Skip to main content
Erschienen in: Wireless Personal Communications 4/2020

11.04.2020

SEEMAKA: Secured Energy-Efficient Mutual Authentication and Key Agreement Scheme for Wireless Body Area Networks

verfasst von: Bhawna Narwal, Amar Kumar Mohapatra

Erschienen in: Wireless Personal Communications | Ausgabe 4/2020

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

With the empowerment of wireless networking technologies and medical sensors, WBAN is playing a major part in modern medical systems. As a key application of IoT, WBAN has shown swift growth and adoption in recent years because of its capabilities such as continuous and seamless monitoring of patients and collection of their biomedical data in real-time which is further used by doctors for clinical diagnosis and treatment. Despite numerous benefits, WBAN lacks a clear in-depth defense line because of the vulnerability caused by its openness and mobility raising issues like privacy leakage, complicated requirements and security concerns from unauthenticated or malicious adversaries. To alleviate the aforementioned issues and prevent adversaries from intimidating legitimate users or exploiting WBAN services, a secured energy-efficient mutual authentication, and key agreement scheme (SEEMAKA) for two-tier WBAN is propounded. In particular, SEEMAKA achieves desirable security features and thwarts different security attacks using fewer hash invocations and bitwise XOR operations, nicely meeting the need for sensor nodes equipped with limited capability. More importantly, the security of SEEMAKA is assessed through sound informal analysis as well as using Automated Validation of Internet Security Protocols and Applications (AVISPA). For verifying the correctness of SEEMAKA, widely-accepted Burrows–Abadi–Needham (BAN) Logic is used. For a better understanding, SEEMAKA is evaluated over NS2 along with counterpart schemes for End-to-End Delay and Throughput. Finally, a set of thorough relative analyses between SEEMAKA and other relevant schemes are performed and the outcomes manifest that SEEMAKA attains superior efficiency concerning processing overhead, energy dissipation, and security features. Relative to Li et al.’s scheme, SEEMAKA outperforms with a reduction of 2 XOR operations in processing cost at master node, includes master key update phase (to make the system safe from master node spoofing attack) and counters sensor node spoofing attack.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Zimmerman, T. G. (1996). Personal area networks: Near-field intrabody communication. IBM Systems Journal.,35(34), 609–617.CrossRef Zimmerman, T. G. (1996). Personal area networks: Near-field intrabody communication. IBM Systems Journal.,35(34), 609–617.CrossRef
2.
Zurück zum Zitat Narwal, B., & Mohapatra, A. K. (2018). A review on authentication protocols in wireless body area networks (WBAN). In 2018 3rd International Conference on Contemporary Computing and Informatics (IC3I), Gurgaon, pp. 227–232. Narwal, B., & Mohapatra, A. K. (2018). A review on authentication protocols in wireless body area networks (WBAN). In 2018 3rd International Conference on Contemporary Computing and Informatics (IC3I), Gurgaon, pp. 227–232.
3.
Zurück zum Zitat He, D., Chen, C., Chan, S., Bu, J., & Zhang, P. (2013). Secure and lightweight network admission and transmission protocol for bodysensor networks. IEEE Journal of Biomedical Health Informatics,17(3), 664–674.CrossRef He, D., Chen, C., Chan, S., Bu, J., & Zhang, P. (2013). Secure and lightweight network admission and transmission protocol for bodysensor networks. IEEE Journal of Biomedical Health Informatics,17(3), 664–674.CrossRef
4.
Zurück zum Zitat Khan, F. H., Shams, R., Rizvi, H. H., & Qazi, F. (2018). A secure crypto base authentication and communication suite in wirelessbody area network (wban) for iot applications. Wireless Personal Communications,103(1), 2877–2890. Khan, F. H., Shams, R., Rizvi, H. H., & Qazi, F. (2018). A secure crypto base authentication and communication suite in wirelessbody area network (wban) for iot applications. Wireless Personal Communications,103(1), 2877–2890.
5.
