Skip to main content

A Certificateless Authentication and Key Agreement Scheme for Secure Cloud-assisted Wireless Body Area Network

Abstract

Wearable electronic equipments and wireless communications provide convenience to the patients. Wireless body area network has entered our lives, helping in making medical diagnosis. Despite various benefits brought by wireless body area network, some security challenges still restrict its application, like identity protection and mutual authentication. Certificateless authentication is a good solution to solve these issues. Recently, it has been seen that several authentication schemes that can get rid of restricts from security challenges. In this paper, we find security risks in a cloud-assisted authentication protocol and design a new anonymous certificateless authentication scheme based on the issue. The scheme can ensure secure and communication between the wearable devices and the cloud server. As for the security of the protocol, we give a description of security attributes and a security proof. Finally, the performance analysis of the scheme is shown at the end of the paper.

This is a preview of subscription content, access via your institution.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6

References

  1. 1.

    Bellare M, Pointcheval D, Rogaway P (2000) Authenticated key exchange secure against dictionary attacks. In: Advances in Cryptology - EUROCRYPT 2000. Springer, pp 139–155

  2. 2.

    Bonneau J, Herley C, Oorschot P, Stajano F (2012) The quest to replace passwords: A framework for comparative evaluation of web authentication schemes

  3. 3.

    Chatterjee S, Das AK, Sing JK (2014) A novel and efficient user access control scheme for wireless body area sensor networks. Journal of King Saud University - Computer and Information Sciences 26:181–201

    Article  Google Scholar 

  4. 4.

    Chen R, Peng D (2019) Analysis and improvement of a mutual authentication scheme for wireless body area networks. J Med Sys 43(2):19:1–19:10

    Article  Google Scholar 

  5. 5.

    Das AK, Chatterjee S, Sing JK (2015) A new biometric-based remote user authentication scheme in hierarchical wireless body area sensor networks. Ad Hoc and Sensor Wireless Networks 28(3-4):221–256

    Google Scholar 

  6. 6.

    Elgamal T (1985) A public-key cryptosystem and a signature scheme based on discrete logarithms. IEEE Trans Inf Theory 31(4):469–472

    MathSciNet  Article  Google Scholar 

  7. 7.

    He D, Wang D (2015) Robust biometrics-based authentication scheme for multiserver environment. IEEE Syst J 9(3):816–823

    Article  Google Scholar 

  8. 8.

    He D, Zeadally S, Kumari N, Lee J (2017) Anonymous authentication for wireless body area networks with provable security. IEEE Syst J 11(4):2590–2601

    Article  Google Scholar 

  9. 9.

    Huang X, Xiang Y, Bertino E, Zhou J (2014) Robust multi-factor authentication for fragile communications. IEEE Trans Dependable Secure Comput 11(6):568–581

    Article  Google Scholar 

  10. 10.

    Huang X, Xiang Y, Chonka A, Zhou J, Deng R (2011) A generic framework for three-factor authentication: preserving security and privacy in distributed systems. IEEE Trans Parallel Distrib Sys 22(8):1390–1397

    Article  Google Scholar 

  11. 11.

    Ibrahim MH, Kumari S, Das AK, Wazid M, Odelu V (2016) Secure anonymous mutual authentication for star two-tier wireless body area networks. Comput Methods Programs Biomed 135:37–50

    Article  Google Scholar 

  12. 12.

    Jiang Q, Lian X, Wang C, Ma J, Tian Y, Yang Y (2016) A bilinear pairing based anonymous authentication scheme in wireless body area networks for mHealth. J Med Sys 40(11):231:1–231:10

    Article  Google Scholar 

  13. 13.

    Kumar M, Chand S (2020) A lightweight cloud-assisted identity-based anonymous authentication and key agreement protocol for secure wireless body area network. IEEE Systems Journal

  14. 14.

    Li X, Peng J, Kumari S, Wu F, Karuppiah M, Choo KR (2017) An enhanced 1-round authentication protocol for wireless body area networks. Comput Electr Eng 61:238–249

    Article  Google Scholar 

  15. 15.

    Liu B, Yan Z, Chen C (2013) Mac protocol in wireless body area networks for e-health Challenges and a context-aware design. IEEE Wirel Commun 20(4):64–72

    Article  Google Scholar 

  16. 16.

    Liu J, Zhang Z, Chen X, Kwak KS (2014) Certificateless remote anonymous authentication schemes for wirelessbody area networks. IEEE Trans Parallel Distrib Sys 25(2):332–342

    Article  Google Scholar 

  17. 17.

    Liu X, Jin C, Li F (2018) An improved two-layer authentication scheme for wireless body area networks. J Med Sys 42(8):143:1–143:14

    Google Scholar 

  18. 18.

