Abstract
With the development of the Internet of Things (IoT), mobile medical systems based on wireless body area networks (WBAN) have aroused extensive attention. Wearable wireless medical devices have emerged to meet the demand for high-quality medical services that brought great convenience to people’s lives. However, attackers pose a latent threat to users’ medical information privacy, and identity is easy to leak due to wireless networks’ openness. It can be seen that the authentication phase is a vital part. In this paper, we proposed a lightweight continuous authentication protocol in medical WBAN environments. Our protocol overcomes the shortcomings of sensor node impersonation attack by using physiological signals, cutting energy consumption by using lightweight technology, saving time and energy by reducing computation complexity, and ensuring the current sensor node is the original one through continuous authentication. Finally, our performance analysis has shown that our protocol is provided with the superiority of lightweight, mutuality, low cost. It has a considerable application prospect in medical WBAN.
Similar content being viewed by others
References
Zimmerman TG (1996) Personal area networks: near-field intrabody communication. IBM Syst J 35(3.4):609–617
Latré B, Braem B, Moerman I, Blondia C, Demeester P (2011) A survey on wireless body area networks. Wirel Netw 17(1):1–18
Buduru AB, Yau SS (2015) A effective approach to continuous user authentication for touch screen smart devices. IEEE, pp 219–226
Wayman J, Jain A, Maltoni D, Maio D (2005) An introduction to biometric authentication systems. Springer
Traoré I, Woungang I, Nakkabi Y, Obaidat MS, Ahmed AAE, Khalilian B (2012) Dynamic sample size detection in learning command line sequence for continuous authentication. IEEE Trans Syst Man Cybern Part B 42(5):1343–1356
Yeh KH, Su C, Chiu W, Zhou L (2018) I walk, therefore i am: continuous user authentication with plantar biometrics. IEEE Commun Mag 56(2):150–157
Chuang YH, Lo NW, Yang CY, Tang SW (2018) A lightweight continuous authentication protocol for the internet of things. Sensors 18(4):1104
Ramli SN, Ahmad R (2011) Surveying the wireless body area network in the realm of wireless communication. In: IAS. IEEE, pp 58–61
Sanchez EM, Hernandez JF, Blasco JM, Hervé T, Micallef J, Grech I, Brincat A, Salcedo VT (2008) Body area network for wireless patient monitoring. IET Commun 2(2):215–222
Seyedi M, Kibret B, Lai DTH, Faulkner M (2013) A survey on intrabody communications for body area network applications. IEEE Trans Biomed Eng 60(8):2067–2079
Koya AM, Deepthi PP (2018) Anonymous hybrid mutual authentication and key agreement scheme for wireless body area network. Comput Netw 140:138–151
Li CT, Hwang MS (2010) An efficient biometrics-based remote user authentication scheme using smart cards. J Netw Comput Appl 33(1):1–5
Ramli SN, Ahmad R, Abdollah MF, Dutkiewicz E (2013) A biometric-based security for data authentication in wireless body area network (wban). In: 2013 15th International Conference on Advanced Communications Technology (ICACT). IEEE, pp 998–1001
Bhargav Spantzel A, Squicciarini AC, Modi SK, Young M, Bertino E, Elliott SJ (2007) Privacy preserving multi-factor authentication with biometrics. J Comput Secur 15(5):529–560
Ranganathan V, Rose SL (2019) Personal authentication mechanism based on finger knuckle print. J Med Syst 43(8):232
He D, Kumar N, Chilamkurti N, Lee J-H (2014) Lightweight ecc based rfid authentication integrated with an id verifier transfer protocol. J Med Syst 38(10):116
Lu Y, Li L, Peng H, Yang Y (2015) An enhanced biometric-based authentication scheme for telecare medicine information systems using elliptic curve cryptosystem. J Med Syst 39(3):32
Han L, Tan X, Wang S, Liang X (2018) An efficient and secure three-factor based authenticated key exchange scheme using elliptic curve cryptosystems. Peer-to-peer Netw Appl 11(1):63–73
Hayajneh T, Mohd BJ, Imran M, Almashaqbeh G, Vasilakos AV (2016) Secure authentication for remote patient monitoring with wireless medical sensor networks. Sensors 16(4):424
Xu G, Qiu S, Ahmad H, Xu G, Guo Y, Zhang M, Xu H (2018) A multi-server two-factor authentication scheme with un-traceability using elliptic curve cryptography. Sensors 18(7):2394
Dharminder, Mishra D, Li X (2020) Construction of rsa-based authentication scheme in authorized access to healthcare services - authorized access to healthcare services. J Med Syst 44(1):6
