Download as pdf or txt
Download as pdf or txt
You are on page 1of 1

Anonymous mutual authentication for wearable sensors in WBANs

Rahul Padhy(114CS0111), Department of Computer Science and Engineering,


National Institute of Technology, Rourkela, Odisha (India).

first level node and hence, the first level node is


Introduction: able to relay traffic between this second level
In the authentication phase, a sensor node N
engages with the Hub node HN for secure
The scheme is verified using the AVIPSA
node and the hub node. In this case,the first level simulation tool[2], where the protocol is
Wireless body area networks (WBANs) are used to anonymous mutual authentication and
node is called an intermediate node. found to be safe against attacks, such as the
collect and exchange vital and sensitive information session key exchange/agreement. We
about the physical conditions of patients. Due to the Sensor node impersonation attack, Replay
assume N is a second level node and hence, attack, Man-in-the-middle attack and also
openness and mobility of such networks, even without
knowing the context of the exchanged data or linking
Protocol[1]: it communicates with HN through an achieves Forward/backward security.
The scheme consists of three phases: intermediate first level node IN. In case N is a
traffic to the identities of involved sensors, criminals are
able to gain useful information about the severe Initialization phase, registration phase and
authentication phase. The initialization and
first level node, the scheme can be easily
adapted to allow direct communication with
Conclusion:
conditions of patients and carry effective undetectable This lightweight authentication scheme for
physical attacks. Therefore, confidentiality and mutual registration phases are performed by the HN by removing the intermediate node IN.
two-hop centralized WBAN provides
authentication services are essential for WBANs, and system administrator (SA).
anonymous and unlinkable features for
the transmission must be anonymous and unlinkable as
wearable sensors while achieving the
well. Given the limitations of the resources available for
these sensors, a lightweight anonymous mutual mutual authentication between wearable
authentication and key agreement scheme for sensors and hub node. The scheme just
centralized two-hop WBANs is implemented, which need to execute hash operations and XOR
allows sensor nodes attached to the patients body to operations, and it is more efficient than
authenticate with the local server/hub node and previously related schemes. Specifically,
establish a session key in an anonymous and unlinkable the sensor node and the hub node are just
manner. The security of the scheme is evaluated by need to perform three and five hash
using the Automated Validation of Internet Security operations, respectively. Due to the low
Protocols and Applications (AVISPA). computational cost, the energy
consumption of the wearable sensors is
Network Model: very low and hence, and the running time of
The network mode for WBAN is a two-hop (two tiers) WBAN can be guaranteed. As to storage
centralized network as shown in Fig. 1. It contains three aspects, the hub node does not need to
types of nodes, i.e. the hub node (HN), first level node store any verification tables or any secret
(FN) and second level node (SN). It is assumed that, the information in its database.
hub node and the first level nodes are always in-range
(i.e. any first level node is able to communicate directly References:
with the hub node), but the hub node is out of range of [1] X. Li et al., Anonymous mutual
the second level nodes, due to the limitations on the authentication and key agreement scheme for
transmitted power. Therefore, for a second level node to wearable sensors in wireless body area
communicate with the hub node, we assume that the
second level nodes are always in range with at least one networks, Computer Networks(2017),
http://dx.doi.org/10.1016/j.comnet.2017.03.013.
[2] ] A. Armando et al., AVIPSA tool,
Fig. 1. Network Model International Conference on Computer Aided
Fig. 2. Protocol Verification, Springer, 2005, pp. 281285.

You might also like