Skip to main content
Springer Nature - PMC COVID-19 Collection logoLink to Springer Nature - PMC COVID-19 Collection
. 2022 Dec 15;29(3):1421–1438. doi: 10.1007/s11276-022-03205-4

Provably secure certificateless protocol for wireless body area network

Susmita Mandal 1,
PMCID: PMC9754315

Abstract

Wireless body area networks are gaining popularity due to their innovative applications such as timely analysis, remote monitoring of patients’ health, and high patient care quality. However, these healthcare systems that carry patient’s physiological data need special attention for the security and privacy of information. Due to the openness of transmitted data, the healthcare system gets prone to several adverse attacks. In this paper, a provably secure remote healthcare system is proposed based on the elliptic curve cryptosystem. The goal is to enable confidentiality and privacy of sensitive information by designing a certificateless authenticated key agreement protocol with low computational cost and higher security. The proposed scheme achieves anonymity, resistance to key escrow problems, mutual authentication between the sensor nodes attached to patients and the application provider. Furthermore, the protocol undergoes formal security analysis using the random oracle model, and the soundness of the proposed scheme is validated using ProVerif. Finally, the performance analysis depicts that the proposed scheme is efficient compared to existing methods.

Keywords: Authentication, Certificateless, Elliptic-curve cryptography, ProVerif, Wireless body area network (WBAN)

Introduction

The rapid advancement in the Internet of Things (IoT) has brought significant improvements in human life. IoT enables a connection between interrelated computing devices with the Internet that gathers information over the network without any person-to-person or person-to-computer interaction. It has a broader application, like wireless sensor networks, smart homes, smart transportation, intelligent healthcare systems, etc. Among these, the wireless body area network (WBAN) has become an essential application in the healthcare ecosystem. WBANs are useful in short distance communication that consists of wearable sensor nodes responsible for monitoring the patient’s health-related sensitive information such as heartbeat rate, body temperature, blood pressure, blood sugar, oxygen level, etc. This technology provides a high quality of convenient and reliable service using IoT devices. These networks are beneficial to elderlies with permanent care at home. The biosensors are placed in or around the patient connected through a star or multi-hop topology. These sensors are responsible for sending the patient’s sensed data to the medical doctor to provide a real-time diagnosis with the right decisions. The shared information traverses several resource constraints devices, making it challenging to secure the transmitted data confidentiality. As if the patient’s physiological data is tampered with during the transmission process, it will mislead the physician, which will result in a false diagnosis of the patient’s health condition. Another crucial challenge concerns the resource-constrained devices connected to the patient; therefore, they must be exposed to lower complex computations for efficiency. Therefore, the patient’s medical record’s security and privacy are the primary concern in the healthcare industry. The data transmitted over the public network must be accessible by only authorized entities [1]. However, strong authentication and the key establishment must be achieved for securing the communication of WBAN. The first WBAN work was proposed by Zimmerman using a wireless personal area network (WPAN) technology [2]. In 2001, Van et al. introduced the concept of body area networks as a step towards a wearable future [3]. The traditional public-key cryptosystem uses trusted Certificate Authority (CA) to bind the user identity to the public key that causes heavy management overhead. Identity-based cryptosystem eliminates the need for explicit certificates by assigning public keys to its user identity; however, it suffers from the key-escrow problem. Over the decade, several WBAN models have been proposed. Still, the privacy and security of a patient stand as a big challenge for researchers. Authentication in WBAN is a relatively new research paradigm; however, few articles have recently discussed this research topic. Most of the existing schemes are based on traditional public key infrastructure (PKI) [46] and identity-based cryptosystem (IBC) [79].

Related work

In the recent COVID-19 pandemic, the need for a remote health monitoring system shows promising solutions where a physician can remotely observe critical patients’ health status. However, patients’ physiological data need to be secured during transmission such that unauthorized entities can not access it. Therefore, it is necessary to enhance the security, which protects data from unauthorized manipulation and confidentiality to prevent data leakage. It is achieved from authenticated key agreement mechanism, which plays a vital role in dealing with the security requirements. Several schemes have recently been proposed for authenticating clients with the application provider remotely in a WBAN environment. However, these authentication schemes are based on traditional public-key cryptography (PKC) and identity-based cryptosystem (IBC) with complex computations. The difficulties in managing the certificates in public key infrastructure for the PKC make it unsuitable for WBAN. Whereas the IBC overcomes the certificate issuing and management problems, however, suffers from the key escrow problem. Al-Riyami and Paterson proposed a certificateless public key cryptography (CL-PKC) to overcome the issues mentioned earlier. However, the scheme increases the overall computation cost due to the usage of complex bilinear pairing operations [10]. In 2012, Drira et al. [11] has proposed an ID-based hybrid authentication and key establishment scheme based on a symmetric key cryptosystem. However, Kompara et al. [12] states that the protocol lacks data confidentiality, integrity, forward and backward secrecy. Also, it is susceptible to key escrow and impersonation attacks. In 2013, Liu et al. [13] proposed a lightweight certificateless authentication protocol based on a short certificateless signature method. However, the scheme fails to achieve session key security. Later Liu et al. [14] tried to resolve the issues mentioned in his above protocol by designing two certificateless remote anonymous authentication schemes for WBANs, namely, preliminary scheme and enhanced secure scheme. In contrast, Hu Xiong et al. [15] proves that the two protocols suffer from public key replacement attack. Zhao [16] pointed out that the preliminary version can not provide anonymity and the security-enhanced version suffers from stolen verifier-table attacks. In 2014, Zhao [16] proposed an efficient anonymous authentication scheme for wireless body area networks using ECC. Later, Wang et al. [17] demonstrated that [16] scheme lacks user anonymity and unable to provide unlikability features and proposed a new anonymous authentication scheme using bilinear pairing. In 2016, Wu et al. [18] found that [17] scheme is susceptible to impersonation attack. Recently, He et al. [19] proved that Liu et al. [13] also suffers from impersonation attack. Therefore, it may not suit the e-healthcare based privacy-preserving applications. Further, they have proposed a provably secure anonymous authentication scheme for WBANs. Several other schemes were proposed based on certificateless cryptosystem to overcome the traditional challenges, like Hu Xiong et al. [20] presented an anonymous certificateless authentication scheme for remote WBANs. Although the scheme withstands key escrow problems due to bilinear pairing usage, the scheme suffers from heavy computation overhead. Liu et al. [21] presented an anonymous 1-round authentication protocol for WBAN based on ECC and claims to achieve essential security features. However, Li et al. [22] prove that the scheme fails to provide key-compromise impersonation attack, stolen-verifier attack, and denial-of-service attack, and proposes an enhanced 1-round authentication protocol based on ECC. Later, Khan et al. [23] designed an improvement over Li et al. [22] by enabling a privacy-preserving key agreement for WBANs to achieve forward secrecy and unlinkability issues. Recently, Hassan et al. [24] proposed an ID-based authenticated key agreement protocol using a pairing-based cryptosystem. The protocol applies a ring signature to authenticate users within the multi-server environment anonymously. However, Kumar et al. [25] show that the scheme suffers from impersonation attack, man-in-the-middle attack, and significantly has higher computation cost. Shen et al. [26] proposed an anonymous certificateless authentication scheme. The protocol enables secure communication between hand-held PDA and application provider. However, the protocol lacks user anonymity and also suffers from collusion attack [27]. In 2020, Kasyoka et al. [28] proposed a pairing-free authentication scheme for healthcare management and proves that the protocol can thwart stolen verifier attacks. However, the scheme lacks rigorous formal security analysis. Recently, Sowjanya et al. [29] proved that [22] scheme lacks perfect forward secrecy, which is essential session key secrecy and has proposed a new end-to-end authenticated scheme for wearable monitoring devices. In the same year, Shuai et al. [30] introduced a privacy-preserving authentication scheme for WBANs using ECC suitable for multi-server architecture. Lately, Kumar et al. [31] proposed an identity-based anonymous authentication and key agreement scheme for WBAN.

