Context-aware anonymous authentication protocols in the internet of things dedicated to e-health applications

Abstract Due to the emergence of the Internet of Things (IoT) era and the rapid technological advancements of wireless communications, Wireless body area network (WBAN) has been introduced as a pioneering key technology for the next generation ubiquitous healthcare systems. However, the open and dynamic nature of wireless sensor technologies makes both inter-sensor and sensor-controller communications vulnerable to several potential attacks, which significantly undermine the WBAN's efficiency and impede its further flourish. Specifically, the patient's sensitive data may be eavesdropped and linked to the identities of the sensors in transmission and thus revealing the patient's medical conditions. Therefore, in such resource-impoverished environment, anonymous authentication for sensor nodes while considering their stringent resource constraints is a paramount security concern. In this paper, we propose a context-aware and lightweight anonymous authentication and key agreement scheme for WBAN applications in emergency and normal situations. The proposed scheme provides selective anonymous authentication between nodes in WBAN while taking into account the dynamic context changes. Formal security analysis using the widely accepted Real-Or-Random (ROR) model, the Burrows-Abadi-Needham (BAN) logic, and the automated security protocol verification (Scyther) tool shows that the proposed scheme is secure against known attacks. From a performance perspective, we prove that the proposed key agreement protocols outperform benchmark schemes in terms of communication and computation overhead.

[1]  David Kanume Koroma,et al.  A survey on security issues and wearable sensors in wireless body area network for healthcare system , 2017, 2017 14th International Computer Conference on Wavelet Active Media Technology and Information Processing (ICCWAMTIP).

[2]  Xianbin Wang,et al.  Physical Layer Authentication Enhancement Using Maximum SNR Ratio Based Cooperative AF Relaying , 2017, Wirel. Commun. Mob. Comput..

[3]  Inmaculada Tomeo-Reyes,et al.  IEEE 802.15.6 standard in wireless body area networks from a healthcare point of view , 2016, 2016 22nd Asia-Pacific Conference on Communications (APCC).

[4]  Gengfa Fang,et al.  Multiple ECG Fiducial Points-Based Random Binary Sequence Generation for Securing Wireless Body Area Networks , 2017, IEEE Journal of Biomedical and Health Informatics.

[5]  Xiong Li,et al.  Anonymous mutual authentication and key agreement scheme for wearable sensors in wireless body area networks , 2017, Comput. Networks.

[6]  Xiaohui Liang,et al.  Wanda: Securely introducing mobile devices , 2016, IEEE INFOCOM 2016 - The 35th Annual IEEE International Conference on Computer Communications.

[7]  Chandreyee Chowdhury,et al.  Secure lightweight routing(SLR) strategy for wireless body area networks , 2017, 2017 IEEE International Conference on Advanced Networks and Telecommunications Systems (ANTS).

[8]  Xiong Li,et al.  A three-factor anonymous authentication scheme for wireless sensor networks in internet of things environments , 2018, J. Netw. Comput. Appl..

[9]  Asma Ben Letaifa,et al.  Adaptive Anonymous Authentication for Wearable Sensors in Wireless Body Area Networks , 2018, 2018 14th International Wireless Communications & Mobile Computing Conference (IWCMC).

[10]  Chin-Chen Chang,et al.  A Provably Secure, Efficient, and Flexible Authentication Scheme for Ad hoc Wireless Sensor Networks , 2016, IEEE Transactions on Wireless Communications.

[11]  Omessaad Hamdi,et al.  A new protocol for an efficient and green biometric-based security key establishment in WBAN’s , 2018, 2018 14th International Wireless Communications & Mobile Computing Conference (IWCMC).

[12]  Chien-Ming Chen,et al.  An Anonymous Mutual Authenticated Key Agreement Scheme for Wearable Sensors in Wireless Body Area Networks , 2018, Applied Sciences.

[13]  Bo Hu,et al.  A Survey on Secure Wireless Body Area Networks , 2017, Secur. Commun. Networks.

[14]  Zhiguang Qin,et al.  Revocable and Scalable Certificateless Remote Authentication Protocol With Anonymity for Wireless Body Area Networks , 2015, IEEE Transactions on Information Forensics and Security.

[15]  Honggang Wang,et al.  Secure and efficient key generation and agreement methods for wireless body area networks , 2017, 2017 IEEE International Conference on Communications (ICC).

[16]  Saru Kumari,et al.  An efficient user authentication and key agreement scheme for heterogeneous wireless sensor network tailored for the Internet of Things environment , 2016, Ad Hoc Networks.

[17]  Mohamed Hamdi,et al.  Game-based adaptive security in the Internet of Things for eHealth , 2014, 2014 IEEE International Conference on Communications (ICC).

[18]  Yiwei Thomas Hou,et al.  Proximity-Based Security Techniques for Mobile Users in Wireless Networks , 2013, IEEE Transactions on Information Forensics and Security.

[19]  Kyung Sup Kwak,et al.  Certificateless Remote Anonymous Authentication Schemes for WirelessBody Area Networks , 2014, IEEE Transactions on Parallel and Distributed Systems.

[20]  Honggang Wang,et al.  A key agreement method for wireless body area networks , 2016, 2016 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS).

[21]  David Pointcheval,et al.  Password-Based Authenticated Key Exchange in the Three-Party Setting , 2005, Public Key Cryptography.

[22]  Xiong Li,et al.  Secure and efficient anonymous authentication scheme for three-tier mobile healthcare systems with wearable sensors , 2018, Telecommun. Syst..

[23]  Lixiang Li,et al.  An Energy Efficient Mutual Authentication and Key Agreement Scheme Preserving Anonymity for Wireless Sensor Networks , 2016, Sensors.

[24]  Qian Li,et al.  Efficient authenticated key exchange protocols for wireless body area networks , 2015, EURASIP Journal on Wireless Communications and Networking.

[25]  Sherali Zeadally,et al.  Anonymous Authentication for Wireless Body Area Networks With Provable Security , 2017, IEEE Systems Journal.

[26]  Kyung-Sup Kwak,et al.  The Internet of Things for Health Care: A Comprehensive Survey , 2015, IEEE Access.

[27]  Prosanta Gope,et al.  A Realistic Lightweight Anonymous Authentication Protocol for Securing Real-Time Application Data Access in Wireless Sensor Networks , 2016, IEEE Transactions on Industrial Electronics.

[28]  Nadeem Javaid,et al.  Co-LAEEBA: Cooperative link aware and energy efficient protocol for wireless body area networks , 2015, Comput. Hum. Behav..

[29]  Palash Sarkar,et al.  A Simple and Generic Construction of Authenticated Encryption with Associated Data , 2010, TSEC.

[30]  Liping Xie,et al.  Lightweight mutual authentication among sensors in body area networks through Physical Unclonable Functions , 2017, 2017 IEEE International Conference on Communications (ICC).

[31]  Cas J. F. Cremers,et al.  The Scyther Tool: Verification, Falsification, and Analysis of Security Protocols , 2008, CAV.