Journal of Medical Systems

, 39:136 | Cite as

New Authentication Scheme for Wireless Body Area Networks Using the Bilinear Pairing

  • Chunzhi Wang
  • Yanmei ZhangEmail author
Systems-Level Quality Improvement
Part of the following topical collections:
  1. Systems-Level Quality Improvement


Due to the development of information technologies and network technologies, healthcare systems have been employed in many countries. As an important part of healthcare systems, the wireless body area network (WBAN) could bring convenience to both patients and physicians because it could help physicians to monitor patients’ physiological values remotely. It is essential to ensure secure communication in WBANs because patients’ physiological values are very sensitive. Recently, Liu et al. proposed an efficient authentication scheme for WBANs. Unfortunately, Zhao pointed out that their scheme suffered from the stolen verifier-table attack. To improve security and efficiency, Zhao proposed an anonymous authentication scheme for WBANs. However, Zhao’s scheme cannot provide real anonymity because the users’ pseudo identities are constant value and the attack could tract the users. In this paper, we propose a new anonymous authentication scheme for WBANs. Security analysis shows that the proposed scheme could overcome weaknesses in previous scheme. We also use the BAN logic to demonstrate the security of the proposed scheme.


Authentication scheme Wireless body area network Anonymity Security 



This research is supported by the Natural Science Foundation of Hubei Province of China (No. 2013CFB021) and the National Natural Science Foundation of China (No. 61170135).

Conflict of Interest

The authors declare that he has no conflict of interest.