In 2021, Azees  et al. [32] proposed an efficient anonymous affine cipher-based encryption technique for WBANs. The work focuses on enhancing data confidentiality and authenticity, however the proposed model uses complex bilinear operations which increases the computational overhead. Therefore, the scheme may not be adequate for resource-constrained environment. Later, Lara  et al. [33] proposed a two-party authentication scheme using self-certified public keys based on ECC for healthcare application. The scheme focus to establish communication between the patient’s portable personal terminal and an application provider (AP) with a Two-party scheme. The scheme has lowered the computational cost but lacks consideration of honest but curious network manager during registration as the secret values are accepted without verification by end nodes. To address the high computation cost Soni  et al. [34] proposes an authentication and key agreement mechanism using low-cost functions (one-way hash, bit-wise XOR, and concatenation) for data exchanges in WBAN. The patient wearing a smart wearable device will collect real-time health information and share with healthcare providers. The protocol lacks discussion on prevention from hash collusion attack and is also vulnerable to offline password-guessing attacks. Peng  et al. [35] proposes an efficient certificateless online/offline signature scheme which is designed in a lightweight manner for WBANs. The scheme focuses on ensuring both security and efficiency of the online/offline signature for the real-world deployment. The scheme tries to reduce the computational cost by addressing the offline mode of verification. In order to achieve data confidentiality and fine-grained access control simultaneously on transmitted data Liu  et al. [36] proposed an attribute-based online/offline encryption and Identity-based ring signature scheme to achieve an outsourced online/offline hybrid signcryption mechanism applied for WBAN. The scheme allow patients to share fine-grained data without leaking any extra information. Despite its promising solution, the scheme may lead to the heavy computational cost on resource-constrained devices. Later, Cheng  et al. [37] proposed an improvement on Kumar et al. [31] scheme on lightweight cloud-assisted identity-based AKA scheme for WBAN. They claimed that the scheme lacks perfect forward secrecy and proposed a protocol a new anonymous identity-based AKA scheme. The proposed scheme claimed to be a certificateless AKA scheme, however the key shared by the network manager to cloud server and leaf node are not partial private keys but private keys. An approach of annonymization using identity-based authenticated encryption scheme without bilinear pairing, known as IB-AAE is proposed by Li  et al. [38]. The scheme combines the functionality of being anonymous and identity-based encryption, to achieve forward security. However, the generation of private keys are completely dependent on the trusted key generator. Recently, Hasan  et al. [39] proposed an architectural framework that incorporates blockchain with Software-Defined Wireless Body Area Networks (SDWBANs) to facilitate secure data sharing. The proposed framework of WBAN is modified by adding SDN enabled switches to communicate with sensors and forwarding the information through an interface between to Blockchain for just access validation. This solution may increase the overhead of data management and communication across the WBAN layers.

So far, from the literature study, it is clear that using identity based cryptosystem may create a key escrow problem. As a malicious PKG could perform a man-in-the-middle (MITM) attack using the private keys. Therefore, desiging a certificateless authenticated key agreement protocol with backward and forward secrecy is suitable for resource constraint wireless body area networks. As the patient’s health information is very sensitive data, it must be accessed only by the authorized medical staff, including doctors and technicians. Therefore it is crucial to obtain data security to wireless body area networks such that confidential information may not be altered or abused by misusers. A remote WBAN based authenticated key agreement protocol must withhold the following properties: user authentication, data integrity, session key security, replay attack, impersonation attack, backward and forward secrecy. This paper proposes a provably secure certificateless authenticated key agreement protocol to meet the security requirements mentioned above and the challenges. The main contributions of this paper are summarized as follows:

  1. Design of a pairing-free secure authentication protocol that overcomes the traditional certificate issuing and management problem of public-key cryptosystem and achieves immunity against key escrow problem faced by IBC.

  2. The proposed scheme enables the network manager to generate partial private keys for each registered entity which can be validated publicly, thus preventing impersonating legitimate users.

  3. The security is based on the hardness assumption of Elliptic Curve Diffie–Hellman assumption and Computational Diffie–Hellman (CDH) problem. The scheme undergoes rigorous formal analysis and informal analysis using automated protocol analyzer ProVerif, and formal analysis using Real-Or-Random (ROR) model.

  4. The comparative analysis of the scheme is performed concerning computation, communication, and security features with existing schemes.

Paper organization

The rest of the paper is organized as follows. Section 2 deals with the mathematical background, network model, system model, and security model. The proposed scheme is depicted in Sect. 3. In Sect. 4, the formal informal security analysis along with protocol validation using ProVerif is presented. The performance analysis concerning security features, computation, and communication costs is shown in Sect. 5. Finally, we conclude in Sect. 6.

Preliminaries

This section provides brief introduction of cryptographic techniques used in this paper, network model, system model, and security model.

Elliptic curve cryptography

The security of Elliptic curve cryptography (ECC) is based upon the difficulty of solving Ellipic curve discrete logarithmic problem (ECDLP). Let E/Fq be a set of elliptic curve points over a finite field Fq, defined by an equation

y2=x3+ax+b,a,bFq 1

where (4a3+27b2)0. The additive elliptic curve group defined as Gq={(x,y):x,yFq,(x,y)E/Fq} {O}, where the point “O” is known as “point at infinity” or “zero point”. The definitions about the elliptic curve group as follows.

  • Point addition Let P, Q be two points on the curve shown in Eq. (2), such that P+Q=R, where the line joining P and Q intersects the curve at negative R, and the reflection towards x-axis is R.

  • Scalar point multiplication It is defined on a cyclic group Gq as rP=P+P+ +P(rtimes), where rZq is scalar.

Computational problem

Definition 1

(Elliptic curve discrete logarithm problem (ECDLP)) Given P,RGq, where R=xP and xZq. It is difficult to compute x from R.

Definition 2

(Computational Diffie–Hellman problem (ECDH)) Given (P,xP,yP) Gq for x,yZq, where computation of xyP is hard from the group Gq.

Network model

The WBAN ecosystem consists of in-body, on-body, and off-body sensors which communicate and share data across three layers. The description is depicted in Fig. 1.

  • Layer 1 In this layer, the sensor nodes placed over and within the body communicate with the aggregator (i.e., mobile device). This layer is also known as Intra-BAN, i.e., an internal network.

  • Layer 2 In this layer, the aggregator passes the collected data to the access points. This layer is also known as Inter-BAN.

