Skip to main content
Log in

Implicit authentication protocol and self-healing key management for WBANs

  • Published:
Multimedia Tools and Applications Aims and scope Submit manuscript

Abstract

In recent years, the rapid development of computer science and technology brings health care into the information era. As a typical representation, wireless body area networks (WBANs) has also promoted the development of medical technology into a higher field. However, collecting data from users seriously affects personal privacy and security, that WBANs needs to overcome. In order to resolve the flaws of the existing secure authentication protocols in WBANs, we propose a lightweight implicit authentication protocol based on the Elliptic Curve Qu-Vantone (ECQV) algorithm. Moreover, we take advantage of the bidirectional key chain to design a group key management protocol between the personal digital assistance (PDA) and each of cluster head sensor nodes. The security and performance analysis show that our protocol can be performed with perfect forward security and backward security in data communication. In addition, the experimental simulation and theoretic analysis show that our protocol is more suitable for WBANs.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5

Similar content being viewed by others

References

  1. Alsadhan A, Khan N (2013) An lbp based key management for secure wireless body area network (wban). In: Acis international conference on software engineering, artificial intelligence, NETWORKING and parallel/distributed computing, pp 85–88

  2. Al-Ayyoub M, AlZu’bi S, Jararweh Y, Shehab M, Gupta BB (2016) Accelerating 3d medical volume segmentation using gpus. 20:12. https://doi.org/10.1007/s11042-016-4218-0

  3. AL-Qurishi M, Rahman SMM, Hossain M, Almogren A, Alrubaian M, Alamri A, Gupta BB (2017) An efficient key agreement protocol for sybil-precaution in online social network 08. https://doi.org/10.1016/j.future.2017.07.055

  4. Atat R, Liu L, Chen H, Wu J, Li H, Yi Y (2017) Enabling cyber-physical communication in 5g cellular networks: challenges, spatial spectrum sensing, and cyber-security. IET Cyber-Physical Systems: Theory & Applications 2(1):49–54. https://doi.org/10.1049/iet-cps.2017.0010

    Google Scholar 

  5. Bao SD, Zhang YT (2006) A design proposal of security architecture for medical body sensor networks. In: International workshop on wearable and implantable body sensor networks, pp 87–90

  6. Bao SD, Zhang YT, Shen LF (2005) Physiological signal based entity authentication for body area sensor networks and mobile healthcare systems. In: International conference of the engineering in medicine & biology society, pp 2455–2458

  7. Brown DRL, Gallant R, Vanstone SA (2000) Provably secure implicit certificate schemes. Lect Notes Comput Sci 76:156–165

    MATH  Google Scholar 

  8. Cao H, Leung V, Chow C, Chan H (2010) Enabling technologies for wireless body area networks: a survey and outlook. IEEE Commun Mag 47(12):84–93

    Article  Google Scholar 

  9. Dutta R, Ee CC, Mukhopadhyay S (2007) Efficient self-healing key distribution with revocation for wireless sensor networks using one way key chains. Lect Notes Comput Sci 4521:385–400

    Article  MATH  Google Scholar 

  10. Elmisery AM, Sertovic M (2017) Privacy enhanced cloud-based recommendation service for implicit discovery of relevant support groups in healthcare social networks. International Journal of Grid and High Performance Computing 9:17. https://doi.org/10.4018/IJGHPC.2017010107

    Article  Google Scholar 

  11. Elmisery AM, Rho S, Botvich D (2016) Privacy-enhanced middleware for location-based sub-community discovery in implicit social groups. J Supercomput 72 (1):1–28

    Article  Google Scholar 

  12. Gupta BB, Agrawal DP, Yamaguchi S (2016) Handbook of research on modern cryptographic solutions for computer and cyber security. https://doi.org/10.4018/978-1-5225-0105-3

  13. Gupta BB, Agrawal D, Yamaguchi S (2016) Handbook of research on modern cryptographic solutions for computer and cyber security 05. https://doi.org/10.4018/978-1-5225-0105-3

  14. Gura N, Patel A, Wander A, Eberle H, Shantz SC (2004) Comparing elliptic curve cryptography and rsa on 8-bit cpus. Lect Notes Comput Sci 3156:119–132

    Article  MATH  Google Scholar 

  15. Hankerson D, Vanstone S, Menezes A (2015) Guide to elliptic curve cryptography. IEEE INFOCOM and International Journal of Advanced Intelligence Paradigms 22(03):xx, 311