Zurück zum Zitat Shaik, M. F., Komanapalli, V. L. N., & Subashini, M. M. (2018). (2018) A comparative study of interference and mitigation techniques in wireless body area networks. Wireless Personal Communications.,98(2), 2333–2365.CrossRef Shaik, M. F., Komanapalli, V. L. N., & Subashini, M. M. (2018). (2018) A comparative study of interference and mitigation techniques in wireless body area networks. Wireless Personal Communications.,98(2), 2333–2365.CrossRef
6.
Zurück zum Zitat S. S. . K. A. Sagar, A.K., “Energy-aware wban for health monitoring using critical data routing (cdr),”Wireless PersCommun, pp. 1–30, 2020. S. S. . K. A. Sagar, A.K., “Energy-aware wban for health monitoring using critical data routing (cdr),”Wireless PersCommun, pp. 1–30, 2020.
7.
Zurück zum Zitat Narwal, B., & Mohapatra, A. (2016). Energy efficient vertical handover algorithm for heterogeneous wireless networks. International Journal of Control Theory and Applications,9(19), 9221–9225. Narwal, B., & Mohapatra, A. (2016). Energy efficient vertical handover algorithm for heterogeneous wireless networks. International Journal of Control Theory and Applications,9(19), 9221–9225.
8.
Zurück zum Zitat AL-Rassan, I. A., & Khan, N. (2011). Energy efficient key management scheme for wban-a hybrid approach. IJCSNS,11(6), 169. AL-Rassan, I. A., & Khan, N. (2011). Energy efficient key management scheme for wban-a hybrid approach. IJCSNS,11(6), 169.
9.
Zurück zum Zitat Kumbhare, Y. L., Rangaree, P. H., & GM., D A. (2011). Wireless body area sensor network authentication using hmac function. In 2nd National Conference on Information and Communication Technology (NCICT). Kumbhare, Y. L., Rangaree, P. H., & GM., D A. (2011). Wireless body area sensor network authentication using hmac function. In 2nd National Conference on Information and Communication Technology (NCICT).
10.
Zurück zum Zitat Liu, J., Zhang, Z., Sun, R., & Kwak, K. S. J. (2012) An efficient certificateless remote anonymous authentication scheme for wireless body area networks. In IEEE International Conference on Communications (ICC). IEEE, pp. 3404–3408. Liu, J., Zhang, Z., Sun, R., & Kwak, K. S. J. (2012) An efficient certificateless remote anonymous authentication scheme for wireless body area networks. In IEEE International Conference on Communications (ICC). IEEE, pp. 3404–3408.
11.
Zurück zum Zitat He, D., Chen, C., Chan, S., Bu, J., & Zhang, P. (2013). Secure and lightweight network admission and transmission protocol for body sensor networks. IEEE Journal of Biomedical Health Informatics,17(3), 664–674.CrossRef He, D., Chen, C., Chan, S., Bu, J., & Zhang, P. (2013). Secure and lightweight network admission and transmission protocol for body sensor networks. IEEE Journal of Biomedical Health Informatics,17(3), 664–674.CrossRef
12.
Zurück zum Zitat Ramli, S. N., Ahmad, R., & Abdollah, M. F. (2013). Electrocardiogram (ecg) signals as biometrics in securing wireless body area network. In 2013 8th International Conference for Internet Technology and Secured Transactions (ICITST); pp. 536–541. Ramli, S. N., Ahmad, R., & Abdollah, M. F. (2013). Electrocardiogram (ecg) signals as biometrics in securing wireless body area network. In 2013 8th International Conference for Internet Technology and Secured Transactions (ICITST); pp. 536–541.
13.
Zurück zum Zitat Ma, L., Ge, Y., & Zhu, Y. (2014). Tinyzkp: A lightweight authentication scheme based on zero-knowledge proof for wireless bodyarea networks. Wireless Personal Communication,77(2), 1077–1090.CrossRef Ma, L., Ge, Y., & Zhu, Y. (2014). Tinyzkp: A lightweight authentication scheme based on zero-knowledge proof for wireless bodyarea networks. Wireless Personal Communication,77(2), 1077–1090.CrossRef
14.
Zurück zum Zitat Li, X., Niu, J., Khan, M. K., & Liao, J. (2013). An enhanced smart card based remote user password authentication scheme. Journal of Network and Computer Applications,36(5), 1365–1371.CrossRef Li, X., Niu, J., Khan, M. K., & Liao, J. (2013). An enhanced smart card based remote user password authentication scheme. Journal of Network and Computer Applications,36(5), 1365–1371.CrossRef
15.
