Skip to main content
Top

2023 | OriginalPaper | Chapter

38. To Analyze Security Requirements of Two AKA Protocols in WBAN and VANET

Authors : Haozhi Wu, Saru Kumari, Tsu-Yang Wu

Published in: Advances in Smart Vehicular Technology, Transportation, Communication and Applications

Publisher: Springer Nature Singapore

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

The emergence of the Internet of Things (IoT) is gradually changing people’s lives and is widely used in various fields. Wireless body area networks (WBAN) and vehicular ad-hoc networks (VANET) are typical examples of IoT applications. In both environments, an attacker can tamper, intercept, and eavesdrop on data transmitted in the public channel. Therefore, it is necessary to design authentication and key agreement (AKA) protocols to protect the communication of entities. Recently, Wu et al. proposed a novel AKA protocol in WBAN. Jagriti et al. proposed an anonymous AKA protocol in VANET. In this paper, we analyse of Wu et al.’s protocol and Jagriti et al.’s protocol, respectively. Unfortunately, we find that Wu et al.’s protocol cannot resist sensor node capture attacks, and Jagriti et al.’s protocol cannot resist session key disclosure attacks, on board unit (OBU) capture attacks, and man-in-the-middle attacks. Finally, we propose some suggestions for the two protocols.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Literature
1.
go back to reference Alizadeh, J., Safkhani, M., Allahdadi, A.: Isaka: improved secure authentication and key agreement protocol for wban. Wirel. Pers. Commun. 126(4), 2911–2935 (2022)CrossRef Alizadeh, J., Safkhani, M., Allahdadi, A.: Isaka: improved secure authentication and key agreement protocol for wban. Wirel. Pers. Commun. 126(4), 2911–2935 (2022)CrossRef
2.
go back to reference Canetti, R., Krawczyk, H.: Universally composable notions of key exchange and secure channels. In: International Conference on the Theory and Applications of Cryptographic Techniques, pp. 337–351. Springer (2002) Canetti, R., Krawczyk, H.: Universally composable notions of key exchange and secure channels. In: International Conference on the Theory and Applications of Cryptographic Techniques, pp. 337–351. Springer (2002)
3.
go back to reference Chen, C.M., Huang, Y., Wang, K.H., Kumari, S., Wu, M.E.: A secure authenticated and key exchange scheme for fog computing. Enterp. Inf. Syst. 15(9), 1200–1215 (2021)CrossRef Chen, C.M., Huang, Y., Wang, K.H., Kumari, S., Wu, M.E.: A secure authenticated and key exchange scheme for fog computing. Enterp. Inf. Syst. 15(9), 1200–1215 (2021)CrossRef
4.
go back to reference Chen, J.N., Huang, Z.J., Zhou, Y.P., Zou, F.M., Chen, C.M., Wu, J.M.T., Wu, T.Y.: Efficient certificate-based aggregate signature scheme for vehicular ad hoc networks. IET Netw. 9(6), 290–297 (2020)CrossRef Chen, J.N., Huang, Z.J., Zhou, Y.P., Zou, F.M., Chen, C.M., Wu, J.M.T., Wu, T.Y.: Efficient certificate-based aggregate signature scheme for vehicular ad hoc networks. IET Netw. 9(6), 290–297 (2020)CrossRef
5.
go back to reference Chen, J.N., Zhou, Y.P., Huang, Z.J., Wu, T.Y., Zou, F.M., Tso, R.: An efficient aggregate signature scheme for healthcare wireless sensor networks. J. Netw. Intell. 6(1), 1–15 (2021) Chen, J.N., Zhou, Y.P., Huang, Z.J., Wu, T.Y., Zou, F.M., Tso, R.: An efficient aggregate signature scheme for healthcare wireless sensor networks. J. Netw. Intell. 6(1), 1–15 (2021)
6.
go back to reference Cheng, Q., Li, Y., Shi, W., Li, X.: A certificateless authentication and key agreement scheme for secure cloud-assisted wireless body area network. Mob. Netw. Appl. 27(1), 346–356 (2022)MathSciNetCrossRef Cheng, Q., Li, Y., Shi, W., Li, X.: A certificateless authentication and key agreement scheme for secure cloud-assisted wireless body area network. Mob. Netw. Appl. 27(1), 346–356 (2022)MathSciNetCrossRef
7.
