Next Article in Journal
Calculation of Dangerous Driving Index for Two-Wheeled Vehicles Using the Analytic Hierarchy Process
Next Article in Special Issue
Enhancing Predictive Expert Method for Link Prediction in Heterogeneous Information Social Networks
Previous Article in Journal
Fault Diagnosis Method for Railway Turnout with Pinball Loss-Based Multiclass Support Matrix Machine
Previous Article in Special Issue
A Comparative Analysis of Active Learning for Rumor Detection on Social Media Platforms
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Fine-Auth: A Fine-Grained User Authentication and Key Agreement Protocol Based on Physical Unclonable Functions for Wireless Body Area Networks

1
Key Laboratory of Trustworthy Distributed Computing and Service (MoE), Beijing University of Posts and Telecommunications, Beijing 100876, China
2
School of Computer Science and Technology, Harbin Institute of Technology, Shenzhen 518055, China
*
Author to whom correspondence should be addressed.
Appl. Sci. 2023, 13(22), 12376; https://doi.org/10.3390/app132212376
Submission received: 29 September 2023 / Revised: 6 November 2023 / Accepted: 7 November 2023 / Published: 15 November 2023
(This article belongs to the Special Issue New Insights and Perspectives in Cyber and Information Security)

Abstract

:
Wireless body area networks (WBANs) can be used to realize the real-time monitoring and transmission of health data concerning the human body based on wireless communication technology. With the transmission of these sensitive health data, security and privacy protection issues have become increasingly prominent. Fine-grained authentication allows physicians to run authentication checks of another specific entity according to their identifying attributes. Hence, it plays a key role in preserving the security and privacy of WBANs. In recent years, substantial research has been carried out on fine-grained authentication. However, these studies have put considerable effort into WBAN performances, resulting in weakened security. This paper proposes a fine-grained user authentication and key agreement protocol based on physical unclonable functions (PUFs) while maintaining robust security and performance. This will allow physicians to perform mutual authentication and obtain key agreements with authorized body area sensor nodes according to their identity parameters, such as occupation type and title. We then provide comprehensive security and heuristic analyses to demonstrate the security of the proposed protocol. Finally, the performance comparison shows that the proposed protocol is more robust in security, cost-effective communication, and computational overheads compared to three leading alternatives.

1. Introduction

Wireless body area networks (WBANs) [1] have been widely used in healthcare as a mature wireless communication technology. By deploying tiny body area sensor nodes and communication devices around the body, medical staff can monitor and transmit physiological parameters and health status data in real time, effectively enhancing people’s quality of life.
As shown in Figure 1, WBANs involve collaboration among medical staff, gateway nodes, and body area sensor nodes (BASNs). Medical staff or physicians are the users and controllers of the system. They obtain the patient’s physiological parameters by communicating with BASNs and performing the operation of diagnosis and treatment. As an intermediate device, the gateway node (GWN) bridges medical staff and BASNs and is responsible for data transmission, forwarding, and coordination. BASNs are equipped to collect patients’ biological data, including heart rate, blood pressure, body temperature, etc., while allowing medical staff to access these data in real time. In addition, BASNs can receive instructions from medical staff to perform corresponding operations as needed. Medical staff can rapidly assess the patient’s physical condition via this network topology model and perform corresponding medical operations.
However, the openness of WBANs communication will undoubtedly lead to illegal network intrusion. If adequate security protection measures for health data involving personal privacy are not implemented, serious consequences will arise, including personal privacy disclosure, data tampering, and unauthorized access [2,3]. Meanwhile, given the different identity authentication requirements for users of different professional levels, it is important to perform personalized authentication according to corresponding levels and permissions to ensure that each user can only access the resources for which they have permission. Naturally, realizing efficient, safe, and credible data transmission and personalized authentication mechanisms in WBANs is essential.
Fine-grained authentication [4] is an authentication technology designed to provide detailed and precise identity verification in order to identify and authorize users in detail according to the users’ unique attributes and permissions. The advantage of this authentication technology is that it can provide a higher level of security and precise control and meet WBANs’ requirements for real-time accuracy and personalization in the authentication process.
This paper aims to provide an efficient and reliable fine-grained authentication solution to ensure the privacy and security of medical data. By carrying out this study, we expect to provide a useful reference and guidance for developing fine-grained authentication technology in order to promote the expansion and application of authentication in WBANs.

1.1. Related Work

In the health field, fine-grained user authentication is an important security measure that aims to ensure that only authorized individuals or entities can gain authentication from other specific entities, maintaining personal privacy and data security. In this section, we summarize existing fine-grained authentication schemes for healthcare systems.
Chatterjee et al. pioneered an attribute-based fine-grained access control scheme to secure communication in the client–server architecture [5]. This groundbreaking scheme utilizes smart cards and biometric authentication for verification purposes. Furthermore, it enables the establishment of session keys to encrypt subsequent communications. However, it is important to highlight that the solution’s communication overheads are relatively substantial, potentially impacting the overall user experience.
Wang et al. [6] introduced an access control with fog computing to achieve a more optimal balance between efficiency and security. This approach is well suited for a range of scenarios, including data storage, directory management, and file organization. However, Singh et al. in [7] reported that the scheme proposed by Wang et al. cannot achieve mutual authentication or resist device impersonation attacks.
Ogundoyin et al. recognized the sensitivity of medical data and consequently introduced a lightweight privacy-preserving authentication and fine-grained access control solution: PAASH [8]. They presented an elliptic curve cryptography (ECC)-based certificateless signature scheme. Simultaneously, they employed attribute-based encryption and signature technology to achieve precise access control. Nevertheless, Benil et al. [9] highlighted that the PAASH fails to counter impersonation, forgery, and modification attacks.
There are also works for securing communication in WBANs. The authors of Ali et al. in [10] offered a robust authentication and access control solution by using expensive bilinear pairing. However, the password of the user can be effectively guessed by the adversary if there is no use of “modulus” operations.
Similarly, one research study [11] designed an E-health-oriented proposal that is relevant to authentication, key agreement, and access control. Furthermore, this study was the first to propose a method of transferring the ownership of patient information from the former physician to the new physician. Before the application of this charming proposal, forward secrecy and three-factor security should be applied.
For the scenario of wireless medical sensor networks, Yao et al. [12] proposed multiple solutions for user–server authentication, patient–server authentication, and user–patient authentication scenarios. However, the password verifier table is stored in the registration center and can face password-guessing attacks, which lead to the exposure of the user’s password.

1.2. Motivations and Contribution

Given the increasing adoption of WBANs in security-critical scenarios, the need to provide a fine-grained three-factor authentication solution increases. However, according to our performance analysis in Section 5, most existing fine-grained user authentication protocols commonly cannot balance security and performance:
  • Security: In terms of security, similar approaches exhibit the same security problems to greater and lesser degrees [10,11,12]: for example, the lack of mutual authentication, the inevitable smart card loss attacks, or the failure to provide forward secrecy.
  • Performance: From the view of storage, communication, and computation costs, existing solutions still require more resources in order to ensure the functionality of fine-grained authentication. However, WBANs are more resource-constrained than conventional networks, and a tiny body area sensor device cannot run extensive operations according to the published protocols.
Thereupon, we consider a robust and effective fine-grained user authentication scheme that can maintain a good balance between security and performance. The specific contributions of this study are as follows:
  • Fine-grained authentication protocol: We design a fine-grained authentication protocol for WBANs. This proposed scheme slows for mutual authentication among users with varying privileges and corresponding authorized BASNs while also facilitating the negotiation of a session key for encrypting subsequent data transmission.
  • Complete security analysis: The proposed protocol’s security is rigorously examined via heuristic and provable security analyses, which show that the proposed protocol attains multiple desired security properties and exhibits resilience against all known attacks.
  • Performance evaluation: Via a comparative assessment of storage, communication, and computational overheads for the proposed protocol and also other established methods, we show the advantages of the proposed protocol with respect to performance.

