Keyan Abdul-Aziz Mutlaq , Mushtaq A. Hasson , Zaid Ameen Abduljabbar , Vincent Omollo Nyangaresi , Mustafa A. Al Sibahee , Junchao Ma , Samir M. Umran , Ali Hasan Ali , Abdulla J.Y. Aldarwish , Husam A. Neamah
{"title":"基于生物识别和非对称密钥加密的无线体域匿名认证协议","authors":"Keyan Abdul-Aziz Mutlaq , Mushtaq A. Hasson , Zaid Ameen Abduljabbar , Vincent Omollo Nyangaresi , Mustafa A. Al Sibahee , Junchao Ma , Samir M. Umran , Ali Hasan Ali , Abdulla J.Y. Aldarwish , Husam A. Neamah","doi":"10.1016/j.array.2025.100463","DOIUrl":null,"url":null,"abstract":"<div><div>Wireless Body Area Networks (WBANs) have been extensively deployed to offer remote patient monitoring that facilitate timely diagnosis and medication. This has greatly helped reduce costs and stress on the limited healthcare resources. However, the exchange of sensory patient data across wireless public communication media exposes the communication process to a myriad of security threats. To curb these security challenges, past research work has deployed techniques such as identity-based and public key cryptosystems to develop schemes for this environment. Nevertheless, the complex mathematical computations in majority of these schemes render them inefficient for sensors. In this current work, we utilize an amalgamation of asymmetric cryptography and user biometrics to develop a robust authentication protocol for WBANs. The famous Burrows–Abadi–Needham (BAN) logic is then deployed to formally analyze the security posture of the developed scheme, with results indicating that it offers secrecy and reliability of the negotiated session keys. In addition, the informal security analysis shows that it is robust against typical WBAN attacks such as impersonation and privileged insiders. From the performance perspective, our protocol incurs the least communication and computation costs.</div></div>","PeriodicalId":8417,"journal":{"name":"Array","volume":"27 ","pages":"Article 100463"},"PeriodicalIF":4.5000,"publicationDate":"2025-07-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Anonymous wireless body area networks authentication protocol based on biometrics and asymmetric key cryptography\",\"authors\":\"Keyan Abdul-Aziz Mutlaq , Mushtaq A. Hasson , Zaid Ameen Abduljabbar , Vincent Omollo Nyangaresi , Mustafa A. Al Sibahee , Junchao Ma , Samir M. Umran , Ali Hasan Ali , Abdulla J.Y. Aldarwish , Husam A. Neamah\",\"doi\":\"10.1016/j.array.2025.100463\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"<div><div>Wireless Body Area Networks (WBANs) have been extensively deployed to offer remote patient monitoring that facilitate timely diagnosis and medication. This has greatly helped reduce costs and stress on the limited healthcare resources. However, the exchange of sensory patient data across wireless public communication media exposes the communication process to a myriad of security threats. To curb these security challenges, past research work has deployed techniques such as identity-based and public key cryptosystems to develop schemes for this environment. Nevertheless, the complex mathematical computations in majority of these schemes render them inefficient for sensors. In this current work, we utilize an amalgamation of asymmetric cryptography and user biometrics to develop a robust authentication protocol for WBANs. The famous Burrows–Abadi–Needham (BAN) logic is then deployed to formally analyze the security posture of the developed scheme, with results indicating that it offers secrecy and reliability of the negotiated session keys. In addition, the informal security analysis shows that it is robust against typical WBAN attacks such as impersonation and privileged insiders. From the performance perspective, our protocol incurs the least communication and computation costs.</div></div>\",\"PeriodicalId\":8417,\"journal\":{\"name\":\"Array\",\"volume\":\"27 \",\"pages\":\"Article 100463\"},\"PeriodicalIF\":4.5000,\"publicationDate\":\"2025-07-14\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Array\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://www.sciencedirect.com/science/article/pii/S2590005625000906\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"Q2\",\"JCRName\":\"COMPUTER SCIENCE, THEORY & METHODS\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Array","FirstCategoryId":"1085","ListUrlMain":"https://www.sciencedirect.com/science/article/pii/S2590005625000906","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q2","JCRName":"COMPUTER SCIENCE, THEORY & METHODS","Score":null,"Total":0}
Anonymous wireless body area networks authentication protocol based on biometrics and asymmetric key cryptography
Wireless Body Area Networks (WBANs) have been extensively deployed to offer remote patient monitoring that facilitate timely diagnosis and medication. This has greatly helped reduce costs and stress on the limited healthcare resources. However, the exchange of sensory patient data across wireless public communication media exposes the communication process to a myriad of security threats. To curb these security challenges, past research work has deployed techniques such as identity-based and public key cryptosystems to develop schemes for this environment. Nevertheless, the complex mathematical computations in majority of these schemes render them inefficient for sensors. In this current work, we utilize an amalgamation of asymmetric cryptography and user biometrics to develop a robust authentication protocol for WBANs. The famous Burrows–Abadi–Needham (BAN) logic is then deployed to formally analyze the security posture of the developed scheme, with results indicating that it offers secrecy and reliability of the negotiated session keys. In addition, the informal security analysis shows that it is robust against typical WBAN attacks such as impersonation and privileged insiders. From the performance perspective, our protocol incurs the least communication and computation costs.