Skip to main content
Erschienen in: Journal of Medical Systems 2/2017

01.02.2017 | Systems-Level Quality Improvement

An Efficient Remote Authentication Scheme for Wireless Body Area Network

verfasst von: Anyembe Andrew Omala, Kittur P. Kibiwott, Fagen Li

Erschienen in: Journal of Medical Systems | Ausgabe 2/2017

Einloggen, um Zugang zu erhalten

Abstract

Wireless body area network (WBAN) provide a mechanism of transmitting a persons physiological data to application providers e.g. hospital. Given the limited range of connectivity associated with WBAN, an intermediate portable device e.g. smartphone, placed within WBAN’s connectivity, forwards the data to a remote server. This data, if not protected from an unauthorized access and modification may be lead to poor diagnosis. In order to ensure security and privacy between WBAN and a server at the application provider, several authentication schemes have been proposed. Recently, Wang and Zhang proposed an authentication scheme for WBAN using bilinear pairing. However, in their scheme, an application provider could easily impersonate a client. In order to overcome this weakness, we propose an efficient remote authentication scheme for WBAN. In terms of performance, our scheme can not only provide a malicious insider security, but also reduce running time of WBAN (client) by 51 % as compared to Wang and Zhang scheme.
Literatur
1.
Zurück zum Zitat Abi-Char, P. E., Mhamed, A., and El-Hassan, B., A fast and secure elliptic curve based authenticated key agreement protocol for low power mobile communications. In: The 2007 International Conference on Next Generation Mobile Applications, Services and Technologies (NGMAST 2007), pp. 235–240 (2007). doi:10.1109/NGMAST.2007.4343427 Abi-Char, P. E., Mhamed, A., and El-Hassan, B., A fast and secure elliptic curve based authenticated key agreement protocol for low power mobile communications. In: The 2007 International Conference on Next Generation Mobile Applications, Services and Technologies (NGMAST 2007), pp. 235–240 (2007). doi:10.​1109/​NGMAST.​2007.​4343427
3.
Zurück zum Zitat Al-Riyami, S. S., and Paterson, K. G., Advances in Cryptology - ASIACRYPT 2003: 9th International Conference on the Theory and Application of Cryptology and Information Security, Taipei, Taiwan, November 30 – December 4, 2003. Proceedings, chap. Certificateless Public Key Cryptography, pp. 452–473. Berlin: Springer, 2003. doi:10.1007/978-3-540-40061-5_29. Al-Riyami, S. S., and Paterson, K. G., Advances in Cryptology - ASIACRYPT 2003: 9th International Conference on the Theory and Application of Cryptology and Information Security, Taipei, Taiwan, November 30 – December 4, 2003. Proceedings, chap. Certificateless Public Key Cryptography, pp. 452–473. Berlin: Springer, 2003. doi:10.​1007/​978-3-540-40061-5_​29.
4.
Zurück zum Zitat Aydos, M., Sunar, B., and Koc, C. K., An elliptic curve cryptography based authentication and key agreement protocol for wireless communication. In: 2nd International Workshop on Discrete Algorithms and Methods for Mobile Computing and Communications Symposium on Information Theory (1998) Aydos, M., Sunar, B., and Koc, C. K., An elliptic curve cryptography based authentication and key agreement protocol for wireless communication. In: 2nd International Workshop on Discrete Algorithms and Methods for Mobile Computing and Communications Symposium on Information Theory (1998)
5.
Zurück zum Zitat Bourouis, A., Feham, M., and Bouchachia, A., Ubiquitous mobile health monitoring system for elderly (UMHMSE). arXiv:1107.3695 (2011) Bourouis, A., Feham, M., and Bouchachia, A., Ubiquitous mobile health monitoring system for elderly (UMHMSE). arXiv:1107.​3695 (2011)
6.
7.
Zurück zum Zitat Cherukuri, S., Venkatasubramanian, K. K., and Gupta, S. K. S., Biosec: a biometric based approach for securing communication in wireless networks of biosensors implanted in the human body. In: Proceedings of the 2003 International Conference on Parallel Processing Workshops, 2003, pp. 432–439 (2003). doi:10.1109/ICPPW.2003.1240399 Cherukuri, S., Venkatasubramanian, K. K., and Gupta, S. K. S., Biosec: a biometric based approach for securing communication in wireless networks of biosensors implanted in the human body. In: Proceedings of the 2003 International Conference on Parallel Processing Workshops, 2003, pp. 432–439 (2003). doi:10.​1109/​ICPPW.​2003.​1240399
