ISAKA: Improved Secure Authentication and Key Agreement protocol for WBAN

被引:5
|
作者
Alizadeh, Javad [1 ]
Safkhani, Masoumeh [2 ,3 ]
Allahdadi, Amir [1 ]
机构
[1] Imam Hossein Univ, Fac & Res Ctr Comp, Fath Ctr, Tehran, Iran
[2] Shahid Rajaee Teacher Training Univ, Comp Engn Dept, Tehran, Iran
[3] Inst Res Fundamental Sci IPM, Tehran, Iran
关键词
IoT; WBAN; AKA; Sensor node traceability attack; Impersonation attack; BAN logic; ProVerif tool; ANONYMOUS MUTUAL AUTHENTICATION; AREA; SCHEME;
D O I
10.1007/s11277-022-09844-2
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
Internet of Things (IoT) is a revolution which has influenced the lifestyle of human. Wireless Body Area Networks (WBAN)s are IoT-based applications which have a crucial role in the current healthcare systems. A WBAN is used to collect some health-related information of patients and transport and monitor them in a healthcare system. This information is crucial in the sense of the patient's life. Then the privacy of the patient and the security of his/her information are some main challenges in the WBAN. Another challenge in the WBAN is the resources limitation of the sensor nodes. This limitation imposes that a suitable scheme for the WBAN should be a lightweight one. In order to response these challenges, several lightweight Authentication and Key Agreement (AKA) schemes have been presented for WBAN so far. However, approximately none of them could reach their security and cost goals. In 2020, Narwal and Mohapatra proposed a claimed to be secure lightweight AKA protocol for WBAN named SEEMAKA. In this paper, we show that this scheme suffers from attacks including sensor node traceability, disclosure of the secret parameters of the sensor nodes and master nodes, sensor node impersonation, extracting the session key, and Denial of Service attacks. Besides that, we focus to overcome these vulnerabilities and present an improved version of SEEMAKA named ISAKA. ISAKA improves the security level and also the efficiency level of SEEMAKA. More precisely, ISAKA is safe against mentioned attacks and it improves ROM and RAM storage requirements and also computational and communication costs. We prove the security of ISAKA using two formal methods, i.e. BAN logic method and ProVerif tool.
引用
收藏
页码:2911 / 2935
页数:25
相关论文
共 50 条
  • [21] An improved Secure Authenticated Group Key Agreement Protocol for WMNs
    Jin, Zhen-Ai
    Park, Geum-Dal
    Yoo, Kee-Young
    ALPIT 2008: SEVENTH INTERNATIONAL CONFERENCE ON ADVANCED LANGUAGE PROCESSING AND WEB INFORMATION TECHNOLOGY, PROCEEDINGS, 2008, : 412 - +
  • [22] An efficient provably secure authentication and key agreement protocol for satellite communication networks
    Thakur, Garima
    Obaidat, Mohammad S.
    Sharma, Piyush
    Prajapat, Sunil
    Kumar, Pankaj
    SECURITY AND PRIVACY, 2024, 7 (05)
  • [23] A Lightweight, Efficient, and Physically Secure Key Agreement Authentication Protocol for Vehicular Networks
    Wang, Shaoqiang
    Fan, Ziyao
    Su, Yu
    Zheng, Baosen
    Liu, Zhaoyuan
    Dai, Yinfei
    ELECTRONICS, 2024, 13 (08)
  • [24] A Lightweight Authentication and Key Agreement Protocol for Secure Fog-to-Fog Collaboration
    Ogundoyin, Sunday Oyinlola
    Kamil, Ismaila Adeniyi
    2021 IEEE INTERNATIONAL MEDITERRANEAN CONFERENCE ON COMMUNICATIONS AND NETWORKING (IEEE MEDITCOM 2021), 2021, : 348 - 353
  • [25] A Provably Secure Identity-based Authentication Multiple Key Agreement Protocol
    Tan Zuowen
    CHINA COMMUNICATIONS, 2011, 8 (02) : 26 - 33
  • [26] A secure and efficient authentication and key agreement protocol in blockchain-enabled VANETs
    Shahparian, J.
    Erfani, S. H.
    Zamanifar, A.
    COMPUTERS & ELECTRICAL ENGINEERING, 2025, 122
  • [27] A new provably secure authentication and key agreement protocol for SIP using ECC
    Wu, Liufei
    Zhang, Yuqing
    Wang, Fengjiao
    COMPUTER STANDARDS & INTERFACES, 2009, 31 (02) : 286 - 291
  • [28] An efficient key agreement and authentication protocol for secure communication in industrial IoT applications
    Vinoth, R.
    Deborah, Lazarus Jegatha
    JOURNAL OF AMBIENT INTELLIGENCE AND HUMANIZED COMPUTING, 2021, 14 (3) : 1431 - 1443
  • [29] Enhancing Cybersecurity for LDACS: a Secure and Lightweight Mutual Authentication and Key Agreement Protocol
    Khan, Suleman
    Gaba, Gurjot Singh
    Gurtov, Andrei
    Maeurer, Nils
    Graeupl, Thomas
    Schmitt, Corinna
    2023 IEEE/AIAA 42ND DIGITAL AVIONICS SYSTEMS CONFERENCE, DASC, 2023,
  • [30] A Lightweight Secure User Authentication and Key Agreement Protocol for Wireless Sensor Networks
    Mo, Jiaqing
    Chen, Hang
    SECURITY AND COMMUNICATION NETWORKS, 2019, 2019