Improvement of Cloud-Assisted Identity-Based Anonymous Authentication and Key Agreement Protocol for Secure WBAN

Authors

Djimnaibeye S., Ngom A., Tchappi I., Hassan B.M., Najjar A.

Reference

Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering, LNICST, vol. 566 LNICST, pp. 58-70, 2024

Description

Kumar and Chand propose an Identity-based Anonymous Authentication and Key Agreement (IBAAKA) protocol for Wireless Body Area Network in the cloud-based environment, which achieves mutual authentication and user anonymity and can resist known attacks. However, Rakeei and Moazami show that their scheme is subject to a traceability attack. As a result of this attack, the scheme does not allow secure authentication because an adversary can successfully perform a man-in-the-middle attack and exchange a session key with the victim sensor. To provide security resilience against this attack, this paper proposes an improvement to the IBAAKA protocol. We also present the resilience of the proposed scheme against various security attacks, as well as ensuring secure mutual authentication and anonymity.

Link

doi:10.1007/978-3-031-56396-6_4

Share this page: