LAUSR.org creates dashboard-style pages of related content for over 1.5 million academic articles. Sign Up to like articles & get recommendations!

Privacy preserving light weight authentication protocol (LEAP) for WBAN by exploring Genus-2 HEC

Photo by dtopkin1 from unsplash

Wireless Body Area Network (WBAN) is evolving as the successful way of monitoring patient health and offers enhanced healthcare solutions to provide the better quality of life for the urban… Click to show full abstract

Wireless Body Area Network (WBAN) is evolving as the successful way of monitoring patient health and offers enhanced healthcare solutions to provide the better quality of life for the urban community. As it involves wireless communications, securing the privacy-related data is a key constraint in WBAN. To ensure privacy, it is essential to include authentication to prevent unauthorized access by intruders. This paper proposes the privacy preserving LightwEight two factors Authentication Protocol (LEAP) for WBAN based on genus-2 Hyper Elliptic Curve (HEC). Personal Digital Assistant (PDA) collects signals from sensors from the BAN. PDA transmits the healthcare data to the Healthcare Service Provider (HSP) connected in the public network. Hence, the two-factor mutual authentication protocol is established between PDA and HSP. Since PDA is considered as a resource constraint device, the lightweight mutual authentication is required. Genus 2 Hyper elliptic curve (HEC) is carefully designed to prevent all possible cryptographic attacks, which is more suitable for lightweight authentication since it provides the high degree of security with the lesser key size even as compared to the elliptic curve. Using the rigorous formal security analysis using BAN logic, it is proved that the proposed scheme is secure against possible attacks. Also, the privacy preserving lightweight authentication scheme is implemented using the most-widely accepted Automated Validation of Internet Security Protocols and Applications (AVISPA) tool, and the simulation results reveal that proposed scheme is secure and robust.

Keywords: privacy preserving; authentication protocol; wban; authentication; protocol leap

Journal Title: Multimedia Tools and Applications
Year Published: 2019

Link to full text (if available)


Share on Social Media:                               Sign Up to like & get
recommendations!

Related content

More Information              News              Social Media              Video              Recommended



                Click one of the above tabs to view related content.