8.
Zurück zum Zitat Dolev, D., and Yao, A. C., On the security of public key protocols. In: 22nd Annual Symposium on Foundations of Computer Science (sfcs 1981), pp. 350–357 (1981). doi:10.1109/SFCS.1981.32 Dolev, D., and Yao, A. C., On the security of public key protocols. In: 22nd Annual Symposium on Foundations of Computer Science (sfcs 1981), pp. 350–357 (1981). doi:10.​1109/​SFCS.​1981.​32
9.
Zurück zum Zitat Hankerson, D., Menezes, A. J., and Vanstone, S., Guide to elliptic curve cryptography. Springer Science & Business Media (2006) Hankerson, D., Menezes, A. J., and Vanstone, S., Guide to elliptic curve cryptography. Springer Science & Business Media (2006)
10.
Zurück zum Zitat He, D., Zeadally, S., Kumar, N., and Lee, J. H., Anonymous authentication for wireless body area networks with provable security. IEEE Syst. J. PP(99):1–12, 2016. doi:10.1109/JSYST.2016.2544805. He, D., Zeadally, S., Kumar, N., and Lee, J. H., Anonymous authentication for wireless body area networks with provable security. IEEE Syst. J. PP(99):1–12, 2016. doi:10.​1109/​JSYST.​2016.​2544805.
11.
Zurück zum Zitat Hu, B. C., Wong, D. S., Zhang, Z., and Deng, X., Information Security and Privacy: 11th Australasian Conference, ACISP 2006, Melbourne, Australia, July 3–5, 2006. Proceedings, chap. Key Replacement Attack Against a Generic Construction of Certificateless Signature, pp. 235–246. Springer, Berlin, Heidelberg (2006). doi:10.1007/11780656_20 Hu, B. C., Wong, D. S., Zhang, Z., and Deng, X., Information Security and Privacy: 11th Australasian Conference, ACISP 2006, Melbourne, Australia, July 3–5, 2006. Proceedings, chap. Key Replacement Attack Against a Generic Construction of Certificateless Signature, pp. 235–246. Springer, Berlin, Heidelberg (2006). doi:10.​1007/​11780656_​20
12.
Zurück zum Zitat Islam, S. H., Design and analysis of an improved smartcard-based remote user password authentication scheme. Int. J. Commun. Syst. 29(11):1708–1719, 2016. doi:10.1002/dac.2793. Islam, S. H., Design and analysis of an improved smartcard-based remote user password authentication scheme. Int. J. Commun. Syst. 29(11):1708–1719, 2016. doi:10.​1002/​dac.​2793.
13.
Zurück zum Zitat Islam, S. H., and Khan, M. K., Cryptanalysis and improvement of authentication and key agreement protocols for telecare medicine information systems. J. Med. Syst. 38(10):135, 2014. doi:10.1007/s10916-014-0135-9. Islam, S. H., and Khan, M. K., Cryptanalysis and improvement of authentication and key agreement protocols for telecare medicine information systems. J. Med. Syst. 38(10):135, 2014. doi:10.​1007/​s10916-014-0135-9.
14.
Zurück zum Zitat Islam, S. H., Obaidat, M. S., and Amin, R., An anonymous and provably secure authentication scheme for mobile user. Int. J. Commun. Syst. 29(9):1529–1544, 2016. doi:10.1002/dac.3126. Dac.3126. Islam, S. H., Obaidat, M. S., and Amin, R., An anonymous and provably secure authentication scheme for mobile user. Int. J. Commun. Syst. 29(9):1529–1544, 2016. doi:10.​1002/​dac.​3126. Dac.3126.
15.
Zurück zum Zitat Jiang, C., Li, B., and Xu, H., An efficient scheme for user authentication in wireless sensor networks. In: 21st International Conference on Advanced Information Networking and Applications Workshops, 2007, AINAW ’07. Vol. 1, pp. 438–442 (2007), 10.1109/AINAW.2007.80 Jiang, C., Li, B., and Xu, H., An efficient scheme for user authentication in wireless sensor networks. In: 21st International Conference on Advanced Information Networking and Applications Workshops, 2007, AINAW ’07. Vol. 1, pp. 438–442 (2007), 10.​1109/​AINAW.​2007.​80
16.
Zurück zum Zitat Kim, J. S., and Chung, J. Y., Eeg encryption scheme with junk data using chaos maps. In: 2015 6th International Conference on Intelligent Systems, Modelling and Simulation, pp. 132–134 (2015). doi:10.1109/ISMS.2015.25 Kim, J. S., and Chung, J. Y., Eeg encryption scheme with junk data using chaos maps. In: 2015 6th International Conference on Intelligent Systems, Modelling and Simulation, pp. 132–134 (2015). doi:10.​1109/​ISMS.​2015.​25
17.
Zurück zum Zitat Koblitz, N., Elliptic curve cryptosystems. Math. Comput. 48(177):203–209, 1987.CrossRef Koblitz, N., Elliptic curve cryptosystems. Math. Comput. 48(177):203–209, 1987.CrossRef