2. Preliminaries

In this section, we introduce preliminaries, which include the system model, adversary model, physically unclonable function, fuzzy extractor, and RSA cryptosystem, in order to ease the reader’s understanding of this study.

2.1. System Model

As shown in Figure 2, based on the standard single-gateway model [13], our system model consists of three entities: physicians at different occupational levels (A, B, and C), a gateway node (GWN), and a series of body area sensor nodes (BASNs).
In the registration phase, users and BASNs register at the gateway, which corresponds to the registration process in Figure 2. At the same time, the gateway sets the user’s fine-grained authentication parameters according to the user’s occupation level and type in order to prepare for subsequent fine-grained authentication between users and BASNs. At the end of registration, the physicians (BASNs) retain real-time fine-grained authentication parameters (resp. secret value), and GWN stores the identity of BASNs.
In the login and authentication phase, if the user wants to access the data of some body area sensor nodes, they first need to initiate an authentication request in the gateway, which corresponds to process 1 in Figure 2. Next, the gateway authenticates the user. If authentication is successful, the gateway node sends the user’s request to the BASN, which corresponds to process 2 in Figure 2. After the BASN receives the request, it first verifies the identity of the gateway, and if the authentication passes, it sends the authentication-related parameters to the gateway, which corresponds to process 3. Upon the gateway’s receipt of data from BASN, it first authenticates the BASN and then updates relevant fine-grained authentication parameters according to the user’s occupation; then, it sends the relevant authentication data to the user, which corresponds to process 4. Finally, the user negotiates a consistent session key with BASN via authentication data from the gateway node. The purpose of this phase is to ensure that only legitimate physicians can access the data resources of BASNs.

2.2. Adversary Model

The Dolev–Yao (DY) model, which portrays the capabilities of the adversary, has been widely used in formal and heuristic analyses with respect to the security of authentication protocols [14]. Currently, the latest research [15] has taken this a step further by consolidating adversary capabilities in order to comprehensively evaluate the authentication protocol. In this refined threat model, an adversary 𝒜 possesses six capacities (A-), which are as follows:
  • (A-1) A can intercept, modify, insert, and delete any messages that are being transmitted through the open channel.
  • (A-2) A can systematically enumerate all elements within the Cartesian product of the identity space and password space, which is denoted as D i d × D p w .
  • (A-3) A is capable of obtaining previously established session keys between the physician and BASN.
  • (A-4) A possesses the capability to acquire the secret key of the GWN in situations where the system eventually experiences failure.
  • (A-5) A can breach some specific BASNs, extracting sensitive data stored within them. Furthermore, A can manipulate the compromised BASN so that it can participate in subsequent communications involving the GWN, other users, and body area sensor nodes.
  • (A-6) A could potentially register as either a legitimate user or even the role of the GWN administrator only if the security of the physician’s password is evaluated during the registration phase.
    Carrying out formal and heuristic analyses in Section 4, based on the DY adversary’s capability, we can quantify the advantage of the adversary relative to their ability to bypass semantic security, and via heuristic analyses, we prove that the protocol can resist all kinds of attacks issued by the DY adversary.

2.3. Physical Unclonable Function

The physical unclonable function (PUF) [16] generates an output based on physical characteristics, such as delay, resistance, capacitance, or reflection properties. Since the output of the PUF is based on slight randomness and unevenness in the manufacturing process, it is difficult for an adversary to generate the same response sequence as the original PUF via copying or simulation. Therefore, the PUF has a high degree of security and protection in security systems, and it is widely used to protect sensitive information in cryptographic authentication protocols.
During the registration phase of the authentication protocol, the user or device generates a unique identifier or a unique key C via PUF and stores it securely. In the login phase, PUF generates a response: R , R = P U F C . Response R is compared with a previously registered identifier or key. If R matches the key, the login can be seen as a success, and the user is allowed to send the authentication request to the GWN. This PUF-based user-authentication mechanism takes advantage of the physical properties and unclonability of the PUF in order to ensure a secure, unique, and difficult-to-forge identity verification process. In the proposed protocol, we use a physical unclonable function P U F s u m · , which configures the embedded trigger sum for the user, where the sum refers to the number of times that the user is allowed to try to use P U F s u m · in the event that the user forgets the secret key.

2.4. Fuzzy Extractor

The fuzzy extractor [17] is an important concept in cryptography, and it is especially suitable for correcting data inconsistencies caused by noise or changes. In the field of cryptographic authentication, fuzzy extractors are used to deal with the variability and noise that may be present when physical characteristics are collected to ensure authentication.
The fuzzy extractor works by converting irregular physical characteristics into a stable and consistent key or bit string. This stable key can be used for the following authentication. Importantly, the fuzzy extractor allows for the extraction of fixed and verifiable information without compromising the accuracy of physical characteristic identification in order to ensure stability and consistency during the login phase of the authentication protocol.
In this paper, the fuzzy extractor is utilized to mitigate the influence of noise during PUF execution. The system executes the PUF to obtain the R , R = P U F C response during the registration process; then, it adds R to the F E . G e n R = K ,   h d fuzzy extractor and stores the auxiliary string h d . During the login phase, the system can execute the PUF to obtain the current R = P U F C response and employ the h d stored in memory to determine K = F E . R e c R ,   h d . If K and K are not equal, this indicates that an unauthorized user attempted to initiate a login request, and the system dismisses this illegal login request.

2.5. RSA Cryptosystem

In the realm of public key cryptography, the RSA cryptosystem [18], founded on the intricacies of the large number factorization problem, is elucidated below. To aid comprehension, an example involving a message sender denoted as S e d who transmits a message m to a message receiver R e v is presented.
Initiation: The message receiver R e v selects two substantial prime numbers p   and   q . Subsequently, R e v computes n = p   ·   q and Euler’s totient function of n , which is denoted as φ n = p 1 · q 1 . Next, R e v chooses an integer e that satisfies gcd e , φ n = 1 . The receiver then computes d e 1 mod φ n . The outcome is that R e v publicizes the public key e , n while keeping the private key d confidential.
Encryption: The message sender S e d takes the message m and performs an encryption operation c = m e   mod   n using R e v ’s public key e . Consequently, S e d transmits the resultant cipher c to R e v .
Decryption: Upon the receipt of the cipher c , message receiver R e v employs private key d to decipher the message. This is accomplished via the computation m = c d mod   n .
In Section 3 (i.e., step L2 in the user login phase and step V10 in the authentication and key agreement phase), we provide the detailed method of using RSA to securely transmit secret values.

3. The Proposed Protocol

Aiming at the solving common security and storage problems of authentication protocols in WBANs, we propose a fine-grained user authentication method based on the physical unclonable function (PUF). Specifically, it includes seven phases, namely system initialization, body area sensor node and user registration, user login, authentication and key agreement, password update, and dynamic node addition. To promote the understanding of researchers, some notations used in the proposed protocol are explained in Table 1.

3.1. System Initialization Phase

In the initialization phase, given a security parameter n , the gateway node G W N selects a long-term key pair x , y 0 , 1 n and generates a unique identity GID. Then, G W N saves x , y and publicizes identity GID.

3.2. Registration Phase

The registration phase comprises the following: In the terminal of the GWN, the user and BASN need to complete the registration of identity information and receive authentication parameters in order to be ready for future identity authentication and key agreement. Specifically, the registration phase includes the registration of the BASN and users.

3.2.1. Registration Phase of BASN MS j

The registration of M S j includes R11~R13:
R11: M S j G W N :   M I S j ; the M S j transmits identity M I S j to gateway node G W N via a secure channel. Then, gateway G W N collects M I S j and stores it in identity set S M = M I S j .
R12: G W N M S j : x j ; GWN calculates secret value x j = h M I S j x for M S j and also returns secret value x j to M S j via a secure channel.
R13: M S j stores x j secretly.
Note that the secure channel can be understood here as comprising the user and node devices that are within the same physical space (such as a computer room managed by a hospital administrator); then, the registration and sharing of secret values can be completed in a face-to-face manner.

