M. H., Kumari, S., Das, A. K., Wazid, M., & Odelu, V. (2016). Secure anonymous mutual authentication for star two-tierwireless body area networks. Computer Methods and Programs in Biomedicine,135, 37–50.CrossRef Ibrahim, M. H., Kumari, S., Das, A. K., Wazid, M., & Odelu, V. (2016). Secure anonymous mutual authentication for star two-tierwireless body area networks. Computer Methods and Programs in Biomedicine,135, 37–50.CrossRef
23.
go back to reference Bharadwaj, P., Pal H., & Narwal, B. (2018). Proposing a Key Escrow Mechanism for Real-Time access to End-to-End encryption systems in the Interest of Law Enforcement. In 2018 3rd International Conference on Contemporary Computing and Informatics (IC3I), Gurgaon, pp. 233–237. Bharadwaj, P., Pal H., & Narwal, B. (2018). Proposing a Key Escrow Mechanism for Real-Time access to End-to-End encryption systems in the Interest of Law Enforcement. In 2018 3rd International Conference on Contemporary Computing and Informatics (IC3I), Gurgaon, pp. 233–237.
24.
go back to reference Shen, J., Chang, S., Shen, J., Liu, Q., & Sun, X. (2016). A lightweight multi-layer authentication protocol for wireless body areanetworks. Future Generation Computer Systems.,8, 956–963. Shen, J., Chang, S., Shen, J., Liu, Q., & Sun, X. (2016). A lightweight multi-layer authentication protocol for wireless body areanetworks. Future Generation Computer Systems.,8, 956–963.
25.
go back to reference Jiang, Q., Lian, X., Yang, C., et al. (2016). A bilinear pairing based anonymous authentication scheme in wireless body area networksfor mhealth. Journal of Medical Systems,40(11), 231.CrossRef Jiang, Q., Lian, X., Yang, C., et al. (2016). A bilinear pairing based anonymous authentication scheme in wireless body area networksfor mhealth. Journal of Medical Systems,40(11), 231.CrossRef
26.
go back to reference Wu, L., Zhang, Y., Li, L., & Shen, J. (2016). Efficient and anonymous authentication scheme for wireless body area networks. Journal of Medical Systems,40(6), 134.CrossRef Wu, L., Zhang, Y., Li, L., & Shen, J. (2016). Efficient and anonymous authentication scheme for wireless body area networks. Journal of Medical Systems,40(6), 134.CrossRef
27.
go back to reference Li, C. T., Lee, C. C., & Weng, C. Y. (2016). A secure cloud-assisted wireless body area network in mobile emergency medical care system. Journal of Medical Systems,40(5), 117.CrossRef Li, C. T., Lee, C. C., & Weng, C. Y. (2016). A secure cloud-assisted wireless body area network in mobile emergency medical care system. Journal of Medical Systems,40(5), 117.CrossRef
28.
go back to reference Omala, A. A., Kibiwott, K. P., & Li, F. (2017). An efficient remote authentication scheme for wireless body area network. Journal of Medical Systems,41(2), 25.CrossRef Omala, A. A., Kibiwott, K. P., & Li, F. (2017). An efficient remote authentication scheme for wireless body area network. Journal of Medical Systems,41(2), 25.CrossRef
29.
go back to reference Yessad, N., Bouchelaghem, S., Ouada, F. S., & Omar, M. (2017). Secure and reliable patient bodymotion based authentication approachfor medical body area networks. Pervasive Mobile Computing.,42, 351–370.CrossRef Yessad, N., Bouchelaghem, S., Ouada, F. S., & Omar, M. (2017). Secure and reliable patient bodymotion based authentication approachfor medical body area networks. Pervasive Mobile Computing.,42, 351–370.CrossRef
31.
go back to reference Li, X., Ibrahim, M. H., Kumari, S., Sangaiah, A. K., Gupta, V., & Choo, K.-K. R. (2017). Anonymous mutual authentication andkey agreement scheme for wearable sensors in wireless body area networks. Computer Networks,129, 429–443.CrossRef Li, X., Ibrahim, M. H., Kumari, S., Sangaiah, A. K., Gupta, V., & Choo, K.-K. R. (2017). Anonymous mutual authentication andkey agreement scheme for wearable sensors in wireless body area networks. Computer Networks,129, 429–443.CrossRef
34.
go back to reference Raj, A. S., & Chinnadurai, M. (2020). Energy efficient routing algorithm in wireless body area networks for smart wearable patches. Computer Communications,153, 85–94.CrossRef Raj, A. S., & Chinnadurai, M. (2020). Energy efficient routing algorithm in wireless body area networks for smart wearable patches. Computer Communications,153, 85–94.CrossRef
35.
go back to reference Narwal, B., & Mohapatra, A. K. (2020). SALMAKA: Secured, anonymity preserving and lightweight mutual authentication and key agreement scheme for wireless body area networks. International Journal Of Sensors, Wireless Communications And Control (forthcoming). Narwal, B., & Mohapatra, A. K. (2020). SALMAKA: Secured, anonymity preserving and lightweight mutual authentication and key agreement scheme for wireless body area networks. International Journal Of Sensors, Wireless Communications And Control (forthcoming).
