Skip to main content
Log in

An Efficient Remote Authentication Scheme for Wireless Body Area Network

  • Systems-Level Quality Improvement
  • Published:
Journal of Medical Systems Aims and scope Submit manuscript

Abstract

Wireless body area network (WBAN) provide a mechanism of transmitting a persons physiological data to application providers e.g. hospital. Given the limited range of connectivity associated with WBAN, an intermediate portable device e.g. smartphone, placed within WBAN’s connectivity, forwards the data to a remote server. This data, if not protected from an unauthorized access and modification may be lead to poor diagnosis. In order to ensure security and privacy between WBAN and a server at the application provider, several authentication schemes have been proposed. Recently, Wang and Zhang proposed an authentication scheme for WBAN using bilinear pairing. However, in their scheme, an application provider could easily impersonate a client. In order to overcome this weakness, we propose an efficient remote authentication scheme for WBAN. In terms of performance, our scheme can not only provide a malicious insider security, but also reduce running time of WBAN (client) by 51 % as compared to Wang and Zhang scheme.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3

Similar content being viewed by others

References

  1. Abi-Char, P. E., Mhamed, A., and El-Hassan, B., A fast and secure elliptic curve based authenticated key agreement protocol for low power mobile communications. In: The 2007 International Conference on Next Generation Mobile Applications, Services and Technologies (NGMAST 2007), pp. 235–240 (2007). doi:10.1109/NGMAST.2007.4343427

  2. Akyildiz, I. F., and Su, W., Sankarasubramaniam, Y., Cayirci, E., A survey on sensor networks. IEEE Commun. Mag. 40(8):102–114, 2002. doi:10.1109/MCOM.2002.1024422.

  3. Al-Riyami, S. S., and Paterson, K. G., Advances in Cryptology - ASIACRYPT 2003: 9th International Conference on the Theory and Application of Cryptology and Information Security, Taipei, Taiwan, November 30 – December 4, 2003. Proceedings, chap. Certificateless Public Key Cryptography, pp. 452–473. Berlin: Springer, 2003. doi:10.1007/978-3-540-40061-5_29.

  4. Aydos, M., Sunar, B., and Koc, C. K., An elliptic curve cryptography based authentication and key agreement protocol for wireless communication. In: 2nd International Workshop on Discrete Algorithms and Methods for Mobile Computing and Communications Symposium on Information Theory (1998)

  5. Bourouis, A., Feham, M., and Bouchachia, A., Ubiquitous mobile health monitoring system for elderly (UMHMSE). arXiv:1107.3695 (2011)

  6. Chen, M., Gonzalez, S., Vasilakos, A., Cao, H., and Leung, V. C. M., Body area networks: a survey. Mobile Netw. Appl. 16(2):171–193, 2010. doi:10.1007/s11036-010-0260-8.

  7. Cherukuri, S., Venkatasubramanian, K. K., and Gupta, S. K. S., Biosec: a biometric based approach for securing communication in wireless networks of biosensors implanted in the human body. In: Proceedings of the 2003 International Conference on Parallel Processing Workshops, 2003, pp. 432–439 (2003). doi:10.1109/ICPPW.2003.1240399

  8. Dolev, D., and Yao, A. C., On the security of public key protocols. In: 22nd Annual Symposium on Foundations of Computer Science (sfcs 1981), pp. 350–357 (1981). doi:10.1109/SFCS.1981.32

  9. Hankerson, D., Menezes, A. J., and Vanstone, S., Guide to elliptic curve cryptography. Springer Science & Business Media (2006)

  10. He, D., Zeadally, S., Kumar, N., and Lee, J. H., Anonymous authentication for wireless body area networks with provable security. IEEE Syst. J. PP(99):1–12, 2016. doi:10.1109/JSYST.2016.2544805.

  11. Hu, B. C., Wong, D. S., Zhang, Z., and Deng, X., Information Security and Privacy: 11th Australasian Conference, ACISP 2006, Melbourne, Australia, July 3–5, 2006. Proceedings, chap. Key Replacement Attack Against a Generic Construction of Certificateless Signature, pp. 235–246. Springer, Berlin, Heidelberg (2006). doi:10.1007/11780656_20

  12. Islam, S. H., Design and analysis of an improved smartcard-based remote user password authentication scheme. Int. J. Commun. Syst. 29(11):1708–1719, 2016. doi:10.1002/dac.2793.

  13. Islam, S. H., and Khan, M. K., Cryptanalysis and improvement of authentication and key agreement protocols for telecare medicine information systems. J. Med. Syst. 38(10):135, 2014. doi:10.1007/s10916-014-0135-9.