  • Layer 3 This layer depicts whole network of the server where communication happens beyond the BAN, therefore known as Beyond-BAN. The transmission occurs over a TCP/IP connection between the access points and the medical server.

Fig. 1.

Fig. 1

Architecture of a WBAN

System model

The proposed model consists of three entities, namely, the Patient’s Mobile device (MD), Application Provider (AP), and Network Manager (NM). The model is depicted in Fig. 2.

  • Patient’s mobile device (MD) The patient implies to the person who avails the medical facilities remotely. With sensors placed in or on the body to collect physiological information. These pieces of information are sent to an intermediate node known as an aggregator, such as PDA and hand-held mobile device. The sensors and mobile device should be registered with the Network Manager before it accesses the Application Provider’s services.

  • Network manager (NM) It acts as a Key Generation Center (KGC) responsible for registering the sensor nodes, aggregator device, and application providers to legally access and avail the services. After the registration process, the NM generates partial private keys for every node and distributes them through a secure channel (i.e, TLS protocol). It is more likely a trusted third party that manages the whole network and participants.

  • Application provider (AP) This represents the hospitals that the network manager authorizes to provide services to patients suffering from any critical ailment.

Fig. 2.

Fig. 2

System model of a WBAN

Security model

This section outlines the widely accepted Dolev-Yao threat model  [40] pursued in the paper using the following assumptions:

  • The Network Manager (NM) is assumed to be a trusted server that generates a partial private key for every registered user. Therefore, even if a passive/active adversary compromises the partial private key, he/she will not be able to forge the session key. The full private key is generated using the secret value and partial private key of each participating entity.

  • The messages exchanged at the authentication phase between two entities are communicated over an insecure channel. An adversary can eavesdrop on all the messages transmitted and intercept, inject, modify, and resend any previously sent message. However, the adversary can not access messages in a secure channel.

  • The application provider is assumed to be trustworthy; however, an adversary can compromise the database for malicious purposes.

  • A privileged insider can act as an adversary by intercepting the registered request parameters.

Proposed work

In this section, the proposed certificateless authenticated key agreement protocol is discussed, which involves three phases: (1) Initialization, (2) Registration, and (3) Authentication. The registration occurs in a secure channel, with all the participating entities registering themselves with the network manager. A secure channel can be defined as a bidirectional communication medium that ensures the confidentiality, integrity, and freshness of data transferred through the channel. This can be achieved either by exchanging data through a trusted person in offline mode or through a strong Transport Layer Security (TLS) connection, defined in RFC 8446 [34, 41]. Typically the registration process is a one-time matter. Thus, an adversary cannot tamper the partial private keys sent by the entities during the registration process. In contrast, the authentication and key agreement phase between the aggregator and the application provider occur through an open/insecure channel, which means that an adversary (based on the Dolev-Yao model) can intercept, modify, delete the message tuple [42]. The notations used throughout the paper are mentioned in Table 1.

Table 1.

Notations

Notation Description
snm Master secret key of network manager
Pnm Public key of network manager
IDu Identity of patient
xu Private key of patient
Pu Public key of patient
xap Private key of application provider
Pap Public key of application provider
ti/tu Timestamp
P Generator of the elliptic curve
|| Concatenation function
XOR operation
SK Session key between patient and application provider
Hi Cryptographic hash function i{0,1,2,3,4,5}
A=?B Verifies whether A is equal to B

Initialization phase

Network manager chooses a security parameter 1k as input and generates a group G with prime order q and determines a point P as generator in group G. The NM then selects a random integer snmZq as a master key and computes a public key Pnm=(snm·P). Then six different hash functions are computed based on SHA-256 algorithm taking following three types of input sets: (a) {0,1} is the set of binary bit-strings of arbitrary size, (b) Zq is a set of positive integers where q is prime number, and (c) G is a cyclic multiplicative group of prime q, to obtain different hash values. The hash functions are depicted as follows: H0:{0,1}×ZqZq, where hash function H0 takes a set of binary bit-strings of arbitrary length concatenated with a set of integers and result is the integer coded in set Zq. Similarly, H1:Zq×ZqZq, H2:Zq×GZq, H3:{0,1}×G×GZq, H4:G×Zq×G×ZqZq, H5:{0,1}×{0,1}×{0,1}×G×GZq. Later, NM publishes the public parameters params={G,q,P,Pnm,H0,H1,H2,H3,H4,H5} while keeping the master key (snm) secret.

Registration phase

In this phase, the patients must register the mobile device with network manager. Similarly, the application provider must register with required details to the network manager. Where NM is a trusted authority. In real-time, the role of NM can be hosted by a central e-healthcare institution or any distributed authorized center. Patients willing to avail remote healthcare facilities from the application provider (i.e., medical institutions) must register their mobile devices assigned as an aggregator to receives details from the sensor nodes. The NM generates partial private keys to all the noted entities. The registration process is described below and also depicted in Fig. 3.

Fig. 3.

Fig. 3

Registration phase

Sensor nodes registration

  • Step 1 The Application provider (AP) deploys the sensor nodes (SN) to each patient upon registration with NM. The AP generates IDSNi{0,1} and a random secret sriZq where i{1,2,3,,n}. Then computes Ni=H0(sri||IDSNi) and sends the message tuple IDap,Ni to NM. Once received, NM stores it in its database. Similarly, AP sends IDSNi,Ni to sensor nodes later stores in its memory.

  • Step 2 Upon receiving the message tuple NM generates a random number rSNiZq, a fresh nonce Nc and computes Yi=NiH1(snm||rSNi), SKsn=H1(snm||rSNi)(IDnm||Nc). Later after the registration of MD, network manager computes Ki=NiH2(Qmd||Rmd) and sends a message tuple Yi,SKsn,Nc,Ki,IDnm to sensor nodes.

  • Step 3 Once SN receives the message, each sensor node computes H1(snm||rSNi)=NiYi. Then every node checks whether SKsn=?H1(snm||rSNi)(IDnm||Nc). If it matches then the sensor nodes successfully validates that NM has shared the correct parameter Ni for future communication else reply with an message. Later, SN stores (Ki) in its database.

Patients registration

  • Step 1 Initially, the patient desiring to register for home care facility provides his/her identity, address proof along with device identification as IDmd{0,1}. Then generates a random number xmdZq and computes its respective public key Pmd=xmd·P. Then the patient’s device sends a message tuple IDmd,Pmd to NM.

  • Step 2 Once received, NM first chooses a random number rmdZq then computes Rmd=rmd·P, Zmd=H3(IDmd||Pmd||Rmd), Qmd=(rmd+Zmd·snm) as partial private key. Then responds back with message IDnm,Ni,Qmd,Rmd to patient’s device.

  • Step 3 Upon receiving the response, patient’s device computes Zmd=H3(IDmd||Pmd||Rmd) and verifies the partial private key as Qmd·P=?(Rmd+Zmd·Pnm). Therefore, patient’s mobile device holds the private keys Upriv=(xmd,Qmd) and public keys Upub=(Pmd,Qmd·P).

