Online citations, reference lists, and bibliographies.
← Back to Search

A Lightweight And Secure Two-factor Authentication Scheme For Wireless Body Area Networks In Health-care IoT

Mahdi Fotouhi, M. Bayat, A. K. Das, Hossein Abdi Nasib Far, S. M. Pournaghi, M. A. Doostari
Published 2020 · Computer Science

Cite This
Download PDF
Analyze on Scholarcy
Abstract The widespread use of mobile devices, sensors, and wireless sensor networks and the progressive development of the Internet of Things (IoT) has motivated medical and health-care societies to employ IoT to monitor, collect data, and communicate with patients using the wireless body area networks (WBANs). The collected data will make a lot of medical diagnosis applications of WBANs, which are obtained directly from the patients’ bodies. Therefore, because of the nature of wireless networks and freely accessible data feature over the public channel, the security and privacy of WBANs is the most critical concern for those who use it for health-care purposes. Accordingly, there is a need for an authentication scheme for letting a trusted user such as doctors or clinical personnel access to the sensor’s data from patients. In this paper, we propose a new lightweight hash-chain-based and forward secure authentication scheme for wireless body area networks in health-care IoT. Our scheme is secure against various known attacks obliged for WBANs. Additionally, we perform the formal security analysis using Real-or Random (ROR) model, and informal security on the proposed scheme, also, security verification of our scheme is validated by the ProVerif tool. Besides, our scheme is simulated by the OPNET network simulator and compared with several new schemes in terms of security and performance requirements. The simulation results and comparisons confirm that the proposed scheme is suitable for WBANs, and it supports more security features compared to related schemes.
This paper references
Authenticated key management protocol for cloud-assisted body area sensor networks
M. Wazid (2018)
Provably Secure Authenticated Key Agreement Scheme for Smart Grid
Vanga Odelu (2018)
Robust anonymous authentication protocol for health-care applications using wireless medical sensor networks
D. He (2013)
Biometrics-Based Privacy-Preserving User Authentication Scheme for Cloud-Based Industrial Internet of Things Deployment
A. K. Das (2018)
Design of Secure User Authenticated Key Management Protocol for Generic IoT Networks
M. Wazid (2018)
Efficient authentication protocol for secure multimedia communications in IoT-enabled wireless sensor networks
Dheerendra Mishra (2017)
Secure Remote User Authenticated Key Establishment Protocol for Smart Home Environment
M. Wazid (2020)
On the security of public key protocols
D. Dolev (1981)
An Enhanced Authentication Scheme with Privacy Preservation for Roaming Service in Global Mobility Networks
Qi Jiang (2013)
Secure Key Agreement and Key Protection for Mobile Device User Authentication
Libing Wu (2019)
A Robust Mutual Authentication Protocol for Wireless Sensor Networks
Tien-Ho Chen (2010)
An Energy Efficient Mutual Authentication and Key Agreement Scheme Preserving Anonymity for Wireless Sensor Networks
Y. Lu (2016)
A Provably Secure, Efficient, and Flexible Authentication Scheme for Ad hoc Wireless Sensor Networks
C. Chang (2016)
A robust and anonymous patient monitoring system using wireless medical sensor networks
R. Amin (2018)
Password-Based Authenticated Key Exchange in the Three-Party Setting
M. Abdalla (2004)
Cryptanalysis on two user authentication protocols using smart card for wireless sensor networks
P. Kumar (2011)
Targeted Online Password Guessing: An Underestimated Threat
Ding Wang (2016)
Authentication protocol for wireless sensor networks applications like safety monitoring in coal mines
S. Kumari (2016)
Security Enhancement on a New Authentication Scheme With Anonymity for Wireless Environments
C. Lee (2006)
An Enhanced Two-factor User Authentication Scheme in Wireless Sensor Networks
Daojing He (2010)
