ISAKA: Improved Secure Authentication and Key Agreement protocol for WBAN

被引:5
|
作者
Alizadeh, Javad [1 ]
Safkhani, Masoumeh [2 ,3 ]
Allahdadi, Amir [1 ]
机构
[1] Imam Hossein Univ, Fac & Res Ctr Comp, Fath Ctr, Tehran, Iran
[2] Shahid Rajaee Teacher Training Univ, Comp Engn Dept, Tehran, Iran
[3] Inst Res Fundamental Sci IPM, Tehran, Iran
关键词
IoT; WBAN; AKA; Sensor node traceability attack; Impersonation attack; BAN logic; ProVerif tool; ANONYMOUS MUTUAL AUTHENTICATION; AREA; SCHEME;
D O I
10.1007/s11277-022-09844-2
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
Internet of Things (IoT) is a revolution which has influenced the lifestyle of human. Wireless Body Area Networks (WBAN)s are IoT-based applications which have a crucial role in the current healthcare systems. A WBAN is used to collect some health-related information of patients and transport and monitor them in a healthcare system. This information is crucial in the sense of the patient's life. Then the privacy of the patient and the security of his/her information are some main challenges in the WBAN. Another challenge in the WBAN is the resources limitation of the sensor nodes. This limitation imposes that a suitable scheme for the WBAN should be a lightweight one. In order to response these challenges, several lightweight Authentication and Key Agreement (AKA) schemes have been presented for WBAN so far. However, approximately none of them could reach their security and cost goals. In 2020, Narwal and Mohapatra proposed a claimed to be secure lightweight AKA protocol for WBAN named SEEMAKA. In this paper, we show that this scheme suffers from attacks including sensor node traceability, disclosure of the secret parameters of the sensor nodes and master nodes, sensor node impersonation, extracting the session key, and Denial of Service attacks. Besides that, we focus to overcome these vulnerabilities and present an improved version of SEEMAKA named ISAKA. ISAKA improves the security level and also the efficiency level of SEEMAKA. More precisely, ISAKA is safe against mentioned attacks and it improves ROM and RAM storage requirements and also computational and communication costs. We prove the security of ISAKA using two formal methods, i.e. BAN logic method and ProVerif tool.
引用
收藏
页码:2911 / 2935
页数:25
相关论文
共 50 条
  • [31] An efficient key agreement and authentication protocol for secure communication in industrial IoT applications
    R. Vinoth
    Lazarus Jegatha Deborah
    Journal of Ambient Intelligence and Humanized Computing, 2023, 14 : 1431 - 1443
  • [32] A lightweight and anonymous mutual authentication and key agreement scheme for WBAN
    Marandi, Saba
    Moazami, Farokhlagha
    Malekinezhad, Amir
    PEER-TO-PEER NETWORKING AND APPLICATIONS, 2024, 17 (04) : 2555 - 2571
  • [33] A lightweight anonymous mutual authentication and key agreement scheme for WBAN
    Xu, Zisang
    Xu, Cheng
    Chen, Haixian
    Yang, Fang
    CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2019, 31 (14):
  • [34] Secure Key Agreement and Authentication Protocol for Message Confirmation in Vehicular Cloud Computing
    Lee, JoonYoung
    Yu, SungJin
    Kim, MyeongHyun
    Park, YoungHo
    Lee, SangWoo
    Chung, BoHeung
    APPLIED SCIENCES-BASEL, 2020, 10 (18):
  • [35] Flexible Authentication Protocol with Key Reconstruction in WBAN Environments
    Fan, Chun-I
    Wang, Jian-Sheng
    Huang, Jheng-Jia
    Tseng, Yi-Fan
    Juang, Wen-Shenq
    Kikuchi, Hiroaki
    2016 6TH INTERNATIONAL CONFERENCE ON IT CONVERGENCE AND SECURITY (ICITCS 2016), 2016, : 220 - 224
  • [36] SAK-AKA: A Secure Anonymity Key of Authentication and Key Agreement protocol for LTE network
    Nashwan, Shadi
    INTERNATIONAL ARAB JOURNAL OF INFORMATION TECHNOLOGY, 2017, 14 (05) : 790 - 801
  • [37] A secure authenticated key agreement protocol
    Popescu, C
    MELECON 2004: PROCEEDINGS OF THE 12TH IEEE MEDITERRANEAN ELECTROTECHNICAL CONFERENCE, VOLS 1-3, 2004, : 783 - 786
  • [38] Secure Authentication and Key Agreement Protocol for Cloud-Assisted Industrial Internet of Things
    Hu, Huanhuan
    Liao, Longxia
    Zhao, Junhui
    ELECTRONICS, 2022, 11 (10)
  • [39] ES-AKA: An Efficient and Secure Authentication and Key Agreement Protocol for UMTS Networks
    Neetesh Saxena
    Jaya Thomas
    Narendra S. Chaudhari
    Wireless Personal Communications, 2015, 84 : 1981 - 2012
  • [40] S-AKA: A Provable and Secure Authentication Key Agreement Protocol for UMTS Networks
    Huang, Yu-Lun
    Shen, Chih-Ya
    Shieh, Shiuhpyng Winston
    IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2011, 60 (09) : 4509 - 4519