An anonymous mutual authentication and key agreement scheme in WMSN using physiological data

IF 2.1 4区 计算机科学 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Wireless Networks Pub Date : 2024-03-06 DOI:10.1007/s11276-024-03690-9
Shanvendra Rai, Rituparna Paul, Subhasish Banerjee, Preetisudha Meher
{"title":"An anonymous mutual authentication and key agreement scheme in WMSN using physiological data","authors":"Shanvendra Rai, Rituparna Paul, Subhasish Banerjee, Preetisudha Meher","doi":"10.1007/s11276-024-03690-9","DOIUrl":null,"url":null,"abstract":"<p>Wireless medical sensor network (WMSN) is an application of the Internet of Things (IoT) that plays a very important role in today’s era for the healthcare industry, especially after the COVID-19 pandemic. To maintain the security and privacy of the real-time health information of the users or patients, the proper mutual authentication and key agreement (AKA) is the foremost necessity. In this context, Shadi Nashwan proposed an end-to-end authentication scheme for a healthcare IoT system i.e. WMSN, and claimed that their scheme could resist so many existing possible threats and could maintain a low computational cost too. Unfortunately, during this research, it is found that their scheme can be threatened by eavesdropping and jamming/desynchronization attacks and have many computational flaws, as well. Moreover, they also assumed that the gateway node (GWN) is always trustworthy, but in reality, it is not always feasible, as the GWN may act as a local server. Hence, in this article, a new AKA scheme has been proposed using the user’s physiological information like ECG data in order to make the WMSN more secure and reliable. In addition, the proposed scheme can resist many well-known threats like GWN spoofing attack, key escrow problem and can guard against GWN stolen database problem, also. To proof the superiority of the proposed scheme, the informal and formal security analysis have been performed using automated validation of internet security protocols and applications (i.e. AVISPA) and Burrows–Abadi–Needham (BAN) logic, respectively. Based on the comparative study with existing schemes concerning security features, computational and communicational cost, and storage requirement; the proposed scheme can perform better than the existing schemes and well suitable for practical implementations.</p>","PeriodicalId":23750,"journal":{"name":"Wireless Networks","volume":"31 1","pages":""},"PeriodicalIF":2.1000,"publicationDate":"2024-03-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Wireless Networks","FirstCategoryId":"94","ListUrlMain":"https://doi.org/10.1007/s11276-024-03690-9","RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q3","JCRName":"COMPUTER SCIENCE, INFORMATION SYSTEMS","Score":null,"Total":0}
引用次数: 0

Abstract

Wireless medical sensor network (WMSN) is an application of the Internet of Things (IoT) that plays a very important role in today’s era for the healthcare industry, especially after the COVID-19 pandemic. To maintain the security and privacy of the real-time health information of the users or patients, the proper mutual authentication and key agreement (AKA) is the foremost necessity. In this context, Shadi Nashwan proposed an end-to-end authentication scheme for a healthcare IoT system i.e. WMSN, and claimed that their scheme could resist so many existing possible threats and could maintain a low computational cost too. Unfortunately, during this research, it is found that their scheme can be threatened by eavesdropping and jamming/desynchronization attacks and have many computational flaws, as well. Moreover, they also assumed that the gateway node (GWN) is always trustworthy, but in reality, it is not always feasible, as the GWN may act as a local server. Hence, in this article, a new AKA scheme has been proposed using the user’s physiological information like ECG data in order to make the WMSN more secure and reliable. In addition, the proposed scheme can resist many well-known threats like GWN spoofing attack, key escrow problem and can guard against GWN stolen database problem, also. To proof the superiority of the proposed scheme, the informal and formal security analysis have been performed using automated validation of internet security protocols and applications (i.e. AVISPA) and Burrows–Abadi–Needham (BAN) logic, respectively. Based on the comparative study with existing schemes concerning security features, computational and communicational cost, and storage requirement; the proposed scheme can perform better than the existing schemes and well suitable for practical implementations.

Abstract Image

查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
使用生理数据的 WMSN 匿名相互认证和密钥协议方案
无线医疗传感器网络(WMSN)是物联网(IoT)的一种应用,在当今时代的医疗保健行业扮演着非常重要的角色,尤其是在 COVID-19 大流行之后。要维护用户或患者实时健康信息的安全和隐私,最重要的是要有适当的相互验证和密钥协议(AKA)。在此背景下,沙迪-纳什万(Shadi Nashwan)为医疗物联网系统(即 WMSN)提出了一种端到端身份验证方案,并声称他们的方案可以抵御许多现有的可能威胁,而且还能保持较低的计算成本。遗憾的是,在这项研究中,人们发现他们的方案可能会受到窃听和干扰/不同步攻击的威胁,而且在计算上也存在很多缺陷。此外,他们还假设网关节点(GWN)始终是可信的,但在现实中,这并不总是可行的,因为网关节点可能充当本地服务器。因此,本文利用用户的生理信息(如心电图数据)提出了一种新的 AKA 方案,以使 WMSN 更加安全可靠。此外,所提出的方案还能抵御许多众所周知的威胁,如 GWN 欺骗攻击、密钥托管问题,并能防范 GWN 数据库被盗问题。为了证明所提方案的优越性,我们分别使用互联网安全协议和应用自动验证(即 AVISPA)和 Burrows-Abadi-Needham (BAN) 逻辑进行了非正式和正式的安全分析。根据与现有方案在安全特性、计算和通信成本以及存储要求方面的比较研究,拟议方案的性能优于现有方案,非常适合实际应用。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
Wireless Networks
Wireless Networks 工程技术-电信学
CiteScore
7.70
自引率
3.30%
发文量
314
审稿时长
5.5 months
期刊介绍: The wireless communication revolution is bringing fundamental changes to data networking, telecommunication, and is making integrated networks a reality. By freeing the user from the cord, personal communications networks, wireless LAN''s, mobile radio networks and cellular systems, harbor the promise of fully distributed mobile computing and communications, any time, anywhere. Focusing on the networking and user aspects of the field, Wireless Networks provides a global forum for archival value contributions documenting these fast growing areas of interest. The journal publishes refereed articles dealing with research, experience and management issues of wireless networks. Its aim is to allow the reader to benefit from experience, problems and solutions described.
期刊最新文献
An EEG signal-based music treatment system for autistic children using edge computing devices A DV-Hop localization algorithm corrected based on multi-strategy sparrow algorithm in sea-surface wireless sensor networks Multi-Layer Collaborative Federated Learning architecture for 6G Open RAN Cloud-edge collaboration-based task offloading strategy in railway IoT for intelligent detection Exploiting data transmission for route discoveries in mobile ad hoc networks
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1