    MATH  Google Scholar 

  16. He D, Zeadally S, Kumar N, Lee JH (2016) Anonymous authentication for wireless body area networks with provable security. IEEE Syst J 11:1–12

    Article  Google Scholar 

  17. Hu C, Cheng X, Zhang F, Wu D (2013) Opfka: secure and efficient ordered-physiological-feature-based key agreement for wireless body area networks. IEEE INFOCOM and International Journal of Advanced Intelligence Paradigms 12(11):2274–2282

    Google Scholar 

  18. Jiang Y, Lin C, Shi M, Shen X (2007) Self-healing group key distribution with time-limited node revocation for wireless sensor networks. IEEE Wirel Commun 5(1):14–23

    Google Scholar 

  19. Jiang Q, Lian X, Yang C, Ma J, Tian Y, Yang Y (2016) A bilinear pairing based anonymous authentication scheme in wireless body area networks for mhealth. J Med Syst 40(11):231

    Article  Google Scholar 

  20. Jouini M, Ben Arfa Rabai L (2016) A security framework for secure cloud computing environments. International Journal of Cloud Applications & Computing 6 (3):32–44

    Article  Google Scholar 

  21. Keoh SL (2011) Efficient group key management and authentication for body sensor networks. In: IEEE international conference on communications, pp 1–6

  22. Keoh SL, Lupu E, Sloman M (2009) Securing body sensor networks: sensor association and key management. In: IEEE international conference on pervasive computing and communications , pp 1–6

  23. Khan P, Hussain A, Kwak KS (2009) Medical applications of wireless body area networks. WSN 3:185–193

    Google Scholar 

  24. Lauter K (2004) The advantages of elliptic curve cryptography for wireless security. IEEE Wirel Commun 11(1):62–67

    Article  Google Scholar 

  25. Li M, Yu S, Lou W, Ren K (2010) Group device pairing based secure sensor association and key management for body area networks. In: Proceedings - IEEE INFOCOM 2651–2659

  26. Li J, Yu C, Gupta BB, Ren X (2017) Color image watermarking scheme based on quaternion hadamard transform and schur decomposition. Multimedia Tools & Applications 1–17

  27. Liu A, Ning P (2008) Tinyecc: a configurable library for elliptic curve cryptography in wireless sensor networks. In: 2008 international conference on information processing in sensor networks, pp 245–256

  28. Liu D, Ning P, Sun K (2003) Efficient self-healing group key distribution with revocation capability. In: Acm conference on computer & communications security, pp 231–240

  29. Mainanwal V, Gupta M, Upadhayay SK (2015) A survey on wireless body area network: security technology and its design methodology issue. In: International conference on innovations in information, embedded and communication systems, pp 1–5

  30. Monton E, Hernandez JF, Blasco JM, Herve T (2008) Body area network for wireless patient monitoring. IET Commun 2(2):215–222

    Article  Google Scholar 

  31. Movassaghi S, Abolhasan M, Lipman J, Smith D (2014) Wireless body area networks: a survey. IEEE Commun Surv Tutorials 16(3):1658–1686

    Article  Google Scholar 

  32. Nagar N, Suman U (2016) Two factor authentication using M-pin server for secure cloud computing environment. IGI Global, Hershey

    Book  Google Scholar 

  33. Park CS (2017) A secure and efficient ecqv implicit certificate issuance protocol for the internet of things applications. IEEE Sensors J 17(7):2215–2223. https://doi.org/10.1109/JSEN.2016.2625821

    Article  Google Scholar 

  34. Pointcheval D, Stern J (2000) Security arguments for digital signatures and blind signatures. J Cryptol 13(3):361–396

    Article  MATH  Google Scholar 

  35. Poon CCY, Zhang YT, Bao SD (2006) A novel biometrics method to secure wireless body area sensor networks for telemedicine and m-health. IEEE Commun Mag 44(4):73–81

    Article  Google Scholar 

  36. Poon C, Lo B, Yuce M, Alomainy A, Hao Y (2015) Body sensor networks: in the era of big data and beyond. IEEE Rev Biomed Eng 8:4–16

    Article  Google Scholar 

  37. Ren Y, Oleshchuk V, Li FY, Sulistyo S (2012) Fosbas: a bi-directional secrecy and collusion resilience key management scheme for bans. In: IEEE Wireless Communications and Networking Conference (WCNC), 2841–2846

  38. Shen J (2011) A novel key management protocol in body area networks. In: The seventh international conference on networking and services, pp 246–251