3.2.2. Registration Phase for User U i

The registration of user U i includes R21~R23:
  • R21: U i G W N : A 0 ; user U i transmits the calculated A 0 to G W N via a secure channel.
Specifically, U i inputs the I D i   and   P W i of their own choice to the personal digital assistant (PDA). The PDA selects a random number r 1 , n 1 , where n is a system security parameter. Then, PDA calculates the following: hash value A 0 = h I D i P W i r   mod   n 0 ; n 0 is a large prime number.
  • R22: G W N U i : {Registration Package (RP)}. The G W N sends a registration package to U i .
After G W N receives information A 0 from user U i , it first records the registration timestamp T r e g U i , selects a pseudo-random identity P I D i , and computes V i = h P I D i x   and   A 1 =   V i A 0 . Secondly, G W N determines the body area sensor node identity set S M U i , which is authorized for the authentication of U i , and binds the authorization check polynomial; the authorized authentication time threshold; and the authorization, authentication, and verification value for user U i , where S M U i is a subset of S M , the check polynomial is f U i t = h P I D i x + M I S j S M U i t h P I D i M I S j , the time threshold is Δ T a u t h U i , and the authentication verification value is E I D i = T r e g U i · h y P I D i 1 . Furthermore, G W N uses symmetrical algorithms (e.g., the well-known AES [19]) to generate symmetric ciphertext F U i t and configures the physically unclonable function P U F s u m · with embedded trigger s u m , where F U i t = E n c h x y f U i t , Δ T a u t h U i , E I D i , and s u m refers to the number of times the user is allowed to try to use P U F s u m · . Here, we set the maximum value to 3 and the initial value to 0. Finally, G W N sends the registration package (RP) to U i , where RP stores parameters P I D i , P U F s u m · , A 1 , S M U i ,   and   F U i t .
  • R23: After U i receives RP, U i updates A 1 and calculates A 2 as follows: At first, U i inputs I D i   and   P W i to PDA, and PDA computes V i =   A 0 A 1   and   V i i = P U F s u m P W i . PDA then uses F E . G E N · to compute the following: k i , k i i = F E . G E N V i i , A 2 = h V i k i S M U i   mod   n 0 . After that, PDA updates secret value A 1 = V i S M U i k i i h I D i V i i . Finally, PDA stores a series of values: P I D i , A 1 , A 2 , P U F s u m · , F U i t .
During registration, the gateway node no longer issues smart cards to users, thereby avoiding offline password-guessing attacks, which result from smart card loss attacks. At the same time, the periodicity of modulo calculations makes it impossible for the adversary to guess passwords effectively in order to protect password security. Meanwhile, the gateway needs to encrypt these fine-grained authentication parameters to prevent users from tampering with them. Additionally, to ease the understanding of readers, Figure 3 summarizes the registration operation of the user and BASN.

3.3. Login Phase

In the login phase, the user needs to be verified via the PDA. Upon the PDA’s authentication of the user identity’s legitimacy, the user can log in via the PDA successfully; then, the PDA generates an authentication request for some specific BASN. Furthermore, the PDA transmits this authentication request to the GWN. The login phase includes three steps from L1 to L3:
L1: Firstly, U i enters the identity and password I D i * , P W i * . Secondly, PDA uses the physically unclonable function P U F s u m · to verify the user’s identity. Specifically, PDA computes V i i * = P U F s u m P W i * , V i * S M U i k i i * = h I D i * V i i * A 1 , k i * = F E . R E P V i i * , k i i * , and A 2 * = h V i * k i * S M U i   mod   n 0 . Thirdly, PDA compares whether A 2 * is equal to A 2 ; if A 2 * = A 2 , the user’s identity can be verified. Then, it proceeds to step L2 to continue the execution; otherwise, P U F s u m · will add 1 to the value of s u m automatically when the user tries to enter another I D i * , P W i * again for the login. If the value exceeds the preset maximum value, the session will be terminated, and the user’s account will be frozen until U i re-registers.
L2: PDA runs a 1024-bit RSA cryptosystem to generate public key e i and private key d i for U i , and PDA keeps d i secret. Then, the PDA selects a random number r u 1 , n 1 ; chooses the identity of M S j , which the user wants to acquire; extracts the timestamp T 1 ; and calculates the following parameters: B 1 = h V i h r u T 1 e i S M U i and B 2 = h P I D i M I S j h r u T 1 e i S M U i , where e i is the public key of U i .
L3: U i G W N :   F U i t , P I D i , M I S j , B 1 , B 2 , T 1 . PDA sends the requested information to G W N in a public channel.

