Abstract
In Healthcare 4.0, Wireless Body Area Networks (WBAN) takes place a major role in gathering real-time data of patients. The gathered real-time medical data is transferred through an insecure channel which may lead to several security attacks. To secure from these attacks, the methodology adopted in this work involves the use of a lightweight secure anonymous authentication scheme with location privacy and the implementation of a WBAN system using a cadence tool. Moreover, the methodology encompasses several stages, including initialization, registration, authentication, and location privacy. Further, the study adopts a systematic approach to address key challenges, such as integrity, privacy, security, and non-repudiation. The hypothesis underlying this research is that WBANs can provide accurate and real-time healthcare monitoring using an anonymous authentication scheme and validated by using cadence software. In this work, a digital signature-based cryptographic technique is used to verify the authenticity and integrity of the messages. The security analysis section proves that the system is efficient in resisting different security attacks. Though there are several existing works related to authentication, the proposed protocol is very efficient in terms of performance analysis parameters which are validated using Cygwin software. Computational cost is diminished by 13% and communication overhead is reduced by 32% when compared to the relevant recent works. Additionally, a practical hardware approach is designed using a Verilog Hardware description language and implemented in hardware on an Arty A7-100 SoC FPGA (Silicon on Chip Field Programmable Gate Array) Development board where the number of bonded IOBs utilization is only 10% and lastly synthesized using a Cadence tool with CMOS GPDK 90 nm technology.
Similar content being viewed by others
Data availability
No data were used to support this study.
References
Cherifi, F., Omar, M., Chenache, T., Radji, S.: Efficient and lightweight protocol for anti-jamming communications in wireless body area networks. Comput. Elect. Eng. 98, 107698 (2022)
Shamshad, S., Mahmood, K., Hussain, S., Das, S.G.A.K., Rodrigues, N.K.J.J.: An efficient privacy-preserving authenticated key establishment protocol for health monitoring in industrial cyber-physical systems. IEEE Internet Things J. 9(7), 5142–5149 (2022)
Kumar, M., Chand, S.: A provable secure and lightweight smart healthcare cyber-physical system with public verifiability”. J. Early Access, IEEE Syst (2021). https://doi.org/10.1109/JSYST.2021.3120553
Li, J., Zhang, N., Ni, J., Chen, J., Du, R.: Secure and lightweight authentication with key agreement for smart wearable systems. IEEE Internet Things J. 7(8), 7334–7344 (2020)
Subramani, J., Maria, A., Rajasekaran, A.S., Al-Turjman, F.: Lightweight privacy and confidentiality preserving anonymous authentication scheme for WBANs. IEEE Trans. Industr. Inf. 18(5), 3484–3491 (2022). https://doi.org/10.1109/TII.2021.3097759
Vijayakumar, P., Obaidat, M.S., Azees, M., Islam, S.H., Kumar, N.: Efficient and secure anonymous authentication with location privacy for IoT-Based WBANs. IEEE Trans. Industr. Inf. 16(4), 2603–2611 (2020). https://doi.org/10.1109/TII.2019.2925071
Yang, X., Yi, X., Nepal, S., Khalil, I., Huang, X., Shen, J.: Efficient and anonymous authentication for healthcare service with cloud based WBANs. IEEE Transact. Serv. Comput. 15(5), 2728–2741 (2022). https://doi.org/10.1109/TSC.2021.3059856
Yang, X., et al.: Secure and lightweight authentication for mobile-edge computing-enabled WBANs. IEEE Internet. Things. J. 9(14), 12563–12572 (2022). https://doi.org/10.1109/JIOT.2021.3138989
Almuhaideb, M., Alqudaihi, K.S.: A lightweight and secure anonymity preserving protocol for WBAN. IEEE Access 8, 178183–178194 (2020). https://doi.org/10.1109/ACCESS.2020.3025733
Rehman, Z.U., Altaf, S., Iqbal, S.: An efficient lightweight key agreement and authentication scheme for WBAN. IEEE Access 8, 175385–175397 (2020). https://doi.org/10.1109/ACCESS.2020.3026630
Rehman, Z.U., Altaf, S., Ahmad, S., Huda, S., Al-Shayea, A.M., Iqbal, S.: An Efficient, Hybrid Authentication Using ECG and Lightweight Cryptographic Scheme for WBAN. IEEE Access 9, 133809–133819 (2021). https://doi.org/10.1109/ACCESS.2021.3115706
