Skip to main content
Erschienen in: The Journal of Supercomputing 4/2022

05.10.2021

Four-factor mutual authentication scheme for health-care based on wireless body area network

verfasst von: Diksha Rangwani, Hari Om

Erschienen in: The Journal of Supercomputing | Ausgabe 4/2022

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Health-care is one of the major concerns for every individual; however, it is not always possible to physically visit the health-care center in emergency situations. In such situations, remote health-care monitoring is beneficial, which can be provided by remote health-care monitoring applications based on wireless body area networks (WBANs). Since the communication in WBANs is carried over a public channel, their security becomes a paramount concern. Many schemes aimed to achieve secure and efficient communication in WBANs, but their own flaws impaired them. In this paper, we cryptanalyze Fotouhi et al.’s scheme and find that it is vulnerable to various attacks, namely privileged insider attack, sensor node capture attack, denial-of-service, desynchronization attack, replay attack, and stolen-verifier attack. It also lacks confidentiality and anonymity. Hence, we propose a new four-factor mutual authentication scheme for health-care based on WBANs that overcomes these issues and has better performance as it uses lightweight cryptographic primitives. The robustness of this scheme is verified formally using the Real-Or-Random model and Burrows–Abadi–Needham logic and informally through the state-of-the-art security analysis. Additionally, we verify the system’s security using the automated validation of Internet security protocols and applications tool-based automated simulation. Finally, we provide a comparative study of security and performance to show its efficacy in real-life applications.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Kira Alex R (2013) The factors affecting gross domestic product (gdp) in developing countries: The case of Tanzania Kira Alex R (2013) The factors affecting gross domestic product (gdp) in developing countries: The case of Tanzania
2.
Zurück zum Zitat Vani Rajasekar J, Sathya Premalatha K, Muzafer S (2021) Secure remote user authentication scheme on health care, iot and cloud applications: a multilayer systematic survey. Acta Polytechnica Hungarica 18(3):87–106CrossRef Vani Rajasekar J, Sathya Premalatha K, Muzafer S (2021) Secure remote user authentication scheme on health care, iot and cloud applications: a multilayer systematic survey. Acta Polytechnica Hungarica 18(3):87–106CrossRef
3.
Zurück zum Zitat Chang L, Qing Z, Holroyd Kenneth A, Seng Elizabeth K (2011) Status and trends of mobile-health applications for ios devices: a developer’s perspective. J Syst Softw 84(11):2022–2033CrossRef Chang L, Qing Z, Holroyd Kenneth A, Seng Elizabeth K (2011) Status and trends of mobile-health applications for ios devices: a developer’s perspective. J Syst Softw 84(11):2022–2033CrossRef
4.
Zurück zum Zitat Pardeep K, Sang-Gon L, Hoon-Jae L (2012) E-sap: efficient-strong authentication protocol for healthcare applications using wireless medical sensor networks. Sensors 12(2):1625–1647CrossRef Pardeep K, Sang-Gon L, Hoon-Jae L (2012) E-sap: efficient-strong authentication protocol for healthcare applications using wireless medical sensor networks. Sensors 12(2):1625–1647CrossRef
5.
Zurück zum Zitat Debiao H, Neeraj K, Jianhua C, Cheng-Chi L, Naveen C, Seng-Soo Y (2015) Robust anonymous authentication protocol for health-care applications using wireless medical sensor networks. Multim Syst 21(1):49–60CrossRef Debiao H, Neeraj K, Jianhua C, Cheng-Chi L, Naveen C, Seng-Soo Y (2015) Robust anonymous authentication protocol for health-care applications using wireless medical sensor networks. Multim Syst 21(1):49–60CrossRef
6.
Zurück zum Zitat Qi J, Jianfeng M, Xiang L, Youliang T (2014) Robust chaotic map-based authentication and key agreement scheme with strong anonymity for telecare medicine information systems. J Med Syst 38(2):1–8 Qi J, Jianfeng M, Xiang L, Youliang T (2014) Robust chaotic map-based authentication and key agreement scheme with strong anonymity for telecare medicine information systems. J Med Syst 38(2):1–8
7.