3.4. Authentication and Key Agreement Phase

In the authentication and key agreement phase, three entities (i.e., user, GWN, and BASN) first verify the identity of the communicating party when communicating with each other. At the same time, U i and M S j can negotiate a consistent session key. This phase includes ten steps from V1 to V10:
V1: Upon G W N ’s receipt of the requested information by user U i , it first extracts the current timestamp T c and checks whether the time gap between T c and T 1 is less than time threshold Δ T . If not, G W N directly discards the request information; if so, G W N decrypts F U i t and obtains f U i * t , Δ T a u t h U i , E I D i * .
Then, G W N verifies whether U i is authorized to obtain authentication with M S j , for which its identity is M I S j . G W N calculates f U i * h P I D i M I S j and h P I D i x and checks whether the two values are equal. If so, G W N further judges whether E I D i * belongs to case (a), case (b), or case (c):
(a)
E I D i * · h y P I D i = h P I D i y ;
(b)
T c E I D i * · h y P I D i > Δ T a u t h U i ;
(c)
T c E I D i * · h y P I D i Δ T a u t h U i .
If it belongs to case (a), this means that U i does not have authentication authority with respect to M S j ; if it belongs to case (b), this means that the authentication authority of U i exceeds the time threshold for U i to be authorized; if it belongs to case (c), this means that the body area sensor node M S j that U i wants to access can be authorized for authentication within a valid period of time. G W N further computes V i * = h P I D i x ,   h r u * T 1 e i * S M U i = B 1 h V i * , and B 2 * = h P I D i M I S j * h r u * T 1 e i * S M U i . Finally, G W N compares B 2 * and B 2 . If they are equal, i.e., h r u * T 1 = h r u T 1   and   e i * = e i , S M U i = S M U i , this means that U i can be validated, and the operation proceeds to step V2; otherwise, G W N terminates this session.
V2: G W N selects random number r g 1 , n 1 , extracts the current timestamp T 2 , and computes the following: x j = h M I S j x , B 3 = h x j M I S j r g h r u T 1 , B 4 = e i h V i E I D i h x j r g , and B 5 = h h r u T 1 r g x j h V i E I D i T 2 .
V3: G W N M S j :   B 3 , B 4 , B 5 , T 2 . G W N sends B 3 , B 4 , B 5 , T 2 to the body area sensor node M S j .
V4: M S j firstly extracts timestamp T c and checks whether the time gap between T c and T 2 is less than time threshold Δ T . If so, M S j recovers r g * , h r u * T 1 , e i * , h V i * E I D i * : r g * h r u * T 1 = B 3 h x j M I S j , and   e i * h V i * E I D i * = B 4 h x j r g * . At the same time, M S j computes B 5 * = h h r u * T 1 r g * x j h V i * E I D i * T 2 and compares the value of B 5 * and B 5 . If the two values are equal, G W N s identity is verified, and M S j proceeds to step V5; otherwise, M S j terminates this session.
V5: M S j selects random number r s 1 , n 1 , extracts timestamp T 3 , and computes r s = r s e i via the RSA algorithm: S K = h h r u T 1 r s h V i E I D i , B 6 = M I S j h r g , B 7 = r s h S K r g x j , B 8 = h r s h S K r g x j T 3 ) ,   and   B 9 = h S K r g x j h r s S K , where B 6 , B 7 , B 8 ,   and   B 9 represent the intermediate parameters, and S K represents the session key of M S j and U i .
V6: M S j G W N :   B 6 , B 7 , B 8 , B 9 , T 3 . M S j sends information B 6 , B 7 , B 8 , B 9 ,   and   T 3 to G W N .
V7: G W N firstly checks the validity of the timestamp. Next, G W N uses the secret value r g to compute x j * , r s * : M I S j * = B 6 h r g , x j * = h M I S j * x , r s * h S K * r g * = B 7 x j * ,   and   B 8 * = h r s * h S K * r g * x j * T 3 ) . Then, G W N checks the consistency of B 8 * and B 8 . If the two values are equal, G W N executes step V8; otherwise, it terminates this communication.
V8: G W N computes h r s S K = B 9 h S K r g x j and updates the parameters as follows:
G W N updates the new pseudo-random identity P I D i n e w for U i ;
G W N updates V i n e w = h P I D i n e w x ;
G W N updates the authorization verification value E I D i n e w , the authorized authentication time threshold Δ T a u t h U i n e w , and the authorized authentication body area sensor node identity set S M U i n e w . Specifically, if the authentication authority of U i needs to be revoked, then G W N computes E I D i n e w = h P I D i n e w y · h y P I D i n e w 1 and sets Δ T a u t h U i n e w = null , f U i n e w t = null , and   S M U i n e w = null ; otherwise, G W N computes E I D i n e w = h y P I D i n e w 1 · T c , updates Δ T a u t h U i n e w , and further updates the authorized authentication identity set S M U i n e w according to situations (d), (e), (f), and (g):
(d)
If there is no change in the identity set of the body area sensor node, then S M U i n e w = S M U i .
(e)
If there is a newly added identity set S M a d d with respect to the body area sensor node, then S M U i n e w = S M U i + S M a d d .
(f)
If identity set S M d e l is removed from the body area sensor node, then S M U i n e w = S M U i S M d e l .
(g)
If cases (e) and (f) occur simultaneously, then S M U i n e w = S M U i S M d e l + S M a d d .
G W N updates the value of f U i n e w t , where f U i n e w t = h P I D i n e w x + M I S j S M U i n e w t h P I D i M I S j .
G W N updates F U i n e w t = E n c h x y f U i n e w t , Δ T a u t h U i n e w , E I D i n e w .
G W N computes B 10 = V i n e w S M U i n e w h V i E I D i V i   and   B 11 = P I D i n e w r s h ( V i n e w h r u T 1 ) and further computes B 12 = h V i n e w h r s S K S M U i n e w .
V9: G W N U i : F U i n e w t , B 10 , B 11 , B 12 ; G W N sends related information F U i n e w t , B 10 , B 11 , B 12 to U i .
V10: U i uses V i to recover V i n e w   and   S M U i n e w , h V i * E I D i * , i.e., ( V i n e w S M U i n e w h V i * E I D i * = B 10 V i . Then, U i uses private key d i and then computes P I D i n e w r s * = B 11 h V i n e w h r u T 1 , r s * = r s * d i , S K * = h h r u T 1 r s * h V i * E I D i * , and B 12 * = h ( V i n e w h r s * S K * S M U i n e w ) . If B 12 * equals B 12 , U i accepts session key S K and completes the authentication; otherwise, U i rejects the session key. After accepting the session key, the PDA computes parameters A 1 n e w = V i n e w S M U i n e w h I D i P W i   and   A 2 n e w = h V i n e w k i S M U i n e w mod   n 0 . Finally, the PDA updates the value from P I D i , A 1 , A 2 , F U i t to { P I D i n e w , A 1 n e w , A 2 n e w , F U i n e w t } . Additionally, Figure 4 summarizes the login, authentication, and key agreement operations of the user and BASN.

3.5. Password Update Phase

U i can update the password by following steps U1~U2 below without interacting with G W N :
U1: At first, U i enters I D i * , P W i * . PDA then uses P U F s u m · to verify the identity of U i . Specifically, PDA computes V i i * = P U F s u m P W i * , V i * S M U i k i i * = h I D i * V i i * A 1 , k i * = F E . R E P V i i * , k i i * ,   and   A 2 * = h V i * k i * S M U i   mod   n 0 . If A 2 * is equal to A 2 , PDA continues to run step U2; otherwise, this session is terminated.
U2: Via the new password P W i n e w , which is chosen by U i , the PDA computes the new parameters: V i i n e w = P U F P W i n e w , k i n e w , k i i n e w = F E . G E N V i i n e w , A 1 n e w = V i S M U i k i i n e w h I D i V i i n e w , and A 2 n e w = h V i k i n e w S M U i   mod   n 0 . Finally, the PDA updates the value of A 1 , A 2 to A 1 n e w , A 2 n e w .

3.6. Dynamic Increase in Sensor Nodes

In order to adapt or meet the continuous medical needs of WBANs, the addition of new body area sensor nodes is undoubtedly necessary. When a new body area sensor node S t joins WBANs, S t only needs to initiate a registration request as in Section 3.2.1. After S t is successfully registered, G W N broadcasts S t s identity S I D t and stores S I D t in identity set S M .

4. Security Analysis of the Proposed Protocol

In this section, we carry out the security analysis of the protocol, which includes formal security and heuristic security analyses. Given the DY adversary’s capabilities, via formal security analysis, we can demonstrate that the adversary does not have a significant and strong advantage with respect to breaking the semantic security of the session key in our protocol. Then, via heuristic analysis, one can observe that the proposed protocol not only fulfills the desired attributes but also demonstrates resilience against a multitude of known attacks [20,21].

4.1. Formal Security Proof

Formal security analysis is an effective method for demonstrating the semantic security of the proposed protocol. It employs formal mathematical techniques to prove whether the proposed protocol satisfies the desired security properties within a specific security model. In this type of analysis, the initial step involves defining a formal model that describes participants, furthering the DY adversary’s capabilities. Subsequently, security properties need to be precisely defined. Lastly, the desired security properties are proven to be satisfied within the defined security model via mathematical, logical deduction.

4.1.1. Basis for Security Proof

In this study, three primary participants within our protocol P are identified as follows: a physician denoted as U i , a gateway node referred to as G W N , and a body area sensor node labeled as M S j . Before initiating the simulation, the simulator selects the RSA cryptosystem, employing two large prime numbers p and q with equal bit lengths, i.e., p = q = n . Subsequently, U i selects a set of personal information I D i , P W i . Simultaneously, G W N generates a long-term key pair x , y , and M S j owns an identity–secret key pair M I S j , x j .
During the proof process, three entities will instantiate U i , G W N , and M I S j , with their respective instances denoted as Π u i u , Π G W N g , and Π M S j m . For the sake of simplicity, these instances can collectively be marked as Π t when distinguishing them is unnecessary. Moreover, each instance is treated as an oracle. This implies that if a message input is valid, invalid, or null, the oracle’s state accordingly is an acceptance, rejection, or “ ”, respectively, where “ ” indicates that there is no response to the input.
Subsequently, we introduce certain terms that are pertinent to this proof:
Accepted State: An instance Π t reaches an accepted state upon receiving the final expected protocol message. Notably, the ordered concatenation of all exchanged messages (both sent and then received) shapes the session identifier for the current session of Π t .
Partnering: Instances Π t 1 and Π t 2 are considered partnered if they simultaneously meet the following criteria: (a) both are in an accepted state, (b) mutual authentication has occurred, and they share an identical session identifier.
Adversary: In this context, adversary A can interact solely with honest entities by initiating query oracles and controlling the simulator. A aims to compromise the security of authentication messages and re-construct the session key within protocol P . The queries that A can launch include the following:
-
Execute ( Π u i u , Π G W N g , Π M S j m ): This query allows A to simulate the entire authentication process and access exchanged messages between U i , G W N , and M S j .
-
Send ( Π t , m ): A can send message m and conduct an active attack on instance Π t . If l is valid and Π t has received m , the simulator responds to A with the computation of m ; otherwise, this query is terminated.
-
Reveal ( Π t ): This query results in revealing the session key calculated by Π t and its partner to adversary A .
-
Corrupt ( Π u i u , α ): In this query, A can obtain authentication factors associated with U i based on value α . Specifically, the oracle exposes the password to A when α = 0 and exposes the data stored in the registration package to A when α = 1 .
-
Corrupt ( Π G W N g ): In this query, A can gain access to the long-term key x possessed by G W N .
-
Corrupt ( Π M S j m ): This query enables A to obtain the secret value of M S j .
Freshness: An instance of Π u i u , Π G W N g , or Π M S j m is deemed fresh if the session key between U i and M S j remains undisclosed to A via the aforementioned reveal query.
Test ( Π t ): This query assesses the semantic security of session key S K . In this query, A can make only one inquiry. Considering protocol P , instance Π t can only either be Π u i u or Π M S j m . Formally, if test Π t has been queried before, the query outputs “ ” (null). Otherwise, the oracle flips an unbiased coin b . If b = 1 , test ( Π t ) provides the real session key to A ; if b = 0 , test ( Π t ) yields a random string with the same length as the real session key and sends it to A .
Semantic Security: Given a protocol P , probabilistic polynomial time (PPT) adversary A requests new instances for a series of queries, including execute query, send query, corrupt query, and test query. A endeavors to compromise protocol P by guessing the value of b in the test query and returns a guessed value b * . Let Succ A denote A ’s successful guess of b * as b , i.e., b * = b . Then, the advantage of A successfully breaking the semantic security of protocol P concerning the session key is defined as A d v A P = 2 Pr Succ A 1 .

