2019
DOI: 10.1002/dac.3974
|View full text |Cite
|
Sign up to set email alerts
|

Design of a lightweight and anonymous authenticated key agreement protocol for wireless body area networks

Abstract: SummaryWireless body area networks (WBANs) are a network designed to gather critical information about the physical conditions of patients and to exchange this information. WBANs are prone to attacks, more than other networks, because of their mobility and the public channel they use. Therefore, mutual authentication and privacy protection are critical for WBANs to prevent attackers from accessing confidential information of patients and executing undetectable physical attacks. In addition, in the authenticati… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
18
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
5
1

Relationship

0
6

Authors

Journals

citations
Cited by 30 publications
(18 citation statements)
references
References 45 publications
0
18
0
Order By: Relevance
“… ROM‐based verification proof This formal security analysis verifies that an adversary may not be able to retrieve crucial secret parameters such as ID i , PW i , V 1 , and session key SK. We adopted the similar procedure to for this analysis as given in previous studies 23,36,37 . The random oracle is defined as follows:…”
Section: Security Analysismentioning
confidence: 99%
See 2 more Smart Citations
“… ROM‐based verification proof This formal security analysis verifies that an adversary may not be able to retrieve crucial secret parameters such as ID i , PW i , V 1 , and session key SK. We adopted the similar procedure to for this analysis as given in previous studies 23,36,37 . The random oracle is defined as follows:…”
Section: Security Analysismentioning
confidence: 99%
“…We adopted the similar procedure to for this analysis as given in previous studies. 23,36,37 The random oracle is defined as follows:…”
Section: Rom-based Verification Proofmentioning
confidence: 99%
See 1 more Smart Citation
“…the attacker should not be able to compute earlier sessions keys in case the long term secret or current session key is revealed to the former. Nonetheless, many AKA schemes for WBAN network including few recent schemes [4], [31], [35]- [37], [44] do not comply with the stipulated objectives, since these are prone to many issues such as lacking anonymity, susceptible to impersonation, replay and forgery attacks [50].…”
Section: B Motivation and Contributionmentioning
confidence: 99%
“…The reviewed schemes above although claim to be lightweight, however these are not suitable for perfect WBAN environment due to limited power constraints, and were also bearing many security loopholes. Recently, we came across another efficient WBAN-based authentication protocol [37], nonetheless, we examine that the scheme is susceptible to session-specific ephemeral information attack, key compromise impersonation attack, and master secret compromise leading to session key recovery attack. In this study, we propose an efficient, secure and anonymous WBAN authenticated key agreement scheme which overcomes the pointed limitations in [37].…”
Section: Related Workmentioning
confidence: 99%