Zurück zum Zitat Jun Z, Zhenfu C, Xiaolei D, Naixue X, Vasilakos Athanasios V (2015) 4s: A secure and privacy-preserving key management scheme for cloud-assisted wireless body area network in m-healthcare social networks. Inform Sci 314:255–276CrossRef Jun Z, Zhenfu C, Xiaolei D, Naixue X, Vasilakos Athanasios V (2015) 4s: A secure and privacy-preserving key management scheme for cloud-assisted wireless body area network in m-healthcare social networks. Inform Sci 314:255–276CrossRef
8.
Zurück zum Zitat Limin MY, Yuesheng Z (2014) Tinyzkp: a lightweight authentication scheme based on zero-knowledge proof for wireless body area networks. Wireless Personal Commun 77(2):1077–1090CrossRef Limin MY, Yuesheng Z (2014) Tinyzkp: a lightweight authentication scheme based on zero-knowledge proof for wireless body area networks. Wireless Personal Commun 77(2):1077–1090CrossRef
9.
Zurück zum Zitat Jingwei L, Qian L, Rui Y, Sun R (2015) Efficient authenticated key exchange protocols for wireless body area networks. EURASIP J Wireless Commun Netw 1:1–11 Jingwei L, Qian L, Rui Y, Sun R (2015) Efficient authenticated key exchange protocols for wireless body area networks. EURASIP J Wireless Commun Netw 1:1–11
10.
Zurück zum Zitat Hamada Ibrahim M, Saru K, Kumar Das A, Mohammad W, Vanga O (2016) Secure anonymous mutual authentication for star two-tier wireless body area networks. Computer Methods Programs Biomed 135:37–50CrossRef Hamada Ibrahim M, Saru K, Kumar Das A, Mohammad W, Vanga O (2016) Secure anonymous mutual authentication for star two-tier wireless body area networks. Computer Methods Programs Biomed 135:37–50CrossRef
11.
Zurück zum Zitat Gaimei G, Xinguang P, Ye T, Zefeng Q (2016) A chaotic maps-based authentication scheme for wireless body area networks. Int J Distrib Sensor Netw 12(7):2174720CrossRef Gaimei G, Xinguang P, Ye T, Zefeng Q (2016) A chaotic maps-based authentication scheme for wireless body area networks. Int J Distrib Sensor Netw 12(7):2174720CrossRef
12.
Zurück zum Zitat Kumar Das Ashok, Kumar Sutrala Anil, Vanga Odelu, Adrijit Goswami (2017) A secure smartcard-based anonymous user authentication scheme for healthcare applications using wireless medical sensor networks. Wireless Personal Commun 94(3):1899–1933CrossRef Kumar Das Ashok, Kumar Sutrala Anil, Vanga Odelu, Adrijit Goswami (2017) A secure smartcard-based anonymous user authentication scheme for healthcare applications using wireless medical sensor networks. Wireless Personal Commun 94(3):1899–1933CrossRef
13.
Zurück zum Zitat Fan W, Lili X, Saru K, Xiong L (2017) An improved and anonymous two-factor authentication protocol for health-care applications with wireless medical sensor networks. Multim Syst 23(2):195–205CrossRef Fan W, Lili X, Saru K, Xiong L (2017) An improved and anonymous two-factor authentication protocol for health-care applications with wireless medical sensor networks. Multim Syst 23(2):195–205CrossRef
14.
Zurück zum Zitat Jangirala S, Dheerendra M, Sourav M (2017) A mutual authentication framework for wireless medical sensor networks. J Med Syst 41(5):80CrossRef Jangirala S, Dheerendra M, Sourav M (2017) A mutual authentication framework for wireless medical sensor networks. J Med Syst 41(5):80CrossRef
15.
Zurück zum Zitat Ruhul A, Hafizul Islam SK, Biswas GP, Khurram Khan M, Neeraj K (2018) A robust and anonymous patient monitoring system using wireless medical sensor networks. Fut Gener Computer Syst 80:483–495CrossRef Ruhul A, Hafizul Islam SK, Biswas GP, Khurram Khan M, Neeraj K (2018) A robust and anonymous patient monitoring system using wireless medical sensor networks. Fut Gener Computer Syst 80:483–495CrossRef
16.
Zurück zum Zitat Xu Y, Wang H, Li Z, Chen S, Hu B, Zou S (2017) A survey on secure wireless body area networks. Secur Commun Netw 1–9:2017 Xu Y, Wang H, Li Z, Chen S, Hu B, Zou S (2017) A survey on secure wireless body area networks. Secur Commun Netw 1–9:2017
17.
Zurück zum Zitat Peyman D, Hossein Jahangir A (2018) A biometric security scheme for wireless body area networks. J Inf Secur Appl 41:62–74 Peyman D, Hossein Jahangir A (2018) A biometric security scheme for wireless body area networks. J Inf Secur Appl 41:62–74
18.
