{"title":"A secure three-party authentication protocol for wireless body area networks","authors":"Rahul Vishwakarma, R. Mohapatra","doi":"10.1109/SSPS.2017.8071573","DOIUrl":null,"url":null,"abstract":"Wireless Body Area Network (WBAN) is one of the most rapidly growing technologies in the field of healthcare. However, providing a secure communication system over WBAN is a challenging task due to the sensitive data exchanged in resource-constrained WBAN. In this paper, we propose an efficient three-party authentication protocol for WBAN using Elliptic Curve Cryptography (ECC). We are using two-hop star network topology based on WBAN standard. The analysis results of BAN Logic and AVIS PA tool provide the security proofs of the proposed protocol. Moreover, the implementation results prove the efficiency of our proposed protocol.","PeriodicalId":382353,"journal":{"name":"2017 Third International Conference on Sensing, Signal Processing and Security (ICSSS)","volume":"30 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2017-05-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"5","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2017 Third International Conference on Sensing, Signal Processing and Security (ICSSS)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/SSPS.2017.8071573","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 5
Abstract
Wireless Body Area Network (WBAN) is one of the most rapidly growing technologies in the field of healthcare. However, providing a secure communication system over WBAN is a challenging task due to the sensitive data exchanged in resource-constrained WBAN. In this paper, we propose an efficient three-party authentication protocol for WBAN using Elliptic Curve Cryptography (ECC). We are using two-hop star network topology based on WBAN standard. The analysis results of BAN Logic and AVIS PA tool provide the security proofs of the proposed protocol. Moreover, the implementation results prove the efficiency of our proposed protocol.