Access the full text.
Sign up today, get DeepDyve free for 14 days.
Zisang Xu, Cheng Xu, W. Liang, Jianbo Xu, Haixia Chen (2019)
A Lightweight Mutual Authentication and Key Agreement Scheme for Medical Internet of ThingsIEEE Access, 7
Aneesh Koya, D. P. (2018)
Anonymous hybrid mutual authentication and key agreement scheme for wireless body area networkComput. Networks, 140
Xiong Li, J. Niu, M. Khan, Junguo Liao (2013)
An enhanced smart card based remote user password authentication schemeJ. Netw. Comput. Appl., 36
Zhaoyang Zhang, Honggang Wang, A. Vasilakos, Hua Fang (2012)
ECG-Cryptography and Authentication in Body Area NetworksIEEE Transactions on Information Technology in Biomedicine, 16
B. Blanchet (2016)
Modeling and Verifying Security Protocols with the Applied Pi Calculus and ProVerifFound. Trends Priv. Secur., 1
Suhas Mathur, Robert Miller, A. Varshavsky, W. Trappe, N. Mandayam (2011)
ProxiMate: proximity-based secure pairing using ambient wireless signals
C. Tan, Haodong Wang, Sheng Zhong, Qun Li (2009)
IBE-Lite: A Lightweight Identity-Based Cryptography for Body Sensor NetworksIEEE Transactions on Information Technology in Biomedicine, 13
B. Blanchet (2001)
An efficient cryptographic protocol verifier based on prolog rulesProceedings. 14th IEEE Computer Security Foundations Workshop, 2001.
K. Venkatasubramanian, Ayan Banerjee, S. Gupta (2010)
PSKA: Usable and Secure Key Agreement Scheme for Body Area NetworksIEEE Transactions on Information Technology in Biomedicine, 14
Ming Li, Shucheng Yu, J. Guttman, W. Lou, K. Ren (2013)
Secure ad hoc trust initialization and key management in wireless body area networksACM Trans. Sens. Networks, 9
Carmen Poon, Yuan-ting Zhang, S. Bao (2006)
A novel biometrics method to secure wireless body area sensor networks for telemedicine and m-healthIEEE Communications Magazine, 44
(2012)
IEEE standard for local and metropolitan area networks-part 15.6: wireless body area networks
F. Miao, S. Bao, Ye Li (2013)
Biometric key distribution solution with energy distribution information of physiological signals for body sensor network securityIET Inf. Secur., 7
Xiong Li, Yongping Xiong, Jian Ma, Wendong Wang (2012)
An efficient and security dynamic identity based authentication protocol for multi-server architecture using smart cardsJ. Netw. Comput. Appl., 35
Martin Konan, Wenyong Wang (2019)
A Secure Mutual Batch Authentication Scheme for Patient Data Privacy Preserving in WBANSensors (Basel, Switzerland), 19
H Zhao, R Xu, M Shu, J Hu (2016)
Physiological-signal-based key negotiation protocols for body sensor networks: a surveySimul. Model. Pract. Theory, 65
B Clifford Neuman, GS Stuart (1993)
A Note on the Use of Timestamps as NoncesOper. Syst. Rev., 27
H. Kilinç, Tugrul Yanik (2014)
A Survey of SIP Authentication and Key Agreement SchemesIEEE Communications Surveys & Tutorials, 16
Jian Shen, Haowen Tan, S. Moh, I. Chung, Qi Liu, Xingming Sun (2015)
Enhanced secure sensor association and key management in wireless body area networksJournal of Communications and Networks, 17
K. Sowjanya, Mou Dasgupta, Sangram Ray (2019)
An elliptic curve cryptography based enhanced anonymous authentication protocol for wearable health monitoring systemsInternational Journal of Information Security, 19
D Dolev, A Yao (1983)
On the security of public key protocolsIEEE Trans. Inf. Theory, 29
(2006)
Node structure information management method and radio network system. U.S. Patent 7,103,354
Marko Kompara, S. Islam, Marko Hölbl (2019)
A robust and efficient mutual authentication and key agreement scheme with untraceability for WBANsComput. Networks, 148
M. Ibrahim, S. Kumari, A. Das, M. Wazid, Vanga Odelu (2016)
Secure anonymous mutual authentication for star two-tier wireless body area networksComputer methods and programs in biomedicine, 135
H. Xiong (2014)
Cost-Effective Scalable and Anonymous Certificateless Remote Authentication ProtocolIEEE Transactions on Information Forensics and Security, 9
Xiong Li, M. Ibrahim, S. Kumari, A. Sangaiah, Vidushi Gupta, Kim-Kwang Choo (2017)
Anonymous mutual authentication and key agreement scheme for wearable sensors in wireless body area networksComput. Networks, 129
D. He, S. Zeadally, Neeraj Kumar, Jong-Hyouk Lee (2017)
Anonymous Authentication for Wireless Body Area Networks With Provable SecurityIEEE Systems Journal, 11
R. Madhusudhan, Shashidhara (2018)
A secure and lightweight authentication scheme for roaming service in global mobile networksJ. Inf. Secur. Appl., 38
D. He, S. Zeadally (2015)
Authentication protocol for an ambient assisted living systemIEEE Communications Magazine, 53
A. Almuhaideb, Kawther Alqudaihi (2020)
A Lightweight and Secure Anonymity Preserving Protocol for WBANIEEE Access, 8
M. Burrows, M. Abadi, R. Needham (1989)
A logic of authenticationProceedings of the Royal Society of London. A. Mathematical and Physical Sciences, 426
Huawei Zhao, R. Xu, M. Shu, Jiankun Hu (2015)