Zurück zum Zitat Mohammad W, Kumar Das A, Vasilakos Athanasios V (2018) Authenticated key management protocol for cloud-assisted body area sensor networks. J Netw Computer Appl 123:112–126CrossRef Mohammad W, Kumar Das A, Vasilakos Athanasios V (2018) Authenticated key management protocol for cloud-assisted body area sensor networks. J Netw Computer Appl 123:112–126CrossRef
19.
Zurück zum Zitat Fan W, Xiong L, Kumar Sangaiah A, Lili X, Kumari Saru W, Liuxi Shen J (2018) A lightweight and robust two-factor authentication scheme for personalized healthcare systems using wireless medical sensor networks. Fut Gener Computer Syst 82:727–737CrossRef Fan W, Xiong L, Kumar Sangaiah A, Lili X, Kumari Saru W, Liuxi Shen J (2018) A lightweight and robust two-factor authentication scheme for personalized healthcare systems using wireless medical sensor networks. Fut Gener Computer Syst 82:727–737CrossRef
20.
Zurück zum Zitat Mahdi F, Majid B, Kumar Das A, Nasib Far Hossein A, Morteza Pournaghi S, Doostari MA (2020) A lightweight and secure two-factor authentication scheme for wireless body area networks in health-care iot. Computer Netw 177:107333CrossRef Mahdi F, Majid B, Kumar Das A, Nasib Far Hossein A, Morteza Pournaghi S, Doostari MA (2020) A lightweight and secure two-factor authentication scheme for wireless body area networks in health-care iot. Computer Netw 177:107333CrossRef
21.
Zurück zum Zitat Canetti R, Krawczyk H (2001) Analysis of key-exchange protocols and their use for building secure channels. In International Conference on the Theory and Applications of Cryptographic Techniques, pages 453–474. Springer Canetti R, Krawczyk H (2001) Analysis of key-exchange protocols and their use for building secure channels. In International Conference on the Theory and Applications of Cryptographic Techniques, pages 453–474. Springer
23.
Zurück zum Zitat Al-Hussain Arwa, Al-Rassan Iehab (2010) A biometric-based authentication system for web services mobile user. In Proceedings of the 8th International Conference on Advances in Mobile Computing and Multimedia, pages 447–452, Al-Hussain Arwa, Al-Rassan Iehab (2010) A biometric-based authentication system for web services mobile user. In Proceedings of the 8th International Conference on Advances in Mobile Computing and Multimedia, pages 447–452,
24.
Zurück zum Zitat Ohood A, Mznah A-R, Abdullah A-D (2013) An efficient biometric authentication protocol for wireless sensor networks. Int J Distrib Sensor Netw 9(5):407971CrossRef Ohood A, Mznah A-R, Abdullah A-D (2013) An efficient biometric authentication protocol for wireless sensor networks. Int J Distrib Sensor Netw 9(5):407971CrossRef
25.
Zurück zum Zitat Wei-Chi K, Shen-Tien C (2005) Impersonation attack on a dynamic id-based remote user authentication scheme using smart cards. IEICE Trans Commun 88(5):2165–2167 Wei-Chi K, Shen-Tien C (2005) Impersonation attack on a dynamic id-based remote user authentication scheme using smart cards. IEICE Trans Commun 88(5):2165–2167
26.
Zurück zum Zitat Wu Zhizheng, Gao Sheng, Cling Eng Siong, Li Haizhou (2014) A study on replay attack and anti-spoofing for text-dependent speaker verification. In Signal and Information Processing Association Annual Summit and Conference (APSIPA), 2014 Asia-Pacific, pages 1–5. IEEE Wu Zhizheng, Gao Sheng, Cling Eng Siong, Li Haizhou (2014) A study on replay attack and anti-spoofing for text-dependent speaker verification. In Signal and Information Processing Association Annual Summit and Conference (APSIPA), 2014 Asia-Pacific, pages 1–5. IEEE
27.
Zurück zum Zitat Vinod K, Rajendra K, Pandey SK (2020) Polynomial based non-interactive session key computation protocol for secure communication in dynamic groups. Int J Inf Technol 12(1):283–288 Vinod K, Rajendra K, Pandey SK (2020) Polynomial based non-interactive session key computation protocol for secure communication in dynamic groups. Int J Inf Technol 12(1):283–288
28.
Zurück zum Zitat Sarvabhatla Mrudula, Reddy M Chandra Mouli, Vorugunti Chandra Sekhar (2015) A robust remote user authentication scheme resistant to known session specific temporary information attack. In 2015 Applications and Innovations in Mobile Computing (AIMoC), pages 164–169. IEEE Sarvabhatla Mrudula, Reddy M Chandra Mouli, Vorugunti Chandra Sekhar (2015) A robust remote user authentication scheme resistant to known session specific temporary information attack. In 2015 Applications and Innovations in Mobile Computing (AIMoC), pages 164–169. IEEE