18.
20.
21.
Zurück zum Zitat Liu, J., Zhang, Z., Chen, X., and Kwak, K. S., Certificateless remote anonymous authentication schemes for wirelessbody area networks. IEEE Trans. Parallel Distrib. Syst. 25 (2): 332–342, 2014. doi:10.1109/TPDS.2013.145. Liu, J., Zhang, Z., Chen, X., and Kwak, K. S., Certificateless remote anonymous authentication schemes for wirelessbody area networks. IEEE Trans. Parallel Distrib. Syst. 25 (2): 332–342, 2014. doi:10.​1109/​TPDS.​2013.​145.
22.
Zurück zum Zitat Liu, J., Zhang, Z., Sun, R., and Kwak, K. S., An efficient certificateless remote anonymous authentication scheme for wireless body area networks. In: 2012 IEEE International Conference on Communications (ICC), pp. 3404–3408 (2012). doi:10.1109/ICC.2012.6363786 Liu, J., Zhang, Z., Sun, R., and Kwak, K. S., An efficient certificateless remote anonymous authentication scheme for wireless body area networks. In: 2012 IEEE International Conference on Communications (ICC), pp. 3404–3408 (2012). doi:10.​1109/​ICC.​2012.​6363786
23.
Zurück zum Zitat Miller, V. S., Use of elliptic curves in cryptography. In: Advances in Cryptology—CRYPTO’85 Proceedings, pp. 417–426. Springer (1985) Miller, V. S., Use of elliptic curves in cryptography. In: Advances in Cryptology—CRYPTO’85 Proceedings, pp. 417–426. Springer (1985)
24.
25.
Zurück zum Zitat Reddy, A. G., Das, A. K., Yoon, E. J., and Yoo, K. Y., A secure anonymous authentication protocol for mobile services on elliptic curve cryptography. IEEE Access 4:4394–4407, 2016. doi:10.1109/ACCESS.2016.2596292. Reddy, A. G., Das, A. K., Yoon, E. J., and Yoo, K. Y., A secure anonymous authentication protocol for mobile services on elliptic curve cryptography. IEEE Access 4:4394–4407, 2016. doi:10.​1109/​ACCESS.​2016.​2596292.
26.
Zurück zum Zitat Shamir, A., Advances in cryptology. In: Proceedings of CRYPTO 84, chap. Identity-Based Cryptosystems and Signature Schemes, pp. 47–53. Springer, Berlin. doi:10.1007/3-540-39568-7_5 (1985) Shamir, A., Advances in cryptology. In: Proceedings of CRYPTO 84, chap. Identity-Based Cryptosystems and Signature Schemes, pp. 47–53. Springer, Berlin. doi:10.​1007/​3-540-39568-7_​5 (1985)
27.
Zurück zum Zitat Wang, C., and Zhang, Y., New authentication scheme for wireless body area networks using the bilinear pairing. J. Med. Syst. 39(11):1–8, 2015. doi:10.1007/s10916-015-0331-2. Wang, C., and Zhang, Y., New authentication scheme for wireless body area networks using the bilinear pairing. J. Med. Syst. 39(11):1–8, 2015. doi:10.​1007/​s10916-015-0331-2.
28.
Zurück zum Zitat Wang, D., He, D., Wang, P., and Chu, C. H., Anonymous two-factor authentication in distributed systems: certain goals are beyond attainment. IEEE Trans. Dependable Secure Comput. 12(4):428–442, 2015. doi:10.1109/TDSC.2014.2355850. Wang, D., He, D., Wang, P., and Chu, C. H., Anonymous two-factor authentication in distributed systems: certain goals are beyond attainment. IEEE Trans. Dependable Secure Comput. 12(4):428–442, 2015. doi:10.​1109/​TDSC.​2014.​2355850.
29.
Zurück zum Zitat Xiong, H., Cost-effective scalable and anonymous certificateless remote authentication protocol. IEEE Trans. Inf. Forensics Secur. 9(12):2327–2339, 2014. doi:10.1109/TIFS.2014.2363553. Xiong, H., Cost-effective scalable and anonymous certificateless remote authentication protocol. IEEE Trans. Inf. Forensics Secur. 9(12):2327–2339, 2014. doi:10.​1109/​TIFS.​2014.​2363553.
30.
Zurück zum Zitat Zhao, Z., An efficient anonymous authentication scheme for wireless body area networks using elliptic curve cryptosystem. J. Med. Syst. 38(2):1–7, 2014. doi:10.1007/s10916-014-0013-5. Zhao, Z., An efficient anonymous authentication scheme for wireless body area networks using elliptic curve cryptosystem. J. Med. Syst. 38(2):1–7, 2014. doi:10.​1007/​s10916-014-0013-5.
Metadaten
Titel
An Efficient Remote Authentication Scheme for Wireless Body Area Network
verfasst von
Anyembe Andrew Omala
Kittur P. Kibiwott
Fagen Li
Publikationsdatum
01.02.2017
Verlag
Springer US
Erschienen in
Journal of Medical Systems / Ausgabe 2/2017
Print ISSN: 0148-5598
Elektronische ISSN: 1573-689X
DOI
https://doi.org/10.1007/s10916-016-0670-7

Weitere Artikel der Ausgabe 2/2017

Journal of Medical Systems 2/2017 Zur Ausgabe