ISAKA: Improved Secure Authentication and Key Agreement protocol for WBAN

被引:5
|
作者
Alizadeh, Javad [1 ]
Safkhani, Masoumeh [2 ,3 ]
Allahdadi, Amir [1 ]
机构
[1] Imam Hossein Univ, Fac & Res Ctr Comp, Fath Ctr, Tehran, Iran
[2] Shahid Rajaee Teacher Training Univ, Comp Engn Dept, Tehran, Iran
[3] Inst Res Fundamental Sci IPM, Tehran, Iran
关键词
IoT; WBAN; AKA; Sensor node traceability attack; Impersonation attack; BAN logic; ProVerif tool; ANONYMOUS MUTUAL AUTHENTICATION; AREA; SCHEME;
D O I
10.1007/s11277-022-09844-2
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
Internet of Things (IoT) is a revolution which has influenced the lifestyle of human. Wireless Body Area Networks (WBAN)s are IoT-based applications which have a crucial role in the current healthcare systems. A WBAN is used to collect some health-related information of patients and transport and monitor them in a healthcare system. This information is crucial in the sense of the patient's life. Then the privacy of the patient and the security of his/her information are some main challenges in the WBAN. Another challenge in the WBAN is the resources limitation of the sensor nodes. This limitation imposes that a suitable scheme for the WBAN should be a lightweight one. In order to response these challenges, several lightweight Authentication and Key Agreement (AKA) schemes have been presented for WBAN so far. However, approximately none of them could reach their security and cost goals. In 2020, Narwal and Mohapatra proposed a claimed to be secure lightweight AKA protocol for WBAN named SEEMAKA. In this paper, we show that this scheme suffers from attacks including sensor node traceability, disclosure of the secret parameters of the sensor nodes and master nodes, sensor node impersonation, extracting the session key, and Denial of Service attacks. Besides that, we focus to overcome these vulnerabilities and present an improved version of SEEMAKA named ISAKA. ISAKA improves the security level and also the efficiency level of SEEMAKA. More precisely, ISAKA is safe against mentioned attacks and it improves ROM and RAM storage requirements and also computational and communication costs. We prove the security of ISAKA using two formal methods, i.e. BAN logic method and ProVerif tool.
引用
收藏
页码:2911 / 2935
页数:25
相关论文
共 50 条
  • [41] SLAKA-IoD: A Secure and Lightweight Authentication and Key Agreement Protocol for Internet of Drones
    Xiao, Yuelei
    Tao, Yu
    DRONES, 2024, 8 (08)
  • [42] Provably secure biometric based authentication and key agreement protocol for wireless sensor networks
    Srinivas, Jangirala
    Mishra, Dheerendra
    Mukhopadhyay, Sourav
    Kumari, Saru
    JOURNAL OF AMBIENT INTELLIGENCE AND HUMANIZED COMPUTING, 2018, 9 (04) : 875 - 895
  • [43] An efficient and secure authentication and key agreement scheme for session initiation protocol using ECC
    Hamed Arshad
    Morteza Nikooghadam
    Multimedia Tools and Applications, 2016, 75 : 181 - 197
  • [44] ES-AKA: An Efficient and Secure Authentication and Key Agreement Protocol for UMTS Networks
    Saxena, Neetesh
    Thomas, Jaya
    Chaudhari, Narendra S.
    WIRELESS PERSONAL COMMUNICATIONS, 2015, 84 (03) : 1981 - 2012
  • [45] A secure and effcient mutual authentication and key agreement protocol with smart cards for wireless communications
    Guo, Cheng
    Chang, Chin-Chen
    Chang, Shih-Chang
    International Journal of Network Security, 2018, 20 (02) : 323 - 331
  • [46] Provably secure biometric based authentication and key agreement protocol for wireless sensor networks
    Jangirala Srinivas
    Dheerendra Mishra
    Sourav Mukhopadhyay
    Saru Kumari
    Journal of Ambient Intelligence and Humanized Computing, 2018, 9 : 875 - 895
  • [47] An efficient and secure authentication and key agreement scheme for session initiation protocol using ECC
    Arshad, Hamed
    Nikooghadam, Morteza
    MULTIMEDIA TOOLS AND APPLICATIONS, 2016, 75 (01) : 181 - 197
  • [48] An improved three-factor authentication and key agreement protocol for smart grid
    Qi M.
    Journal of Ambient Intelligence and Humanized Computing, 2023, 14 (12) : 16465 - 16476
  • [49] A cocktail protocol with the Authentication and Key Agreement on the UMTS
    Ou, Hsia-Hung
    Hwang, Min-Shiang
    Jan, Jinn-Ke
    JOURNAL OF SYSTEMS AND SOFTWARE, 2010, 83 (02) : 316 - 325
  • [50] An authentication and key agreement protocol for satellite communications
    Chang, Chin-Chen
    Cheng, Ting-Fang
    Wu, Hsiao-Ling
    INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2014, 27 (10) : 1994 - 2006