Skip to main content

Advertisement

Log in

A lightweight continuous authentication scheme for medical wireless body area networks

  • Published:
Peer-to-Peer Networking and Applications Aims and scope Submit manuscript

Abstract

With the development of the Internet of Things (IoT), mobile medical systems based on wireless body area networks (WBAN) have aroused extensive attention. Wearable wireless medical devices have emerged to meet the demand for high-quality medical services that brought great convenience to people’s lives. However, attackers pose a latent threat to users’ medical information privacy, and identity is easy to leak due to wireless networks’ openness. It can be seen that the authentication phase is a vital part. In this paper, we proposed a lightweight continuous authentication protocol in medical WBAN environments. Our protocol overcomes the shortcomings of sensor node impersonation attack by using physiological signals, cutting energy consumption by using lightweight technology, saving time and energy by reducing computation complexity, and ensuring the current sensor node is the original one through continuous authentication. Finally, our performance analysis has shown that our protocol is provided with the superiority of lightweight, mutuality, low cost. It has a considerable application prospect in medical WBAN.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5

Similar content being viewed by others

References

  1. Zimmerman TG (1996) Personal area networks: near-field intrabody communication. IBM Syst J 35(3.4):609–617

    Article  Google Scholar 

  2. Latré B, Braem B, Moerman I, Blondia C, Demeester P (2011) A survey on wireless body area networks. Wirel Netw 17(1):1–18

    Article  Google Scholar 

  3. Buduru AB, Yau SS (2015) A effective approach to continuous user authentication for touch screen smart devices. IEEE, pp 219–226

  4. Wayman J, Jain A, Maltoni D, Maio D (2005) An introduction to biometric authentication systems. Springer

  5. Traoré I, Woungang I, Nakkabi Y, Obaidat MS, Ahmed AAE, Khalilian B (2012) Dynamic sample size detection in learning command line sequence for continuous authentication. IEEE Trans Syst Man Cybern Part B 42(5):1343–1356

    Article  Google Scholar 

  6. Yeh KH, Su C, Chiu W, Zhou L (2018) I walk, therefore i am: continuous user authentication with plantar biometrics. IEEE Commun Mag 56(2):150–157

    Article  Google Scholar 

  7. Chuang YH, Lo NW, Yang CY, Tang SW (2018) A lightweight continuous authentication protocol for the internet of things. Sensors 18(4):1104

    Article  Google Scholar 

  8. Ramli SN, Ahmad R (2011) Surveying the wireless body area network in the realm of wireless communication. In: IAS. IEEE, pp 58–61

  9. Sanchez EM, Hernandez JF, Blasco JM, Hervé T, Micallef J, Grech I, Brincat A, Salcedo VT (2008) Body area network for wireless patient monitoring. IET Commun 2(2):215–222

    Article  Google Scholar 

  10. Seyedi M, Kibret B, Lai DTH, Faulkner M (2013) A survey on intrabody communications for body area network applications. IEEE Trans Biomed Eng 60(8):2067–2079

    Article  Google Scholar 

  11. Koya AM, Deepthi PP (2018) Anonymous hybrid mutual authentication and key agreement scheme for wireless body area network. Comput Netw 140:138–151

    Article  Google Scholar 

  12. Li CT, Hwang MS (2010) An efficient biometrics-based remote user authentication scheme using smart cards. J Netw Comput Appl 33(1):1–5

    Article  Google Scholar 

  13. Ramli SN, Ahmad R, Abdollah MF, Dutkiewicz E (2013) A biometric-based security for data authentication in wireless body area network (wban). In: 2013 15th International Conference on Advanced Communications Technology (ICACT). IEEE, pp 998–1001

  14. Bhargav Spantzel A, Squicciarini AC, Modi SK, Young M, Bertino E, Elliott SJ (2007) Privacy preserving multi-factor authentication with biometrics. J Comput Secur 15(5):529–560

    Article  Google Scholar 

  15. Ranganathan V, Rose SL (2019) Personal authentication mechanism based on finger knuckle print. J Med Syst 43(8):232

    Article  Google Scholar 

  16. He D, Kumar N, Chilamkurti N, Lee J-H (2014) Lightweight ecc based rfid authentication integrated with an id verifier transfer protocol. J Med Syst 38(10):116

    Article  Google Scholar 

  17. Lu Y, Li L, Peng H, Yang Y (2015) An enhanced biometric-based authentication scheme for telecare medicine information systems using elliptic curve cryptosystem. J Med Syst 39(3):32

    Article  Google Scholar 

  18. Han L, Tan X, Wang S, Liang X (2018) An efficient and secure three-factor based authenticated key exchange scheme using elliptic curve cryptosystems. Peer-to-peer Netw Appl 11(1):63–73

    Article  Google Scholar 

  19. Hayajneh T, Mohd BJ, Imran M, Almashaqbeh G, Vasilakos AV (2016) Secure authentication for remote patient monitoring with wireless medical sensor networks. Sensors 16(4):424

    Article  Google Scholar 

  20. Xu G, Qiu S, Ahmad H, Xu G, Guo Y, Zhang M, Xu H (2018) A multi-server two-factor authentication scheme with un-traceability using elliptic curve cryptography. Sensors 18(7):2394

    Article  Google Scholar 

  21. Dharminder, Mishra D, Li X (2020) Construction of rsa-based authentication scheme in authorized access to healthcare services - authorized access to healthcare services. J Med Syst 44(1):6