Khemissa H, Tandjaoui D (2015) A lightweight authentication scheme for e-health applications in the context of internet of things. In: Al-Begain K, AlBeiruti N (eds) NGMAST. IEEE, pp 90–95
Gope P, Hwang T (2016) A realistic lightweight anonymous authentication protocol for securing real-time application data access in wireless sensor networks. IEEE Trans Ind Electron 63(11):7124–7132
Adavoudi-Jolfaei A, Ashouri-Talouki M, Aghili SF (2019) Lightweight and anonymous three-factor authentication and access control scheme for real-time applications in wireless sensor networks. Peer-to-Peer Netw Appl 12(1):43–59
Das AK, Wazid M, Kumar N, Khan MK, Choo K-KR, Park Y (2018) Design of secure and lightweight authentication protocol for wearable devices environment. IEEE J Biomed Health Inf 22 (4):1310–1322
Dhillon PK, Kalra S (2017) A lightweight biometrics based remote user authentication scheme for iot services. J Inf Secur Appl 34:255–270
Xu L, Wu F (2019) A lightweight authentication scheme for multi-gateway wireless sensor networks under iot conception. Arab J Sci Eng 44(4):3977–3993
Ostad Sharif A, Abbasinezhad Mood D, Nikooghadam M (2019) A robust and efficient ecc-based mutual authentication and session key generation scheme for healthcare applications. J Med Syst 43(1):10
Yu S, Park K, Park Y, Kim H, Park Y (2020) A lightweight three-factor authentication protocol for digital rights management system. Peer-to-Peer Netw Appl:pp 1–17
Frank M, Biedert R, Ma E, Martinovic I, Song D (2012) Touchalytics: On the applicability of touchscreen input as a behavioral biometric for continuous authentication. IEEE Trans Inf Forens Secur 8(1):136–148
Matsuyama Y, Shozawa M, Yokote R (2015) Brain signal’s low-frequency fits the continuous authentication. Neurocomputing 164:137–143
Mondal S, Bours P (2015) Continuous authentication and identification for mobile devices: Combining security and forensics. IEEE:1–6
Peng G, Zhou G, Nguyen DT, Qi X, Yang Q, Wang S (2017) Continuous authentication with touch behavioral biometrics and voice on wearable glasses. IEEE Trans Hum-Mach Syst 47(3):404–416
Mosenia A, Sur-Kolay S, Raghunathan A, Jha NK (2016) Caba: Continuous authentication based on bioaura. IEEE Trans Comput 66(5):759–772
Alshehri A, Coenen F, Bollegala D (2018) Iterative keystroke continuous authentication: A time series based approach. KI-Künstliche Intell 32(4):231–243
Acar A, Aksu H, Uluagac AS, Akkaya K (2018) Waca: Wearable-assisted continuous authentication. IEEE, pp 264–269
Smith Creasey M, Rajarajan M (2019) A novel word-independent gesture-typing continuous authentication scheme for mobile devices. Comput Secur 83:140–150
Burrows M, Abadi M, Needham RM (1989) A logic of authentication. Proc R Soc Lond Math Phys Sci 426(1871):233–271
Pereira GCCF, Alves RCA, da Silva FL, Azevedo RM, Albertini BC, Margi CB (2017) Performance evaluation of cryptographic algorithms over iot platforms and operating systems. Secur Commun Netw 2017:1–16
Yeh KH, Su C, Choo KKR, Chiu W (2017) A novel certificateless signature scheme for smart objects in the internet-of-things. Sensors 17(5):1001
Arshad H, Nikooghadam M (2016) An efficient and secure authentication and key agreement scheme for session initiation protocol using ecc. Multimed Tools Appl 75(1):181–197
Li X, Ibrahim MH, Kumari S, Sangaiah AK, Gupta V, Choo K-KR (2017) Anonymous mutual authentication and key agreement scheme for wearable sensors in wireless body area networks. Comput Netw 129:429–443
Acknowledgements
This study was funded by National Natural Science Foundation of China (No.61962022), Key Research and Development Plan of Jiangxi Province (No.20192BBE50077), and Excellent Scientific and Technological Innovation Teams of Jiangxi Province (No.2018 1BCB24009).
Author information
Authors and Affiliations
Corresponding author
Ethics declarations
Conflict of interest
All authors declare that they have no conflict of interest.
Additional information
Ethical approval
This article does not contain any studies with human participants or animals performed by any of the authors.
Publisher’s note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
About this article
Cite this article
Wan, T., Wang, L., Liao, W. et al. A lightweight continuous authentication scheme for medical wireless body area networks. Peer-to-Peer Netw. Appl. 14, 3473–3487 (2021). https://doi.org/10.1007/s12083-021-01190-7
Received:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s12083-021-01190-7