Abstract
Kumar and Chand propose an Identity-based Anonymous Authentication and Key Agreement (IBAAKA) protocol for Wireless Body Area Network in the cloud-based environment, which achieves mutual authentication and user anonymity and can resist known attacks. However, Rakeei and Moazami show that their scheme is subject to a traceability attack. As a result of this attack, the scheme does not allow secure authentication because an adversary can successfully perform a man-in-the-middle attack and exchange a session key with the victim sensor. To provide security resilience against this attack, this paper proposes an improvement to the IBAAKA protocol. We also present the resilience of the proposed scheme against various security attacks, as well as ensuring secure mutual authentication and anonymity.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Shamir, A.: Identity-based cryptosystems and signature schemes. In: Blakley, G.R., Chaum, D. (eds.) CRYPTO 1984. LNCS, vol. 196, pp. 47–53. Springer, Heidelberg (1985). https://doi.org/10.1007/3-540-39568-7_5
Debiao, H., Jianhua, C., Jin, H.: An ID-based client authentication with key agreement protocol for mobile client-server environment on ECC with provable security. Inf. Fusion 13(3), 223–230 (2012)
Goutham, R.A., Lee, G.-J., Yoo, K.-Y.: An anonymous ID-based remote mutual authentication with key agreement protocol on ECC using smart cards. In: Proceedings of the 30th Annual ACM Symposium on Applied Computing, SAC 2015, pp. 169–174. Association for Computing Machinery, New York (2015)
Zhang, W., Lin, D., Zhang, H., Chen, C., Zhou, X.: A lightweight anonymous mutual authentication with key agreement protocol on ECC. In: 2017 IEEE Trustcom/BigDataSE/ICESS, pp. 170–176 (2017)
Li, X., Peng, J., Kumari, S., Wu, F., Karuppiah, M., Choo, K.-K.R.: An enhanced 1-round authentication protocol for wireless body area networks with user anonymity. Comput. Electr. Eng. 61, 238–249 (2017)
Dasgupta, M., Sowjanya, K., Ray, S.: An elliptic curve cryptography based enhanced anonymous authentication protocol for wearable health monitoring system. Int. J. Inf. Secur. 19, 129–146 (2020)
Braeken, A., Patonico, S., Steenhaut, K.: Identity-based and anonymous key agreement protocol for fog computing resistant in the Canetti-Krawczyk security model. Wireless Netw. 29(3), 1017–1029 (2019)
Mohammadali, A., Haghighi, M.S., Tadayon, M.H., Mohammadi-Nodooshan, A.: A novel identity-based key establishment method for advanced metering infrastructure in smart grid. IEEE Trans. Smart Grid 9(4), 2834–2842 (2018)
Mahmood, K., Arshad, J., Chaudhry, S.A., Kumari, S.: An enhanced anonymous identity-based key agreement protocol for smart grid advanced metering infrastructure. Int. J. Commun. Syst. 32(16), e4137 (2019)
Moghadam, M.F., Nikooghadam, M., Jabban, M.A.B.A., Alishahi, M., Mortazavi, L., Mohajerzadeh, A.: An efficient authentication and key agreement scheme based on ECDH for wireless sensor network. IEEE Access 8, 73182–73192 (2020)
Kwon, D.K., Yu, S.J., Lee, J.Y., Son, S.H., Park, Y.H.: WSN-SLAP: secure and lightweight mutual authentication protocol for wireless sensor networks. Sensors 21(3), 936 (2021)
Kumar, M., Chand, S.: A lightweight cloud-assisted identity-based anonymous authentication and key agreement protocol for secure wireless body area network. IEEE Syst. J. 15, 1–8 (2020)
Rakeei, M.A., Moazami, F.: Cryptanalysis of an anonymous authentication and key agreement protocol for secure wireless body area network. Cryptology ePrint Archive, Report 2020/1465 (2020). https://eprint.iacr.org/2020/1465
Liu, J., Zhang, Z., Chen, X., Kwak, K.S.: Certificateless remote anonymous authentication schemes for wirelessbody area networks. IEEE Trans. Parallel Distrib. Syst. 25(2), 332–342 (2014)
He, D., Zeadally, S., Kumar, N., Lee, J.: Anonymous authentication for wireless body area networks with provable security. IEEE Syst. J. 11(4), 2590–2601 (2017)
Wang, C., Zhang, Y.: New authentication scheme for wireless body area networks using the bilinear pairing. J. Med. Syst. 39, 1–8 (2015)
Jia, X., He, D., Kumar, N., Choo, K.R.: A provably secure and efficient identity-based anonymous authentication scheme for mobile edge computing. IEEE Syst. J. 14(1), 560–571 (2020)
Nikooghadam, M., Amintoosi, H.: A secure and robust elliptic curve cryptography-based mutual authentication scheme for session initiation protocol. Secur. Priv. 3(1), e92 (2020)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2024 ICST Institute for Computer Sciences, Social Informatics and Telecommunications Engineering
About this paper
Cite this paper
Djimnaibeye, S., Ngom, A., Tchappi, I., Hassan, B.M., Najjar, A. (2024). Improvement of Cloud-Assisted Identity-Based Anonymous Authentication and Key Agreement Protocol for Secure WBAN. In: Tchakounte, F., Atemkeng, M., Rajagopalan, R.P. (eds) Safe, Secure, Ethical, Responsible Technologies and Emerging Applications. SAFER-TEA 2023. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol 566. Springer, Cham. https://doi.org/10.1007/978-3-031-56396-6_4
Download citation
DOI: https://doi.org/10.1007/978-3-031-56396-6_4
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-031-56395-9
Online ISBN: 978-3-031-56396-6
eBook Packages: Computer ScienceComputer Science (R0)