Wireless body area networks (WBANs) guarantee timely data processing and secure information preservation within the range of the wireless access network, which is in urgent need of a new type of security technology. However, with the speedy development of hardware, the existing security schemes can hardly meet the new requirements of anonymity and lightweight.
To resolve these difficulties, a research team led by Qingfeng CHENG published their
new research on 15 October 2024 in
Frontiers of Computer Science co-published by Higher Education Press and Springer Nature.
The team first noticed a novel authentication scheme proposed by Wang et al. for WBANs, which considered conditional privacy preservation. However, it was analyzed in Cheng et al.’s research that Wang et al.’s scheme could hardly satisfy ephemeral key leakage attack resistance. Further, the team designed an anonymous authentication key agreement scheme with enhanced security attributes using symmetric encryption and certificateless cryptography. The proposed scheme is evaluated and compared from the perspective of security attributes, communication and computation costs. Compared with the existing research results, the proposed method requires fewer communication and computation resources, and it has stronger security.
Wang et al. proposed a certificateless authentication key agreement protocol (CL-AKA) recently, with expectations of achieving conditional private preservation and resistance to common attacks. Regretfully, they analyzed and presented that the proposal could hardly resist ephemeral key leakage attacks in the research paper. Considering the safeness of physiological data and private information, they design a novel secure and efficient CL-AKA scheme based on Wang et al.’s scheme. The proposed scheme is proved to be secure under a specific security model. In addition, they also assess the security attributes the proposed scheme satisfies through BAN logic and Scyther tool. With these three types of analysis methods, it is claimed that the proposed scheme can satisfy security properties required urgently in WBANs setting. Performance evaluation and comparison are given and indicate that the proposed scheme cost relatively fewer resources, satisfying more security attributes at the same time.
DOI:
10.1007/s11704-023-2548-4