Abstract

Wireless Body Area Network (WBAN) is a promising field that may improve the quality of life by using it in patients’ health monitoring process. However, the mobility and open access of wireless networks have resulted in several security gaps which may lead to critical health-related data compromise issues. Therefore, there existed a need to develop a mechanism to secure patient health-related data from all security impairments. Recently, a lightweight authentication scheme that depends on the assumption that the base node is reliable is proposed. Nevertheless, it does not seem feasible practically. Hence, the researchers present a lightweight cryptographic scheme based on three levels that provide anonymous key agreement and authentication for the data communicated on the wireless channel. The proposed authentication scheme shows its efficiency to protect against various known cyber-attacks especially the base station compromise attack and sensor node impersonation attack. The scheme was formally verified with BAN logic and simulated informally using the Automated Validation of Internet Security Protocol and Applications (AVISPA) tool. The proposed key agreement and authentication scheme was also compared with the results of other related researches. The simulation results and security analysis indicate that the proposed improved scheme has overcome different identified gaps in terms of storage requirements, computational, and communicational costs.

Highlights

  • The enhancement in technology, especially the sensor network has opened the way to improve the quality of life by making remote monitoring of patients possible

  • ANALYSIS OF KOMPARA’S SCHEME After analysis of Kompara et al [1] scheme in detail, three types of attacks were under investigation in their model as follows: 1) Intermediate Node (IN) COMPROMISE ATTACK Referring to Fig 2, the role of IN in the said scheme is to relay all the communication received to Hub node (HN) and saves tuple

  • The first flaw is IN compromise attack which is caused by storing the identity idIN of IN that remain unchanged in the authentication process

Read more

Summary

INTRODUCTION

The enhancement in technology, especially the sensor network has opened the way to improve the quality of life by making remote monitoring of patients possible. Koya et al [23], proposed a hybrid scheme i.e. a blend of physiological features i.e., Electrocardiography (ECG) of a patient with the original scheme of Li et al [12], and resulted in an improved scheme but exposed an additional cost of acquiring data from sensors with synchronization as well.

PROBLEM IDENTIFICATION
RIVAL MODEL We assumed an adversary can perform the subsequent activities
PROPOSED AUTHENTICATION SCHEME
DISCUSSION
VIII. CONCLUSION AND FUTURE WORK
Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call