Fine-Auth: A Fine-Grained User Authentication and Key Agreement Protocol Based on Physical Unclonable Functions for Wireless Body Area Networks
-
Published:2023-11-15
Issue:22
Volume:13
Page:12376
-
ISSN:2076-3417
-
Container-title:Applied Sciences
-
language:en
-
Short-container-title:Applied Sciences
Author:
Liu Kaijun1, Cao Qiang1ORCID, Xu Guosheng1ORCID, Xu Guoai2
Affiliation:
1. Key Laboratory of Trustworthy Distributed Computing and Service (MoE), Beijing University of Posts and Telecommunications, Beijing 100876, China 2. School of Computer Science and Technology, Harbin Institute of Technology, Shenzhen 518055, China
Abstract
Wireless body area networks (WBANs) can be used to realize the real-time monitoring and transmission of health data concerning the human body based on wireless communication technology. With the transmission of these sensitive health data, security and privacy protection issues have become increasingly prominent. Fine-grained authentication allows physicians to run authentication checks of another specific entity according to their identifying attributes. Hence, it plays a key role in preserving the security and privacy of WBANs. In recent years, substantial research has been carried out on fine-grained authentication. However, these studies have put considerable effort into WBAN performances, resulting in weakened security. This paper proposes a fine-grained user authentication and key agreement protocol based on physical unclonable functions (PUFs) while maintaining robust security and performance. This will allow physicians to perform mutual authentication and obtain key agreements with authorized body area sensor nodes according to their identity parameters, such as occupation type and title. We then provide comprehensive security and heuristic analyses to demonstrate the security of the proposed protocol. Finally, the performance comparison shows that the proposed protocol is more robust in security, cost-effective communication, and computational overheads compared to three leading alternatives.
Funder
National Key Research and Development Program of China Fundamental Research Funds for the Central Universities
Subject
Fluid Flow and Transfer Processes,Computer Science Applications,Process Chemistry and Technology,General Engineering,Instrumentation,General Materials Science
Reference29 articles.
1. O’Donovan, T., O’Donoghue, J., Sreenan, C., Sammon, D., O’Reilly, P., and O’Connor, K. (2009, January 1–3). A context aware wireless body area network (BAN). Proceedings of the 2009 International Conference on Pervasive Computing Technologies for Healthcare, London, UK. 2. Secure Three Factor User Authentication Scheme for Renewable-Energy-Based Smart Grid Environment;Wazid;IEEE Trans. Ind. Inform.,2017 3. Halperin, D., Heydt-Benjamin, T.S., Ransford, B., Clark, S.S., Defend, B., Morgan, W., Fu, K., Kohno, T., and Maisel, W.H. (2008, January 18–22). Pacemakers and Implantable Cardiac Defibrillators: Software Radio Attacks and Zero-Power Defenses. Proceedings of the 2018 IEEE Symposium on Security and Privacy, Oakland, CA, USA. 4. Authenticating Users through Fine-Grained Channel Information;Liu;IEEE. Trans. Mob. Comput.,2018 5. On the Design of Fine Grained Access Control with User Authentication Scheme for Telecare Medicine Information Systems;Chatterjee;IEEE Access,2017
|
|