    Liu Y, Liang Y, Wu Y, Nie X (2020) Revisit of certificateless signature scheme used to remote authentication schemes for wireless body area networks. IEEE Internet Things J 7(3):2160–2168

    Article  Google Scholar 

  19. 19.

    Qiu S, Wang D, Xu G, Kunari S (2020) Practical and provably secure three-factor authentication protocol based on extended chaotic-maps for mobile lightweight devices. IEEE Transactions on Dependable and Secure Computing

  20. 20.

    Rivest R, Shamir A, Adleman LM (1978) A method for obtaining digital signatures and public-key cryptosystems. Commun ACM 21(2):120–126

    MathSciNet  Article  Google Scholar 

  21. 21.

    Shamir A (1984) Identity-based cryptosystems and signature schemes

  22. 22.

    Shen J, Chang S, Shen J, Liu Q, Sun X (2016) A lightweight multi-layer authentication protocol for wireless body area networks. Futur Gener Comput Syst 78:956–963

    Article  Google Scholar 

  23. 23.

    Shen J, Gui Z, Ji S, Shen J, Tan H, Tang Y (2018) Cloud-aided lightweight certificateless authentication protocol with anonymity for wireless body area networks. J Netw Comput Appl 106:117–123

    Article  Google Scholar 

  24. 24.

    Shuai M, Lui B, Yu N, Xiong L, Wang C (2020) Efficient and privacy-preserving authentication scheme for wireless body area networks. J Inf Secur Appl 52:102499:1–102499:10

    Google Scholar 

  25. 25.

    Sowjanya K, Dasgupta M, Ray S (2020) An elliptic curve cryptography based enhanced anonymous authentication protocol for wearable health monitoring systems. Int J Inf Secur 19(1):129–146

    Article  Google Scholar 

  26. 26.

    Wang C, Zhang Y (2015) New authentication scheme for wireless body area networks using the bilinear pairing. J Med Sys 39(11):136:1–136:8

    Article  Google Scholar 

  27. 27.

    Wang D, Cheng H, He D, Wang P (2018) On the challenges in designing identity-based privacy-preserving authentication schemes for mobile devices. IEEE Syst J 12(1):916– 925

    Article  Google Scholar 

  28. 28.

    Wang D, Li W, Wang P (2018) Measuring two-factor authentication schemes for real-time data access in industrial wireless sensor networks. IEEE Trans Industr Inform 14(9):4081– 4092

    Article  Google Scholar 

  29. 29.

    Wang D, stone P. Wang. (2018) Two birds with one Two-factor authentication with security beyond conventional bound. IEEE Trans Dependable Secure Comput 15(4):708–722

    Google Scholar 

  30. 30.

    Wazid M, Das AK, Vasilakos A (2018) Authenticated key management protocol for cloud-assisted body area sensor networks. J Netw Comput Appl 123:112–126

    Article  Google Scholar 

  31. 31.

    Wu L, Zhang Y, Li L, Shen J (2016) Efficient and anonymous authentication scheme for wireless body area networks. J Med Sys 40(6):134:1–134:12

    Article  Google Scholar 

  32. 32.

    Xiong H (2014) Cost-effective scalable and anonymous certificateless remote authentication protocol. IEEE Trans Inf Forensics Secur 9(12):2327–2339

    Article  Google Scholar 

  33. 33.

    Xiong H, Qin Z (2015) Revocable and scalable certificateless remote authentication protocol with anonymity for wireless body area networks. IEEE Trans Inf Forensics Secur 10(7):1442– 1455

    Article  Google Scholar 

  34. 34.

    Zhao Z (2014) An efficient anonymous authentication scheme for wireless body area networks using elliptic curve cryptosystem. J Med Syst 38(2):13–20

    Article  Google Scholar 

  35. 35.

    Zimmerman T (1996) Personal area networks: Near-field intrabody communication. IBM Syst J 35(3):609–617

    Article  Google Scholar 

Download references

Acknowledgment

This work was supported by the National Natural Science Foundation of China (Grant Nos. 61872449, U1708262, U1736203, 62072093).

Author information

Affiliations

Authors

Corresponding author

Correspondence to Qingfeng Cheng.

Additional information

Publisher’s Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and Permissions

About this article

Verify currency and authenticity via CrossMark

Cite this article

Cheng, Q., Li, Y., Shi, W. et al. A Certificateless Authentication and Key Agreement Scheme for Secure Cloud-assisted Wireless Body Area Network. Mobile Netw Appl (2021). https://doi.org/10.1007/s11036-021-01840-3

Download citation

Keywords

  • Wireless body area network
  • Security protection
  • Authentication
  • User anonymity