A Secure and Anonymous Authentication Protocol Based on Three-Factor Wireless Medical Sensor Networks

被引:13
|
作者
Lee, JoonYoung [1 ]
Oh, Jihyeon [1 ]
Park, Youngho [1 ,2 ]
机构
[1] Kyungpook Natl Univ, Sch Elect & Elect Engn, Daegu 41566, South Korea
[2] Kyungpook Natl Univ, Sch Elect Engn, Daegu 41566, South Korea
基金
新加坡国家研究基金会;
关键词
WMSN; PUF; biometrics; authentication; AVISPA; ROR; KEY EXCHANGE; SYSTEMS;
D O I
10.3390/electronics12061368
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Wireless medical sensor networks (WMSNs), a type of wireless sensor network (WSN), have enabled medical professionals to identify patients' health information in real time to identify and diagnose their conditions. However, since wireless communication is performed through an open channel, an attacker can steal or manipulate the transmitted and received information. Because these attacks are directly related to the patients' lives, it is necessary to prevent these attacks upfront by providing the security of WMSN communication. Although authentication protocols are continuously developed to establish the security of WMSN communication, they are still vulnerable to attacks. Recently, Yuanbing et al. proposed a secure authentication scheme for WMSN. They emphasized that their protocol is able to resist various attacks and can ensure mutual authentication. Unfortunately, this paper demonstrates that Yuanbing et al.'s protocol is vulnerable to smart card stolen attacks, ID/password guessing attacks, and sensor node capture attacks. In order to overcome the weaknesses and effectiveness of existing studies and to ensure secure communication and user anonymity of WMSN, we propose a secure and anonymous authentication protocol. The proposed protocol can prevent sensor capture, guessing, and man-in-the-middle attacks. To demonstrate the security of the proposed protocol, we perform various formal and informal analyses using AVISPA tools, ROR models, and BAN logic. Additionally, we compare the security aspects with related protocols to prove that the proposed protocol has excellent security. We also prove the effectiveness of our proposed protocol compared with related protocols in computation and communication costs. Our protocol has low or comparable computation and communication costs compared to related protocols. Thus, our protocol can provide services in the WMSN environment.
引用
收藏
页数:27
相关论文
共 50 条
  • [31] Anonymous three-factor authenticated key agreement for wireless sensor networks
    Yanrong Lu
    Guangquan Xu
    Lixiang Li
    Yixian Yang
    Wireless Networks, 2019, 25 : 1461 - 1475
  • [32] Anonymous three-factor authenticated key agreement for wireless sensor networks
    Lu, Yanrong
    Xu, Guangquan
    Li, Lixiang
    Yang, Yixian
    WIRELESS NETWORKS, 2019, 25 (04) : 1461 - 1475
  • [33] Cryptanalysis and Improvement of a Privacy-Preserving Three-Factor Authentication Protocol for Wireless Sensor Networks
    Renuka, Km
    Kumar, Sachin
    Kumari, Saru
    Chen, Chien-Ming
    SENSORS, 2019, 19 (21)
  • [34] Privacy Preserving Three-factor Authentication Protocol for Secure Message Forwarding in Wireless Body Area Networks
    Nyangaresi, Vincent Omollo
    AD HOC NETWORKS, 2023, 142
  • [35] An Improved Three-Factor User Authentication and Key Agreement Scheme for Wireless Medical Sensor Networks
    Chen, Ying
    Ge, Yangming
    Wang, Yerong
    Zeng, Zhuang
    IEEE ACCESS, 2019, 7 : 85440 - 85451
  • [36] A secure three-factor authentication scheme for multi-gateway wireless sensor networks based on elliptic curve cryptography
    Dai, Cong
    Xu, Zhongwei
    AD HOC NETWORKS, 2022, 127
  • [37] A Secure and Efficient User Anonymity-Preserving Three-Factor Authentication Protocol for Large-Scale Distributed Wireless Sensor Networks
    Ashok Kumar Das
    Wireless Personal Communications, 2015, 82 : 1377 - 1404
  • [39] Lightweight Three-Factor Authentication and Key Agreement Protocol for Internet-Integrated Wireless Sensor Networks
    Jiang, Qi
    Zeadally, Sherali
    Ma, Jianfeng
    He, Debiao
    IEEE ACCESS, 2017, 5 : 3376 - 3392
  • [40] Secure and Anonymous Three-Factor Authentication Scheme for Remote Healthcare Systems
    Alanazi, Munayfah
    Nashwan, Shadi
    COMPUTER SYSTEMS SCIENCE AND ENGINEERING, 2022, 42 (02): : 703 - 725