Online citations, reference lists, and bibliographies.
← Back to Search

A Lightweight And Secure Two-factor Authentication Scheme For Wireless Body Area Networks In Health-care IoT

Mahdi Fotouhi, M. Bayat, A. K. Das, Hossein Abdi Nasib Far, S. M. Pournaghi, M. A. Doostari
Published 2020 · Computer Science

Cite This
Download PDF
Analyze on Scholarcy
Share
Abstract The widespread use of mobile devices, sensors, and wireless sensor networks and the progressive development of the Internet of Things (IoT) has motivated medical and health-care societies to employ IoT to monitor, collect data, and communicate with patients using the wireless body area networks (WBANs). The collected data will make a lot of medical diagnosis applications of WBANs, which are obtained directly from the patients’ bodies. Therefore, because of the nature of wireless networks and freely accessible data feature over the public channel, the security and privacy of WBANs is the most critical concern for those who use it for health-care purposes. Accordingly, there is a need for an authentication scheme for letting a trusted user such as doctors or clinical personnel access to the sensor’s data from patients. In this paper, we propose a new lightweight hash-chain-based and forward secure authentication scheme for wireless body area networks in health-care IoT. Our scheme is secure against various known attacks obliged for WBANs. Additionally, we perform the formal security analysis using Real-or Random (ROR) model, and informal security on the proposed scheme, also, security verification of our scheme is validated by the ProVerif tool. Besides, our scheme is simulated by the OPNET network simulator and compared with several new schemes in terms of security and performance requirements. The simulation results and comparisons confirm that the proposed scheme is suitable for WBANs, and it supports more security features compared to related schemes.
This paper references
10.1016/j.jnca.2018.09.008
Authenticated key management protocol for cloud-assisted body area sensor networks
M. Wazid (2018)
10.1109/TSG.2016.2602282
Provably Secure Authenticated Key Agreement Scheme for Smart Grid
Vanga Odelu (2018)
10.1007/s00530-013-0346-9
Robust anonymous authentication protocol for health-care applications using wireless medical sensor networks
D. He (2013)
10.1109/JIOT.2018.2877690
Biometrics-Based Privacy-Preserving User Authentication Scheme for Cloud-Based Industrial Internet of Things Deployment
A. K. Das (2018)
10.1109/JIOT.2017.2780232
Design of Secure User Authenticated Key Management Protocol for Generic IoT Networks
M. Wazid (2018)
10.1007/s11042-017-5376-4
Efficient authentication protocol for secure multimedia communications in IoT-enabled wireless sensor networks
Dheerendra Mishra (2017)
10.1109/TDSC.2017.2764083
Secure Remote User Authenticated Key Establishment Protocol for Smart Home Environment
M. Wazid (2020)
10.1109/TIT.1983.1056650
On the security of public key protocols
D. Dolev (1981)
10.1007/s11277-012-0535-4
An Enhanced Authentication Scheme with Privacy Preservation for Roaming Service in Global Mobility Networks
Qi Jiang (2013)
10.1109/TIFS.2018.2850299
Secure Key Agreement and Key Protection for Mobile Device User Authentication
Libing Wu (2019)
10.4218/ETRIJ.10.1510.0134
A Robust Mutual Authentication Protocol for Wireless Sensor Networks
Tien-Ho Chen (2010)
10.3390/s16060837
An Energy Efficient Mutual Authentication and Key Agreement Scheme Preserving Anonymity for Wireless Sensor Networks
Y. Lu (2016)
10.1109/TWC.2015.2473165
A Provably Secure, Efficient, and Flexible Authentication Scheme for Ad hoc Wireless Sensor Networks
C. Chang (2016)
10.1016/j.future.2016.05.032
A robust and anonymous patient monitoring system using wireless medical sensor networks
R. Amin (2018)
10.1049/IP-IFS:20055073
Password-Based Authenticated Key Exchange in the Three-Party Setting
M. Abdalla (2004)
10.1109/WIAD.2011.5983262
Cryptanalysis on two user authentication protocols using smart card for wireless sensor networks
P. Kumar (2011)
10.1145/2976749.2978339
Targeted Online Password Guessing: An Underestimated Threat
Ding Wang (2016)
10.1016/j.comnet.2016.05.007
Authentication protocol for wireless sensor networks applications like safety monitoring in coal mines
S. Kumari (2016)
10.1109/TIE.2006.881998
Security Enhancement on a New Authentication Scheme With Anonymity for Wireless Environments
C. Lee (2006)
An Enhanced Two-factor User Authentication Scheme in Wireless Sensor Networks
Daojing He (2010)
10.1109/TCE.2004.1277867
A new authentication scheme with anonymity for wireless environments
Jianming Zhu (2004)
10.1016/j.jnca.2007.01.001
Assessing readiness of IP networks to support desktop videoconferencing using OPNET
K. Salah (2008)
