Skip to main content
Log in

Energy Efficient Lightweight Mutual Authentication Protocol (REAP) for MBAN Based on Genus-2 Hyper-Elliptic Curve

  • Published:
Wireless Personal Communications Aims and scope Submit manuscript

Abstract

In the modern era, medical body area network (MBAN) emerges with the development of information and communication technology to improve the quality of healthcare services. As MBAN contains patient’s sensitive information and usually be transmitted via wireless channel, it is vulnerable to security threats and privacy attacks. To preserve privacy, it is important to provide authentication to prevent unauthorized access by intruders. Since MBAN consists of resource constraint devices to monitor physiological conditions, light-weight authentication protocol are in demand to reduce computational time and communication cost. Hence the paper proposes an eneRgy efficient, lightweight mutual authentication protocol for MBAN based on genus 2 hyper-elliptic curve cryptosystem, since it provides high security with smaller key size than Rivest–Shamir–Adleman and elliptic curve cryptosystem. The proposed authentication protocol is validated using the widely accepted AVISPA tool for its secure. In addition, BAN logic is used to analyse the formal security features and resistance to possible attacks are discussed informally.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10

Similar content being viewed by others

References

  1. Hayajneh, T., Almashaqbeh, G., Ullah, S., & Vasilakos, A. V. (2014). A survey of wireless technologies coexistence in MBAN: Analysis and open research issues. Wireless Networks,20(8), 2165–2199.

    Article  Google Scholar 

  2. Movassaghi, S., Abolhasan, M., Lipman, J., et al. (2014). Wireless body area networks: A survey. IEEE Communications Surveys & Tutorials,16(3), 1658–1686.

    Article  Google Scholar 

  3. Al-Janabi, S., Al-Shourbaji, I., Shojafar, M., & Shamshirband, S. (2017). Survey of main challenges (security and privacy) in wireless body area networks for healthcare applications. Egyptian Informatics Journal,18(2), 113–122.

    Article  Google Scholar 

  4. Xu, G., Wu, Q., Daneshmand, M., et al. (2016). A data privacy protective mechanism for wireless body area networks. Wireless Communications and Mobile Computing,16(13), 1746–1758.

    Article  Google Scholar 

  5. Asif, R. A. (2016). Efficient computation for hyper elliptic curve based cryptography. Master’s dissertation, Department of Electrical and Computer Engineering, University of Windsor.

  6. Zhao, Z. (2014). An efficient anonymous authentication scheme for wireless body area networks using elliptic curve cryptosystem. Journal of Medical Systems,38(2), 13.

    Article  Google Scholar 

  7. He, D., & Zeadally, S. (2015). Authentication protocol for ambient assisted living system. IEEE Communications Magazine,53(1), 71–77.

    Article  Google Scholar 

  8. Ch, S. A., Sher, M., Ghani, A., et al. (2015). An efficient signcryption scheme with forward secrecy and public verifiability based on hyper elliptic curve cryptography. Multimedia Tools and Applications,74(5), 1711–1723.

    Article  Google Scholar 

  9. John, A. L., & Thampi, S. M. (2016). Encryption scheme based on hyperelliptic curve cryptography. In International conference on security, privacy and anonymity in computation, communication, and storage (pp. 491–506). Cham: Springer.

  10. Ali, A., & Khan, F. A. (2013). ‘Energy-efficient cluster-based security mechanism for intra-MBAN and inter-MBAN communications for healthcare applications. EURASIP Journal on Wireless Communications and Networking,1, 216.

    Article  Google Scholar 

  11. Ma, L., Ge, Y., & Zhu, Y. (2014). TinyZKP: A lightweight authentication scheme based on zero-knowledge proof for wireless body area networks. Wireless Personal Communications,77(2), 1077–1090.

    Article  Google Scholar 

  12. Liu, J., Zhang, Z., Chen, X., & Kwak, K. S. (2014). Certificateless remote anonymous authentication schemes for wireless body area networks. IEEE Transactions on Parallel and Distributed Systems,25(2), 332–342.

    Article  Google Scholar 

  13. Xiong, H. (2014). Cost-effective scalable and anonymous certificateless remote authentication protocol. IEEE Transactions on Information Forensics and Security,9(12), 2327–2339.

    Article  Google Scholar 

  14. Xiong, H., & Qin, Z. (2015). Revocable and scalable certificateless remote authentication protocol with anonymity for wireless body area networks. IEEE Transactions on Information Forensics and Security,10(7), 1442–1455.

    Article  Google Scholar 

  15. Liu, Y., Wang, H., Li, T., Li, P., & Ling, J. (2018). Attribute-based handshake protocol for mobile healthcare social networks. Future Generation Computer Systems,86, 873–880.

    Article  Google Scholar 

  16. Liu, J., Zhang, L., & Sun, R. (2016). 1-RAAP: An efficient 1-round anonymous authentication protocol for wireless body area networks. Sensors,16(5), 728.

    Article  Google Scholar 

  17. Ibrahim, M. H., Kumari, S., Das, A. K., et al. (2016). Secure anonymous mutual authentication for star two-tier wireless body area networks. Computer Methods and Programs in Biomedicine,135, 37–50.

    Article  Google Scholar 

  18. Jiang, Q., Ma, J., Wei, F., et al. (2016). An untraceable temporal-credential-based two-factor authentication scheme using ECC for wireless sensor networks. Journal of Network and Computer Applications,76, 37–48.

    Article  Google Scholar 

  19. Li, X., Ibrahim, M. H., Kumari, S., et al. (2017). Anonymous mutual authentication and key agreement scheme for wearable sensors in wireless body area networks. Computer Networks,129, 429–443.

    Article  Google Scholar 

  20. Li, Z., Wang, H., & Fang, H. (2017). Group-based cooperation on symmetric key generation for wireless body area networks. IEEE Internet of Things Journal,4(6), 1955–1963.

    Article  Google Scholar 

  21. Jiang, Q., Ma, J., Yang, C., et al. (2017). Efficient end-to-end authentication protocol for wearable health monitoring systems. Computers & Electrical Engineering,63, 182–195.

    Article  Google Scholar 

  22. Das, A. K., Sutrala, A. K., Odelu, V., & Goswami, A. (2017). A secure smartcard-based anonymous user authentication scheme for healthcare applications using wireless medical sensor networks. Wireless Personal Communications,94(3), 1899–1933.

    Article  Google Scholar 

  23. Challa, S., Das, A. K., Odelu, V., et al. (2017). An efficient ECC-based provably secure three-factor user authentication and key agreement protocol for wireless healthcare sensor networks. Computers & Electrical Engineering,69, 534–554.

    Article  Google Scholar 

  24. Li, X., Peng, J., Kumari, S., et al. (2017). An enhanced 1-round authentication protocol for wireless body area networks with user anonymity. Computers & Electrical Engineering,61, 238–249.

    Article  Google Scholar 

  25. Mohammedi, M., Omar, M., & Bouabdallah, A. (2018). Secure and lightweight remote patient authentication scheme with biometric inputs for mobile healthcare environments. Journal of Ambient Intelligence and Humanized Computing,9(5), 1527–1539.

    Article  Google Scholar 

  26. Li, X., Ibrahim, M. H., Kumari, S., & Kumar, R. (2018). Secure and efficient anonymous authentication scheme for three-tier mobile healthcare systems with wearable sensors. Telecommunication Systems,67(2), 323–348.

    Article  Google Scholar 

  27. Shen, J., Chang, S., Shen, J., et al. (2018). A lightweight multi-layer authentication protocol for wireless body area networks. Future Generation Computer Systems,78, 956–963.

    Article  Google Scholar 

  28. Srinivas, J., Das, A. K., Kumar, N., & Rodrigues, J. (2018). Cloud centric authentication for wearable healthcare monitoring system. IEEE Transactions on Dependable and Secure Computing.

  29. Li, X., Niu, J., Kumari, S., et al. (2018). A three-factor anonymous authentication scheme for wireless sensor networks in the internet of things environments. Journal of Network and Computer Applications,103, 194–204.

    Article  Google Scholar 

  30. Ullah, S., Li, X. Y., & Zhang, L. (2017). A review of signcryption schemes based on hyper elliptic curve. In 3rd international conference on big data computing and communications (BIGCOM) (pp. 51–58). IEEE.

Download references

Acknowledgements

This part of the work is funded by the Science and Engineering Board (SERB), Government of India under the ECR Grant (ECR/2017/000679/ES).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to N. Sasikaladevi.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Sasikaladevi, N., Malathi, D. Energy Efficient Lightweight Mutual Authentication Protocol (REAP) for MBAN Based on Genus-2 Hyper-Elliptic Curve. Wireless Pers Commun 109, 2471–2488 (2019). https://doi.org/10.1007/s11277-019-06693-4

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11277-019-06693-4

Keywords

Navigation