  1. 1.
    Zimmerman, T. G., Personal area networks: Near-field intrabody communication. IBM Syst. J. 35(3/4):609–617, 1996.CrossRefGoogle Scholar
  2. 2.
    Kwak, K. S., Sana, U., and Niamat, U., An overview of IEEE 802.15.6 standard. In: Proc. ISABEL 2010, pp. 1–6, 2010.Google Scholar
  3. 3.
    The Institute of Electrical and Electronics Engineers, 802.15.6–2012—IEEE standard for local and metropolitan area networks—Part 15.6: Wireless body area networks, 2012.Google Scholar
  4. 4.
    Rivest, R. L., Shamir, A., and Adleman, L., A method for obtaining digital signatures and public key cryptosystems. Commun. ACM 21(2):120–126, 1978.CrossRefGoogle Scholar
  5. 5.
    ElGamal, T., A public key cryptosystem and a signature scheme based on discrete logarithms. IEEE Trans. Inf. Theory IT-31:469–472, 1985.CrossRefGoogle Scholar
  6. 6.
    Tian, X., Wong, D., and Zhu, R., Analysis and improvement of authenticated key exchange protocol for sensor networks. IEEE Commun. Lett. 9(11):970–972, 2005.CrossRefGoogle Scholar
  7. 7.
    Jia, Z., Zhang, Y., Shao, H., Lin, Y., and Wang, J., A remote user authentication scheme using bilinear pairings and ECC. In: Proceedings of the sixth international conference on intelligent system design and applications; 1091–1094, 2006.Google Scholar
  8. 8.
    Jiang, C., Li, B., and Xu, H., An efficient scheme for user authentication in wireless sensor networks. In: Proceedings of 21st international conference on advanced information networking and applications workshops; 438–442, 2007.Google Scholar
  9. 9.
    Liao, Y., and Wang, S., A secure and efficient scheme of remote user authentication based on bilinear pairings. In: Proceedings of 2007 I.E. region 10 conference; 1–4, 2007.Google Scholar
  10. 10.
    Abichar, P., Mhamed, A., and Elhassan, B., A fast and secure elliptic curve based authenticated key agreement protocol for low power mobile communications. In: Proceedings of the 2007 international conference on next generation mobile applications, services and technologies; 235–240, 2007.Google Scholar
  11. 11.
    Miller, V. S., Use of elliptic curves in cryptography. In: Advances in cryptology, proceedings of CRYPTO’85, 417–26, 1986.Google Scholar
  12. 12.
    Koblitz, N., Elliptic curve cryptosystem. Math. Comput. 48:203–209, 1987.CrossRefGoogle Scholar
  13. 13.
    Shamir, A., Identity based cryptosystems and signature schemes. In: Proceedings of CRYPTO’ 84; 47–53, 1984.Google Scholar
  14. 14.
    Jiang, Q., Ma, J., Ma, Z., et al., A privacy enhanced authentication scheme for telecare medical information systems. J. Med. Syst. 37(1):1–8, 2013.CrossRefGoogle Scholar
  15. 15.
    Das, A. K., and Bruhadeshwar, B., An improved and effective secure password-based authentication and key agreement scheme using smart cards for the telecare medicine information system. J. Med. Syst. 37(5):1–17, 2013.CrossRefGoogle Scholar
  16. 16.
    Tan, Z., A user anonymity preserving three-factor authentication scheme for Telecare medicine information systems. J. Med. Syst. 38(3):1–9, 2014.CrossRefGoogle Scholar
  17. 17.
    He, D., and Zeadally, S., Authentication protocol for ambient assisted living system. IEEE Commun. Mag. 35(1):71–77, 2015.CrossRefGoogle Scholar
  18. 18.
    He, D., Kumar, J., Chen, J., et al., Robust anonymous authentication protocol for healthcare applications using wireless medical sensor networks. Multimedia Systems 21(1):49–60, 2015.CrossRefGoogle Scholar
  19. 19.
    He, D., Kumar, J., and Chilamkurti, N., A secure temporal-credential-based mutual authentication and key agreement scheme with pseudo identity for wireless sensor networks. Inf. Sci. 321:263–277, 2015.CrossRefGoogle Scholar
  20. 20.
    He, D., and Wang, D., Robust biometrics-based authentication scheme for multi-server environment. IEEE Syst. J. 9(3):816–823, 2015.CrossRefGoogle Scholar
  21. 21.
    Liu, J., Zhang, Z., Chen, X., and Kwak, K., Certificateless remote anonymous authentication schemes for wireless body sensor networks. IEEE Trans. Parallel Distrib. Syst. 25(2):332–342, 2014.CrossRefGoogle Scholar
  22. 22.
    Zhao, Z., An efficient anonymous authentication scheme for wireless body area networks using elliptic curve cryptosystem. J. Med. Syst. 38(2):1–7, 2014.CrossRefGoogle Scholar
  23. 23.
    Burrows, M., Abadi, M., and Needham, R., A logic of authentication. ACM Trans. Comput. Syst. 8(1):18–36, 1990.CrossRefGoogle Scholar
  24. 24.
    Shen, J., Tan, H., Wang, J., et al., A novel routing protocol providing good transmission reliability in underwater sensor networks. J. Internet Technol. 16(1):171–178, 2015.Google Scholar
  25. 25.
    Fu, Z., Sun, X., Liu, Q., et al., Achieving efficient cloud search services: Multi-keyword ranked search over encrypted cloud data supporting parallel computing. IEICE Trans. Commun. E98-B(1):190–200, 2015.CrossRefGoogle Scholar
  26. 26.
    Wang, D., He, D., Wang, P., et al., Anonymous two-factor authentication in distributed systems: Certain goals are beyond attainment. IEEE Trans. Dependable Secure Comput. 12(4):428–442, 2015.CrossRefGoogle Scholar
  27. 27.
    Zhu, Z., An efficient authentication scheme for telecare medicine information systems. J. Med. Syst. 36(6):3833–3838, 2012.CrossRefPubMedGoogle Scholar
  28. 28.
    Guo, P., Wang, J., Li, B., et al., A variable threshold-value authentication architecture for wireless mesh networks. J. Internet Technol. 15(6):929–936, 2014.Google Scholar
  29. 29.
    Zhao, Z., A secure RFID authentication protocol for healthcare environments using elliptic curve cryptosystem. J. Med. Syst. 38(5):1–7, 2014.CrossRefGoogle Scholar
  30. 30.
    Xie, Q., Liu, W., Wang, S., et al., Improvement of a uniqueness-and-anonymity-preserving user authentication scheme for connected health care. J. Med. Syst. 38:91, 2014.CrossRefPubMedGoogle Scholar

Copyright information

© Springer Science+Business Media New York 2015

Authors and Affiliations

  1. 1.School of Computer ScienceHubei University of TechnologyWuhanChina
  2. 2.School of Aerospace EngineeringBeijing Institute of TechnologyBeijingChina

Personalised recommendations