Zurück zum Zitat Liu, J., Zhang, Z., Chen, X., & Kwak, K. S. (2014). Certificateless remote anonymous authentication schemes for wireless body areanetworks. IEEE Transactions of Parallel Distributed Systems,25(2), 332–342.CrossRef Liu, J., Zhang, Z., Chen, X., & Kwak, K. S. (2014). Certificateless remote anonymous authentication schemes for wireless body areanetworks. IEEE Transactions of Parallel Distributed Systems,25(2), 332–342.CrossRef
16.
Zurück zum Zitat Zhao, Z. (2014). An efficient anonymous authentication scheme for wireless body area networks using elliptic curve cryptosystem. Journal of Medical Systems,38(2), 13.CrossRef Zhao, Z. (2014). An efficient anonymous authentication scheme for wireless body area networks using elliptic curve cryptosystem. Journal of Medical Systems,38(2), 13.CrossRef
17.
Zurück zum Zitat Xiong, H. (2014). Cost-effective scalable and anonymous certificateless remote authentication protocol. IEEE Transactions of Infor-mation Forensics Security,9(12), 2327–2339.CrossRef Xiong, H. (2014). Cost-effective scalable and anonymous certificateless remote authentication protocol. IEEE Transactions of Infor-mation Forensics Security,9(12), 2327–2339.CrossRef
18.
Zurück zum Zitat Liu, J., Li, Q., Yan, R., & Sun, R. (2015). Efficient authenticated key exchange protocols for wireless body area networks. EURASIP Journal on Wireless Communications and Networking,2015(1), 188.CrossRef Liu, J., Li, Q., Yan, R., & Sun, R. (2015). Efficient authenticated key exchange protocols for wireless body area networks. EURASIP Journal on Wireless Communications and Networking,2015(1), 188.CrossRef
19.
Zurück zum Zitat Narwal, B., Mohapatra, A. K., & Usmani, K. A. (2019). Towards a taxonomy of cyber threats against target applications. Journal of Statistics and Management Systems,22(2), 301–325.CrossRef Narwal, B., Mohapatra, A. K., & Usmani, K. A. (2019). Towards a taxonomy of cyber threats against target applications. Journal of Statistics and Management Systems,22(2), 301–325.CrossRef
20.
Zurück zum Zitat Wang, C., & Zhang, Y. (2015). New authentication scheme for wireless body area networks using the bilinear pairing. Journalof Medical Systems,39(11), 136.CrossRef Wang, C., & Zhang, Y. (2015). New authentication scheme for wireless body area networks using the bilinear pairing. Journalof Medical Systems,39(11), 136.CrossRef
21.
Zurück zum Zitat He, D., & Zeadally, S. (2015). Authentication protocol for an ambient assisted living system. IEEE Communications Magazine,53(1), 71–77.CrossRef He, D., & Zeadally, S. (2015). Authentication protocol for an ambient assisted living system. IEEE Communications Magazine,53(1), 71–77.CrossRef
22.
Zurück zum Zitat Ibrahim, M. H., Kumari, S., Das, A. K., Wazid, M., & Odelu, V. (2016). Secure anonymous mutual authentication for star two-tierwireless body area networks. Computer Methods and Programs in Biomedicine,135, 37–50.CrossRef Ibrahim, M. H., Kumari, S., Das, A. K., Wazid, M., & Odelu, V. (2016). Secure anonymous mutual authentication for star two-tierwireless body area networks. Computer Methods and Programs in Biomedicine,135, 37–50.CrossRef
23.
Zurück zum Zitat Bharadwaj, P., Pal H., & Narwal, B. (2018). Proposing a Key Escrow Mechanism for Real-Time access to End-to-End encryption systems in the Interest of Law Enforcement. In 2018 3rd International Conference on Contemporary Computing and Informatics (IC3I), Gurgaon, pp. 233–237. Bharadwaj, P., Pal H., & Narwal, B. (2018). Proposing a Key Escrow Mechanism for Real-Time access to End-to-End encryption systems in the Interest of Law Enforcement. In 2018 3rd International Conference on Contemporary Computing and Informatics (IC3I), Gurgaon, pp. 233–237.
24.
Zurück zum Zitat Shen, J., Chang, S., Shen, J., Liu, Q., & Sun, X. (2016). A lightweight multi-layer authentication protocol for wireless body areanetworks. Future Generation Computer Systems.,8, 956–963. Shen, J., Chang, S., Shen, J., Liu, Q., & Sun, X. (2016). A lightweight multi-layer authentication protocol for wireless body areanetworks. Future Generation Computer Systems.,8, 956–963.
25.
Zurück zum Zitat Jiang, Q., Lian, X., Yang, C., et al. (2016). A bilinear pairing based anonymous authentication scheme in wireless body area networksfor mhealth. Journal of Medical Systems,40(11), 231.CrossRef Jiang, Q., Lian, X., Yang, C., et al. (2016). A bilinear pairing based anonymous authentication scheme in wireless body area networksfor mhealth. Journal of Medical Systems,40(11), 231.CrossRef