Application provider registration

  • Step 1 Like MD, the application provider sends his/her identity IDap{0,1} then generates a random number xapZq and computes the public key Pap=xap·P. Then sends the message tuple IDap,Pap to NM.

  • Step 2 Once received, NM first chooses a random number raZq and a public key Ra=ra·P. Then computes Za=H3(IDap||Pap||Ra), Qa=(ra+Za·snm) as the partial private key. Then responds back with message IDnm,Qa,Ra to AP.

  • Step 3 Upon receiving the message, the application provider then verifies the partial private keys as Za=H3(IDap||Pap||Ra) then check if Qa·P=?Ra+Za·Pnm. Therefore, AP holds private keys Apri=(xap,Qa) and public keys Apub=(Pap,Qa·P) respectively.

Authentication phase

Upon completing the registration process with the network manager, now each sensor node attached to the patient body, senses the health vitals and share it with the mobile device. The patient’s device is capable of communicating all the gathered information to the application provider for suitable diagnosis and treatment from concerned doctors. The process is described in following steps and depicted in Fig. 4.

  • Step 1 To begin the communication, each sensor node collect the information related to blood glucose, temperature, oxygen levels, pulse, blood pressure etc. Then send the aggregated data along with a timestamp ti, parameter Ki stored in SN to the mobile device. The patient’s device first checks if |ti-tc|T to validate whether the received timestamp ti falls within the tolerable time delay T else abort the message. Now MD computes Ni=KiH2(Qmd||Pmd) then check if Ni=?Ni from database. If matches, then aggregates the health vitals from all the nodes and generate a fresh nonce nu, timestamp tu, and an ephemeral key ymdZq. Then computes, C1=H1(ymd||nu), F=xmd·Pap, C2=(Pnm||F||IDap||IDmd)C1, C3=xmd+H4(Pap||tu||Pnm||Ni)·C1. Later sends tu,C2,C3 to the application provider.

  • Step 2 Once received, AP first checks whether the time stamp tu is fresh as tu-tnT. Then computes F=Pmd·xap, C1=C2(Pnm||F||IDap||IDmd). AP checks whether C3·P=?Pmd+H4(Pap||tu||Pnm||Ni)·C1·P if matches, then AP further generates a random number na and a time-stamp ta. Then computes, D1=(yap+na), Kz=C1·Pap, D2=D1(Kz||IDmd||IDap||C2), D3=xap+H4(C3||Pap||Pmd||ta)·D1. Finally, computes the session key SK=H5(C1·D1·P||Kz||IDmd||IDap||IDnm). Later, sends a message tuple ta,D2,D3.

  • Step 3 Upon receiving the message tuple the patient’s device checks the freshness of the timestamp as ta-tnT. Then computes, Kz=C1·Pap, D1=D2(Kz||IDmd||IDap||C2). Patient’s device now checks whether D3·P=?Pap+H4(C3||Pap||Pmd||ta)·D1·P if matches then patient computes the session key SK=H5(C1·D1·P||Kz||IDmd||IDap||IDnm) for future communication.

Fig. 4.

Fig. 4

Authentication phase

Security analysis

In this section, a formal and informal (non-mathematical) security analysis of proposed scheme is performed. Furthermore, the protocol is verified using the widespread automated tool ProVerif.

Formal proof using ROR model

In this section, the formal security analysis using the probabilistic Real- Or-Random (ROR) model [43] is used to prove the session key security of the proposed scheme. The model states that an adversary A has complete control over all the transmitted messages between the entities such that, A can intercept, replay, or modify the messages. Though A does not have direct access to the private keys and session keys, however, it can perform the following queries to capture the leaked information.

In this scheme, there are three participants Pdevice, Network Manager, and Application Provider. For convenience we denote Pdevice as Pi and Application Provider APj such that Pi and APj represents the ith and jth instances of Pdevice and AP in the authentication phase. Each instance is considered to be an oracle which has three states Accept, Reject, and , where Accept means oracle receives correct message else sends a Reject message otherwise send a symbol means not able to produce a response. A can simulate following oracle queries:

  • Execute(Pi,APj) It simulates passive attack and allow A to learn the messages exchanges between honest instances Pi and APj.

  • Send(Pi/APj,m) It simulates active attack where A can generate any message m and send it to Pi/APj. As a result, the corresponding operation is performed according to the protocol description.

  • SSReveal(Pi/APj) It allows A to obtain session-specific information.

  • SKReveal(Pi/APj) It allows A to obtain the session key held by Pi/APj, if it has been negotiated.

  • Corrupt(Pi/APj) This query is used to capture the perfect forward secrecy, in which A is allowed to obtain the long-term private key.

  • Test(Pi/APj) This query returns a session key or a random value else sends back a null value. A is allowed to send a single Test query. In response a coin b{0,1} is flipped. If b=1 the session key is returned or a random value with same bit length is returned if b=0.

Partnering The instances Pi and APj are partners if they authenticate each other and share the same session key.

Freshness As instances, Pi and APj are fresh, if the session key is not revealed SKReveal. The adversary A’s goal is to identify the difference between a fresh session key from a random value.

Semantic security An adversary A can execute several Test queries to either Pi or APj. In this query, the oracle flips the coin b, if a bit b is returned at the end of the experiment. A can win the game if b=b. The advantage of A breaking the semantic security of the proposed certificateless authenticated key aggrement (CL-AKA) referred as W becomes AdvWCL-AKA(A)= 2Pr[b=b]-1 where b is the bit A guesses.

One-way hash function This query simulates the hash function. When Pi/APj receives the message m from A, the hash value of m is calculated and returned to A.

Lemma 1

(Difference Lemma): Let R1,R2 and R3 denote the events defined in some probability distribution. If R1¬R3R2¬R3, we have |Pr[R1]-Pr[R2]|Pr[R3] [44].

Theorem 1

Assume A is a probabilistic polynomial time adversary against the semantic security who can issue at most qs times Send query, qe time Execute query, and qh times hash query. The advantage of A is given as AdvWCL-AKA(A)(qh2/2(l+1))+(qs+qe)2/2p+(qs/2l)+qhAdvCL-AKAECDHP(A).

Proof

In order to prove the semantic security of the proposed scheme, a sequence of gamer Gm0 to Gm4 is presented where Gm0 represents the real attack. Let Succi is the event where the adversary (A) correctly guesses the bit b after the Test query.

GameGm0
This games simulation is the real attack situation against the protocol in the random oracle model. Thus, we have
AdvWCL-AKA(A)=|2Pr[Succ0]-1| 2
GameGm1

In this game, all the oracle queries and responses are stored in following list:

LW

stores all messages in the whole process.

LH

stores answers of all random hash oracles H0,H1,H2,H3,H4,H5.

LT
stores the transcript of all the messages. The answer to hash queries are generated in the form of (x,y,f) such that on a hash query f(x) where f{H0,H1,H2,H3,H4,H5}, if the record x,y,f is found in the list LH then return y directly, else a random string y with the same bit length will be produced as the returned value and then add x,y,f into the list LH. It is observed that the transcript distribution of games Gm0 and Gm1 are indistinguishable. Therefore,
Pr[Succ0]=Pr[Succ1] 3
GameGm2

In this game, all the oracle queries are simulated as same as in the game Gm1, however collision occurred at transcript and collision occur at hash queries are aimed to be avoided. According to the birthday paradox,

  1. xmd,xapZq, the probability of collision in the transcripts is at most (qs+qe)22p.

