4.8 Article

Secure and Lightweight Authentication With Key Agreement for Smart Wearable Systems

Journal

IEEE INTERNET OF THINGS JOURNAL
Volume 7, Issue 8, Pages 7334-7344

Publisher

IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC
DOI: 10.1109/JIOT.2020.2984618

Keywords

Authentication; Biomedical monitoring; Brain modeling; Wireless communication; Temperature sensors; Automated validation of Internet security protocols and application (AVISPA); BAN logic; key agreement; mutual authentication; NS3; smart wearable systems

Funding

  1. National Natural Science Foundation of China [U1836202, 61772383, 61572380, 61972136, 61702379]
  2. Joint Foundation of Ministry of Education for Pre-Research Equipment [6141A02033341]
  3. Foundation of Science, Technology and Innovation Commission of Shenzhen Municipality [JCYJ20170303170108208]

Ask authors/readers for more resources

Nowadays, an increasing number of wearable devices (WDs) have been widely deployed in smart wearable systems to collect health status measures and body information of users. Due to the openness of wireless transmission and the low capabilities of WDs in terms of energy and computation, it is of a great challenge to ensure the security of the users' physiological information. In this article, we propose a secure and lightweight authentication and key agreement scheme (SLAKA) by using the fuzzy extractor, the cryptographic hash function, and the bitwise exclusive-or operation. In SLAKA, mutual authentication between a WD and the mobile terminal (MT) can be achieved, after that, a session key can be negotiated at both ends for future secure communications. Detailed security analysis shows that SLAKA has the resilience against various well-known attacks, such as replay attacks, stolen/lost MT/WD attacks, man-in-the-middle attacks, MT/WD impersonation attacks, password change attacks, anonymity and untraceability attacks, and privileged-insider attacks. Through performance comparison and extensive simulation, SLAKA is demonstrated to be more efficient than the existing schemes, while providing more extractive features and security guarantees.

Authors

I am an author on this paper
Click your name to claim this paper and add it to your profile.

Reviews

Primary Rating

4.8
Not enough ratings

Secondary Ratings

Novelty
-
Significance
-
Scientific rigor
-
Rate this paper

Recommended

No Data Available
No Data Available