29.
Zurück zum Zitat Alsalhi Israa N, Albermany Salah A Authentication of crns by using ban logic Alsalhi Israa N, Albermany Salah A Authentication of crns by using ban logic
30.
Zurück zum Zitat Mohammad W, Kumar Das A, Neeraj K, Vasilakos Athanasios V (2019) Design of secure key management and user authentication scheme for fog computing services. Fut Gener Computer Syst 91:475–492CrossRef Mohammad W, Kumar Das A, Neeraj K, Vasilakos Athanasios V (2019) Design of secure key management and user authentication scheme for fog computing services. Fut Gener Computer Syst 91:475–492CrossRef
31.
Zurück zum Zitat Abdalla Michel, Chevassut Olivier, Fouque Pierre-Alain, Pointcheval David (2005) A simple threshold authenticated key exchange from short secrets. In International Conference on the Theory and Application of Cryptology and Information Security, pages 566–584. Springer Abdalla Michel, Chevassut Olivier, Fouque Pierre-Alain, Pointcheval David (2005) A simple threshold authenticated key exchange from short secrets. In International Conference on the Theory and Application of Cryptology and Information Security, pages 566–584. Springer
32.
Zurück zum Zitat Armando Alessandro, Basin David, Boichut Yohan, Chevalier Yannick, Compagna Luca, Cuéllar Jorge, Drielsma P Hankes, Héam Pierre-Cyrille, Kouchnarenko Olga, Mantovani Jacopo, et al. (2005) The avispa tool for the automated validation of internet security protocols and applications. In International Conference on Computer Aided Verification, pages 281–285. Springer Armando Alessandro, Basin David, Boichut Yohan, Chevalier Yannick, Compagna Luca, Cuéllar Jorge, Drielsma P Hankes, Héam Pierre-Cyrille, Kouchnarenko Olga, Mantovani Jacopo, et al. (2005) The avispa tool for the automated validation of internet security protocols and applications. In International Conference on Computer Aided Verification, pages 281–285. Springer
33.
Zurück zum Zitat Fan W, Lili X, Saru K, Xiong L (2015) A novel and provably secure biometrics-based three-factor remote authentication scheme for mobile client-server networks. Computers Elect Eng 45:274–285CrossRef Fan W, Lili X, Saru K, Xiong L (2015) A novel and provably secure biometrics-based three-factor remote authentication scheme for mobile client-server networks. Computers Elect Eng 45:274–285CrossRef
34.
Zurück zum Zitat Lili X, Fan W (2015) Cryptanalysis and improvement of a user authentication scheme preserving uniqueness and anonymity for connected health care. J Med Syst 39(2):1–9MathSciNetCrossRef Lili X, Fan W (2015) Cryptanalysis and improvement of a user authentication scheme preserving uniqueness and anonymity for connected health care. J Med Syst 39(2):1–9MathSciNetCrossRef
35.
Zurück zum Zitat Kumar Das A, Kumar Sutrala A, Saru K, Vanga O, Mohammad W, Xiong L (2016) An efficient multi-gateway-based three-factor user authentication and key agreement scheme in hierarchical wireless sensor networks. Secur Commun Netw 9(13):2070–2092CrossRef Kumar Das A, Kumar Sutrala A, Saru K, Vanga O, Mohammad W, Xiong L (2016) An efficient multi-gateway-based three-factor user authentication and key agreement scheme in hierarchical wireless sensor networks. Secur Commun Netw 9(13):2070–2092CrossRef
36.
Zurück zum Zitat Shnayder Victor, Hempstead Mark, Chen Bor-rong, Allen Geoff Werner, Welsh Matt (2004) Simulating the power consumption of large-scale sensor network applications. In Proceedings of the 2nd International Conference on Embedded Networked Sensor Systems, pages 188–200 Shnayder Victor, Hempstead Mark, Chen Bor-rong, Allen Geoff Werner, Welsh Matt (2004) Simulating the power consumption of large-scale sensor network applications. In Proceedings of the 2nd International Conference on Embedded Networked Sensor Systems, pages 188–200
Metadaten
Titel
Four-factor mutual authentication scheme for health-care based on wireless body area network
verfasst von
Diksha Rangwani
Hari Om
Publikationsdatum
05.10.2021
Verlag
Springer US
Erschienen in
The Journal of Supercomputing / Ausgabe 4/2022
Print ISSN: 0920-8542
Elektronische ISSN: 1573-0484
DOI
https://doi.org/10.1007/s11227-021-04099-3

Weitere Artikel der Ausgabe 4/2022

The Journal of Supercomputing 4/2022 Zur Ausgabe

Premium Partner