4.1.2. Security Proof

In this section, we set up a total of eight games to simulate the semantic security of the adversary’s ability to break the session key from different perspectives. Among these simulated games, the only difference is that the latter game provides more information to the adversary; the former and latter games are indistinguishable to the adversary. In each game, the simulator responds to queries from the adversary, who, in turn, obtains different information to increase their advantage of interfering with semantic security. Finally, based on the advantage of the adversary in each game, the total advantage of the adversary in interfering with the semantic security of the session key can be quantified.
Theorem 1.
Let  P  be the proposed protocol,  D  be the space of password, and  n  be the system’s security parameter. Then, PPT adversary  A  breaks  P  with a negligible advantage  A d v A P , D  by making a series of queries, including  q e  execute query,  q s  send query,  q h  hash query, and  q p  PUF query, where  A d v A P , D  encounters the following.
A d v A P , D q h 2 + 6 q s 2 l 1 + q s + q e 2 p + q p 2 + 2 q p 2 l 2 + 2 C q s e n d s + A d v A R S A n
Proof. 
We now demonstrate and prove that the adversary’s advantage in breaking the semantic security of the session key is factually negligible due to the involvement of G a m e 1 with G a m e 8 . S u c c i is set to be the event during which A guesses b in the test query of G a m e k   successfully , where   k = 1 , 2 , , 8 .
G a m e 1 : This game simulates a real attack by a random oracle. Bit b is then randomly chosen at the beginning of this game. Thus, we obtain the following:
A d v A P , D = 2 Pr S u c c 1 1
G a m e 2 : This game shapes hash list Ω h . For example, A initiates a hash query h γ and hash oracle Θ h takes γ to retrieve Ω h . If there is a retrieved hash value, h γ , in Ω h , Θ h responds to the hash value. Otherwise, a random string ψ will be sent to A ; meanwhile, γ , ψ is stored in Ω h .
Using the known list in this game, A performs a test query to distinguish the real session key and the random string. Factually, given S K = h h r u T 1 r s h V i E I D i , only secret values including U i ’s r u , V i , and M S j ’s r s essentially comprise S K . Hence, A has no way of computing S K and cannot distinguish whether b = 0 or b = 1 other than making guesses.
Thus, compared to G a m e 1 , A ’s chance of winning this game does not empower A ’s advantage.
Pr S u c c 2 = Pr S u c c 1
G a m e 3 : In this game, the active attack is modeled based on G a m e 2 . A can execute the send query and hash query to try to persuade a participant to accept a forged message. Thus, A ’s advantage may be enhanced by finding the collision that generates a valid message compared with G a m e 1 / 2 . That is, if the following collisions occur, this game is aborted:
(i)
A collision can be found in the hash values or PUF’s outputs, and the probability is q h 2 2 l 1 + 1 or q p 2 2 l 2 + 1 , where l 1 and l 2 denote the length of output by the hash function and PUF, respectively.
(ii)
Another collision that can be found is relative to the choice of random numbers r u , r g ,   and   r s , where the probability is q s + q e 2 2 p .
Thus, we have the following:
Pr S u c c 3 Pr S u c c 2   q h 2 2 l 1 + 1 + q p 2 2 l 2 + 1 + q s + q e 2 2 p
G a m e 4 : In this game, A desires to guess B 2 , B 5 , B 8 ,   and   B 12 without asking the hash query.
We can obtain:
Pr S u c c 4 Pr S u c c 3 q s 2 l 1
G a m e 5 : In this game, A tries to guess A 2 without asking the hash query. Similarly, we can obtain the following:
Pr S u c c 5 Pr S u c c 4 q s 2 l 1
G a m e 6 : In this game, via the corrupt Π u i u , α query, A computes A 2 . There are two cases we need to consider:
  • Case 1, i.e., corrupt Π u i u , α = 0 : with respect to “fuzzy keywords + honeywords”, the probability that A guesses a physician’s password is no greater than C q s e n d s [22,23,24];
  • Case 2, i.e., corrupt Π u i u , α = 1 : the probability that A guesses the values of A 2 is less than q s 2 l 1 .
Therefore, we obtain the following:
Pr S u c c 6 Pr S u c c 5 C q s e n d s + q s 2 l 1
G a m e 7 : In this game, A initiates a corrupt ( Π M S j m ) query to compromise body area sensor node M S j , and then A further obtains secret values x j and r s . However, A cannot obtain r s from r s since there is no PPT solution for solving the difficulty of the large number factorization problem [18].
Therefore, we can yield the following:
Pr S u c c 7 Pr S u c c 6 A d v A R S A n
G a m e 8 : This game simulates the attack where A tries to calculate the session key, which means that A no longer queries the oracle’s execute query, send query, and corrupt query. However, similarly to the analysis in G a m e 7 , A cannot compute r s from r s . In other words, A ’s advantage in this game is equal to the advantage in G a m e 7 . Thus, we can have the following:
Pr S u c c 8 = Pr S u c c 7
Ultimately, we can observe that A has no un-negligible advantage greater than 1 2 ; thus, Pr S u c c 8 = 1 2 .
From Equation (1) to Equation (8) and with respect to the triangular inequality, we yield the following:
A d v A P , D = 2 Pr S u c c 1 1 = 2 Pr S u c c 8 1 + 2 Pr S u c c 1 Pr S u c c 8 q h 2 + 6 q s 2 l 1 + q s + q e 2 p + q p 2 2 l 2 + 2 C q s e n d s + A d v A R S A n
In sum, we can conclude that adversary A does not have a significant and strong advantage, A d v A P , D , in breaking the semantic security of the session key in our protocol. □

4.2. Heuristic Analysis

The heuristic method [25,26] eschews the use of intricate formulas, making it remarkably straightforward. This approach proves to be both highly efficient and uncomplicated, enabling a succinct yet all-encompassing security analysis of the scheme. In this section, via the heuristic analysis, one can observe that our solution not only fulfills the desired attributes but also demonstrates resilience against a multitude of known attacks.

4.2.1. Mutual Authentication

The proposed scheme can attain mutual authentication since U i and G W N authenticate each other bidirectionally by checking if B 2 * = B 2 and B 12 * = B 12 , respectively. Similarly, with M S j checking whether B 5 * = B 5 and G W N verifying that B 8 * = B 8 , G W N and M S j can authenticate each other successfully.

