Abstract
As a significant part of the Internet of Things (IoT), Wireless Body Area Network (WBAN) has attract much attention in this years. In WBANs, sensors placed in or around the human body collect the sensitive data of the body and transmit it through an open wireless channel in which the messages may be intercepted, modified, etc. Recently, Wang et al. presented a new anonymous authentication scheme for WBANs and claimed that their scheme can solve the security problems in the previous schemes. Unfortunately, we demonstrate that their scheme cannot withstand impersonation attack. Either an adversary or a malicious legal client could impersonate another legal client to the application provider. In this paper, we give the detailed weakness analysis of Wang et al.’s scheme at first. Then we present a novel anonymous authentication scheme for WBANs and prove that it’s secure under a random oracle model. At last, we demonstrate that our presented anonymous authentication scheme for WBANs is more suitable for practical application than Wang et al.’s scheme due to better security and performance. Compared with Wang et al.’s scheme, the computation cost of our scheme in WBANs has reduced by about 31.58 %.
Similar content being viewed by others
References
Movassaghi, S., Abolhasan, M., Lipman, J., Smith, D., and Jamalipour, A., Wireless body area networks: A survey. IEEE Commun. Surv. Tutorials 16(3):1658–1686, 2014.
Feng, Z., Liu, C., Guan, X., and Mor, V., China’s rapidly aging population creates policy challenges in shaping a viable long-term care system. Health Aff. 31(12):2764–2773, 2012.
Zimmerman, T. G., Personal area networks: near-field intrabody communication. IBM Syst. J. 35(3.4):609–617, 1996.
IEEE standard for local and metropolitan area networks: Part 15.6:Wireless body area networks. IEEE, 2012.
Wang, C., and Zhang, Y., New authentication scheme for wireless body area networks using the bilinear pairing. J. Med. Syst. 39(11):1–8, 2015.
Li, X., Ma, J., Wang, W., Xiong, Y., and Zhang, J., A novel smart card and dynamic ID based remote user authentication scheme for multi-server environments. Math. Comput. Model. 58(1):85–95, 2013.
Li, X., Niu, J., Khan, M. K., and Liao, J., An enhanced smart card based remote user password authentication scheme. J. Netw. Comput. Appl. 36(5):1365–1371, 2013.
Li, X., Niu, J., Kumari, S., Liao, J., Liang, W., and Khan, M. K., A new authentication protocol for healthcare applications using wireless medical sensor networks with user anonymity. Secur. Commun. Netw. 2014. doi:10.1002/sec.1214.
Li, X., Niu, J., Wang, Z., and Chen, C., Applying biometrics to design three‐factor remote user authentication scheme with key agreement. Secur. Commun. Netw. 7(10):1488–1497, 2014.
Rivest, R. L., Shamir, A., and Adleman, L., A method for obtaining digital signatures and public-key cryptosystems. Commun. ACM 21(2):120–126, 1978.
ElGamal, T., A public key cryptosystem and a signature scheme based on discrete logarithms. Crypto 84:10–18, 1984.
He, D., Kumar, N., Shen, H., and Lee, J., One-to-many authentication for access control in mobile pay-TV systems. Sci. China Inf. Sci. 2015. doi:10.1007/s11432-015-5469-5.
Jia, Z., Zhang, Y., Shao, H., Lin, Y., and Wang, J., A remote user authentication scheme using bilinear pairings and ECC. In: Sixth International Conference on Intelligent Systems Design and Applications, pp. 1091–1094, 2006.
Jiang, C., Li, B., & Xu, H., An efficient scheme for user authentication in wireless sensor networks. In: 21st International Conference on Advanced Information Networking and Applications Workshops, pp. 438–442, 2007.
Liao, Y. P., and Wang, S. S., A secure and efficient scheme of remote user authentication based on bilinear pairings. In: TENCON 2007–2007 I.E. Region 10 Conference (pp. 1–4). IEEE, 2007.
Abi-char, P. E., Mhamed, A., and El-Hassan, B., A fast and secure elliptic curve based authenticated key agreement protocol for low power mobile communications. In Next Generation Mobile Applications, Services and Technologies, 2007. NGMAST’07. The 2007 International Conference on (pp. 235–240). IEEE, 2007.
Chen, Z. G., and Song, X. X., A distributed electronic authentication scheme based on elliptic curve. In: 2007 International Conference on Machine Learning and Cybernetics, pp. 2179–2182, 2007.
Miller, V. S., Use of elliptic curves in cryptography. In: Proceedings of CRYPTO’85. pp. 417–426, 1985.
Koblitz, N., Elliptic curve cryptosystems. Math. Comput. 48(177):203–209, 1987.
Yang, J. H., and Chang, C. C., An ID-based remote mutual authentication with key agreement scheme for mobile devices on elliptic curve cryptosystem. Comput. Secur. 28(3):138–143, 2009.
