4.6 Article

A Lightweight Cloud-Assisted Identity-Based Anonymous Authentication and Key Agreement Protocol for Secure Wireless Body Area Network

Journal

IEEE SYSTEMS JOURNAL
Volume 15, Issue 2, Pages 2779-2786

Publisher

IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC
DOI: 10.1109/JSYST.2020.2990749

Keywords

Wireless communication; Cloud computing; Protocols; Body area networks; Authentication; Servers; Anonymous; authentication; impersonation attack; security; wireless body area network (WBAN)

Ask authors/readers for more resources

The article proposes an identity-based anonymous authentication and key agreement protocol for WBAN in a cloud-assisted environment, which ensures security and user anonymity. The scheme is proven to be secure under computational diffie-hellman assumption and random oracle model, with low computational and communication costs compared to existing schemes.
Recent advancements in ubiquitous technologies, such as an intelligible sensor, wireless communication, internet of things, and cloud computing have enabled the wearable devices to integrate with the wireless body area network (WBAN) for improving the patient's health remotely. Due to the resource-constraint nature of the WBAN, it provides limited services to the patients. Cloud technology has strengthened the WBAN potential by facilitating the storage and computation. However, due to the open nature of the cloud technology and wireless communication, these type of systems encounter several security issues. In this article, we propose an identity-based anonymous authentication and key agreement (IBAAKA) protocol for WBAN in the cloud-assisted environment, which achieves mutual authentication and user anonymity. In the security analysis, we show that under the well-known computational diffie-hellman assumption and random oracle model, the proposed IBAAKA scheme is provably secure, as well as achieves the required security properties. Further, it requires the least computational cost and comparable communication cost with the existing schemes.

Authors

I am an author on this paper
Click your name to claim this paper and add it to your profile.

Reviews

Primary Rating

4.6
Not enough ratings

Secondary Ratings

Novelty
-
Significance
-
Scientific rigor
-
Rate this paper

Recommended

No Data Available
No Data Available