4.6 Article

An Improved WBSN Key-Agreement Protocol Based on Static Parameters and Hash Functions

Journal

IEEE ACCESS
Volume 9, Issue -, Pages 78463-78473

Publisher

IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC
DOI: 10.1109/ACCESS.2021.3083708

Keywords

Protocols; Security; Authentication; Wireless communication; Photonics; Communication system security; Authentication; anonymity; formal verification; unlinkability; wireless body sensor network

Ask authors/readers for more resources

Wireless Body Sensor Networks (WBSNs) are a relatively new area of research in healthcare systems, facing challenges in human health, social interactions, coverage radius, energy consumption, and communication reliability. An improved authenticated key agreement (AKA) protocol was proposed in this study, providing anonymity and unlinkability of sensor node sessions. The results showed a significant reduction in energy consumption, communication cost, and computation time compared to similar schemes.
Wireless telecommunications systems have expanded rapidly over the past few years. Wireless Body Sensor Network (WBSN) is a relatively novel area of research and development in healthcare systems. However, it has multiple constraints and challenges regarding human health, social interactions, coverage radius, energy consumption, and communication reliability. In addition, communications between nodes can contain highly sensitive personal information, while hostile environments will impose a wide range of security risks. Therefore, designing authenticated key agreement (AKA) protocols is a crucial challenge in these networks. The current study, considering the security issues of the Li et al. scheme and some of their new extensions, proposes an improved AKA protocol with anonymity and unlinkability of the sensor node sessions. The results of theoretical analysis compared with similar schemes indicated that the proposed scheme could reduce average energy consumption and communication cost by 41 percent. It also reduced the average computation time by 61 percent. Furthermore, it was shown by formal/informal analyses that, on top of unlinkability and anonymity features, other central security features in the current scheme were similar and comparable to those in the recent and similar schemes.

Authors

I am an author on this paper
Click your name to claim this paper and add it to your profile.

Reviews

Primary Rating

4.6
Not enough ratings

Secondary Ratings

Novelty
-
Significance
-
Scientific rigor
-
Rate this paper

Recommended

No Data Available
No Data Available