Cao, X., Zeng, X., Kou, W., and Hu, L., Identity-based anonymous remote authentication for value-added services in mobile networks. IEEE Trans. Veh. Technol. 58(7):3508–3517, 2009.
Huang, X., Xiang, Y., Bertino, E., Zhou, J., and Xu, L., Robust multi-factor authentication for fragile communications. IEEE Trans. Dependable Secure Comput. 11(6):568–581, 2014.
Huang, X., Xiang, Y., Chonka, A., Zhou, J., and Deng, R., A generic framework for three-factor authentication: Preserving security and privacy in distributed systems. IEEE Trans. Parallel Distrib. Syst. 22(8):1390–1397, 2011.
Islam, S. H., and Biswas, G. P., A more efficient and secure ID-based remote mutual authentication with key agreement scheme for mobile devices on elliptic curve cryptosystem. J. Syst. Softw. 84(11):1892–1898, 2011.
He, D., Zeadally, S., Kumar, N., and Lee, J., Anonymous authentication for wireless body area networks with provable security. IEEE Syst. J. 2016. doi:10.1109/JSYST.2016.2544805.
Shamir, A., Identity-based cryptosystems and signature schemes. Crypto 84:47–53, 1984.
Liu, J., Zhang, Z., Chen, X., and Kwak, K. S., Certificateless remote anonymous authentication schemes for wireless body area networks. IEEE Trans. Parallel Distrib. Syst. 25(2):332–342, 2014.
Zhao, Z., An efficient anonymous authentication scheme for wireless body area networks using elliptic curve cryptosystem. J. Med. Syst. 38(2):1–7, 2014.
He, D., Zeadally, S., Xu, B., and Huang, X., An efficient identity-based conditional privacy-preserving authentication scheme for vehicular ad-hoc networks. IEEE Trans. Inf. Forensics Secur. 10(12):1681–2691, 2015.
Tsai, J. L., and Lo, N. W., A privacy-aware authentication scheme for distributed mobile cloud computing services. IEEE Syst. J. 9(3):805–815, 2015.
Shunmuganathan, S., Saravanan, R. D., and Palanichamy, Y., Secure and efficient smart-card-based remote user authentication scheme for multiserver environment. Can. J. Electr. Comput. Eng. 38(1):20–30, 2015.
Li, X., Niu, J., Kumari, S., Liao, J., and Liang, W., An enhancement of a smart card authentication scheme for multi-server architecture. Wirel. Pers. Commun. 80(1):175–192, 2015.
Shi, L., Yuan, J., Yu, S., and Li, M., ASK-BAN: authenticated secret key extraction utilizing channel characteristics for body area networks. In: Proceedings of the sixth ACM conference on Security and privacy in wireless and mobile networks (pp. 155–166). ACM, 2013.
Bellare, M., Pointcheval, D., and Rogaway, P., Authenticated key exchange secure against dictionary attacks. In: Advances in cryptology—EUROCRYPT 2000 (pp. 139–155). Berlin: Springer, 2000.
Choon, J. C., and Cheon, J. H., An identity-based signature from gap Diffie-Hellman groups. In: Public key cryptography—PKC 2003 (pp. 18–30). Berlin: Springer, 2003.
Pointcheval, D., and Stern, J., Security arguments for digital signatures and blind signatures. J. Cryptol. 13(3):361–396, 2000.
Xiong, X., Wong, D. S., & Deng, X., TinyPairing: a fast and lightweight pairing-based cryptographic library for wireless sensor networks. In: Wireless Communications and Networking Conference (WCNC), 2010 I.E. (pp. 1–6). IEEE, 2010.
Acknowledgments
The authors thank Dr. Jesse M Ehrenfeld and the anonymous reviewer for their valuable comments. This research was supported by the National Natural Science Foundation of China (nos. 61272112, 61472287, 61402339, 61572370), Key project of Natural Science Foundation of Hubei Province (No.2015CFA068), the Project Funded by the Priority Academic Program Development of Jiangsu Higher Education Institutions (PAPD) and the Jiangsu Collaborative Innovation Center on Atmospheric Environment and Equipment Technology (CICAEET).
Author information
Authors and Affiliations
Corresponding author
Ethics declarations
Conflict of Interest
The authors declare that they have no conflict of interest.
Additional information
This article is part of the Topical Collection on Systems-Level Quality Improvement
Rights and permissions
About this article
Cite this article
Wu, L., Zhang, Y., Li, L. et al. Efficient and Anonymous Authentication Scheme for Wireless Body Area Networks. J Med Syst 40, 134 (2016). https://doi.org/10.1007/s10916-016-0491-8
Received:
Accepted:
Published:
DOI: https://doi.org/10.1007/s10916-016-0491-8