4.2.2. Session Key Agreement

The session key agreement means that no one can solely pre-compute the session key without interacting with another entity. Factually, in the proposed protocol, S K = h h r u T 1 r s h ( V i E I D i ) contains an indispensable part from U i (secret parameter r u ) and M S j (secret parameter r s ); thus, our scheme meets this well-defined attribute.

4.2.3. Forward Secrecy

Forward secrecy holds if the past built session keys are still secure on the condition that the long-term secret holds; i.e., G W N ’s x is corrupted. As a matter of fact, suppose the following: the adversary knows x , they can obtain P I D i from the open channel and then compute V i = h P I D i x , and they can obtain h r u T 1 . However, an important consideration is that they cannot retrieve r s due to the difficulty of large number factorization in RSA [18]. That is, we can retain forward secrecy.

4.2.4. User Anonymity

User anonymity mainly comprises user identity protection, which prevents the adversary from obtaining the user’s identity, and user un-traceability, which guarantees that the adversary cannot decide upon who the communicating user is, nor does it allow them to distinguish whether two instances of data interaction are from the same communicating user.
For the first form of identity protection, on the one hand, during the registration phase, U i only submits A 0 to G W N ; thus, it cannot directly extract identity information for the adversary even if G W N could be destroyed. On the other hand, P I D i cannot be used to deduce the identity of the user during the authentication phase; thus, the adversary cannot capture the user’s identity, I D i . As for the un-traceability of another user, the randomness of P I D i breaks the statistical property, which effectively confuses the adversary in determining whether two sessions are from the same communicating user.

4.2.5. Password-Guessing Attack

In this attack, the adversary tries to guess the password via the physical unclonable function (PUF), in which the PUF generates an inherently unclonable output for a given input. That is, the adversary prepares a guessed password P W i g u e ; then, the PDA computes A 2 g u e using the same operations as in the login phase. Even if A 2 g u e may be equal to A 2 , “fuzzy keywords + honey words”, by inducing the modulus operation, cannot help the adversary in determining whether the guessed password is correct.

4.2.6. Body Area Sensor Node Impersonation Attack

This attack [25] gives the adversary, i.e., the legitimate inside user, an opportunity: The user could obtain the body area sensor node’s secret key x j and create a faulty session key for the new physician. However, this attack makes no sense in our scheme. Factually, this adversary cannot extract this secret x j from B 7 , B 8 ,   and   B 9 because they do not possess the secret value r g of G W N . Therefore, the proposed protocol resists sensor node impersonation attacks.

4.2.7. De-Synchronization Attack

Generally, after the session key is established, U i ,   G W N ,   and   M S j have no need to update any parameters; thus, the de-synchronization attack is impossible. In our proposed protocol, U i needs to update the parameters for the next authentication. Then, U i checks whether B 12 * is equal to B 12 . Luckily, the checking operation can detect this attack in a timely manner. That is, the occasion in which B 12 * B 12 holds implies that this attack interferes with the normal update of parameters, and the user only asks G W N to run the update operation of B 12 again.

4.2.8. Replay Attack

The replay attack comprises the following: the adversary usually sends old messages to pass the verification of entities and re-computes the session key. However, in each session, U i , G W N , and M S j choose random numbers r , r u ,   r g , and r s , respectively, to ensure the freshness and independence of exchanged messages. As a result, the adversary can neither calculate the correct session key based on the replayed message nor can they pass the authentication of U i .

4.2.9. Privileged Insider Attack

In order to prevent the adversary (even corrupted G W N ) from using privileged insider attacks and extracting the identity information of legitimate users during the registration phase, U i only submits A 0   A 0 = h I D i P W i r   mod   n 0 , which encapsulates I D i relative to G W N , rather than bare string I D i , and the adversary cannot obtain the real I D i .

4.2.10. Node Capture Attack

Even if it is possible to assume that the adversary has the node’s secret x j value and retrieve r g and e i , h r u T 1 , h V i E I D i , this adversary cannot re-calculate session key S K unless they can effectively solve the difficulty of large number factorization in RSA [18] in obtaining another important value r s .

4.2.11. Denial of Service (DoS) Attack

In the proposed scheme, even if the adversary may render BASN unavailable by replaying old messages B 3 , B 4 , B 5 ,   and   T 2 repeatedly, BASN firstly verifies whether the time gap meets T c T 2 > Δ T or not. If it does, BASN directly terminates this session. Furthermore, even if the adversary updates timestamp T 2 to obtain T c T 2 < Δ T , BASN also ignores this session due to the following verification failure of value B 5 , where B 5 can only be derived by the original timestamp. Thus, the denial-of-service (DoS) attack cannot succeed. Similarly, the terminal of G W N does not suffer from this DoS attack.

4.2.12. Man-in-the-Middle (MITM) Attack

In our scheme, we suppose that the adversary [26] listens and blocks the user’s login message F U i t ,   P I D i , M I S j ,   B 1 , B 2 ,   and   T 1 and response messages F U i n e w t ,   B 10 , B 11 ,   and   B 12 from G W N . To issue a man-in-the-middle (MITM) attack, the adversary must create a flow of new login and response messages or replay old messages. As discussed above, the proposed protocol can resist impersonation and replay attacks. That is, the adversary cannot be authenticated by both the user and the gateway. Hence, the proposed scheme can be used against MITM attacks.

5. Summary Comparisons: Functionality and Performance

In this section, we begin by introducing the criteria designed for the assessment of authentication protocols in Section 5.1. Subsequently, in Section 5.2, we conduct a comparative analysis between our proposed protocol and alternative approaches to determine their alignment with the security prerequisites outlined in Section 5.1. Lastly, in Section 5.3, we provide a comparison with regard to storage, communication overheads, and computational overheads.

5.1. Security Evaluation Criteria

Over the years, Wang et al. [15,22,27] conducted in-depth studies on the security criteria of authentication protocols. Based on their studies, we summarize 10 criteria for fine-grained authentication protocols, as shown in Table 2. Additionally, E C 8 states that password-guessing, privileged insider, de-synchronization, replay, stolen verifier, node impersonation, node capture, and DoS attacks cannot be effectively initiated by the adversary.

5.2. Functionality Comparison

The comparative outcomes of our proposed protocol with respect to other protocols in [10,11,12] are displayed in Table 3. From our analyses, we can observe that the protocol presented in [10] is vulnerable to the verifier loss attack, resulting in an inability to achieve E C 8 .
The protocol shown in [11] falls short of achieving E C 7 , E C 8 , and E C 9 . Specifically, neither the physician nor the sensor node can authenticate the gateway, aligning with E C 7 . Also, the protocol of [11] is susceptible to user impersonation attacks, which is in line with E C 8 . Additionally, it falters in attaining forward security, corresponding to E C 9 .
For the protocol in [12], the server or GWN in [12] retains many more password-related parameters, which threatens the security of passwords ( E C 5 ). As for E C 7 , mutual authentication ( E C 7 ) cannot be met because the messages do not guarantee that BASN can realize mutual authentication with respect to the GWN. Additionally, the users in [12] directly submit their bare identities to the GWN or the registration center in order to complete the registration phase, and once the gateway is corrupted by the adversary, the anonymity ( E C 1 ) of the user will not be respected.
Only our proposal fulfills all the stipulated security prerequisites. It is evident that our proposal exhibits resistance against known attacks, enabling the attainment of optimal security and usability objectives. Notably, since no smart card has been used in our proposal, our proposal can meet criterium E C 10 naturally.

