ISAKA: Improved Secure Authentication and Key Agreement protocol for WBAN

被引:5
|
作者
Alizadeh, Javad [1 ]
Safkhani, Masoumeh [2 ,3 ]
Allahdadi, Amir [1 ]
机构
[1] Imam Hossein Univ, Fac & Res Ctr Comp, Fath Ctr, Tehran, Iran
[2] Shahid Rajaee Teacher Training Univ, Comp Engn Dept, Tehran, Iran
[3] Inst Res Fundamental Sci IPM, Tehran, Iran
关键词
IoT; WBAN; AKA; Sensor node traceability attack; Impersonation attack; BAN logic; ProVerif tool; ANONYMOUS MUTUAL AUTHENTICATION; AREA; SCHEME;
D O I
10.1007/s11277-022-09844-2
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
Internet of Things (IoT) is a revolution which has influenced the lifestyle of human. Wireless Body Area Networks (WBAN)s are IoT-based applications which have a crucial role in the current healthcare systems. A WBAN is used to collect some health-related information of patients and transport and monitor them in a healthcare system. This information is crucial in the sense of the patient's life. Then the privacy of the patient and the security of his/her information are some main challenges in the WBAN. Another challenge in the WBAN is the resources limitation of the sensor nodes. This limitation imposes that a suitable scheme for the WBAN should be a lightweight one. In order to response these challenges, several lightweight Authentication and Key Agreement (AKA) schemes have been presented for WBAN so far. However, approximately none of them could reach their security and cost goals. In 2020, Narwal and Mohapatra proposed a claimed to be secure lightweight AKA protocol for WBAN named SEEMAKA. In this paper, we show that this scheme suffers from attacks including sensor node traceability, disclosure of the secret parameters of the sensor nodes and master nodes, sensor node impersonation, extracting the session key, and Denial of Service attacks. Besides that, we focus to overcome these vulnerabilities and present an improved version of SEEMAKA named ISAKA. ISAKA improves the security level and also the efficiency level of SEEMAKA. More precisely, ISAKA is safe against mentioned attacks and it improves ROM and RAM storage requirements and also computational and communication costs. We prove the security of ISAKA using two formal methods, i.e. BAN logic method and ProVerif tool.
引用
收藏
页码:2911 / 2935
页数:25
相关论文
共 50 条
  • [1] ISAKA: Improved Secure Authentication and Key Agreement protocol for WBAN
    Javad Alizadeh
    Masoumeh Safkhani
    Amir Allahdadi
    Wireless Personal Communications, 2022, 126 : 2911 - 2935
  • [2] A provably secure and efficient anonymous mutual authentication and key agreement protocol for wearable devices in WBAN
    Gupta, Ankur
    Tripathi, Meenakshi
    Sharma, Aakar
    COMPUTER COMMUNICATIONS, 2020, 160 : 311 - 325
  • [3] An efficient key agreement protocol for secure authentication
    Kim, YS
    Huh, EN
    Hwang, J
    Lee, BW
    COMPUTATIONAL SCIENCE AND ITS APPLICATIONS - ICCSA 2004, PT 1, 2004, 3043 : 746 - 754
  • [4] Improved Adaptive Protocol for Authentication and Key Agreement
    Shalmany, Nasibeh Alijanpour
    Rahbar, Akbar Ghaffar Pour
    2008 INTERNATIONAL SYMPOSIUM ON TELECOMMUNICATIONS, VOLS 1 AND 2, 2008, : 1 - 6
  • [5] Improved quantum key agreement protocol with authentication
    郭继红
    柏明强
    雷小燕
    谢佳欣
    莫智文
    ChinesePhysicsB, 2023, 32 (05) : 356 - 361
  • [6] Improved quantum key agreement protocol with authentication
    Guo, Ji-Hong
    Bai, Ming-Qiang
    Lei, Xiao-Yan
    Xie, Jia-Xin
    Mo, Zhi-Wen
    CHINESE PHYSICS B, 2023, 32 (05)
  • [7] Secure and Efficient Certificateless Authentication Key Agreement Protocol in VANET
    Wei, Guoheng
    Qin, Yanlin
    Fu, Wei
    EMERGING INFORMATION SECURITY AND APPLICATIONS, EISA 2022, 2022, 1641 : 160 - 172
  • [8] Highly secure authentication and key agreement protocol for the internet of vehicles
    Li, Li
    Fan, Xingjuan
    Zhi, Boyuan
    Li, Shaojun
    Dabollahi, Seyyed Amirreza
    TELECOMMUNICATION SYSTEMS, 2024, 87 (01) : 73 - 88
  • [9] SAKA: a secure authentication and key agreement protocol for GSM networks
    Neetesh Saxena
    Narendra S. Chaudhari
    CSI Transactions on ICT, 2013, 1 (4) : 331 - 341
  • [10] A lightweight and flexible mutual authentication and key agreement protocol for wearable sensing devices in WBAN
    Thota, Sandeep Kumar Reddy
    Mala, C.
    Krishnan, Geetha
    INTERNATIONAL JOURNAL OF PERVASIVE COMPUTING AND COMMUNICATIONS, 2024, 20 (04) : 398 - 414