go back to reference Cui, J., Zhang, X., Zhong, H., Zhang, J., Liu, L.: Extensible conditional privacy protection authentication scheme for secure vehicular networks in a multi-cloud environment. IEEE Trans. Inf. Forensics Secur. 15, 1654–1667 (2019)CrossRef Cui, J., Zhang, X., Zhong, H., Zhang, J., Liu, L.: Extensible conditional privacy protection authentication scheme for secure vehicular networks in a multi-cloud environment. IEEE Trans. Inf. Forensics Secur. 15, 1654–1667 (2019)CrossRef
8.
go back to reference Cui, J., Zhang, X., Zhong, H., Zhang, J., Liu, L.: Extensible conditional privacy protection authentication scheme for secure vehicular networks in a multi-cloud environment. IEEE Trans. Inf. Forensics Secur. 15, 1654–1667 (2020)CrossRef Cui, J., Zhang, X., Zhong, H., Zhang, J., Liu, L.: Extensible conditional privacy protection authentication scheme for secure vehicular networks in a multi-cloud environment. IEEE Trans. Inf. Forensics Secur. 15, 1654–1667 (2020)CrossRef
9.
go back to reference Deebak, B.D., Al-Turjman, F., Aloqaily, M., Alfandi, O.: An authentic-based privacy preservation protocol for smart e-healthcare systems in iot. IEEE Access 7, 135632–135649 (2019)CrossRef Deebak, B.D., Al-Turjman, F., Aloqaily, M., Alfandi, O.: An authentic-based privacy preservation protocol for smart e-healthcare systems in iot. IEEE Access 7, 135632–135649 (2019)CrossRef
10.
go back to reference Deebak, B.D., Fadi, A.T.: Lightweight authentication for iot/cloud-based forensics in intelligent data computing. Futur. Gener. Comput. Syst. 116, 406–425 (2021)CrossRef Deebak, B.D., Fadi, A.T.: Lightweight authentication for iot/cloud-based forensics in intelligent data computing. Futur. Gener. Comput. Syst. 116, 406–425 (2021)CrossRef
11.
go back to reference Deng, L., Shao, J., Hu, Z.: Identity based two-party authenticated key agreement scheme for vehicular ad hoc networks. Peer-to-Peer Netw. Appl. 14(4), 2236–2247 (2021)CrossRef Deng, L., Shao, J., Hu, Z.: Identity based two-party authenticated key agreement scheme for vehicular ad hoc networks. Peer-to-Peer Netw. Appl. 14(4), 2236–2247 (2021)CrossRef
13.
go back to reference Gupta, A., Tripathi, M., Sharma, A.: A provably secure and efficient anonymous mutual authentication and key agreement protocol for wearable devices in wban. Comput. Commun. 160, 311–325 (2020)CrossRef Gupta, A., Tripathi, M., Sharma, A.: A provably secure and efficient anonymous mutual authentication and key agreement protocol for wearable devices in wban. Comput. Commun. 160, 311–325 (2020)CrossRef
15.
go back to reference Jia, X., He, D., Kumar, N., Choo, K.K.R.: Authenticated key agreement scheme for fog-driven iot healthcare system. Wirel. Netw. 25(8), 4737–4750 (2019)CrossRef Jia, X., He, D., Kumar, N., Choo, K.K.R.: Authenticated key agreement scheme for fog-driven iot healthcare system. Wirel. Netw. 25(8), 4737–4750 (2019)CrossRef
16.
go back to reference Kim, Y.J., An, D.J., Sin, K.S., Kim, S.G.: Security analysis of a recent pairing-based certificateless authenticated key agreement protocol for blockchain-based wbans. Cryptology ePrint Archive (2022). https://eprint.iacr.org/2022/844 Kim, Y.J., An, D.J., Sin, K.S., Kim, S.G.: Security analysis of a recent pairing-based certificateless authenticated key agreement protocol for blockchain-based wbans. Cryptology ePrint Archive (2022). https://​eprint.​iacr.​org/​2022/​844
17.
go back to reference Li, X., Ibrahim, M.H., Kumari, S., Sangaiah, A.K., Gupta, V., Choo, K.K.R.: Anonymous mutual authentication and key agreement scheme for wearable sensors in wireless body area networks. Comput. Netw. 129, 429–443 (2017)CrossRef Li, X., Ibrahim, M.H., Kumari, S., Sangaiah, A.K., Gupta, V., Choo, K.K.R.: Anonymous mutual authentication and key agreement scheme for wearable sensors in wireless body area networks. Comput. Netw. 129, 429–443 (2017)CrossRef
18.
go back to reference Ma, M., He, D., Wang, H., Kumar, N., Choo, K.K.R.: An efficient and provably secure authenticated key agreement protocol for fog-based vehicular ad-hoc networks. IEEE Internet Things J. 6(5), 8065–8075 (2019)CrossRef Ma, M., He, D., Wang, H., Kumar, N., Choo, K.K.R.: An efficient and provably secure authenticated key agreement protocol for fog-based vehicular ad-hoc networks. IEEE Internet Things J. 6(5), 8065–8075 (2019)CrossRef