26.
Zurück zum Zitat Wu, L., Zhang, Y., Li, L., & Shen, J. (2016). Efficient and anonymous authentication scheme for wireless body area networks. Journal of Medical Systems,40(6), 134.CrossRef Wu, L., Zhang, Y., Li, L., & Shen, J. (2016). Efficient and anonymous authentication scheme for wireless body area networks. Journal of Medical Systems,40(6), 134.CrossRef
27.
Zurück zum Zitat Li, C. T., Lee, C. C., & Weng, C. Y. (2016). A secure cloud-assisted wireless body area network in mobile emergency medical care system. Journal of Medical Systems,40(5), 117.CrossRef Li, C. T., Lee, C. C., & Weng, C. Y. (2016). A secure cloud-assisted wireless body area network in mobile emergency medical care system. Journal of Medical Systems,40(5), 117.CrossRef
28.
Zurück zum Zitat Omala, A. A., Kibiwott, K. P., & Li, F. (2017). An efficient remote authentication scheme for wireless body area network. Journal of Medical Systems,41(2), 25.CrossRef Omala, A. A., Kibiwott, K. P., & Li, F. (2017). An efficient remote authentication scheme for wireless body area network. Journal of Medical Systems,41(2), 25.CrossRef
29.
Zurück zum Zitat Yessad, N., Bouchelaghem, S., Ouada, F. S., & Omar, M. (2017). Secure and reliable patient bodymotion based authentication approachfor medical body area networks. Pervasive Mobile Computing.,42, 351–370.CrossRef Yessad, N., Bouchelaghem, S., Ouada, F. S., & Omar, M. (2017). Secure and reliable patient bodymotion based authentication approachfor medical body area networks. Pervasive Mobile Computing.,42, 351–370.CrossRef
31.
Zurück zum Zitat Li, X., Ibrahim, M. H., Kumari, S., Sangaiah, A. K., Gupta, V., & Choo, K.-K. R. (2017). Anonymous mutual authentication andkey agreement scheme for wearable sensors in wireless body area networks. Computer Networks,129, 429–443.CrossRef Li, X., Ibrahim, M. H., Kumari, S., Sangaiah, A. K., Gupta, V., & Choo, K.-K. R. (2017). Anonymous mutual authentication andkey agreement scheme for wearable sensors in wireless body area networks. Computer Networks,129, 429–443.CrossRef
34.
Zurück zum Zitat Raj, A. S., & Chinnadurai, M. (2020). Energy efficient routing algorithm in wireless body area networks for smart wearable patches. Computer Communications,153, 85–94.CrossRef Raj, A. S., & Chinnadurai, M. (2020). Energy efficient routing algorithm in wireless body area networks for smart wearable patches. Computer Communications,153, 85–94.CrossRef
35.
Zurück zum Zitat Narwal, B., & Mohapatra, A. K. (2020). SALMAKA: Secured, anonymity preserving and lightweight mutual authentication and key agreement scheme for wireless body area networks. International Journal Of Sensors, Wireless Communications And Control (forthcoming). Narwal, B., & Mohapatra, A. K. (2020). SALMAKA: Secured, anonymity preserving and lightweight mutual authentication and key agreement scheme for wireless body area networks. International Journal Of Sensors, Wireless Communications And Control (forthcoming).
36.
Zurück zum Zitat Li, X., Ibrahim, M. H., Kumari, S., & Kumar, R. (2018). Secure and efficient anonymous authentication scheme for three-tier mobilehealthcare systems with wearable sensors. Telecommunication Systems,67(2), 323–348.CrossRef Li, X., Ibrahim, M. H., Kumari, S., & Kumar, R. (2018). Secure and efficient anonymous authentication scheme for three-tier mobilehealthcare systems with wearable sensors. Telecommunication Systems,67(2), 323–348.CrossRef
37.
Zurück zum Zitat Shen, J., Chang, S., Shen, J., Liu, Q., & Sun, X. (2018). A lightweight multi-layer authentication protocol for wireless body areanetworks. Future Generation Computer Systems,78, 956–963.CrossRef Shen, J., Chang, S., Shen, J., Liu, Q., & Sun, X. (2018). A lightweight multi-layer authentication protocol for wireless body areanetworks. Future Generation Computer Systems,78, 956–963.CrossRef
38.
Zurück zum Zitat Ostad-Sharif, A., Nikooghadam, M., & Abbasinezhad-Mood, D. (2019). Design of a lightweight and anonymous authenticatedkey agreement protocol for wireless body area networks. International Journal of Communication Systems,32(12), e3974.CrossRef Ostad-Sharif, A., Nikooghadam, M., & Abbasinezhad-Mood, D. (2019). Design of a lightweight and anonymous authenticatedkey agreement protocol for wireless body area networks. International Journal of Communication Systems,32(12), e3974.CrossRef