  2. The probability of hash collision is at most qh22l+1 where l is the length of hash output string.

Therefore, we have |Pr[Succ2]-Pr[Succ1]|qh22l+1+(qs+qe)22p.

GameGm3
In this game, if adversary (A) can guess the C3 and D3 without asking the random oracle queries H4, then the scheme is aborted. Such situation appears in the send queries, which means Gm3 and Gm2 are indistinguishable unless this case occurs. Thus,
|Pr[Succ3]-Pr[Succ2]|qs2l 4
GameGm4

In this game, the session key security is considered. The notion of this security feature is that A must not be able to obtain the past session keys even if some information among {ymd,nu,yap,na,xap} is revealed. The adversary A knows the session transcripts (tu,C2,C3) and (ta,D2,D3). The adversary must ask H5 query to win the game. The goal of A is to compute the session key in the following four cases and by asking Execute(Pi,APj) and hash queries.

  • (Case 1) Corrupt(Pi) and Corrupt(APj) are queried from which adversary A obtain the long-term private keys xmd,xap of Pi and APj respectively. However, to derive the session key SK=H1((ymd+nu)·(yap+na)·P||((ymd+nu)·xap·P)||IDmd||IDap||IDnm) either of the random nonces nu,na and the ephemeral key ymd of Pi and yap of APj are also required.

  • (Case 2) SSReveal(Pi) and Corrupt(APj) are queried from which adversary A obtains the nonce nu, ephemeral keys ymd of Pi and long-term private key xap of APj.

  • (Case 3) Corrupt(Pi and SSReveal(APj) are queried from which adversary A obtains the long-term secret key xmd of Pi and ephemeral key yap and nonce na.

  • (Case 4) SSReveal(Pi) and SSReveal(APj) are queried from which adversary A obtains the ephemeral key of both but not the private key. However, in all the above four cases, the information available to adversary are insufficient to break the ECDHP assumption. As a result the difference between Gm3 and Gm4 is negligible as long as the ECDHP assumption holds.
    |Pr[Succ4]-Pr[Succ3]|qhAdvCL-AKAECDHPA 5

In Gm4, all the random oracles are simulated. A is only left to guess the winning bit b after querying the Test query. Therefore, we have,

Pr[Succ4]=12 6

From Eq. 2, we have

12AdvWCL-AKAA=|Pr[Succ0]-12| 7

From Eqs. 3 and 4, we have

12AdvWCL-AKAA=|Pr[Succ1]-12| 8

Applying triangular inequality, we obtain,

|Pr[Succ4]-Pr[Succ1]||Pr[Succ4]-Pr[Succ3]|+|Pr[Succ3]-Pr[Succ1]||Pr[Succ4]-Pr[Succ3]|+|Pr[Succ3]-Pr[Succ2]|+|Pr[Succ2]-Pr[Succ1]|qh22l+1+(qs+qe)22p+qs2l+qhAdvCL-AKAECDHP(A)

From the games Gm0 to Gm4 and using the Lemma 1, Theorem 1 is proven.

Informal security analysis

Mutual authentication

In the proposed scheme, at the authenticated phase the application provider verifies the authenticity of the patient communicating with his registered device as C3·P=?Pmd+H4(Pap||tu||Pnm||Ni)·C1·P. Similarly, the patients device also verifies whether the response is obtained from legitimate application provider by checking if D3·P=?Pap+H4(C3||Pap||Pmd||ta)·D1·P. Else the session is terminated. Therefore, the proposed scheme could provide mutual authentication successfully.

Resistance against sensor node impersonation attack

Suppose an adversary A intercepts the sensor node’s message ti,Ki claiming to be a legitimate sensor node to access the network for malicious gain. In the proposed scheme, an adversary fails to deduce the parameter Ki as the temporary identity Ni is computed using a random secret generated by the application provider and the identities of each sensor node. Then the one-way hash function is applied on Ni. Therefore, even if an adversary tries to compromise a sensor node the random secret cannot be disclosed.

Perfect forward secrecy

Suppose an adversary A had compromised the session key SK. The PFS holds when even after compromising long-term keys of the current session, it must not affect any past or future sessions. For instance, despite an adversary obtains Pdevice and AP’s private keys to compute the session key SK, an adversary A still requires the ephemeral keys and random nonces which are different and fresh at every session. Therefore, the proposed scheme achieves perfect forward secrecy.

Resistance against application provider impersonation attack

Suppose an adversary A intercepts the application provider message ta,D2,D3 to forge its identity to the Patient’s device. However, in the proposed scheme, an adversary fails to deduce the parameter D1 as it includes a random ephemeral key yap and nonce na. Thus, it is difficult for A to obtain two secret parameters to forge successfully.

Replay attack

In the proposed scheme, the timestamp tu,ta is used between Pdevice and AP to prevent the replay attack. Even if an adversary tries to intervene the tolerable time delay will exceed and the session will be aborted. Therefore, it is infeasible to replay a message from any previous session into a new session.

Resistance against patient impersonation attack

Suppose an adversary A intercepts the message send by the Patient’s device tu,C2,C3 to forge its identity to the application provider. However, in the proposed scheme, an adversary fails to deduce the parameter C1 as it includes a random ephemeral key ymd and nonce nu. Thus, it is difficult for A to obtain two secret parameters to forge successfully.

Known session key secrecy

In this scheme, the application provider, and patient’s mobile device chooses a secret ephemeral key yap/ymdZp, random nonces na/nu which are generated freshly each time the protocol is run. In the protocol, the session key SK is generated using the combination of nonces, long-term secret key, and ephemeral keys. Therefore, an adversary will fail to re-create the session key with partial information due to the difficulty of solving the ECDLP assumption.

ProVerif security analysis

In this section, we aim to analyze the proposed CL-AKA protocol using the widely accepted ProVerif tool [45] which is used to verify the security of cryptographic protocols automatically. The tool used pi-calculus language for describing and analyzing protocols. ProVerif supports several cryptographic properties such as encryption/decryption (symmetric and asymmetric), hash functions, and digital signatures. This tool enables session simulation and message space to determines whether the correctness of the protocol can be proved. The adversary is assumed to be able to eavesdrop, insert, and delete the messages. Upon the verification of cryptographic protocol based on required security properties, one of the following may occur:

  • If the proof is true, it states that the attacker is unreachable. This makes ProVerif suitable for proving the secrecy of terms in a protocol.

  • Otherwise, if the proof is false, it states that ProVerif is able to provide an attack trace.

Further, it proves security properties like perfect secrecy, mutual authentication, based on which our proposed protocol is verified.

Definitions

Open channels SecChanl, PubChanl are defined for registration and authentication. The code has few constants like identities IDmd,IDap,IDnm,IDsni and variables (P,xmd,sri, rd,xap,rsni,ra). The operations are string concatenation, XOR operation, hash function, addition, and multiplication. Followed by events that are applied to check correspondence relation in the mutual authentication phase of the proposed scheme. The queries about session keys are to check the secrecy of the key. The definitions are depicted in Fig. 5.

