Skip to main content
Log in

A fog-based anonymous authentication scheme with location privacy for wireless body area network with FPGA implementation

  • Special Issue Paper
  • Published:
International Journal of Information Security Aims and scope Submit manuscript

Abstract

In Healthcare 4.0, Wireless Body Area Networks (WBAN) takes place a major role in gathering real-time data of patients. The gathered real-time medical data is transferred through an insecure channel which may lead to several security attacks. To secure from these attacks, the methodology adopted in this work involves the use of a lightweight secure anonymous authentication scheme with location privacy and the implementation of a WBAN system using a cadence tool. Moreover, the methodology encompasses several stages, including initialization, registration, authentication, and location privacy. Further, the study adopts a systematic approach to address key challenges, such as integrity, privacy, security, and non-repudiation. The hypothesis underlying this research is that WBANs can provide accurate and real-time healthcare monitoring using an anonymous authentication scheme and validated by using cadence software. In this work, a digital signature-based cryptographic technique is used to verify the authenticity and integrity of the messages. The security analysis section proves that the system is efficient in resisting different security attacks. Though there are several existing works related to authentication, the proposed protocol is very efficient in terms of performance analysis parameters which are validated using Cygwin software. Computational cost is diminished by 13% and communication overhead is reduced by 32% when compared to the relevant recent works. Additionally, a practical hardware approach is designed using a Verilog Hardware description language and implemented in hardware on an Arty A7-100 SoC FPGA (Silicon on Chip Field Programmable Gate Array) Development board where the number of bonded IOBs utilization is only 10% and lastly synthesized using a Cadence tool with CMOS GPDK 90 nm technology.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5

Similar content being viewed by others

Data availability

No data were used to support this study.

References

  1. Cherifi, F., Omar, M., Chenache, T., Radji, S.: Efficient and lightweight protocol for anti-jamming communications in wireless body area networks. Comput. Elect. Eng. 98, 107698 (2022)

    Article  Google Scholar 

  2. Shamshad, S., Mahmood, K., Hussain, S., Das, S.G.A.K., Rodrigues, N.K.J.J.: An efficient privacy-preserving authenticated key establishment protocol for health monitoring in industrial cyber-physical systems. IEEE Internet Things J. 9(7), 5142–5149 (2022)

    Article  Google Scholar 

  3. Kumar, M., Chand, S.: A provable secure and lightweight smart healthcare cyber-physical system with public verifiability”. J. Early Access, IEEE Syst (2021). https://doi.org/10.1109/JSYST.2021.3120553

    Book  Google Scholar 

  4. Li, J., Zhang, N., Ni, J., Chen, J., Du, R.: Secure and lightweight authentication with key agreement for smart wearable systems. IEEE Internet Things J. 7(8), 7334–7344 (2020)

    Article  Google Scholar 

  5. Subramani, J., Maria, A., Rajasekaran, A.S., Al-Turjman, F.: Lightweight privacy and confidentiality preserving anonymous authentication scheme for WBANs. IEEE Trans. Industr. Inf. 18(5), 3484–3491 (2022). https://doi.org/10.1109/TII.2021.3097759

    Article  Google Scholar 

  6. Vijayakumar, P., Obaidat, M.S., Azees, M., Islam, S.H., Kumar, N.: Efficient and secure anonymous authentication with location privacy for IoT-Based WBANs. IEEE Trans. Industr. Inf. 16(4), 2603–2611 (2020). https://doi.org/10.1109/TII.2019.2925071

    Article  Google Scholar 

  7. Yang, X., Yi, X., Nepal, S., Khalil, I., Huang, X., Shen, J.: Efficient and anonymous authentication for healthcare service with cloud based WBANs. IEEE Transact. Serv. Comput. 15(5), 2728–2741 (2022). https://doi.org/10.1109/TSC.2021.3059856

    Article  Google Scholar 

  8. Yang, X., et al.: Secure and lightweight authentication for mobile-edge computing-enabled WBANs. IEEE Internet. Things. J. 9(14), 12563–12572 (2022). https://doi.org/10.1109/JIOT.2021.3138989

    Article  MathSciNet  Google Scholar 

  9. Almuhaideb, M., Alqudaihi, K.S.: A lightweight and secure anonymity preserving protocol for WBAN. IEEE Access 8, 178183–178194 (2020). https://doi.org/10.1109/ACCESS.2020.3025733

    Article  Google Scholar 

  10. Rehman, Z.U., Altaf, S., Iqbal, S.: An efficient lightweight key agreement and authentication scheme for WBAN. IEEE Access 8, 175385–175397 (2020). https://doi.org/10.1109/ACCESS.2020.3026630

    Article  Google Scholar 

  11. Rehman, Z.U., Altaf, S., Ahmad, S., Huda, S., Al-Shayea, A.M., Iqbal, S.: An Efficient, Hybrid Authentication Using ECG and Lightweight Cryptographic Scheme for WBAN. IEEE Access 9, 133809–133819 (2021). https://doi.org/10.1109/ACCESS.2021.3115706

    Article  Google Scholar 

  12. Alzahrani, B.A., Irshad, A., Albeshri, A., Alsubhi, K., Shafiq, M.: An Improved lightweight authentication protocol for wireless body area networks. IEEE Access 8, 190855–190872 (2020). https://doi.org/10.1109/ACCESS.2020.3031484