Alzahrani, B.A., Irshad, A., Albeshri, A., Alsubhi, K., Shafiq, M.: An Improved lightweight authentication protocol for wireless body area networks. IEEE Access 8, 190855–190872 (2020). https://doi.org/10.1109/ACCESS.2020.3031484
Li, C., Xu, C.: Efficient anonymous authentication for wireless body area networks. IEEE Access 10, 80015–80026 (2022). https://doi.org/10.1109/ACCESS.2022.3180165
Pu, C., Zerkle, H., Wall, A., Lim, S., Choo, K.-K.R., Ahmed, I.: A lightweight and anonymous authentication and key agreement protocol for wireless body area networks. IEEE Internet. Things. J. 9(21), 21136–21146 (2022). https://doi.org/10.1109/JIOT.2022.3175756
Zia, M., Obaidat, M.S., Mahmood, K., Shamshad, S., Saleem, M.A., Chaudhry, S.A.: A provably secure lightweight key agreement protocol for wireless body area networks in healthcare system. IEEE Trans. Industr. Inf. 19(2), 1683–1690 (2023). https://doi.org/10.1109/TII.2022.3202968
Gheisari, M., Najafabadi, H.E., Alzubi, J.A., Gao, J., Wang, G., Abbasi, A.A., Castiglione, A.: OBPP: An ontology-based framework for privacy-preserving in IoT-based smart city. Future Gener. Comput. Syst. (2021). https://doi.org/10.1016/j.future.2021.01.028
Alzubi, O.A., Alzubi, J.A., Alazab, M., Alrabea, A., Awajan, A., Qiqieh, I.: Optimized machine learning-based intrusion detection system for fog and edge computing environment. Electronics (2022). https://doi.org/10.3390/electronics11193007
Alzubi, O.A., Alzubi, J.A., Shankar, K., Gupta, D.: Blockchain and artificial intelligence enabled privacy-preserving medical data transmission in internet of things. Transact. Emerg. Telecommun. Technol. 32(12), e4360 (2020)
Movassagh, A.A., Alzubi, J.A., Gheisari, M., Rahimi, M., Mohan, S., Abbasi, A.A., Nabipour, N.: Artificial neural networks training algorithm integrating invasive weed optimization with diferential evolutionary model. J. Ambient Intell. Human. Comput. (2021). https://doi.org/10.1007/s12652-020-02623-6
Gheisari, M., Yaraziz, M.S., Alzubi, J.A., Fernandez-Campusano, C., Feylizadeh, M.R., Pirasteh, S., Abbasi, A.A., Liu, Y., Lee, C.-C.: An efficient cluster head selection for wireless sensor network-based smart agriculture systems. Comput. Electron. Agri. (2022). https://doi.org/10.1016/j.compag.2022.107105
Zhou, J., Ou, Y.-H.: Key tree and chinese remainder theorem based group key distribution scheme. J. Chin. Inst. Eng. 32, 967–974 (2009)
Hu, H., Li, Y., Xiang, H.T., Liao, Z.: Secure and efficient data communication protocol for wireless body area networks. IEEE Transact. Multi-Scale Comput. Syst. 2(2), 94–107 (2016)
Jia, X., He, D., Kumar, N., Choo, K.R.: A provably secure and efficient identity-based anonymous authentication scheme for mobile edge computing. IEEE Syst. J. 14, 560–571 (2020)
Li, X., Peng, J., Kumari, S., Wu, F., Karuppiah, M., Choo, K.K.R.: An enhanced 1-round authentication protocol for wireless body area networks with user anonymity. Comput. Electr. Eng. 61, 238–249 (2017)
He, D., Zeadally, S., Kumar, N., Lee, J.H.: Anonymous authentication for wireless body area networks with provable security. IEEE Syst. J. 11(4), 2590–2601 (2016)
Kumar, M., Chand, S.: a lightweight cloud-assisted identity-based anonymous authentication and key agreement protocol for secure wireless body area network. IEEE Syst. J. 15, 2779–2786 (2021). https://doi.org/10.1109/JSYST.2020.2990749
Cygwin: Linux Environment Emulator for Windows. Available online: http://www.cygwin.com/
Funding
The authors declare no funding received for the research.
Author information
Authors and Affiliations
Contributions
Arun Sekar Rajasekaran wrote the main manuscript text Azees Maria prepared figures All authors reviewed the manuscript
Corresponding author
Ethics declarations
Conflict of interest
The authors declare that they have no conflict of interest regarding the publication of this paper.
Additional information
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.
About this article
Cite this article
Rajasekaran, A.S., Azees, M. A fog-based anonymous authentication scheme with location privacy for wireless body area network with FPGA implementation. Int. J. Inf. Secur. 23, 1–13 (2024). https://doi.org/10.1007/s10207-023-00717-8
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s10207-023-00717-8