Fig. 5.

Fig. 5

Definition of the code

Process

The code is written for four entities namely, Patient’s device (MD), AP (Application provider), sensor nodes (SN) and NM (Network manager). The MD, SN and NM processes are depicted in Figs. 6 and 7. It consist of the registration phase of Patient through mobile device, sensor nodes with NM. Whereas, Fig. 8 represents the registration phase of AP with NM and the authentication phase details of exchange of session between AP and Patient’s device for mutual authentication and secure exhange. The detail process of NM’s key generation and work process is also depicted in it.

Fig. 6.

Fig. 6

Process for patient’s device

Fig. 7.

Fig. 7

Process for NM

Fig. 8.

Fig. 8

Process for AP

Result

The results for the eight queries are demonstrated in Fig. 9. The result of relation query shows that the event(UserNM(a,b)) is correctly executed after the event(UserAuth(a,b)). Similarly, event(APNM(a_17,b_18)) is correctly executed after the event(APAuth(a_17,b_18)), event(begin_SN(a_19)) is correctly executed after the event(SNAuth(a_19)) and inj-event(UA(a_21,b_22,c)) is correctly executed after the inj-event(acceptAU(a_21,b_22,c)). The events are executed in the simulation process RESULTnotattacker(xmd[])istrue, RESULT

Fig. 9.

Fig. 9

Result

notattacker(xap[])istrue, and RESULT notattacker(sri[])istrue. This shows that the private keys are secured. Also the RESULT notattacker(SKua[])istrue states that the session keys are secured against various attacks. Thus, the scheme is verified under ProVerif.

Performance analysis

In this section, the performance analysis of the proposed CL-AKA scheme is discussed in comparison with existing competent schemes namely, [13, 1719, 2931, 33], and [37]. This section demonstrates the comparision of the proposed scheme with respect to security features, computation cost, and communication cost with above mentioned seven related protocols.

Comparison of computation cost

The evaluation environment is a laptop running Windows 10 and 64-bit Intel(R) Core(TM) i7-10750 H CPU @2.60GHz, 16.00GB RAM. If we consider the schemes based on bilinear pairing, then the Tate pairing e:G1×G1GT defined on a super-singular curve E1:y2=x3-x+1 mod p where p denotes 160-bit prime number and the size of elements taken for computation in G1 is 320 bits. The state-of-the-art of computing the Tate bilinear pairing is eta pairing, introduced by Barreto et al. [46] is used for implementation. This achieves the security level of the RSA algorithm with a 1024-bit key length.

To attain same security level, in the proposed scheme the Koblitz curve secp256k1 defined in Standards for Efficient Cryptography (SEC) [47] is utilized. The curve E2:y2=x3+ax+b mod p where p is 160-bit prime number for a,bZq where q=160 bits and size of elements in G is 320 bits. Table 2, shows the notations for different cryptographic operations along with their execution time in seconds. The computation cost of proposed CL-AKA scheme is compared with existing competent schemes in Table 3.

Table 2.

Execution time of various operations

Notation Execution time (seconds)
Tmul Time complexity for executing the modular multiplication is 0.343 s
Texp Time complexity for executing the modular exponentiation is 0.140 s
Tsm Time complexity for executing the elliptic curve scalar point multiplication is 0.031 s
Tenc/dec Time complexity for executing AES-256 encryption and decryption is 0.937 s
Tbp Time complexity for executing the bilinear pairing operation is 4.06 s
Th Time complexity for executing the hash function is 0.001 s

Table 3.

Computation cost

Schemes Patients AP Total
Liu et al. [13] 4Tsm+Texp Tsm+Texp+Tbp 5Tsm+2Texp+Tbp4.495
Wang et al. [17] 3Tsm+Tbp 2Tsm+Tbp 5Tsm+2Tbp8.275
Wu et al. [18] 3Tsm+4Th+2Texp 3Tsm+4Th+2Texp+Tbp 6Tsm+8Th+4Texp+Tbp4.814
He et al. [19] 4Tsm+4Th 4Tsm+2Tbp 8Tsm+4Th+2Tbp8.372
Sowjanya et al. [29] 3Tsm+Th+Tmul 6Tsm+3Th+Tmul 9Tsm+4Th+2Tmul0.969
Shuai et al. [30] 4Tsm+4Th+Tmul 4Tsm+4Th+Tmul 8Tsm+8Th+2Tmul0.942
Kumar et al. [31] 3Tsm+4Th+2Tmul 6Tsm+4Th 9Tsm+8Th+2Tmul0.973
Lara  et al. [33] 3Tsm+4Th+Tenc 3Tsm+4Th+Tdec 6Tsm+8Th+2Tenc/dec2.069
Cheng  et al. [37] 3Tsm+5Th+2Tmul 5Tsm+3Th+2Tmul 8Tsm+8Th+4Tmul1.628
Proposed CL-AKA 4Tsm+3Th+Tmul 4Tsm+4Th+Tmul 8Tsm+7Th+2Tmul0.941

Comparison of communication cost

In order to compare the communication cost of the proposed CL-AKA scheme with existing ones, let us assume that the length of the identity as |ID| is 32 bits, timestamp |T| is 32 bits, the size of random number |Zq| is 160 bits, the scalar point multiplication as |G| is 320 bits, pairing-based scalar multiplication as |G1| is 320 bits, hash function as |H| is 256 bits, and symmetric enc/dec function ED is 256 bits, respectively. In the proposed scheme the message transferred between Patient to AP contains tu,C2,C3 which needs (32 + 160 + 160) = 352 bits and response message from AP contains ta,D2,D3 which needs (32 + 160 + 160) = 352 bits. Therefore, the total communication cost of the proposed CL-AKA scheme is 704 bits. The communication costs of competent existing schemes are depicted in Table 4.

Table 4.

Communication cost

Scheme Communication cost Length (in bits)
Liu et al. [13] |T|+2|Zq|+|G1|+2|H| 1184
Wang et al. [17] 2|T|+2|G1|+|ED|+|H| 1216
Wu et al. [18] 2|T|+|Zq|+|ED|+|G1| 800
He et al. [19] |T|+|ED|+2|G1|+|H| 1184
Sowjanya et al. [29] |ED|+2|G|+|H| 1152
Shuai et al. [30] 2|T|+2|G|+3|Zq| 1184
Kumar et al. [31] |T|+2|G|+|Zq|+|H| 1088
Lara  et al. [33] |T|+2|G|+|Zq| 832
Cheng  et al. [37] 3|T|+2|G|+|ED|+3|H| 1760
Proposed CL-AKA 2|T|+4|Zq| 704

Comparison of security and functional features

In this subsection, we analyze the security and functional features of the proposed CL-AKA scheme with the existing competent schemes. Table 5 emphasizes on the security features which includes, mutual authentication, impersonation attack, user anonymity, untraceability, session key agreement, perfect forward secrecy, and formal security proof. In this table ’Y’ indicates the security feature is addressed whereas ’N’ indicates the absence of that feature.

Table 5.

