SEEMAKA: Secured Energy-Efficient Mutual Authentication and Key Agreement Scheme for Wireless Body Area Networks

@article{Narwal2020SEEMAKASE,
  title={SEEMAKA: Secured Energy-Efficient Mutual Authentication and Key Agreement Scheme for Wireless Body Area Networks},
  author={Bhawna Narwal and Amar Kumar Mohapatra},
  journal={Wireless Personal Communications},
  year={2020},
  pages={1-24}
}
With the empowerment of wireless networking technologies and medical sensors, WBAN is playing a major part in modern medical systems. As a key application of IoT, WBAN has shown swift growth and adoption in recent years because of its capabilities such as continuous and seamless monitoring of patients and collection of their biomedical data in real-time which is further used by doctors for clinical diagnosis and treatment. Despite numerous benefits, WBAN lacks a clear in-depth defense line… Expand
SAMAKA: Secure and Anonymous Mutual Authentication and Key Agreement Scheme for Wireless Body Area Networks
TLDR
A secure and anonymous mutual authentication scheme for WBANs (SAMAKA) is propounded that preserves all the desired security features and guards from various security attacks from an adversary and is proved to be provably secure in the RoR Model. Expand
An Improved Lightweight Authentication Protocol for Wireless Body Area Networks
TLDR
This study demonstrates that one of the most recently presented WBAN-based authentication protocol is found to be prone to session-specific temporary information attack, key compromise impersonation as well as session key recovery attacks and proposes an efficient, secure and anonymous WBAN authenticated key agreement scheme addressing the identified concerns in previous scheme. Expand
A survey on security and authentication in wireless body area networks
TLDR
This survey elaborates the functionality of WBAN, its technologies, building blocks, and a much wider view ofWBAN in terms of security and authentication to serve the bigger goal of providing a bird-eye view of the domain. Expand
A Yoking-Proof and PUF-based Mutual Authentication Scheme for Cloud-aided Wearable Devices
  • Nishtha Mehndiratta
  • 2020 IEEE International Conference for Innovation in Technology (INOCON)
  • 2020
In today's world privacy is paramount in everyone's life. Alongside the growth of IoT (Internet of things), wearable devices are becoming widely popular for real-time user monitoring and wise serviceExpand
Towards an Efficient Certificateless Access Control Scheme for Wireless Body Area Networks
TLDR
An efficient certificateless pairing-free signcryption scheme is given then a secure access control scheme is designed that can satisfy both the properties of ciphertext authentication and public verifiability using the signc encryption scheme. Expand
A Robust Anonymous Remote User Authentication Protocol for IoT Services
TLDR
The proposed protocol fulfils mutual authentication using BAN logic, as a broadly accepted formal method in security analysis, and its security, communication overhead, and time complexity have been compared with similar protocols that show its efficiency for IoT applications. Expand
Secure Remote User Authentication Scheme on Health Care, IoT and Cloud Applications: A Multilayer Systematic Survey
TLDR
An analytical and comprehensive survey of various remote user authentication techniques and categorizes them based on different applications and their advantages, key features, computational cost, storage cost, and communication cost are highlighted. Expand
PAASH: A privacy-preserving authentication and fine-grained access control of outsourced data for secure smart health in smart cities
TLDR
An analysis of PAASH reveals that it can provide desirable privacy and security measures in smart health and the formal security demonstrated in the random oracle model (ROM) shows that PAASH is semantically secure under the intractability of the Discrete Logarithm Problem (DLP). Expand
A Yoking-Proof Based Remote Authentication Scheme for Cloud-Aided Wearable Devices (YPACW)
TLDR
A Yoking Proof based remote Authentication scheme for Cloud-aided Wearable devices (YPACW) which takes PUF and cryptographic functions and joins them to achieve mutual authentication between the wearable devices and smartphone via a cloud server, by performing the simultaneous verification of these devices, using the established yoking-proofs. Expand
A Proposed Access Control-Based Privacy Preservation Model to Share Healthcare Data in Cloud
TLDR
The concept of an access control-based (AC) privacy preservation model for the mutual authentication of users and data owners in the proposed digital system offers a high-security guarantee and high efficiency. Expand
...
1
2
...

References

SHOWING 1-10 OF 51 REFERENCES
A lightweight anonymous mutual authentication and key agreement scheme for WBAN
TLDR
This paper proposes a lightweight anonymous mutual authentication and key agreement scheme for WBAN that uses only hash function operations and XOR operations, and uses the automatic security verification tool ProVerif to verify the security properties of the scheme. Expand
CasCP: Efficient and Secure Certificateless Authentication Scheme for Wireless Body Area Networks with Conditional Privacy-Preserving
TLDR
An improved and efficient certificateless authentication scheme with conditional privacy-preserving is proposed on the basis of analyzing the most recent presented certificateless Authentication scheme for WBANs and shows some advantages in computation and communication cost. Expand
Certificateless Remote Anonymous Authentication Schemes for WirelessBody Area Networks
TLDR
A pair of efficient and light-weight authentication protocols to enable remote WBAN users to anonymously enjoy healthcare service and outperform the existing schemes in terms of better trade-off between desirable security properties and computational overhead, nicely meeting the needs of WBANs. Expand
A Secure Crypto Base Authentication and Communication Suite in Wireless Body Area Network (WBAN) for IoT Applications
TLDR
The proposed methodology is not only simple but also advanced and much secured procedure of key generation and management that will be further validated by the performance analysis and will be beneficial for the continuous monitoring of patient’s critical data in remote areas also. Expand
A Secure Mutual Batch Authentication Scheme for Patient Data Privacy Preserving in WBAN
TLDR
This work proposes a secured and efficient remote batch authentication scheme that genuinely ascertains the identity of C and AP and reduces the communication and computational costs by providing an efficient data aggregation and batch authentication for limited device’s resources in WBAN. Expand
New Authentication Scheme for Wireless Body Area Networks Using the Bilinear Pairing
TLDR
A new anonymous authentication scheme for WBANs is proposed that could overcome weaknesses in previous scheme and the BAN logic is used to demonstrate the security of the proposed scheme. Expand
Anonymous mutual authentication and key agreement scheme for wearable sensors in wireless body area networks
TLDR
A lightweight anonymous mutual authentication and key agreement scheme for centralized two-hop WBANs is proposed, which allows sensor nodes attached to the patient’s body to authenticate with the local server/hub node and establish a session key in an anonymous and unlinkable manner. Expand
A Provably Secure and Lightweight Patient-Healthcare Authentication Protocol in Wireless Body Area Networks
TLDR
This work demonstrates that a new patient healthcare monitoring protocol presented recently is vulnerable to many attacks, including replay attacks and key compromise impersonation attacks, and also that it suffers from privacy issues. Expand
Secure anonymous mutual authentication for star two-tier wireless body area networks
TLDR
This work proposes a new secure protocol to realize anonymous mutual authentication and confidential transmission for star two-tier WBAN topology using the widely-accepted Burrows-Abadi-Needham (BAN) logic and informal security analysis to prove that the protocol achieves the necessary security requirements and goals of an authentication service. Expand
Efficient and Anonymous Authentication Scheme for Wireless Body Area Networks
TLDR
This paper presents a novel anonymous authentication scheme for WBANs and proves that it’s secure under a random oracle model and is more suitable for practical application than Wang et al. Expand
...
1
2
3
4
5
...