10.1002/sec.1558
A novel and provably secure authentication and key agreement scheme with user anonymity for global mobility networks
F. Wu (2016)
10.1109/ACCESS.2017.2676119
Secure Signature-Based Authenticated Key Establishment Scheme for Future IoT Applications
S. Challa (2017)
10.1109/TIE.2016.2585081
A Realistic Lightweight Anonymous Authentication Protocol for Securing Real-Time Application Data Access in Wireless Sensor Networks
Prosanta Gope (2016)
10.1109/TC.2002.1004593
Examining Smart-Card Security under the Threat of Power Analysis Attacks
Thomas S. Messerges (2002)
10.1007/s11277-013-1243-4
A Secure and Effective Anonymous User Authentication Scheme for Roaming Service in Global Mobility Networks
F. Wen (2013)
10.1007/11964254_5
Tiny 3-TLS: A Trust Delegation Protocol for Wireless Sensor Networks
S. Fouladgar (2006)
10.1109/TVT.2019.2911672
TCALAS: Temporal Credential-Based Anonymous Lightweight Authentication Scheme for Internet of Drones Environment
J. Srinivas (2019)
10.1109/JSYST.2015.2428620
Certificateless Public Auditing Scheme for Cloud-Assisted Wireless Body Area Networks
D. He (2018)
10.1007/s10916-016-0629-8
Secure and Efficient Two-Factor User Authentication Scheme with User Anonymity for Network Based E-Health Care Applications
X. Li (2016)
10.1007/s00530-015-0476-3
An improved and anonymous two-factor authentication protocol for health-care applications with wireless medical sensor networks
F. Wu (2015)
10.1016/j.future.2016.04.016
A user friendly mutual authentication and key agreement scheme for wireless sensor networks using chaotic maps
S. Kumari (2016)
10.1007/s10916-017-0720-9
A Mutual Authentication Framework for Wireless Medical Sensor Networks
J. Srinivas (2017)
10.1007/s11277-015-2344-z
Enhanced Secure Mutual Authentication and Key Agreement Scheme Preserving User Anonymity in Global Mobile Networks
Prosanta Gope (2015)
10.1016/j.future.2017.08.042
A lightweight and robust two-factor authentication scheme for personalized healthcare systems using wireless medical sensor networks
F. Wu (2018)
10.1016/J.FUTURE.2019.06.020
Two-factor authentication in industrial Internet-of-Things: Attacks, evaluation and new construction
W. Li (2019)
10.3390/s100302450
Cryptanalysis and Security Improvements of ‘Two-Factor User Authentication in Wireless Sensor Networks’
M. Khan (2010)
10.1533/9780857096289
Implantable sensor systems for medical applications
A. Inmann (2013)
10.1016/c2011-0-07051-5
Computer and Information Security Handbook
J. Vacca (2009)
10.1109/TDSC.2018.2857811
Anonymous Lightweight Chaotic Map-Based Authenticated Key Agreement Protocol for Industrial Internet of Things
J. Srinivas (2020)
10.1007/s10916-010-9614-9
A Secure Authentication Scheme for Telecare Medicine Information Systems
Z. Wu (2010)
10.1007/3-540-44987-6_28
Analysis of Key-Exchange Protocols and Their Use for Building Secure Channels
R. Canetti (2001)
Cryptography and Network Security: Principles and Practice
W. Stallings (1998)
10.1109/TII.2019.2895030
Lightweight and Physically Secure Anonymous Mutual Authentication Protocol for Real-Time Data Access in Industrial Wireless Sensor Networks
Prosanta Gope (2019)
10.1016/j.adhoc.2018.07.030
Anonymous two factor authentication protocol for roaming service in global mobility network with security beyond traditional limit
M. Gupta (2019)
10.1109/JSYST.2016.2544805
Anonymous Authentication for Wireless Body Area Networks With Provable Security
D. He (2017)
10.1002/dac.3019
A lightweight anonymous authentication scheme for consumer roaming in ubiquitous networks with provable security
M. Farash (2017)
10.1109/SP.2012.49
The Science of Guessing: Analyzing an Anonymized Corpus of 70 Million Passwords
J. Bonneau (2012)
10.1109/MCOM.2002.1007422
A comparison of active queue management algorithms using the OPNET Modeler
Chengyu Zhu (2002)
10.1109/TIFS.2017.2721359
Zipf’s Law in Passwords
Ding Wang (2017)
10.1016/j.compeleceng.2017.04.017
A provably secure password-based anonymous authentication scheme for wireless body area networks
Fushan Wei (2018)
10.1109/ICITBS.2018.00057
Research on Comprehensive Performance Simulation of Communication IP Network Based on OPNET
C. Cao (2018)
10.1109/TWC.2008.080128
Two-factor user authentication in wireless sensor networks
M. Das (2009)
10.1109/IAW.2005.1495974
Wireless sensor network denial of sleep attack
M. Brownfield (2005)
10.1109/JIOT.2019.2923373
A Provably Secure and Lightweight Anonymous User Authenticated Session Key Exchange Scheme for Internet of Things Deployment
S. Banerjee (2019)
10.1109/TII.2019.2922697
ECCAuth: A Secure Authentication Protocol for Demand Response Management in a Smart Grid System
N. Kumar (2019)



This paper is referenced by
Semantic Scholar Logo Some data provided by SemanticScholar