Security features

Scheme [13] [17] [18] [19] [29] [30] [31] [33] [37] Proposed
CL-AKA
Mutual authentication N Y N Y Y Y Y Y Y Y
Resistance against sensor impersonation attack N N N Y Y Y Y Y Y Y
Resistance against AP impersonation attack N N N Y Y Y Y Y Y Y
Replay attack N Y Y Y Y Y Y Y Y Y
Resistance against patient impersonation attack N Y Y Y Y Y Y Y Y Y
Known session key secrecy Y Y Y Y Y Y Y Y Y Y
Perfect forward secrecy N Y Y Y Y Y N Y Y Y
Formal security proof N N Y Y Y Y Y Y N Y

Conclusion

This paper proposes a certificateless authenticated key agreement protocol for remotely monitoring patients health using WBAN. The proposed scheme provides perfect forward secrecy, resistance against sensor/application provider & patient’s device impersonation attack, mutual authentication, and known session key secrecy. The formal security analysis shows that the proposed scheme is able to provide session key security in the widely accepted ROR model. The validation of the proposed CL-AKA scheme using the widely accepted ProVerif tool states that the protocol is safe. In addition, the performance analysis shows that the proposed scheme has low computation and communication cost compared with existing competent schemes. Therefore, the proposed scheme can be applied to e-healthcare applications.

Dr. Susmita Mandal

received her Ph.D. in computer science and engineering from National Institute of Technology Rourkela, India. She is currently an Assistant Professor associated with the Center for Distributed Ledger Technology and Innovation at Institute for Development and Research in Banking Technology, (Established by RBI), India. She is currently leading three Government sponsored Projects as Principle Investigator in the area of Cryptographic applications to Blockchain and secure communication using Internet of Things. She is the Managing Editor for the Journal of Banking and Financial Technology, Springer. Her current research interest are in Applied Cryptography, Security and Privacy aspects in Blockchain, Secure Low-cost communication solution, Authentication, and Privacy preserving mechanisms.graphic file with name 11276_2022_3205_Figa_HTML.jpg