36.
go back to reference Li, X., Ibrahim, M. H., Kumari, S., & Kumar, R. (2018). Secure and efficient anonymous authentication scheme for three-tier mobilehealthcare systems with wearable sensors. Telecommunication Systems,67(2), 323–348.CrossRef Li, X., Ibrahim, M. H., Kumari, S., & Kumar, R. (2018). Secure and efficient anonymous authentication scheme for three-tier mobilehealthcare systems with wearable sensors. Telecommunication Systems,67(2), 323–348.CrossRef
37.
go back to reference Shen, J., Chang, S., Shen, J., Liu, Q., & Sun, X. (2018). A lightweight multi-layer authentication protocol for wireless body areanetworks. Future Generation Computer Systems,78, 956–963.CrossRef Shen, J., Chang, S., Shen, J., Liu, Q., & Sun, X. (2018). A lightweight multi-layer authentication protocol for wireless body areanetworks. Future Generation Computer Systems,78, 956–963.CrossRef
38.
go back to reference Ostad-Sharif, A., Nikooghadam, M., & Abbasinezhad-Mood, D. (2019). Design of a lightweight and anonymous authenticatedkey agreement protocol for wireless body area networks. International Journal of Communication Systems,32(12), e3974.CrossRef Ostad-Sharif, A., Nikooghadam, M., & Abbasinezhad-Mood, D. (2019). Design of a lightweight and anonymous authenticatedkey agreement protocol for wireless body area networks. International Journal of Communication Systems,32(12), e3974.CrossRef
39.
go back to reference Chen, R., & Peng, D. (2019). Analysis and improvement of a mutual authentication scheme for wireless body area networks. Journal of medical Systems,43(2), 19.CrossRef Chen, R., & Peng, D. (2019). Analysis and improvement of a mutual authentication scheme for wireless body area networks. Journal of medical Systems,43(2), 19.CrossRef
40.
go back to reference Konan, M., & Wang, W. (2019). A secure mutual batch authentication scheme for patient data privacy preserving in wban. Sensors,19(7), 1608.CrossRef Konan, M., & Wang, W. (2019). A secure mutual batch authentication scheme for patient data privacy preserving in wban. Sensors,19(7), 1608.CrossRef
41.
go back to reference Xu, Z., Xu, C., Chen, H., & Yang, F. (2019). A lightweight anonymous mutual authentication and key agreement scheme forwban. Concurrency and Computation: Practice and Experience,31, 14. Xu, Z., Xu, C., Chen, H., & Yang, F. (2019). A lightweight anonymous mutual authentication and key agreement scheme forwban. Concurrency and Computation: Practice and Experience,31, 14.
42.
go back to reference Xie, Y., Zhang, S., Li, X., Li, Y., & Chai, Y. (2019). Cascp: Efficient and secure certificateless authentication scheme for wirelessbody area networks with conditional privacy-preserving. Security and Communication Networks. Xie, Y., Zhang, S., Li, X., Li, Y., & Chai, Y. (2019). Cascp: Efficient and secure certificateless authentication scheme for wirelessbody area networks with conditional privacy-preserving. Security and Communication Networks.
43.
go back to reference Sridhar, M., Priya, N., & Muniyappan, A. (2020). Wireless body area networks: requirements, characteristics, design consideration, and challenges. In Incorporating the Internet of Things in Healthcare Applications and Wearable Devices (pp. 67–85). IGI Global. Sridhar, M., Priya, N., & Muniyappan, A. (2020). Wireless body area networks: requirements, characteristics, design consideration, and challenges. In Incorporating the Internet of Things in Healthcare Applications and Wearable Devices (pp. 67–85). IGI Global.
44.
go back to reference Dolev, D., & Yao, A. C. (1981) On the security of public key protocols. In 22nd Annual Symposium on Foundations of ComputerScience (sfcs 1981), pp. 350–357. Dolev, D., & Yao, A. C. (1981) On the security of public key protocols. In 22nd Annual Symposium on Foundations of ComputerScience (sfcs 1981), pp. 350–357.
45.
go back to reference Burrows, M., Abadi, M., & Needham, R. (1990). A logic of authentication. ACM Transactions on Computer Systems,8(1), 18–36.MATHCrossRef Burrows, M., Abadi, M., & Needham, R. (1990). A logic of authentication. ACM Transactions on Computer Systems,8(1), 18–36.MATHCrossRef
46.
go back to reference Armando, A., Basin, D., Boichut Y. et al. (2005) The avispa tool for the automated validation of internet security protocols and applications. In International Conference on Computer Aided Verification. Heidelberg: Springer, pp. 281–285. Armando, A., Basin, D., Boichut Y. et al. (2005) The avispa tool for the automated validation of internet security protocols and applications. In International Conference on Computer Aided Verification. Heidelberg: Springer, pp. 281–285.
48.
go back to reference Narwal, B. (2019) Security analysis and verification of authenticated mobile payment protocols. In 2019 4th International Conference on Information Systems and Computer Networks (ISCON), Mathura, pp. 202–207. Narwal, B. (2019) Security analysis and verification of authenticated mobile payment protocols. In 2019 4th International Conference on Information Systems and Computer Networks (ISCON), Mathura, pp. 202–207.
Metadata
Title
SEEMAKA: Secured Energy-Efficient Mutual Authentication and Key Agreement Scheme for Wireless Body Area Networks
Authors
Bhawna Narwal
Amar Kumar Mohapatra
Publication date
11-04-2020
Publisher
Springer US
Published in
Wireless Personal Communications / Issue 4/2020
Print ISSN: 0929-6212
Electronic ISSN: 1572-834X
DOI
https://doi.org/10.1007/s11277-020-07304-3

Other articles of this Issue 4/2020

Wireless Personal Communications 4/2020 Go to the issue