z-logo
Premium
Design of a lightweight and anonymous authenticated key agreement protocol for wireless body area networks
Author(s) -
OstadSharif Arezou,
Nikooghadam Morteza,
AbbasinezhadMood Dariush
Publication year - 2019
Publication title -
international journal of communication systems
Language(s) - English
Resource type - Journals
SCImago Journal Rank - 0.344
H-Index - 49
eISSN - 1099-1131
pISSN - 1074-5351
DOI - 10.1002/dac.3974
Subject(s) - computer science , computer security , computer network , key agreement protocol , random oracle , anonymity , authentication (law) , key (lock) , mutual authentication , protocol (science) , session key , authentication protocol , internet security , public key cryptography , information security , encryption , key distribution , security service , medicine , alternative medicine , pathology
Summary Wireless body area networks (WBANs) are a network designed to gather critical information about the physical conditions of patients and to exchange this information. WBANs are prone to attacks, more than other networks, because of their mobility and the public channel they use. Therefore, mutual authentication and privacy protection are critical for WBANs to prevent attackers from accessing confidential information of patients and executing undetectable physical attacks. In addition, in the authentication and key agreement process, messages should be transferred anonymously such that they are not linkable. In this paper, we first indicate that one of the most recently introduced authentication protocol is vulnerable to the wrong session key agreement attack and desynchronization attack. Second, we propose a lightweight authentication and key agreement protocol, which can withstand the well‐known attacks and provide the anonymity feature. Eventually, we analyze the security of our proposed protocol using both Automated Validation of Internet Security Protocols and Applications (AVISPA) and random oracle model and compare its performance with the related works. The results demonstrate the superiority of our proposed protocol in comparison with the other protocols.

This content is not available in your region!

Continue researching here.

Having issues? You can contact us here