A new authentication scheme with anonymity for wireless environments
Jianming Zhu (2004)
Assessing readiness of IP networks to support desktop videoconferencing using OPNET
K. Salah (2008)
A novel and provably secure authentication and key agreement scheme with user anonymity for global mobility networks
F. Wu (2016)
Secure Signature-Based Authenticated Key Establishment Scheme for Future IoT Applications
S. Challa (2017)
A Realistic Lightweight Anonymous Authentication Protocol for Securing Real-Time Application Data Access in Wireless Sensor Networks
Prosanta Gope (2016)
Examining Smart-Card Security under the Threat of Power Analysis Attacks
Thomas S. Messerges (2002)
A Secure and Effective Anonymous User Authentication Scheme for Roaming Service in Global Mobility Networks
F. Wen (2013)
Tiny 3-TLS: A Trust Delegation Protocol for Wireless Sensor Networks
S. Fouladgar (2006)
TCALAS: Temporal Credential-Based Anonymous Lightweight Authentication Scheme for Internet of Drones Environment
J. Srinivas (2019)
Certificateless Public Auditing Scheme for Cloud-Assisted Wireless Body Area Networks
D. He (2018)
Secure and Efficient Two-Factor User Authentication Scheme with User Anonymity for Network Based E-Health Care Applications
X. Li (2016)
An improved and anonymous two-factor authentication protocol for health-care applications with wireless medical sensor networks
F. Wu (2015)
A user friendly mutual authentication and key agreement scheme for wireless sensor networks using chaotic maps
S. Kumari (2016)
A Mutual Authentication Framework for Wireless Medical Sensor Networks
J. Srinivas (2017)
Enhanced Secure Mutual Authentication and Key Agreement Scheme Preserving User Anonymity in Global Mobile Networks
Prosanta Gope (2015)
A lightweight and robust two-factor authentication scheme for personalized healthcare systems using wireless medical sensor networks
F. Wu (2018)
Two-factor authentication in industrial Internet-of-Things: Attacks, evaluation and new construction
W. Li (2019)
Cryptanalysis and Security Improvements of ‘Two-Factor User Authentication in Wireless Sensor Networks’
M. Khan (2010)
Implantable sensor systems for medical applications
A. Inmann (2013)
Computer and Information Security Handbook
J. Vacca (2009)
Anonymous Lightweight Chaotic Map-Based Authenticated Key Agreement Protocol for Industrial Internet of Things
J. Srinivas (2020)
A Secure Authentication Scheme for Telecare Medicine Information Systems
Z. Wu (2010)
Analysis of Key-Exchange Protocols and Their Use for Building Secure Channels
R. Canetti (2001)
Cryptography and Network Security: Principles and Practice
W. Stallings (1998)
Lightweight and Physically Secure Anonymous Mutual Authentication Protocol for Real-Time Data Access in Industrial Wireless Sensor Networks
Prosanta Gope (2019)
Anonymous two factor authentication protocol for roaming service in global mobility network with security beyond traditional limit
M. Gupta (2019)
Anonymous Authentication for Wireless Body Area Networks With Provable Security
D. He (2017)
A lightweight anonymous authentication scheme for consumer roaming in ubiquitous networks with provable security
M. Farash (2017)
The Science of Guessing: Analyzing an Anonymized Corpus of 70 Million Passwords
J. Bonneau (2012)
A comparison of active queue management algorithms using the OPNET Modeler
Chengyu Zhu (2002)
Zipf’s Law in Passwords
Ding Wang (2017)
A provably secure password-based anonymous authentication scheme for wireless body area networks
Fushan Wei (2018)
Research on Comprehensive Performance Simulation of Communication IP Network Based on OPNET
C. Cao (2018)
Two-factor user authentication in wireless sensor networks
M. Das (2009)
Wireless sensor network denial of sleep attack
M. Brownfield (2005)
A Provably Secure and Lightweight Anonymous User Authenticated Session Key Exchange Scheme for Internet of Things Deployment
S. Banerjee (2019)
ECCAuth: A Secure Authentication Protocol for Demand Response Management in a Smart Grid System
N. Kumar (2019)

This paper is referenced by
Semantic Scholar Logo Some data provided by SemanticScholar