5.3. Storage, Communication, and Computation Cost Comparisons

In order to provide a comprehensive evaluation of storage and communication overheads, Table 4 provides reasonable reference lengths for all components.
Simultaneously, to ascertain computational costs during the login and verification phases, we executed the RSA algorithm with a key length of 1024 bits on a 12th-generation intel core i7–12700 H with 16 G memory; we report that the elapsed time with respect to 1024-bit RSA modular exponentiation is 0.63 ms. For other cryptographic functions, based on the results from [10,11,12,28,29], the time required for the SHA-1 hash function is 0.00069 ms [28], the PUF function requires 0.43 ms [29], and symmetric encryption/decryption and the bio-hash function demand 0.1303 ms and 0.01 ms, respectively [11]. ECC point multiplication requires 0.0018 ms [12], and the fuzzy extractor function and bilinear pairing require 2.226 ms and 5.811 ms, respectively [10].
Then, we provide Table 5, which presents a comparative analysis covering the storage, communication, and computational overheads consumed in all compared schemes.
In our protocol, our total storage overhead is the smallest at 1376 bits, and the storage overhead of Ali et al. [10] is the largest at 3952 bits. The storage overhead of each scheme increases in the order of 1376 bits, 1507 bits, 1888 bits, and 3952 bits. Moreover, our proposal has obvious advantages in terms of storage overheads. As for communication overheads, the user, GWN, and BASN costs are 1920 bits, 3616 bits, and 1664 bits, respectively, with corresponding computation times of 3.28 ms, 0.20 ms, and 0.64 ms. It is evident that our solution boasts the lowest cumulative storage overhead compared to [10,11,12]. Simultaneously, the consumed times of the user and BASN in our scheme are 3.28 ms and 0.64 ms, respectively, which can reduce the user’s and BASN’s computation cost by 68.1% and 83.8% compared to the scheme reported in [10].
In summary, our proposal outperforms others in terms of optimal security, superior storage and communication efficiency, and competitively efficient computational overheads. Other schemes, to varying degrees, require improvements in terms of security, communication overheads, or computational overheads.

6. Conclusions

With respect to high-security-requirement WBAN scenarios, we first introduced the authentication model of WBANs. Then, based on the PUFs, we proposed a fine-grained user authentication and key agreement protocol for WBANs. The proposed protocol does not need to allocate smart cards for users, and it can provide fine-grained user authentication and authorization. In the final security and performance analysis, the proposed protocol demonstrates advantages in terms of overall performance, and it is expected to significantly improve the security, efficiency, and availability of user authentication in WBANs. Regarding future studies, we will concentrate on blockchain-based authentication schemes in order to avoid single-point failure in a centralized GWN.

Author Contributions

Validation, methodology, and writing—original draft, K.L.; writing—review and editing, Q.C. and G.X. (Guoai Xu); validation, G.X. (Guosheng Xu). All authors have read and agreed to the published version of the manuscript.

Funding

This work was supported by the National Key Research and Development Program of China (No.: 2022YFB3104400) and the Fundamental Research Funds for the Central Universities under Grant No.: 2023RC69.

Institutional Review Board Statement

Not applicable.

Informed Consent Statement

Not applicable.

Data Availability Statement

The data presented in this study are available in article.

Conflicts of Interest

The authors declare no conflict of interest.