    Article  Google Scholar 

  13. Li, C., Xu, C.: Efficient anonymous authentication for wireless body area networks. IEEE Access 10, 80015–80026 (2022). https://doi.org/10.1109/ACCESS.2022.3180165

    Article  Google Scholar 

  14. Pu, C., Zerkle, H., Wall, A., Lim, S., Choo, K.-K.R., Ahmed, I.: A lightweight and anonymous authentication and key agreement protocol for wireless body area networks. IEEE Internet. Things. J. 9(21), 21136–21146 (2022). https://doi.org/10.1109/JIOT.2022.3175756

    Article  Google Scholar 

  15. Zia, M., Obaidat, M.S., Mahmood, K., Shamshad, S., Saleem, M.A., Chaudhry, S.A.: A provably secure lightweight key agreement protocol for wireless body area networks in healthcare system. IEEE Trans. Industr. Inf. 19(2), 1683–1690 (2023). https://doi.org/10.1109/TII.2022.3202968

    Article  Google Scholar 

  16. Gheisari, M., Najafabadi, H.E., Alzubi, J.A., Gao, J., Wang, G., Abbasi, A.A., Castiglione, A.: OBPP: An ontology-based framework for privacy-preserving in IoT-based smart city. Future Gener. Comput. Syst. (2021). https://doi.org/10.1016/j.future.2021.01.028

    Article  Google Scholar 

  17. Alzubi, O.A., Alzubi, J.A., Alazab, M., Alrabea, A., Awajan, A., Qiqieh, I.: Optimized machine learning-based intrusion detection system for fog and edge computing environment. Electronics (2022). https://doi.org/10.3390/electronics11193007

    Article  Google Scholar 

  18. Alzubi, O.A., Alzubi, J.A., Shankar, K., Gupta, D.: Blockchain and artificial intelligence enabled privacy-preserving medical data transmission in internet of things. Transact. Emerg. Telecommun. Technol. 32(12), e4360 (2020)

    Article  Google Scholar 

  19. Movassagh, A.A., Alzubi, J.A., Gheisari, M., Rahimi, M., Mohan, S., Abbasi, A.A., Nabipour, N.: Artificial neural networks training algorithm integrating invasive weed optimization with diferential evolutionary model. J. Ambient Intell. Human. Comput. (2021). https://doi.org/10.1007/s12652-020-02623-6

    Article  Google Scholar 

  20. Gheisari, M., Yaraziz, M.S., Alzubi, J.A., Fernandez-Campusano, C., Feylizadeh, M.R., Pirasteh, S., Abbasi, A.A., Liu, Y., Lee, C.-C.: An efficient cluster head selection for wireless sensor network-based smart agriculture systems. Comput. Electron. Agri. (2022). https://doi.org/10.1016/j.compag.2022.107105

    Article  Google Scholar 

  21. Zhou, J., Ou, Y.-H.: Key tree and chinese remainder theorem based group key distribution scheme. J. Chin. Inst. Eng. 32, 967–974 (2009)

    Article  Google Scholar 

  22. Hu, H., Li, Y., Xiang, H.T., Liao, Z.: Secure and efficient data communication protocol for wireless body area networks. IEEE Transact. Multi-Scale Comput. Syst. 2(2), 94–107 (2016)

    Article  Google Scholar 

  23. Jia, X., He, D., Kumar, N., Choo, K.R.: A provably secure and efficient identity-based anonymous authentication scheme for mobile edge computing. IEEE Syst. J. 14, 560–571 (2020)

    Article  Google Scholar 

  24. Li, X., Peng, J., Kumari, S., Wu, F., Karuppiah, M., Choo, K.K.R.: An enhanced 1-round authentication protocol for wireless body area networks with user anonymity. Comput. Electr. Eng. 61, 238–249 (2017)

    Article  Google Scholar 

  25. He, D., Zeadally, S., Kumar, N., Lee, J.H.: Anonymous authentication for wireless body area networks with provable security. IEEE Syst. J. 11(4), 2590–2601 (2016)

    Article  Google Scholar 

  26. Kumar, M., Chand, S.: a lightweight cloud-assisted identity-based anonymous authentication and key agreement protocol for secure wireless body area network. IEEE Syst. J. 15, 2779–2786 (2021). https://doi.org/10.1109/JSYST.2020.2990749

    Article  Google Scholar 

  27. Cygwin: Linux Environment Emulator for Windows. Available online: http://www.cygwin.com/

Download references

Funding

The authors declare no funding received for the research.

Author information

Authors and Affiliations

Authors

Contributions

Arun Sekar Rajasekaran wrote the main manuscript text Azees Maria prepared figures All authors reviewed the manuscript

Corresponding author

Correspondence to M. Azees.

Ethics declarations

Conflict of interest

The authors declare that they have no conflict of interest regarding the publication of this paper.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Rajasekaran, A.S., Azees, M. A fog-based anonymous authentication scheme with location privacy for wireless body area network with FPGA implementation. Int. J. Inf. Secur. 23, 1–13 (2024). https://doi.org/10.1007/s10207-023-00717-8

Download citation

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s10207-023-00717-8

Keywords

Navigation