This paper proposes a lightweight anonymous mutual authentication scheme for two-hop centralized wireless body area networks (WBANs). The scheme consists of initialization, registration, and authentication phases to allow sensor nodes to authenticate with a hub node and establish session keys anonymously. It uses hash and XOR operations, requiring low computation. The scheme was analyzed using the AVIPSA simulation tool and found to be secure against common attacks while achieving forward/backward security. It provides anonymous and unlinkable authentication for wearable sensors with low energy consumption, suitable for resource-constrained WBAN environments.
This paper proposes a lightweight anonymous mutual authentication scheme for two-hop centralized wireless body area networks (WBANs). The scheme consists of initialization, registration, and authentication phases to allow sensor nodes to authenticate with a hub node and establish session keys anonymously. It uses hash and XOR operations, requiring low computation. The scheme was analyzed using the AVIPSA simulation tool and found to be secure against common attacks while achieving forward/backward security. It provides anonymous and unlinkable authentication for wearable sensors with low energy consumption, suitable for resource-constrained WBAN environments.
This paper proposes a lightweight anonymous mutual authentication scheme for two-hop centralized wireless body area networks (WBANs). The scheme consists of initialization, registration, and authentication phases to allow sensor nodes to authenticate with a hub node and establish session keys anonymously. It uses hash and XOR operations, requiring low computation. The scheme was analyzed using the AVIPSA simulation tool and found to be secure against common attacks while achieving forward/backward security. It provides anonymous and unlinkable authentication for wearable sensors with low energy consumption, suitable for resource-constrained WBAN environments.
Anonymous mutual authentication for wearable sensors in WBANs
Rahul Padhy(114CS0111), Department of Computer Science and Engineering,
National Institute of Technology, Rourkela, Odisha (India).
first level node and hence, the first level node is
Introduction: able to relay traffic between this second level In the authentication phase, a sensor node N engages with the Hub node HN for secure The scheme is verified using the AVIPSA node and the hub node. In this case,the first level simulation tool[2], where the protocol is Wireless body area networks (WBANs) are used to anonymous mutual authentication and node is called an intermediate node. found to be safe against attacks, such as the collect and exchange vital and sensitive information session key exchange/agreement. We about the physical conditions of patients. Due to the Sensor node impersonation attack, Replay assume N is a second level node and hence, attack, Man-in-the-middle attack and also openness and mobility of such networks, even without knowing the context of the exchanged data or linking Protocol[1]: it communicates with HN through an achieves Forward/backward security. The scheme consists of three phases: intermediate first level node IN. In case N is a traffic to the identities of involved sensors, criminals are able to gain useful information about the severe Initialization phase, registration phase and authentication phase. The initialization and first level node, the scheme can be easily adapted to allow direct communication with Conclusion: conditions of patients and carry effective undetectable This lightweight authentication scheme for physical attacks. Therefore, confidentiality and mutual registration phases are performed by the HN by removing the intermediate node IN. two-hop centralized WBAN provides authentication services are essential for WBANs, and system administrator (SA). anonymous and unlinkable features for the transmission must be anonymous and unlinkable as wearable sensors while achieving the well. Given the limitations of the resources available for these sensors, a lightweight anonymous mutual mutual authentication between wearable authentication and key agreement scheme for sensors and hub node. The scheme just centralized two-hop WBANs is implemented, which need to execute hash operations and XOR allows sensor nodes attached to the patients body to operations, and it is more efficient than authenticate with the local server/hub node and previously related schemes. Specifically, establish a session key in an anonymous and unlinkable the sensor node and the hub node are just manner. The security of the scheme is evaluated by need to perform three and five hash using the Automated Validation of Internet Security operations, respectively. Due to the low Protocols and Applications (AVISPA). computational cost, the energy consumption of the wearable sensors is Network Model: very low and hence, and the running time of The network mode for WBAN is a two-hop (two tiers) WBAN can be guaranteed. As to storage centralized network as shown in Fig. 1. It contains three aspects, the hub node does not need to types of nodes, i.e. the hub node (HN), first level node store any verification tables or any secret (FN) and second level node (SN). It is assumed that, the information in its database. hub node and the first level nodes are always in-range (i.e. any first level node is able to communicate directly References: with the hub node), but the hub node is out of range of [1] X. Li et al., Anonymous mutual the second level nodes, due to the limitations on the authentication and key agreement scheme for transmitted power. Therefore, for a second level node to wearable sensors in wireless body area communicate with the hub node, we assume that the second level nodes are always in range with at least one networks, Computer Networks(2017), http://dx.doi.org/10.1016/j.comnet.2017.03.013. [2] ] A. Armando et al., AVIPSA tool, Fig. 1. Network Model International Conference on Computer Aided Fig. 2. Protocol Verification, Springer, 2005, pp. 281285.