Skip to main content

Improvement of Cloud-Assisted Identity-Based Anonymous Authentication and Key Agreement Protocol for Secure WBAN

  • Conference paper
  • First Online:
Safe, Secure, Ethical, Responsible Technologies and Emerging Applications (SAFER-TEA 2023)

Abstract

Kumar and Chand propose an Identity-based Anonymous Authentication and Key Agreement (IBAAKA) protocol for Wireless Body Area Network in the cloud-based environment, which achieves mutual authentication and user anonymity and can resist known attacks. However, Rakeei and Moazami show that their scheme is subject to a traceability attack. As a result of this attack, the scheme does not allow secure authentication because an adversary can successfully perform a man-in-the-middle attack and exchange a session key with the victim sensor. To provide security resilience against this attack, this paper proposes an improvement to the IBAAKA protocol. We also present the resilience of the proposed scheme against various security attacks, as well as ensuring secure mutual authentication and anonymity.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 79.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 99.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Shamir, A.: Identity-based cryptosystems and signature schemes. In: Blakley, G.R., Chaum, D. (eds.) CRYPTO 1984. LNCS, vol. 196, pp. 47–53. Springer, Heidelberg (1985). https://doi.org/10.1007/3-540-39568-7_5

    Chapter  Google Scholar 

  2. Debiao, H., Jianhua, C., Jin, H.: An ID-based client authentication with key agreement protocol for mobile client-server environment on ECC with provable security. Inf. Fusion 13(3), 223–230 (2012)

    Article  Google Scholar 

  3. Goutham, R.A., Lee, G.-J., Yoo, K.-Y.: An anonymous ID-based remote mutual authentication with key agreement protocol on ECC using smart cards. In: Proceedings of the 30th Annual ACM Symposium on Applied Computing, SAC 2015, pp. 169–174. Association for Computing Machinery, New York (2015)

    Google Scholar 

  4. Zhang, W., Lin, D., Zhang, H., Chen, C., Zhou, X.: A lightweight anonymous mutual authentication with key agreement protocol on ECC. In: 2017 IEEE Trustcom/BigDataSE/ICESS, pp. 170–176 (2017)

    Google Scholar 

  5. Li, X., Peng, J., Kumari, S., Wu, F., Karuppiah, M., Choo, K.-K.R.: An enhanced 1-round authentication protocol for wireless body area networks with user anonymity. Comput. Electr. Eng. 61, 238–249 (2017)

    Article  Google Scholar 

  6. Dasgupta, M., Sowjanya, K., Ray, S.: An elliptic curve cryptography based enhanced anonymous authentication protocol for wearable health monitoring system. Int. J. Inf. Secur. 19, 129–146 (2020)

    Article  Google Scholar 

  7. Braeken, A., Patonico, S., Steenhaut, K.: Identity-based and anonymous key agreement protocol for fog computing resistant in the Canetti-Krawczyk security model. Wireless Netw. 29(3), 1017–1029 (2019)

    Google Scholar 

  8. Mohammadali, A., Haghighi, M.S., Tadayon, M.H., Mohammadi-Nodooshan, A.: A novel identity-based key establishment method for advanced metering infrastructure in smart grid. IEEE Trans. Smart Grid 9(4), 2834–2842 (2018)

    Article  Google Scholar 

  9. Mahmood, K., Arshad, J., Chaudhry, S.A., Kumari, S.: An enhanced anonymous identity-based key agreement protocol for smart grid advanced metering infrastructure. Int. J. Commun. Syst. 32(16), e4137 (2019)

    Article  Google Scholar 

  10. Moghadam, M.F., Nikooghadam, M., Jabban, M.A.B.A., Alishahi, M., Mortazavi, L., Mohajerzadeh, A.: An efficient authentication and key agreement scheme based on ECDH for wireless sensor network. IEEE Access 8, 73182–73192 (2020)

    Article  Google Scholar 

  11. Kwon, D.K., Yu, S.J., Lee, J.Y., Son, S.H., Park, Y.H.: WSN-SLAP: secure and lightweight mutual authentication protocol for wireless sensor networks. Sensors 21(3), 936 (2021)

    Article  Google Scholar 

  12. Kumar, M., Chand, S.: A lightweight cloud-assisted identity-based anonymous authentication and key agreement protocol for secure wireless body area network. IEEE Syst. J. 15, 1–8 (2020)

    Google Scholar 

  13. Rakeei, M.A., Moazami, F.: Cryptanalysis of an anonymous authentication and key agreement protocol for secure wireless body area network. Cryptology ePrint Archive, Report 2020/1465 (2020). https://eprint.iacr.org/2020/1465

  14. Liu, J., Zhang, Z., Chen, X., Kwak, K.S.: Certificateless remote anonymous authentication schemes for wirelessbody area networks. IEEE Trans. Parallel Distrib. Syst. 25(2), 332–342 (2014)

    Article  Google Scholar 

  15. He, D., Zeadally, S., Kumar, N., Lee, J.: Anonymous authentication for wireless body area networks with provable security. IEEE Syst. J. 11(4), 2590–2601 (2017)

    Article  Google Scholar 

  16. Wang, C., Zhang, Y.: New authentication scheme for wireless body area networks using the bilinear pairing. J. Med. Syst. 39, 1–8 (2015)

    Article  Google Scholar 

  17. Jia, X., He, D., Kumar, N., Choo, K.R.: A provably secure and efficient identity-based anonymous authentication scheme for mobile edge computing. IEEE Syst. J. 14(1), 560–571 (2020)

    Article  Google Scholar 

  18. Nikooghadam, M., Amintoosi, H.: A secure and robust elliptic curve cryptography-based mutual authentication scheme for session initiation protocol. Secur. Priv. 3(1), e92 (2020)

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Sidoine Djimnaibeye .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2024 ICST Institute for Computer Sciences, Social Informatics and Telecommunications Engineering

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Djimnaibeye, S., Ngom, A., Tchappi, I., Hassan, B.M., Najjar, A. (2024). Improvement of Cloud-Assisted Identity-Based Anonymous Authentication and Key Agreement Protocol for Secure WBAN. In: Tchakounte, F., Atemkeng, M., Rajagopalan, R.P. (eds) Safe, Secure, Ethical, Responsible Technologies and Emerging Applications. SAFER-TEA 2023. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol 566. Springer, Cham. https://doi.org/10.1007/978-3-031-56396-6_4

Download citation

  • DOI: https://doi.org/10.1007/978-3-031-56396-6_4

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-031-56395-9

  • Online ISBN: 978-3-031-56396-6

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics