phat 24(1):

Research Article

An efficient and secure mutual authentication protocol in wireless body area network

Download126 downloads
  • @ARTICLE{10.4108/eetpht.9.3114,
        author={Manoj Kumar and S.Z. Hussain},
        title={An efficient and secure mutual authentication protocol in wireless body area network},
        journal={EAI Endorsed Transactions on Pervasive Health and Technology},
        volume={9},
        number={1},
        publisher={EAI},
        journal_a={PHAT},
        year={2023},
        month={7},
        keywords={wireless body area networks (wban), mutual authentication, wearable bio-sensors, key agreement, formal verification, BAN logic, Scyther tool, XOR operations, cryptographic hash functions},
        doi={10.4108/eetpht.9.3114}
    }
    
  • Manoj Kumar
    S.Z. Hussain
    Year: 2023
    An efficient and secure mutual authentication protocol in wireless body area network
    PHAT
    EAI
    DOI: 10.4108/eetpht.9.3114
Manoj Kumar1,*, S.Z. Hussain1
  • 1: Jamia Millia Islamia
*Contact email: manoj.rke77@gmail.com

Abstract

Wireless Body Area Network (WBAN) is an emerging field which is gaining a lot of attention in healthcare sector. It facilitates remote monitoring by gathering health related data using wearable bio-sensors based on IOT. This technological advancement would significantly improve the tracking of fitness, health care delivery, medical diagnostics, early disease prediction, and associated medical dealings of any individual. Several challenges persist in WBAN due to its openness and mobility. The medical data is extremely sensitive and personal in nature therefore it must be protected at any cost while being communicated between nodes. Highly resource constrained tiny sized bio-sensors restrict the usage of energy seeking traditional cryptographic techniques and hence require new methods to be evolved to secure the communication. The current study proposes a lightweight mutual authentication based key agreement scheme which is dependent on XOR operations and cryptographic hash functions. BAN logic is used for formal verification and automatic security verification tool Scyther is used for the analysis of security protocol. Proposed scheme is compared with other related works on 15 key security parameters which are identified on the basis of literature survey. The results indicate that the proposed scheme follows all the security parameters and performs better in terms of computation cost, energy consumption, communication cost and storage requirement as compared with other schemes.