References

  1. O’Donovan, T.; O’Donoghue, J.; Sreenan, C.; Sammon, D.; O’Reilly, P.; O’Connor, K. A context aware wireless body area network (BAN). In Proceedings of the 2009 International Conference on Pervasive Computing Technologies for Healthcare, London, UK, 1–3 April 2009; pp. 1–8. [Google Scholar]
  2. Wazid, M.; Das, A.K.; Kumar, N.; Rodrigues, J. Secure Three Factor User Authentication Scheme for Renewable-Energy-Based Smart Grid Environment. IEEE Trans. Ind. Inform. 2017, 13, 3144–3153. [Google Scholar] [CrossRef]
  3. Halperin, D.; Heydt-Benjamin, T.S.; Ransford, B.; Clark, S.S.; Defend, B.; Morgan, W.; Fu, K.; Kohno, T.; Maisel, W.H. Pacemakers and Implantable Cardiac Defibrillators: Software Radio Attacks and Zero-Power Defenses. In Proceedings of the 2018 IEEE Symposium on Security and Privacy, Oakland, CA, USA, 18–22 May 2008; pp. 129–142. [Google Scholar]
  4. Liu, H.B.; Wang, Y.; Liu, J.; Yang, J.; Chen, Y.; Poor, H.V. Authenticating Users through Fine-Grained Channel Information. IEEE. Trans. Mob. Comput. 2018, 17, 251–264. [Google Scholar] [CrossRef]
  5. Chatterjee, S.; Roy, S.; Das, A.K.; Chattopadhyay, S.; Kumar, N.; Reddy, A.G.; Park, K.; Park, Y. On the Design of Fine Grained Access Control with User Authentication Scheme for Telecare Medicine Information Systems. IEEE Access 2017, 5, 7012–7030. [Google Scholar] [CrossRef]
  6. Wang, X.F.; Wang, L.; Li, Y.; Gai, K. Privacy-Aware Efficient Fine-Grained Data Access Control in Internet of Medical Things Based Fog Computing. IEEE Access 2018, 6, 47657–47665. [Google Scholar] [CrossRef]
  7. Singh, D.; Wazid, M.; Singh, D.P.; Das, A.K.; Joel, R. Embattle the Security of E-Health System Through A Secure Authentication and Key Agreement Protocol. In Proceedings of the 2023 International Wireless Communications and Mobile Computing (IWCMC), Marrakesh, Morocco, 19–23 June 2023; pp. 1130–1135. [Google Scholar]
  8. Ogundoyin, S.O.; Kamil, I.A. PAASH: A Privacy-Preserving Authentication and Fine-Grained Access Control of Outsourced Data for Secure Smart Health in Smart Cities. J. Parallel Distrib. Comput. 2021, 155, 101–119. [Google Scholar] [CrossRef]
  9. Benil, T.; Jasper, J. Blockchain Based Secure Medical Data Outsourcing with Data Deduplication in Cloud Environment. Comput. Commun. 2023, 209, 1–13. [Google Scholar] [CrossRef]
  10. Ali, Z.; Ghani, A.; Khan, I.; Chaudhry, S.A.; Islam, S.H.; Giri, D. A robust authentication and access control protocol for securing wireless healthcare sensor networks. J. Inf. Secur. Appl. 2020, 52, 2020. [Google Scholar] [CrossRef]
  11. Aghili, S.F.; Mala, H.; Shojafar, M.; Peris-Lopez, P. LACO: Lightweight three-factor authentication, access control and ownership transfer scheme for e-health systems in IoT. Future Gener. Comp. Syst. 2019, 96, 410–424. [Google Scholar] [CrossRef]
  12. Yao, H.L.; Yan, Q.; Fu, X.B.; Zhang, Z.; Lan, C. ECC-based lightweight authentication and access control scheme for IoT E-healthcare. Soft Comput. 2022, 26, 4441–4461. [Google Scholar] [CrossRef]
  13. Wang, D.; Li, W.T.; Wang, P. Measuring Two-Factor Authentication Schemes for Real-Time Data Access in Industrial Wireless Sensor Networks. IEEE Trans. Ind. Inform. 2018, 14, 4081–4092. [Google Scholar] [CrossRef]
  14. Dolev, D.; Yao, A.C. On the Security of Public Key Protocols. IEEE Trans. Inf. Theory 1983, 29, 198–208. [Google Scholar] [CrossRef]
  15. Wang, C.Y.; Wang, D.; Tu, Y.; Xu, G.; Wang, H. Understanding node capture attacks in user authentication schemes for wireless sensor networks. IEEE Trans. Dependable Secur. Comput. 2020, 19, 507–523. [Google Scholar] [CrossRef]
  16. Kumar, S.S.; Guajardo, J.; Maes, R.; Schrijen, G.J.; Tuyls, P. The Butterfly PUF: Protecting IP on Every FPGA. In Proceedings of the 2008 IEEE International Workshop on Hardware-Oriented Security and Trust, Anaheim, CA, USA, 9 June 2018; IEEE: Piscataway, NJ, USA, 2008; pp. 67–70. [Google Scholar]
  17. Dodis, Y.; Reyzin, L.; Smith, A. Fuzzy extractors: How to generate strong keys from biometrics and other noisy data. In Proceedings of the 2008 IEEE International Workshop on Hardware-Oriented Security and Trust, Anaheim, CA, USA, 9 June 2018; pp. 523–540. [Google Scholar]
  18. Rivest, R.L.; Shamir, A.; Adleman, L. A method for obtaining digital signatures and public-key cryptosystems. Commun. ACM 1978, 21, 120–126. [Google Scholar] [CrossRef]
  19. Daemen, J.; Rijmen, V. AES Proposal: Rijndael; Technical Report; National Institute of Standards and Technology: Gaithersburg, MD, USA, 2003.
  20. Xie, Q.; Liu, D.; Ding, Z.; Tan, X.; Han, L. Provably Secure and Lightweight Patient Monitoring Protocol for Wireless Body Area Network in IoHT. J. Healthc. Eng. 2023, 2023, 4845850. [Google Scholar] [CrossRef]
  21. Wu, F.; Li, X.; Xu, L.; Vijayakumar, P.; Kumar, N. A Novel Three-Factor Authentication Protocol for Wireless Sensor Networks with IoT Notion. IEEE Syst. J. 2021, 15, 1120–1129. [Google Scholar] [CrossRef]
  22. Wang, D.; Wang, P. Two birds with one stone: Two-factor authentication with security beyond conventional bound. IEEE Trans. Dependable Secur. Comput. 2016, 15, 708–722. [Google Scholar] [CrossRef]
  23. Wang, D.; Cheng, H.B.; Wang, P. Zipf’s Law in Passwords. IEEE Trans. Inf. Forensic Secur. 2017, 12, 2776–2791. [Google Scholar] [CrossRef]
  24. Wang, D.; Zou, Y.K.; Dong, Q.Y. How to Attack and Generate Honeywords. In Proceedings of the 43rd IEEE Symposium on Security and Privacy (IEEE S&P), San Francisco, CA, USA, 23–25 May 2022; pp. 489–506. [Google Scholar]
  25. Zou, S.H.; Cao, Q.; Wang, C.Y.; Huang, Z.; Xu, G. A Robust Two-Factor User Authentication Scheme-Based ECC for Smart Home in IoT. IEEE Syst. J. 2021, 16, 4938–4949. [Google Scholar] [CrossRef]
  26. Qiu, S.M.; Wang, D.; Xu, G. Practical and Provably Secure Three-Factor Authentication Protocol Based on Extended Chaotic-Maps for Mobile Lightweight Devices. IEEE Trans. Dependable Secur. Comput. 2022, 19, 1338–1351. [Google Scholar] [CrossRef]
  27. Wang, D.; Gu, Q.; Cheng, H. The request for better measurement: A comparative evaluation of two-factor authentication schemes. In Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security, Xi’an, China, 30 May–3 June 2016. [Google Scholar]
  28. Wang, C.Y.; Wang, D.; Xu, G.; He, D. Efficient Privacy-Preserving User Authentication Scheme with Forward Secrecy for Industry 4.0. Sci. China Inf. Sci. 2022, 65, 112301. [Google Scholar] [CrossRef]
  29. Kumar, D.; Jain, S.; Khan, A.; Pathak, P.S. An improved lightweight anonymous user authenticated session key exchange scheme for Internet of Things. J. Am. Intell. Hum. Comp. 2020, 14, 5067–5083. [Google Scholar] [CrossRef]
Figure 1. WBANs network topology.
Figure 1. WBANs network topology.
Applsci 13 12376 g001
Figure 2. System model of the proposed scheme.
Figure 2. System model of the proposed scheme.
Applsci 13 12376 g002
Figure 3. Registration of the user and BASN.
Figure 3. Registration of the user and BASN.
Applsci 13 12376 g003
Figure 4. Login, authentication, and key agreement.
Figure 4. Login, authentication, and key agreement.
Applsci 13 12376 g004aApplsci 13 12376 g004b
Table 1. Notations with related descriptions in the proposed protocol.
Table 1. Notations with related descriptions in the proposed protocol.
NotationsDescriptionsNotationsDescriptions
G W N Gateway node S M The set of BASN’s identity
XOR operation T r e g U i Registration timestamp of U i
T c Current timestamp P I D i A pseudo-random identity of U i
G I D G W N s identity f U i t Authorization check polynomial
Bit concatenation I D i , P W i The identity and password of U i
M I S j The identity of M S j F E . R E P · Fuzzy extraction and recovery function
h Secure hash function A B : M The message M is sent from A to B through a secure channel
U i i th user (medical staff) A B : M The message M is sent from A to B through a public channel
x j The secret value of M S j P U F s u m · The physically unclonable function with embedded s u m
x , y G W N s long-term key pair Δ T a u t h U i Time threshold for U i to be authorized in order to obtain authentication
M S j j th body area sensor node S M U i The set of BASN’s identity for U i to be authorized in order to obtain authentication
Table 2. Criteria for evaluating authentication schemes.
Table 2. Criteria for evaluating authentication schemes.
NotationDescriptionNotationDescription
E C 1 User anonymity and un-traceability E C 6 Key agreement provision
E C 2 Sound repairability E C 7 Mutual authentication
E C 3 Password exposure is avoidable E C 8 Resist known attacks
E C 4 Password friendly E C 9 Forward secrecy
E C 5 No password verifiers in GWN E C 10 No smart card loss attack
Table 3. Functionality comparison among relevant AKA protocols.
Table 3. Functionality comparison among relevant AKA protocols.
ProtocolsRef.Evaluation Criteria
E C 1 E C 2 E C 3 E C 4 E C 5 E C 6 E C 7 E C 8 E C 9 E C 10
Ali et al.[10]🗴
Aghili et al.[11]🗴🗴🗴
Yao et al.[12]🗴🗴🗴🗴🗴
Ours---
Table 4. The lengths of all terms involved in storage and communication costs.
Table 4. The lengths of all terms involved in storage and communication costs.
SymbolsBitsSymbolsBits
Module n 0 32ECC point p 160
Counter c 32Hash value h 160
Threshold value t16 Secret   key   value   x 160
Timestamp T 32Random/once r 160
User’s/BASN’s identity128Symmetric ciphertext size enc 256
BASN’s identity set S M / S M U i 32 Public   reproduction   parameter   τ i 128
Table 5. Storage, communication, and computation costs in the login and authentication phase.
Table 5. Storage, communication, and computation costs in the login and authentication phase.
SchemesRef.Storage Cost: BitsCommunication Cost: BitComputation Cost: ms
U i G W N B A S N U i G W N B A S N U i G W N B A S N
Ali et al.[10]132828823361056800128010.270.0055.81
Aghili et al.[11]1057322128140818563520.160.140.003
Yao et al.[12]57628810241888348821440.030.030.90
Ours---8643521601920361616643.280.200.64
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

MDPI and ACS Style

Liu, K.; Cao, Q.; Xu, G.; Xu, G. Fine-Auth: A Fine-Grained User Authentication and Key Agreement Protocol Based on Physical Unclonable Functions for Wireless Body Area Networks. Appl. Sci. 2023, 13, 12376. https://doi.org/10.3390/app132212376

AMA Style

Liu K, Cao Q, Xu G, Xu G. Fine-Auth: A Fine-Grained User Authentication and Key Agreement Protocol Based on Physical Unclonable Functions for Wireless Body Area Networks. Applied Sciences. 2023; 13(22):12376. https://doi.org/10.3390/app132212376

Chicago/Turabian Style

Liu, Kaijun, Qiang Cao, Guosheng Xu, and Guoai Xu. 2023. "Fine-Auth: A Fine-Grained User Authentication and Key Agreement Protocol Based on Physical Unclonable Functions for Wireless Body Area Networks" Applied Sciences 13, no. 22: 12376. https://doi.org/10.3390/app132212376

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop