| Literature DB >> 27213384 |
Jingwei Liu1, Lihuan Zhang2, Rong Sun3.
Abstract
Thanks to the rapid technological convergence of wireless communications, medical sensors and cloud computing, Wireless Body Area Networks (WBANs) have emerged as a novel networking paradigm enabling ubiquitous Internet services, allowing people to receive medical care, monitor health status in real-time, analyze sports data and even enjoy online entertainment remotely. However, because of the mobility and openness of wireless communications, WBANs are inevitably exposed to a large set of potential attacks, significantly undermining their utility and impeding their widespread deployment. To prevent attackers from threatening legitimate WBAN users or abusing WBAN services, an efficient and secure authentication protocol termed 1-Round Anonymous Authentication Protocol (1-RAAP) is proposed in this paper. In particular, 1-RAAP preserves anonymity, mutual authentication, non-repudiation and some other desirable security properties, while only requiring users to perform several low cost computational operations. More importantly, 1-RAAP is provably secure thanks to its design basis, which is resistant to the anonymous in the random oracle model. To validate the computational efficiency of 1-RAAP, a set of comprehensive comparative studies between 1-RAAP and other authentication protocols is conducted, and the results clearly show that 1-RAAP achieves the best performance in terms of computational overhead.Entities:
Keywords: 1-RAAP; anonymity; authentication protocol; security; sensors; wireless body area networks
Year: 2016 PMID: 27213384 PMCID: PMC4883419 DOI: 10.3390/s16050728
Source DB: PubMed Journal: Sensors (Basel) ISSN: 1424-8220 Impact factor: 3.576
Figure 1The participants of 1-RAAP.
Figure 2The registration of 1-RAAP.
Figure 3The authentication of 1-RAAP.
Comparison of computational complexity.
| The Schemes | Client | Server | |||||||
|---|---|---|---|---|---|---|---|---|---|
| BP | EXC | PCM | Hash | BP | EXC | PCM | Hash | ||
| TWW [ | 0 | 0 | 3 | 2 | 2 | 0 | 1 | 3 | |
| CZKH [ | 0 | 0 | 2 | 2 | 0 | 1 | 1 | 2 | |
| CHLS [ | 0 | 1 | 3 | 3 | 2 | 1 | 1 | 3 | |
| He [ | 0 | 0 | 3 | 3 | 1 | 1 | 1 | 4 | |
| LZCK [ | 0 | 1 | 3 | 2 | 1 | 1 | 1 | 2 | |
| XQ [ | 1 | 12 | 1 | 7 | 8 | 4 | 0 | 6 | |
| 1-RAAP | 0 | 0 | 2 | 2 | 0 | 0 | 3 | 2 | |
Security feature comparison between different authentication protocols. “√” indicates that the property is satisfied.
| Scheme | He [ | DSGP [ | GDS [ | WT [ | CZKH [ | CHLS [ | TWW [ | LZCK [ | XQ [ | 1-RAAP |
|---|---|---|---|---|---|---|---|---|---|---|
| Anonymity | √ | √ | √ | |||||||
| Mutual Authentication | √ | √ | √ | √ | √ | √ | √ | √ | ||
| Session Key Establishment | √ | √ | √ | √ | √ | √ | √ | √ | ||
| Non-repudiation | √ | √ | √ | √ | √ | √ | √ | √ | √ | √ |
| Immunity of key escrow | √ | √ | √ | |||||||
| Unforgeability | √ | √ | ||||||||
| Forward Security | √ | √ | √ |
Figure 4Message size comparison of different schemes.
Computational time consumed on different cryptographic operations.
| Operations | Server (ms) | Client (ms) |
|---|---|---|
| Exponentiation in | 13.21 | 63.51 |
| Multiplication in | 6.38 | 30.67 |
| Hash in | 3.14 | 14.62 |
| Pairing | 20.04 | 96.35 |
Figure 5Different schemes’ computational time on authentication.
Figure 6Energy consumption on message transmission.
The performance evaluation comparison between different authentication protocols.
| Schemes | TWW [ | CZKH [ | CHLS [ | He [ | LZCK [ | XQ [ | 1-RAAP |
|---|---|---|---|---|---|---|---|
| Message Size (byte) | 66 | 64 | 82 | 102 | 102 | 120 | 82 |
| Client’s Computational Time (ms) | 122.08 | 92.06 | 195.52 | 135.87 | 186.19 | 990.05 | 90.58 |
| Server’s Computational Time (ms) | 55.08 | 32.08 | 65.67 | 51.34 | 39.63 | 233.44 | 25.42 |
| Transmitting Energy Consumption (mJ) | 6.93 | 5.80 | 7.87 | 10.06 | 10.06 | 11.13 | 7.87 |
| Receiving Energy Consumption (mJ) | 3.35 | 2.80 | 3.80 | 4.86 | 4.86 | 5.38 | 3.80 |