    Article  Google Scholar 

  22. Khemissa H, Tandjaoui D (2015) A lightweight authentication scheme for e-health applications in the context of internet of things. In: Al-Begain K, AlBeiruti N (eds) NGMAST. IEEE, pp 90–95

  23. Gope P, Hwang T (2016) A realistic lightweight anonymous authentication protocol for securing real-time application data access in wireless sensor networks. IEEE Trans Ind Electron 63(11):7124–7132

    Article  Google Scholar 

  24. Adavoudi-Jolfaei A, Ashouri-Talouki M, Aghili SF (2019) Lightweight and anonymous three-factor authentication and access control scheme for real-time applications in wireless sensor networks. Peer-to-Peer Netw Appl 12(1):43–59

    Article  Google Scholar 

  25. Das AK, Wazid M, Kumar N, Khan MK, Choo K-KR, Park Y (2018) Design of secure and lightweight authentication protocol for wearable devices environment. IEEE J Biomed Health Inf 22 (4):1310–1322

    Article  Google Scholar 

  26. Dhillon PK, Kalra S (2017) A lightweight biometrics based remote user authentication scheme for iot services. J Inf Secur Appl 34:255–270

    Google Scholar 

  27. Xu L, Wu F (2019) A lightweight authentication scheme for multi-gateway wireless sensor networks under iot conception. Arab J Sci Eng 44(4):3977–3993

    Article  Google Scholar 

  28. Ostad Sharif A, Abbasinezhad Mood D, Nikooghadam M (2019) A robust and efficient ecc-based mutual authentication and session key generation scheme for healthcare applications. J Med Syst 43(1):10

    Article  Google Scholar 

  29. Yu S, Park K, Park Y, Kim H, Park Y (2020) A lightweight three-factor authentication protocol for digital rights management system. Peer-to-Peer Netw Appl:pp 1–17

  30. Frank M, Biedert R, Ma E, Martinovic I, Song D (2012) Touchalytics: On the applicability of touchscreen input as a behavioral biometric for continuous authentication. IEEE Trans Inf Forens Secur 8(1):136–148

    Article  Google Scholar 

  31. Matsuyama Y, Shozawa M, Yokote R (2015) Brain signal’s low-frequency fits the continuous authentication. Neurocomputing 164:137–143

    Article  Google Scholar 

  32. Mondal S, Bours P (2015) Continuous authentication and identification for mobile devices: Combining security and forensics. IEEE:1–6

  33. Peng G, Zhou G, Nguyen DT, Qi X, Yang Q, Wang S (2017) Continuous authentication with touch behavioral biometrics and voice on wearable glasses. IEEE Trans Hum-Mach Syst 47(3):404–416

    Article  Google Scholar 

  34. Mosenia A, Sur-Kolay S, Raghunathan A, Jha NK (2016) Caba: Continuous authentication based on bioaura. IEEE Trans Comput 66(5):759–772

    Article  MathSciNet  Google Scholar 

  35. Alshehri A, Coenen F, Bollegala D (2018) Iterative keystroke continuous authentication: A time series based approach. KI-Künstliche Intell 32(4):231–243

    Article  Google Scholar 

  36. Acar A, Aksu H, Uluagac AS, Akkaya K (2018) Waca: Wearable-assisted continuous authentication. IEEE, pp 264–269

  37. Smith Creasey M, Rajarajan M (2019) A novel word-independent gesture-typing continuous authentication scheme for mobile devices. Comput Secur 83:140–150

    Article  Google Scholar 

  38. Burrows M, Abadi M, Needham RM (1989) A logic of authentication. Proc R Soc Lond Math Phys Sci 426(1871):233–271

    MathSciNet  MATH  Google Scholar 

  39. Pereira GCCF, Alves RCA, da Silva FL, Azevedo RM, Albertini BC, Margi CB (2017) Performance evaluation of cryptographic algorithms over iot platforms and operating systems. Secur Commun Netw 2017:1–16

    Article  Google Scholar 

  40. Yeh KH, Su C, Choo KKR, Chiu W (2017) A novel certificateless signature scheme for smart objects in the internet-of-things. Sensors 17(5):1001

    Article  Google Scholar 

  41. Arshad H, Nikooghadam M (2016) An efficient and secure authentication and key agreement scheme for session initiation protocol using ecc. Multimed Tools Appl 75(1):181–197

    Article  Google Scholar 

  42. Li X, Ibrahim MH, Kumari S, Sangaiah AK, Gupta V, Choo K-KR (2017) Anonymous mutual authentication and key agreement scheme for wearable sensors in wireless body area networks. Comput Netw 129:429–443

    Article  Google Scholar 

Download references

Acknowledgements

This study was funded by National Natural Science Foundation of China (No.61962022), Key Research and Development Plan of Jiangxi Province (No.20192BBE50077), and Excellent Scientific and Technological Innovation Teams of Jiangxi Province (No.2018 1BCB24009).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Tao Wan.

Ethics declarations

Conflict of interest

All authors declare that they have no conflict of interest.

Additional information

Ethical approval

This article does not contain any studies with human participants or animals performed by any of the authors.

Publisher’s note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Wan, T., Wang, L., Liao, W. et al. A lightweight continuous authentication scheme for medical wireless body area networks. Peer-to-Peer Netw. Appl. 14, 3473–3487 (2021). https://doi.org/10.1007/s12083-021-01190-7

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s12083-021-01190-7

Keywords

Navigation