39.
Zurück zum Zitat Chen, R., & Peng, D. (2019). Analysis and improvement of a mutual authentication scheme for wireless body area networks. Journal of medical Systems,43(2), 19.CrossRef Chen, R., & Peng, D. (2019). Analysis and improvement of a mutual authentication scheme for wireless body area networks. Journal of medical Systems,43(2), 19.CrossRef
40.
Zurück zum Zitat Konan, M., & Wang, W. (2019). A secure mutual batch authentication scheme for patient data privacy preserving in wban. Sensors,19(7), 1608.CrossRef Konan, M., & Wang, W. (2019). A secure mutual batch authentication scheme for patient data privacy preserving in wban. Sensors,19(7), 1608.CrossRef
41.
Zurück zum Zitat Xu, Z., Xu, C., Chen, H., & Yang, F. (2019). A lightweight anonymous mutual authentication and key agreement scheme forwban. Concurrency and Computation: Practice and Experience,31, 14. Xu, Z., Xu, C., Chen, H., & Yang, F. (2019). A lightweight anonymous mutual authentication and key agreement scheme forwban. Concurrency and Computation: Practice and Experience,31, 14.
42.
Zurück zum Zitat Xie, Y., Zhang, S., Li, X., Li, Y., & Chai, Y. (2019). Cascp: Efficient and secure certificateless authentication scheme for wirelessbody area networks with conditional privacy-preserving. Security and Communication Networks. Xie, Y., Zhang, S., Li, X., Li, Y., & Chai, Y. (2019). Cascp: Efficient and secure certificateless authentication scheme for wirelessbody area networks with conditional privacy-preserving. Security and Communication Networks.
43.
Zurück zum Zitat Sridhar, M., Priya, N., & Muniyappan, A. (2020). Wireless body area networks: requirements, characteristics, design consideration, and challenges. In Incorporating the Internet of Things in Healthcare Applications and Wearable Devices (pp. 67–85). IGI Global. Sridhar, M., Priya, N., & Muniyappan, A. (2020). Wireless body area networks: requirements, characteristics, design consideration, and challenges. In Incorporating the Internet of Things in Healthcare Applications and Wearable Devices (pp. 67–85). IGI Global.
44.
Zurück zum Zitat Dolev, D., & Yao, A. C. (1981) On the security of public key protocols. In 22nd Annual Symposium on Foundations of ComputerScience (sfcs 1981), pp. 350–357. Dolev, D., & Yao, A. C. (1981) On the security of public key protocols. In 22nd Annual Symposium on Foundations of ComputerScience (sfcs 1981), pp. 350–357.
45.
Zurück zum Zitat Burrows, M., Abadi, M., & Needham, R. (1990). A logic of authentication. ACM Transactions on Computer Systems,8(1), 18–36.MATHCrossRef Burrows, M., Abadi, M., & Needham, R. (1990). A logic of authentication. ACM Transactions on Computer Systems,8(1), 18–36.MATHCrossRef
46.
Zurück zum Zitat Armando, A., Basin, D., Boichut Y. et al. (2005) The avispa tool for the automated validation of internet security protocols and applications. In International Conference on Computer Aided Verification. Heidelberg: Springer, pp. 281–285. Armando, A., Basin, D., Boichut Y. et al. (2005) The avispa tool for the automated validation of internet security protocols and applications. In International Conference on Computer Aided Verification. Heidelberg: Springer, pp. 281–285.
48.
Zurück zum Zitat Narwal, B. (2019) Security analysis and verification of authenticated mobile payment protocols. In 2019 4th International Conference on Information Systems and Computer Networks (ISCON), Mathura, pp. 202–207. Narwal, B. (2019) Security analysis and verification of authenticated mobile payment protocols. In 2019 4th International Conference on Information Systems and Computer Networks (ISCON), Mathura, pp. 202–207.
Metadaten
Titel
SEEMAKA: Secured Energy-Efficient Mutual Authentication and Key Agreement Scheme for Wireless Body Area Networks
verfasst von
Bhawna Narwal
Amar Kumar Mohapatra
Publikationsdatum
11.04.2020
Verlag
Springer US
Erschienen in
Wireless Personal Communications / Ausgabe 4/2020
Print ISSN: 0929-6212
Elektronische ISSN: 1572-834X
DOI
https://doi.org/10.1007/s11277-020-07304-3

Weitere Artikel der Ausgabe 4/2020

Wireless Personal Communications 4/2020 Zur Ausgabe

Neuer Inhalt