  39. Shen J, Tan H, Moh S, Chung I (2015) Enhanced secure sensor association and key management in wireless body area networks. J Commun Networks 17(5):453–462

    Article  Google Scholar 

  40. Shen J, Tan H, Wang J, Wang J, Lee S (2015) A novel routing protocol providing good transmission reliability in underwater sensor networks. Journal of Internet Technology 16(1):171–178

    Google Scholar 

  41. Shen J, Tan H, Moh S, Chung I, Wang J (2016) An efficient rfid authentication protocol providing strong privacy and security. Int J Intell Technol 17 (3):443–455. https://doi.org/10.1016/j.future.2017.07.055

    Google Scholar 

  42. Shen J, Liu D, Shen J, Liu Q, Sun X (2017) A secure cloud-assisted urban data sharing framework for ubiquitous-cities. Pervasive Mob Comp. https://doi.org/10.1016/j.pmcj.2017.03.013

  43. Shen J, Chang S, Shen J, Liu Q, Sun X (2017) A lightweight multi-layer authentication protocol for wireless body area networks. Futur Gener Comput Syst. https://doi.org/10.1016/j.future.2016.11.033

  44. Shen J, Zhou T, He D, Zhang Y, Sun X, Xiang Y (2017) Block design-based key agreement for group data sharing in cloud computing. IEEE Trans Dependable Secure Comput. https://doi.org/10.1109/TDSC.2017.2725953

  45. Shen J, Shen J, Chen X, Huang X, Susilo W (2017) An efficient public auditing protocol with novel dynamic structure for cloud data. IEEE Trans Inf Forensics Secur 12(10):2402–2415

    Article  Google Scholar 

  46. Tan CC, Wang H, Zhong S, Li Q (2008) Body sensor network security: an identity-based cryptography approach. In: ACM conference on wireless network security, WISEC 2008, Alexandria, VA, USA, March 31 - April, pp 148–153

  47. Tewari A, Gupta BB (2017) Cryptanalysis of a novel ultra-lightweight mutual authentication protocol for IoT devices using RFID tags, vol 73. Kluwer Academic Publishers, Norwell. https://doi.org/10.1007/s11227-016-1849-x

    Google Scholar 

  48. Tewari A, Gupta BB (2017) A lightweight mutual authentication protocol based on elliptic curve cryptography for iot devices. IEEE INFOCOM and International Journal of Advanced Intelligence Paradigms 9:111, 01

    Google Scholar 

  49. Venkatasubramanian KK, Banerjee A, Gupta SK (2010) Pska: usable and secure key agreement scheme for body area networks. IEEE Transactions on Information Technology in Biomedicine A Publication of the IEEE Engineering in Medicine & Biology Society 14(1):60–68

    Article  Google Scholar 

  50. Wu J, Guo S, Li J, Zeng D (2016) Big data meet green challenges: big data toward green applications. IEEE Syst J 10(3):888–900

    Article  Google Scholar 

  51. Wu J, Guo S, Li J, Zeng D (2016) Big data meet green challenges: greening big data. IEEE Syst J 10(3):873–887

    Article  Google Scholar 

  52. Yu C, Li J, Li X, Ren X, Gupta BB (2017) Four-image encryption scheme based on quaternion fresnel transform, chaos and computer generated hologram. Multimedia Tools & Applications 1–24

  53. Zhang Z, Wang H, Vasilakos AV, Fang H (2012) Ecg-cryptography and authentication in body area networks. IEEE Transactions on Information Technology in Biomedicine A Publication of the IEEE Engineering in Medicine & Biology Society 16 (6):1070–1078

    Article  Google Scholar 

  54. Ziegeldorf JH, Shafagh H, Raza S, Wehrle K (2013) Towards viable certificate-based authentication for the internet of things. In: ACM workshop on hot topics on wireless network security and privacy, pp 37–42

Download references

Acknowledgements

This work is supported by the National Science Foundation of China under Grant No. 61672295, No. 61672290 and No. U1405254, the State Key Laboratory of Information Security under Grant No. 2017-MS-10, the 2015 Project of six personnel in Jiangsu Province under Grant No. R2015L06, the CICAEET fund, and the PAPD fund.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Jian Shen.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Shen, J., Chang, S., Liu, Q. et al. Implicit authentication protocol and self-healing key management for WBANs. Multimed Tools Appl 77, 11381–11401 (2018). https://doi.org/10.1007/s11042-017-5559-z

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11042-017-5559-z

Keywords

Navigation