19.
go back to reference Ma, M., He, D., Wang, H., Kumar, N., Choo, K.K.R.: An efficient and provably secure authenticated key agreement protocol for fog-based vehicular ad-hoc networks. IEEE Internet Things J. 6(5), 8065–8075 (2019)CrossRef Ma, M., He, D., Wang, H., Kumar, N., Choo, K.K.R.: An efficient and provably secure authenticated key agreement protocol for fog-based vehicular ad-hoc networks. IEEE Internet Things J. 6(5), 8065–8075 (2019)CrossRef
20.
go back to reference Tso, R., Huang, K., Chen, Y.C., Rahman, S.M.M., Wu, T.Y.: Generic construction of dual-server public key encryption with keyword search on cloud computing. IEEE Access 8, 152551–152564 (2020)CrossRef Tso, R., Huang, K., Chen, Y.C., Rahman, S.M.M., Wu, T.Y.: Generic construction of dual-server public key encryption with keyword search on cloud computing. IEEE Access 8, 152551–152564 (2020)CrossRef
21.
go back to reference Wu, T.Y., Lee, Z., Yang, L., Chen, C.M.: A provably secure authentication and key exchange protocol in vehicular ad hoc networks. Secur. Commun, Netw (2021)CrossRef Wu, T.Y., Lee, Z., Yang, L., Chen, C.M.: A provably secure authentication and key exchange protocol in vehicular ad hoc networks. Secur. Commun, Netw (2021)CrossRef
22.
go back to reference Wu, T.Y., Yang, L., Meng, Q., Guo, X., Chen, C.M.: Fog-driven secure authentication and key exchange scheme for wearable health monitoring system. Secur. Commun, Netw (2021)CrossRef Wu, T.Y., Yang, L., Meng, Q., Guo, X., Chen, C.M.: Fog-driven secure authentication and key exchange scheme for wearable health monitoring system. Secur. Commun, Netw (2021)CrossRef
23.
go back to reference Wu, X., Xu, J., Huang, W., Jian, W.: A new mutual authentication and key agreement protocol in wireless body area network. In: 2020 IEEE International Conference on Smart Cloud (SmartCloud), pp. 199–203. IEEE (2020) Wu, X., Xu, J., Huang, W., Jian, W.: A new mutual authentication and key agreement protocol in wireless body area network. In: 2020 IEEE International Conference on Smart Cloud (SmartCloud), pp. 199–203. IEEE (2020)
24.
go back to reference Yang, L., Chen, Y.C., Wu, T.Y.: Provably secure client-server key management scheme in 5g networks. Wirel. Commun. Mob. Comput. 2021, 4083199 (2021)CrossRef Yang, L., Chen, Y.C., Wu, T.Y.: Provably secure client-server key management scheme in 5g networks. Wirel. Commun. Mob. Comput. 2021, 4083199 (2021)CrossRef
25.
go back to reference Yang, X., Shu, L., Chen, J., Ferrag, M.A., Wu, J., Nurellari, E., Huang, K.: A survey on smart agriculture: development modes, technologies, and security and privacy challenges. IEEE/CAA J. Autom. Sin. 8(2), 273–302 (2021)CrossRef Yang, X., Shu, L., Chen, J., Ferrag, M.A., Wu, J., Nurellari, E., Huang, K.: A survey on smart agriculture: development modes, technologies, and security and privacy challenges. IEEE/CAA J. Autom. Sin. 8(2), 273–302 (2021)CrossRef
26.
go back to reference Yu, S., Jho, N., Park, Y.: Lightweight three-factor-based privacy-preserving authentication scheme for iot-enabled smart homes. IEEE Access 9, 126186–126197 (2021)CrossRef Yu, S., Jho, N., Park, Y.: Lightweight three-factor-based privacy-preserving authentication scheme for iot-enabled smart homes. IEEE Access 9, 126186–126197 (2021)CrossRef
27.
go back to reference Zhang, J., Zhong, H., Cui, J., Xu, Y., Liu, L.: Smaka: secure many-to-many authentication and key agreement scheme for vehicular networks. IEEE Trans. Inf. Forensics Secur. 16, 1810–1824 (2020)CrossRef Zhang, J., Zhong, H., Cui, J., Xu, Y., Liu, L.: Smaka: secure many-to-many authentication and key agreement scheme for vehicular networks. IEEE Trans. Inf. Forensics Secur. 16, 1810–1824 (2020)CrossRef
Metadata
Title
To Analyze Security Requirements of Two AKA Protocols in WBAN and VANET
Authors
Haozhi Wu
Saru Kumari
Tsu-Yang Wu
Copyright Year
2023
Publisher
Springer Nature Singapore
DOI
https://doi.org/10.1007/978-981-99-0848-6_39

Premium Partner