  14. Islam, S. H., Obaidat, M. S., and Amin, R., An anonymous and provably secure authentication scheme for mobile user. Int. J. Commun. Syst. 29(9):1529–1544, 2016. doi:10.1002/dac.3126. Dac.3126.

  15. Jiang, C., Li, B., and Xu, H., An efficient scheme for user authentication in wireless sensor networks. In: 21st International Conference on Advanced Information Networking and Applications Workshops, 2007, AINAW ’07. Vol. 1, pp. 438–442 (2007), 10.1109/AINAW.2007.80

  16. Kim, J. S., and Chung, J. Y., Eeg encryption scheme with junk data using chaos maps. In: 2015 6th International Conference on Intelligent Systems, Modelling and Simulation, pp. 132–134 (2015). doi:10.1109/ISMS.2015.25

  17. Koblitz, N., Elliptic curve cryptosystems. Math. Comput. 48(177):203–209, 1987.

    Article  Google Scholar 

  18. Latré, B., Braem, B., Moerman, I., Blondia, C., and Demeester, P., A survey on wireless body area networks. Wirel. Netw. 17(1):1–18, 2011. doi:10.1007/s11276-010-0252-4.

  19. Li, F., Han, Y., and Jin, C., Practical access control for sensor networks in the context of the internet of things. Comput. Commun. 89-90:154–164, 2016. doi:10.1016/j.comcom.2016.03.007. http://www.sciencedirect.com/science/article/pii/S0140366416300652. Internet of Things Research challenges and Solutions.

  20. Li, F., Zheng, Z., and Jin, C., Secure and efficient data transmission in the internet of things. Telecommun. Syst. 62(1):111–122, 2016. doi:10.1007/s11235-015-0065-y.

  21. Liu, J., Zhang, Z., Chen, X., and Kwak, K. S., Certificateless remote anonymous authentication schemes for wirelessbody area networks. IEEE Trans. Parallel Distrib. Syst. 25 (2): 332–342, 2014. doi:10.1109/TPDS.2013.145.

  22. Liu, J., Zhang, Z., Sun, R., and Kwak, K. S., An efficient certificateless remote anonymous authentication scheme for wireless body area networks. In: 2012 IEEE International Conference on Communications (ICC), pp. 3404–3408 (2012). doi:10.1109/ICC.2012.6363786

  23. Miller, V. S., Use of elliptic curves in cryptography. In: Advances in Cryptology—CRYPTO’85 Proceedings, pp. 417–426. Springer (1985)

  24. Omala, A. A., Robert, N., and Li, F., A provably-secure transmission scheme for wireless body area networks. J. Med. Syst. 40(11):247, 2016. doi:10.1007/s10916-016-0615-1.

  25. Reddy, A. G., Das, A. K., Yoon, E. J., and Yoo, K. Y., A secure anonymous authentication protocol for mobile services on elliptic curve cryptography. IEEE Access 4:4394–4407, 2016. doi:10.1109/ACCESS.2016.2596292.

  26. Shamir, A., Advances in cryptology. In: Proceedings of CRYPTO 84, chap. Identity-Based Cryptosystems and Signature Schemes, pp. 47–53. Springer, Berlin. doi:10.1007/3-540-39568-7_5 (1985)

  27. Wang, C., and Zhang, Y., New authentication scheme for wireless body area networks using the bilinear pairing. J. Med. Syst. 39(11):1–8, 2015. doi:10.1007/s10916-015-0331-2.

  28. Wang, D., He, D., Wang, P., and Chu, C. H., Anonymous two-factor authentication in distributed systems: certain goals are beyond attainment. IEEE Trans. Dependable Secure Comput. 12(4):428–442, 2015. doi:10.1109/TDSC.2014.2355850.

  29. Xiong, H., Cost-effective scalable and anonymous certificateless remote authentication protocol. IEEE Trans. Inf. Forensics Secur. 9(12):2327–2339, 2014. doi:10.1109/TIFS.2014.2363553.

  30. Zhao, Z., An efficient anonymous authentication scheme for wireless body area networks using elliptic curve cryptosystem. J. Med. Syst. 38(2):1–7, 2014. doi:10.1007/s10916-014-0013-5.

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Fagen Li.

Additional information

This article is part of the Topical Collection on Systems-Level Quality Improvement

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Omala, A.A., Kibiwott, K.P. & Li, F. An Efficient Remote Authentication Scheme for Wireless Body Area Network. J Med Syst 41, 25 (2017). https://doi.org/10.1007/s10916-016-0670-7

Download citation

  • Received:

  • Accepted:

  • Published:

  • DOI: https://doi.org/10.1007/s10916-016-0670-7

Keywords

Navigation