A Key-Agreement Protocol Based on Static Parameters and Hash Functions

10/17/2020
by   Behrooz Khadem, et al.
0

Wireless Body Sensor Network (WBSN) is a developing technology with constraints in energy consumption, coverage radius, communication reliability. Also, communications between nodes contain very sensitive personal information in which sometimes due to the presence of hostile environments, there are a wide range of security risks. As such, designing authenticated key agreement (AKA) protocols is an important challenge in these networks. Recently, Li et al. proposed a lightweight scheme using the hash and XOR functions which is much more efficient compared with similar schemes based on elliptic curve. However, the investigations revealed that the claim concerning the unlinkability between the sessions of a sensor node is NOT true. The present paper considers the security issues of the scheme proposed by Li et al. and some of its new extensions in order to propose a new AKA scheme with anonymity and unlinkability of the sensor node sessions. The results of theoretical analysis compared with similar schemes indicate that the proposed scheme reduces average energy consumption and average computation time by 61 percent while reduces the average communication cost by 41 percent. Further, it has been shown by formal and informal analysis that, Besides the two anonymity and unlinkability features, the other main features of the security in the proposed scheme are comparable and similar to the recent similar schemes.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
07/27/2022

EBAKE-SE: A Novel ECC Based Authenticated Key Exchange between Industrial IoT Devices using Secure Element

Industrial IoT (IIoT) aims to enhance services provided by various indus...
research
09/23/2021

An Improved Authentication Key Exchange Protocol Based on ECDH for WSNs

Wide-spread use of wireless sensor networks (WSNs) that are consisted of...
research
11/23/2017

Key management system for WSNs based on hash functions and elliptic curve cryptography

Due to hostile environment and wireless communication channel, security ...
research
09/24/2019

Security analysis of two lightweight certificateless signature schemes

Certificateless cryptography can be considered as an intermediate soluti...
research
06/03/2020

An Authenticated Key Scheme over Elliptic Curves and Security Considerations

Nodes of sensor networks may be resource-constrained devices, often havi...
research
06/03/2020

An Authenticated Key Scheme over Elliptic Curves for Topological Networks

Nodes of sensor networks may be resource-constrained devices, often havi...
research
01/07/2018

An Energy Conserving Routing Scheme for Wireless Body Sensor Nanonetwork Communication

Current developments in nanotechnology make electromagnetic communicatio...

Please sign up or login with your details

Forgot password? Click here to reset