Data availibility

Not applicable

Footnotes

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

References

  • 1.Thotahewa KMS, Redouté JM, Yuce MR. Ultra wideband wireless body area networks. Cham: Springer International Publishing; 2014. [Google Scholar]
  • 2.Zimmerman TG. Personal area networks: Near-field intrabody communication. IBM Systems Journal. 1996;35(3.4):609–617. doi: 10.1147/sj.353.0609. [DOI] [Google Scholar]
  • 3.Van Dam, K., Pitchers, S., & Barnard, M. (2001). Body area networks: Towards a wearable future. In Proc. WWRF kick off meeting. (pp. 6–7).
  • 4.Sangari, A. S., Manickam, J. M. L. (2014). Public key cryptosystem based security in wireless body area network. In Circuit, power and computing technologies (ICCPCT), 2014 international conference on. (pp. 1609–1612). IEEE.
  • 5.Li J, Chen X, Li M, Li J, Lee PPC, Lou Wenjing. Secure deduplication with efficient and reliable convergent key management. IEEE Transactions on Parallel and Distributed Systems. 2014;25(6):1615–1625. doi: 10.1109/TPDS.2013.284. [DOI] [Google Scholar]
  • 6.Shen J, Zheng W-Y, Wang J, Zheng Y-H, Sun X-M, Lee S-Y. An efficient verifiably encrypted signature from weil pairing. Journal of Internet Technology. 2013;14(6):947–952. [Google Scholar]
  • 7.Tan CC, Wang H, Zhong S, Li Q. Ibe-lite: A lightweight identity-based cryptography for body sensor networks. IEEE Transactions on Information Technology in Biomedicine. 2009;13(6):926–932. doi: 10.1109/TITB.2009.2033055. [DOI] [PubMed] [Google Scholar]
  • 8.Li J, Li J, Chen X, Jia C, Lou W. Identity-based encryption with outsourced revocation in cloud computing. IEEE Transactions on Computers. 2015;64(2):425–437. doi: 10.1109/TC.2013.208. [DOI] [Google Scholar]
  • 9.Li X, Niu J, Liao J, Liang Wei. Cryptanalysis of a dynamic identity-based remote user authentication scheme with verifiable password update. International Journal of Communication Systems. 2015;28(2):374–382. doi: 10.1002/dac.2676. [DOI] [Google Scholar]
  • 10.Al-Riyami, S. S. & Paterson, K. G. (2003). Certificateless public key cryptography. In International conference on the theory and application of cryptology and information security (pp. 452–473). Springer.
  • 11.Drira, W., Renault, É. & Zeghlache, D. (2012) A hybrid authentication and key establishment scheme for wban. In 2012 IEEE 11th international conference on trust, security and privacy in computing and communications (pp. 78–83). IEEE.
  • 12.Kompara M, Hölbl M. Survey on security in intra-body area network communication. Ad Hoc Networks. 2018;70:23–43. doi: 10.1016/j.adhoc.2017.11.006. [DOI] [Google Scholar]
  • 13.Liu J, Zhang Z, Chen X, Kwak KS. Certificateless remote anonymous authentication schemes for wirelessbody area networks. IEEE Transactions on Parallel and Distributed Systems. 2013;25(2):332–342. doi: 10.1109/TPDS.2013.145. [DOI] [Google Scholar]
  • 14.Liu J, Zhang Z, Chen X, Kwak KS. Certificateless remote anonymous authentication schemes for wirelessbody area networks. IEEE Transactions on Parallel and Distributed Systems. 2014;25(2):332–342. doi: 10.1109/TPDS.2013.145. [DOI] [Google Scholar]
  • 15.Xiong H. Cost-effective scalable and anonymous certificateless remote authentication protocol. IEEE Transactions on Information Forensics and Security. 2014;9(12):2327–2339. doi: 10.1109/TIFS.2014.2363553. [DOI] [Google Scholar]
  • 16.Zhao Z. An efficient anonymous authentication scheme for wireless body area networks using elliptic curve cryptosystem. Journal of Medical Systems. 2014;38(2):13. doi: 10.1007/s10916-014-0013-5. [DOI] [PubMed] [Google Scholar]
  • 17.Wang C, Zhang Y. New authentication scheme for wireless body area networks using the bilinear pairing. Journal of Medical Systems. 2015;39(11):136. doi: 10.1007/s10916-015-0331-2. [DOI] [PubMed] [Google Scholar]
  • 18.Wu L, Zhang Y, Li L, Shen J. Efficient and anonymous authentication scheme for wireless body area networks. Journal of Medical Systems. 2016;40(6):134. doi: 10.1007/s10916-016-0491-8. [DOI] [PubMed] [Google Scholar]
  • 19.He D, Zeadally S, Kumar N, Lee JH. Anonymous authentication for wireless body area networks with provable security. IEEE Systems Journal. 2016;11(4):2590–2601. doi: 10.1109/JSYST.2016.2544805. [DOI] [Google Scholar]
  • 20.Xiong H, Qin Z. Revocable and scalable certificateless remote authentication protocol with anonymity for wireless body area networks. IEEE Transactions on Information Forensics and Security. 2015;10(7):1442–1455. doi: 10.1109/TIFS.2015.2414399. [DOI] [Google Scholar]
  • 21.Liu J, Zhang L, Sun R. 1-RAAP: An efficient 1-round anonymous authentication protocol for wireless body area networks. Sensors. 2016;16(5):728. doi: 10.3390/s16050728. [DOI] [PMC free article] [PubMed] [Google Scholar]
  • 22.Li X, Peng J, Kumari S, Wu F, Karuppiah M, Choo KKR. An enhanced 1-round authentication protocol for wireless body area networks with user anonymity. Computers & Electrical Engineering. 2017;61:238–249. doi: 10.1016/j.compeleceng.2017.02.011. [DOI] [Google Scholar]
  • 23.Khan, H., Dowling, B. & Martin, K.M. (2018). Highly efficient privacy-preserving key agreement for wireless body area Networks. In 2018 17th IEEE international conference on trust, security and privacy in computing and communications/12th IEEE international conference on big data science and engineering (TrustCom/BigDataSE) (pp. 1064-1069). IEEE.
  • 24.Hassan A, Omala AA, Ali M, Jin C, Li F. Identity-based user authenticated key agreement protocol for multi-server environment with anonymity. Mobile Networks and Applications. 2019;24(3):890–902. doi: 10.1007/s11036-018-1145-5. [DOI] [Google Scholar]
  • 25.Kumar, P., & Liyanage, M. (2020). Efficient and anonymous mutual authentication protocol in multi-access edge computing (MEC) environments (pp. 119–131). IoT Security: Advances in Authentication.
  • 26.Shen J, Gui Z, Ji S, Shen J, Tan H, Tang Y. Cloud-aided lightweight certificateless authentication protocol with anonymity for wireless body area networks. Journal of Network and Computer Applications. 2018;106:117–123. doi: 10.1016/j.jnca.2018.01.003. [DOI] [Google Scholar]
  • 27.Tao H, Bhuiyan MZA, Abdalla AN, Hassan MM, Zain JM, Hayajneh T. Secured data collection with hardware-based ciphers for IoT-based healthcare. IEEE Internet of Things Journal. 2018;6(1):410–420. doi: 10.1109/JIOT.2018.2854714. [DOI] [Google Scholar]
  • 28.Kasyoka P, Kimwele M, Mbandu Angolo S. Certificateless pairing-free authentication scheme for wireless body area network in healthcare management system. Journal of Medical Engineering & Technology. 2020;44(1):12–19. doi: 10.1080/03091902.2019.1707890. [DOI] [PubMed] [Google Scholar]
  • 29.Sowjanya K, Dasgupta M, Ray S. An elliptic curve cryptography based enhanced anonymous authentication protocol for wearable health monitoring systems. International Journal of Information Security. 2020;19(1):129–146. doi: 10.1007/s10207-019-00464-9. [DOI] [Google Scholar]
  • 30.Shuai M, Liu B, Yu N, Xiong L, Wang C. Efficient and privacy-preserving authentication scheme for wireless body area networks. Journal of Information Security and Applications. 2020;52:102499. doi: 10.1016/j.jisa.2020.102499. [DOI] [Google Scholar]
  • 31.Kumar M, Chand S. A lightweight cloud-assisted identity-based anonymous authentication and key agreement protocol for secure wireless body area network. IEEE Systems Journal. 2020;15(2):2779–2786. doi: 10.1109/JSYST.2020.2990749. [DOI] [Google Scholar]
  • 32.Azees M, Vijayakumar P, Karuppiah M, Nayyar A. An efficient anonymous authentication and confidentiality preservation schemes for secure communications in wireless body area networks. Wireless Networks. 2021;27(3):2119–2130. doi: 10.1007/s11276-021-02560-y. [DOI] [Google Scholar]
  • 33.Lara E, Aguilar L, García JA. Lightweight authentication protocol using self-certified public keys for wireless body area networks in health-care applications. IEEE Access. 2021;9:79196–79213. doi: 10.1109/ACCESS.2021.3084135. [DOI] [Google Scholar]
  • 34.Soni, M. & Singh, D.K. (2021). LAKA: Lightweight authentication and key agreement protocol for internet of things based wireless body area network. Wireless Personal Communications, 1–18.
  • 35.Peng C, Luo M, Li L, Choo KKR, He D. Efficient certificateless online/offline signature scheme for wireless body area networks. IEEE Internet of Things Journal. 2021;8(18):14287–14298. doi: 10.1109/JIOT.2021.3068364. [DOI] [Google Scholar]
  • 36.Liu, S., Chen, L., Wang, H., Fu, S. & Shi, L. (2022). O3HSC: Outsourced online/offline hybrid signcryption for wireless body area networks. IEEE Transactions on Network and Service Management.
  • 37.Cheng Q, Li Y, Shi W, Li X. A certificateless authentication and key agreement scheme for secure cloud-assisted wireless body area network. Mobile Networks and Applications. 2022;27(1):346–356. doi: 10.1007/s11036-021-01840-3. [DOI] [Google Scholar]
  • 38.Li C, Xu C. Efficient anonymous authentication for wireless body area networks. IEEE Access. 2022;10:80015–80026. doi: 10.1109/ACCESS.2022.3180165. [DOI] [Google Scholar]
  • 39.Hasan K, Chowdhury MJM, Biswas K, Ahmed K, Islam MS, Usman M. A blockchain-based secure data-sharing framework for software defined wireless body area networks. Computer Networks. 2022;211:109004. doi: 10.1016/j.comnet.2022.109004. [DOI] [Google Scholar]
  • 40.Dolev D, Yao A. On the security of public key protocols. IEEE Transactions on information theory. 1983;29(2):198–208. doi: 10.1109/TIT.1983.1056650. [DOI] [Google Scholar]
  • 41.The Transport Layer Security (TLS) Protocol Version 1.3. Retrieved Aug 2022 from, https://www.rfc-editor.org/rfc/rfc8446.html.
  • 42.Insecure Communication. Retrieved Aug 2022 from, https://owasp.org/www-project-mobile-top-10/2016-risks/m3-insecure-communication.
  • 43.Bellare, M., & Rogaway, p. (1993). Random oracles are practical: A paradigm for designing efficient protocols. In Proceedings of the 1st ACM conference on computer and communications security pp. 62–73.
  • 44.Shoup V. Sequences of games: A tool for taming complexity in security proofs. IACR Cryptology ePrint Archive. 2004;2004:332. [Google Scholar]
  • 45.Blanchet, B., Smyth, B., Cheval, V. & Sylvestre, M. (2018). ProVerif 2.00: Automatic cryptographic protocol verifier, user manual and tutorial. Version from, pp. 05-16.
  • 46.Barreto PS, Galbraith SD, hÉigeartaigh CÓ. Efficient pairing computation on supersingular abelian varieties. Designs, Codes and Cryptography. 2007;42(3):239–271. doi: 10.1007/s10623-006-9033-6. [DOI] [Google Scholar]
  • 47.Brown, D. R. (2010). Sec 2: Recommended elliptic curve domain parameters. Standars for Efficient Cryptography.

Associated Data

This section collects any data citations, data availability statements, or supplementary materials included in this article.

Data Availability Statement

Not applicable


Articles from Wireless Networks are provided here courtesy of Nature Publishing Group

RESOURCES