Provable secure authentication key agreement for wireless body area networks
en-GBde-DEes-ESfr-FR

Provable secure authentication key agreement for wireless body area networks

29.11.2024 Frontiers Journals

Wireless body area networks (WBANs) guarantee timely data processing and secure information preservation within the range of the wireless access network, which is in urgent need of a new type of security technology. However, with the speedy development of hardware, the existing security schemes can hardly meet the new requirements of anonymity and lightweight.
To resolve these difficulties, a research team led by Qingfeng CHENG published their new research on 15 October 2024 in Frontiers of Computer Science co-published by Higher Education Press and Springer Nature.
The team first noticed a novel authentication scheme proposed by Wang et al. for WBANs, which considered conditional privacy preservation. However, it was analyzed in Cheng et al.’s research that Wang et al.’s scheme could hardly satisfy ephemeral key leakage attack resistance. Further, the team designed an anonymous authentication key agreement scheme with enhanced security attributes using symmetric encryption and certificateless cryptography. The proposed scheme is evaluated and compared from the perspective of security attributes, communication and computation costs. Compared with the existing research results, the proposed method requires fewer communication and computation resources, and it has stronger security.
Wang et al. proposed a certificateless authentication key agreement protocol (CL-AKA) recently, with expectations of achieving conditional private preservation and resistance to common attacks. Regretfully, they analyzed and presented that the proposal could hardly resist ephemeral key leakage attacks in the research paper. Considering the safeness of physiological data and private information, they design a novel secure and efficient CL-AKA scheme based on Wang et al.’s scheme. The proposed scheme is proved to be secure under a specific security model. In addition, they also assess the security attributes the proposed scheme satisfies through BAN logic and Scyther tool. With these three types of analysis methods, it is claimed that the proposed scheme can satisfy security properties required urgently in WBANs setting. Performance evaluation and comparison are given and indicate that the proposed scheme cost relatively fewer resources, satisfying more security attributes at the same time.
DOI: 10.1007/s11704-023-2548-4
Angehängte Dokumente
  • The authentication and key agreement flow of the proposed scheme
29.11.2024 Frontiers Journals
Regions: Asia, China
Keywords: Applied science, Computing

Disclaimer: AlphaGalileo is not responsible for the accuracy of news releases posted to AlphaGalileo by contributing institutions or for the use of any information through the AlphaGalileo system.

Referenzen

We have used AlphaGalileo since its foundation but frankly we need it more than ever now to ensure our research news is heard across Europe, Asia and North America. As one of the UK’s leading research universities we want to continue to work with other outstanding researchers in Europe. AlphaGalileo helps us to continue to bring our research story to them and the rest of the world.
Peter Dunn, Director of Press and Media Relations at the University of Warwick
AlphaGalileo has helped us more than double our reach at SciDev.Net. The service has enabled our journalists around the world to reach the mainstream media with articles about the impact of science on people in low- and middle-income countries, leading to big increases in the number of SciDev.Net articles that have been republished.
Ben Deighton, SciDevNet
AlphaGalileo is a great source of global research news. I use it regularly.
Robert Lee Hotz, LA Times

Wir arbeiten eng zusammen mit...


  • BBC
  • The Times
  • National Geographic
  • The University of Edinburgh
  • University of Cambridge
  • iesResearch
Copyright 2024 by DNN Corp Terms Of Use Privacy Statement