Physiological-Signal-Based Key Negotiation Protocols for Body Sensor Networks: A Survey2015 IEEE Twelfth International Symposium on Autonomous Decentralized Systems
Ding Wang, Ping Wang (2014)
On the anonymity of two-factor authentication schemes for wireless sensor networks: Attacks, principle and solutionsComput. Networks, 73
Kuo-Hui Yeh (2016)
A Secure IoT-Based Healthcare System With Body Sensor NetworksIEEE Access, 4
Nonces Neuman, S. Stubblebine (1993)
A note on the use of timestamps as noncesACM SIGOPS Oper. Syst. Rev., 27
Ankur Gupta, Meenakshi Tripathi, Aakar Sharma (2020)
A provably secure and efficient anonymous mutual authentication and key agreement protocol for wearable devices in WBANComput. Commun., 160
Marko Kompara, Marko Hölbl (2018)
Survey on security in intra-body area network communicationAd Hoc Networks, 70
Jingwei Liu, Lihuan Zhang, Rong Sun (2016)
1-RAAP: An Efficient 1-Round Anonymous Authentication Protocol for Wireless Body Area NetworksSensors (Basel, Switzerland), 16
S. Islam, G. Biswas (2017)
A pairing-free identity-based two-party authenticated key agreement protocol for secure and efficient communicationJ. King Saud Univ. Comput. Inf. Sci., 29
Xiong Li, Jian Ma, Wendong Wang, Yongping Xiong, Junsong Zhang (2013)
A novel smart card and dynamic ID based remote user authentication scheme for multi-server environmentsMath. Comput. Model., 58
Chanying Huang, Hwaseong Lee, Dong Lee (2012)
A Privacy-Strengthened Scheme for E-Healthcare Monitoring SystemJournal of Medical Systems, 36
D. Dolev, A. Yao (1983)
On the security of public key protocols22nd Annual Symposium on Foundations of Computer Science (sfcs 1981)
S. Challa, A. Das, Vanga Odelu, Neeraj Kumar, S. Kumari, M. Khan, A. Vasilakos (2017)
An efficient ECC-based provably secure three-factor user authentication and key agreement protocol for wireless healthcare sensor networksComput. Electr. Eng., 69
Sofia Zebboudj, Feriel Cherifi, Mohamed Mohammedi, Mawloud Omar (2017)
Secure and efficient ECG-based authentication scheme for medical body area sensor networksSmart Health
Zhenguo Zhao (2014)
An Efficient Anonymous Authentication Scheme for Wireless Body Area Networks Using Elliptic Curve CryptosystemJournal of Medical Systems, 38
Jian Shen, Shaohua Chang, Jun Shen, Qi Liu, Xingming Sun (2018)
A lightweight multi-layer authentication protocol for wireless body area networksFuture Gener. Comput. Syst., 78
Jingwei Liu, Zonghua Zhang, Xiaofeng Chen, K. Kwak (2014)
Certificateless Remote Anonymous Authentication Schemes for WirelessBody Area NetworksIEEE Transactions on Parallel and Distributed Systems, 25
Ding Wang, Ping Wang (2014)
Understanding security failures of two-factor authentication schemes for real-time applications in hierarchical wireless sensor networksAd Hoc Networks, 20
Qi Jiang, M. Khan, Xiang Lu, Jianfeng Ma, D. He (2016)
A privacy preserving three-factor authentication protocol for e-Health cloudsThe Journal of Supercomputing, 72
A Wireless Body Area Networks (WBANs) is a wireless network in which sensors are embedded inside the body of a human, to monitor the health of patient continuously without any constraint in his normal daily life activities. As the information from the embed sensor is transmitted through wireless network and device has a limited battery power, therefore, the assurance of security in such tiny devices related to medical patients is highly recommended. Thus, the shared information must be maintained in terms of integrity, confidentiality, non-repudiation, untraceable key establishment, and mutual authentication in WBAN. In this context, to achieve high security and efficiency in WBAN, an efficient mutual authentication and secret key agreement scheme have been proposed in this paper and also listed out some drawbacks of an existing mutual authentication and key agreement of Li et al.’s scheme. To confirm the efficiency and security, the proposed scheme has been verified using formal security analysis tool namely, ProVerif and BAN logic. The low communication and computation costs indicate that our scheme is more suitable for practical application in healthcare as compared to other existing schemes.
Arabian Journal for Science and Engineering – Springer Journals
Published: Sep 1, 2021
Keywords: Authentication; WBAN; Master Key; Hub Node
Read and print from thousands of top scholarly journals.
Already have an account? Log in
Bookmark this article. You can see your Bookmarks on your DeepDyve Library.
To save an article, log in first, or sign up for a DeepDyve account if you don’t already have one.
Copy and paste the desired citation format or use the link below to download a file formatted for EndNote
Access the full text.
Sign up today, get DeepDyve free for 14 days.
All DeepDyve websites use cookies to improve your online experience. They were placed on your computer when you launched this website. You can change your cookie settings through your browser.