基于生物识别和非对称密钥加密的无线体域匿名认证协议

IF 4.5 Q2 COMPUTER SCIENCE, THEORY & METHODS
Array Pub Date : 2025-07-14 DOI:10.1016/j.array.2025.100463
Keyan Abdul-Aziz Mutlaq , Mushtaq A. Hasson , Zaid Ameen Abduljabbar , Vincent Omollo Nyangaresi , Mustafa A. Al Sibahee , Junchao Ma , Samir M. Umran , Ali Hasan Ali , Abdulla J.Y. Aldarwish , Husam A. Neamah
{"title":"基于生物识别和非对称密钥加密的无线体域匿名认证协议","authors":"Keyan Abdul-Aziz Mutlaq ,&nbsp;Mushtaq A. Hasson ,&nbsp;Zaid Ameen Abduljabbar ,&nbsp;Vincent Omollo Nyangaresi ,&nbsp;Mustafa A. Al Sibahee ,&nbsp;Junchao Ma ,&nbsp;Samir M. Umran ,&nbsp;Ali Hasan Ali ,&nbsp;Abdulla J.Y. Aldarwish ,&nbsp;Husam A. Neamah","doi":"10.1016/j.array.2025.100463","DOIUrl":null,"url":null,"abstract":"<div><div>Wireless Body Area Networks (WBANs) have been extensively deployed to offer remote patient monitoring that facilitate timely diagnosis and medication. This has greatly helped reduce costs and stress on the limited healthcare resources. However, the exchange of sensory patient data across wireless public communication media exposes the communication process to a myriad of security threats. To curb these security challenges, past research work has deployed techniques such as identity-based and public key cryptosystems to develop schemes for this environment. Nevertheless, the complex mathematical computations in majority of these schemes render them inefficient for sensors. In this current work, we utilize an amalgamation of asymmetric cryptography and user biometrics to develop a robust authentication protocol for WBANs. The famous Burrows–Abadi–Needham (BAN) logic is then deployed to formally analyze the security posture of the developed scheme, with results indicating that it offers secrecy and reliability of the negotiated session keys. In addition, the informal security analysis shows that it is robust against typical WBAN attacks such as impersonation and privileged insiders. From the performance perspective, our protocol incurs the least communication and computation costs.</div></div>","PeriodicalId":8417,"journal":{"name":"Array","volume":"27 ","pages":"Article 100463"},"PeriodicalIF":4.5000,"publicationDate":"2025-07-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Anonymous wireless body area networks authentication protocol based on biometrics and asymmetric key cryptography\",\"authors\":\"Keyan Abdul-Aziz Mutlaq ,&nbsp;Mushtaq A. Hasson ,&nbsp;Zaid Ameen Abduljabbar ,&nbsp;Vincent Omollo Nyangaresi ,&nbsp;Mustafa A. Al Sibahee ,&nbsp;Junchao Ma ,&nbsp;Samir M. Umran ,&nbsp;Ali Hasan Ali ,&nbsp;Abdulla J.Y. Aldarwish ,&nbsp;Husam A. Neamah\",\"doi\":\"10.1016/j.array.2025.100463\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"<div><div>Wireless Body Area Networks (WBANs) have been extensively deployed to offer remote patient monitoring that facilitate timely diagnosis and medication. This has greatly helped reduce costs and stress on the limited healthcare resources. However, the exchange of sensory patient data across wireless public communication media exposes the communication process to a myriad of security threats. To curb these security challenges, past research work has deployed techniques such as identity-based and public key cryptosystems to develop schemes for this environment. Nevertheless, the complex mathematical computations in majority of these schemes render them inefficient for sensors. In this current work, we utilize an amalgamation of asymmetric cryptography and user biometrics to develop a robust authentication protocol for WBANs. The famous Burrows–Abadi–Needham (BAN) logic is then deployed to formally analyze the security posture of the developed scheme, with results indicating that it offers secrecy and reliability of the negotiated session keys. In addition, the informal security analysis shows that it is robust against typical WBAN attacks such as impersonation and privileged insiders. From the performance perspective, our protocol incurs the least communication and computation costs.</div></div>\",\"PeriodicalId\":8417,\"journal\":{\"name\":\"Array\",\"volume\":\"27 \",\"pages\":\"Article 100463\"},\"PeriodicalIF\":4.5000,\"publicationDate\":\"2025-07-14\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Array\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://www.sciencedirect.com/science/article/pii/S2590005625000906\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"Q2\",\"JCRName\":\"COMPUTER SCIENCE, THEORY & METHODS\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Array","FirstCategoryId":"1085","ListUrlMain":"https://www.sciencedirect.com/science/article/pii/S2590005625000906","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q2","JCRName":"COMPUTER SCIENCE, THEORY & METHODS","Score":null,"Total":0}
引用次数: 0

摘要

无线体域网络(wban)已广泛部署,以提供远程患者监测,促进及时诊断和药物治疗。这极大地帮助降低了有限的医疗资源的成本和压力。然而,通过无线公共通信媒体交换患者的感官数据使通信过程暴露于无数的安全威胁之中。为了遏制这些安全挑战,过去的研究工作已经部署了诸如基于身份和公钥密码系统之类的技术来开发这种环境的方案。然而,在大多数这些方案中,复杂的数学计算使它们对传感器效率低下。在当前的工作中,我们利用非对称密码学和用户生物识别技术的融合来开发wban的鲁棒认证协议。然后部署著名的Burrows-Abadi-Needham (BAN)逻辑来正式分析所开发方案的安全状态,结果表明它提供了协商会话密钥的机密性和可靠性。此外,非正式的安全性分析表明,它对典型的WBAN攻击(如冒充和特权内部人员)具有鲁棒性。从性能的角度来看,我们的协议需要最少的通信和计算成本。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
Anonymous wireless body area networks authentication protocol based on biometrics and asymmetric key cryptography
Wireless Body Area Networks (WBANs) have been extensively deployed to offer remote patient monitoring that facilitate timely diagnosis and medication. This has greatly helped reduce costs and stress on the limited healthcare resources. However, the exchange of sensory patient data across wireless public communication media exposes the communication process to a myriad of security threats. To curb these security challenges, past research work has deployed techniques such as identity-based and public key cryptosystems to develop schemes for this environment. Nevertheless, the complex mathematical computations in majority of these schemes render them inefficient for sensors. In this current work, we utilize an amalgamation of asymmetric cryptography and user biometrics to develop a robust authentication protocol for WBANs. The famous Burrows–Abadi–Needham (BAN) logic is then deployed to formally analyze the security posture of the developed scheme, with results indicating that it offers secrecy and reliability of the negotiated session keys. In addition, the informal security analysis shows that it is robust against typical WBAN attacks such as impersonation and privileged insiders. From the performance perspective, our protocol incurs the least communication and computation costs.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
Array
Array Computer Science-General Computer Science
CiteScore
4.40
自引率
0.00%
发文量
93
审稿时长
45 days
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信