Anonymous wireless body area networks authentication protocol based on biometrics and asymmetric key cryptography

Wireless Body Area Networks (WBANs) have been extensively deployed to offer remote patient monitoring that facilitate timely diagnosis and medication. This has greatly helped reduce costs and stress on the limited healthcare resources. However, the exchange of sensory patient data across wireless pu...

Full description

Saved in:
Bibliographic Details
Main Authors: Keyan Abdul-Aziz Mutlaq, Mushtaq A. Hasson, Zaid Ameen Abduljabbar, Vincent Omollo Nyangaresi, Mustafa A. Al Sibahee, Junchao Ma, Samir M. Umran, Ali Hasan Ali, Abdulla J.Y. Aldarwish, Husam A. Neamah
Format: Article
Language:English
Published: Elsevier 2025-09-01
Series:Array
Subjects:
Online Access:http://www.sciencedirect.com/science/article/pii/S2590005625000906
Tags: Add Tag
No Tags, Be the first to tag this record!
Description
Summary:Wireless Body Area Networks (WBANs) have been extensively deployed to offer remote patient monitoring that facilitate timely diagnosis and medication. This has greatly helped reduce costs and stress on the limited healthcare resources. However, the exchange of sensory patient data across wireless public communication media exposes the communication process to a myriad of security threats. To curb these security challenges, past research work has deployed techniques such as identity-based and public key cryptosystems to develop schemes for this environment. Nevertheless, the complex mathematical computations in majority of these schemes render them inefficient for sensors. In this current work, we utilize an amalgamation of asymmetric cryptography and user biometrics to develop a robust authentication protocol for WBANs. The famous Burrows–Abadi–Needham (BAN) logic is then deployed to formally analyze the security posture of the developed scheme, with results indicating that it offers secrecy and reliability of the negotiated session keys. In addition, the informal security analysis shows that it is robust against typical WBAN attacks such as impersonation and privileged insiders. From the performance perspective, our protocol incurs the least communication and computation costs.
ISSN:2590-0056