Secure Communication in Wireless Body Area Networks with ECC-Based Key Management and Renewal Protocols

PDF (1408KB), PP.26-47

Views: 0 Downloads: 0

Author(s)

Yusuf Taofeek 1,* Waziri Onomza Victor 1 Olalere Morufu 1 Noel Moses Dogonyaro 1

1. Department of Cyber Security Science, Federal University of Technology, Minna, Nigeria

* Corresponding author.

DOI: https://doi.org/10.5815/ijwmt.2024.06.03

Received: 2 Jun. 2024 / Revised: 25 Jul. 2024 / Accepted: 15 Sep. 2024 / Published: 8 Dec. 2024

Index Terms

Key management, Cryptography, Authentication, WBAN, Key revocation and renewal

Abstract

Wireless body area networks (WBANs) are employed to monitor and collect physiological data using wearable and implantable sensor nodes for remote medical applications. Due to the sensitive nature of the data transmitted over open wireless channels, robust security measures are critical. WBANs are particularly susceptible to threats such as eavesdropping, man-in-the-middle attacks, node capture, and replay attacks. Moreover, the constrained nature of sensor nodes and duplicate occurrence of keys makes it challenging for cryptographic key management protocols to function efficiently without increasing the computational and storage overhead of the security protocol. This work proposes a secure and efficient key management protocol designed for key establishment, revocation, and renewal of compromised keys in WBANs. The protocol leverages elliptic curve cryptography (ECC) and integrates a keychain hash function mechanism to eliminate the reuse of keys and execute key computations efficiently. Furthermore, it utilizes an authentication method based on authentication tables, which reduces the number of messages exchanged and minimizes computational overhead. To guarantee the protocol's robustness, a formal validation using BAN logic was conducted, validating that the protocol meets key security requirements, which include, confidentiality, integrity, and authentication. An informal security analysis further demonstrates the protocol's resilience against impersonation, eavesdropping, man-in-the-middle, replay, and injection attacks. A performance evaluation of the protocol’s computational and storage costs was also carried out. The results show that while our protocol incurs lower computational costs compared to some related works, it exhibits slightly higher costs compared to others. In terms of storage overhead, our protocol outperforms most existing solutions. Future work will focus on optimizing the protocol and exploring further efficiency improvements in its implementation within a WBAN testbed.

Cite This Paper

Yusuf Taofeek, Waziri Onomza Victor, Olalere Morufu, Noel Moses Dogonyaro, "Secure Communication in Wireless Body Area Networks with ECC-Based Key Management and Renewal Protocols", International Journal of Wireless and Microwave Technologies(IJWMT), Vol.14, No.6, pp. 26-47, 2024. DOI:10.5815/ijwmt.2024.06.03

Reference

[1]Hajar, M. S., Al-Kadri, M. O., & Kalutarage, H. K. (2021). A survey on wireless body area networks: Architecture, security challenges and research opportunities. Computers & Security, 104, 102211.
[2]A. Joshi, A. Mohapatra, “Authentication protocols for wireless body area network with key management approach” Journal of Discrete Mathematical Sciences and Cryptography, 22(2), pp. 219-240, 2019
[3]S. J. Hussain, M. Irfan, N. Z. Jhanjhi, K. Hussain, and M. Humayun, “Performance enhancement in wireless body area networks with secure communication” Wireless Personal Communications, 116(1), pp. 1-22, 2020.
[4]F. Noor, T. Kordy, A. Alkhodre, O. Benrhouma, A Nadeem., A. Alzahrani, “Securing wireless body area network with efficient secure channel free and anonymous certificateless signcryption” Wireless Communications and Mobile Computing, 2021.
[5]Kumari, S., & Om, H. (2016). Authentication protocol for wireless sensor networks applications like safety monitoring in coal mines. Computer Networks, 104, 137-154.
[6]AbuAlghanam, O., Qatawneh, M., Almobaideen, W., & Saadeh, M. (2022). A new hierarchical architecture and protocol for key distribution in the context of IoT-based smart cities. Journal of Information Security and Applications, 67, 103173.
[7]Shah, S., Munir, A., Waheed, A., Alabrah, A., Mukred, M., Amin, F., & Salam, A. (2023). Enhancing Security and Efficiency in Underwater Wireless Sensor Networks: A Lightweight Key Management Framework. Symmetry, 15(8), 1484.
[8]Sowjanya, K., Dasgupta, M., & Ray, S. (2021). A lightweight key management scheme for key-escrow-free ECC-based CP-ABE for IoT healthcare systems. Journal of Systems Architecture, 117, 102108
[9]Khan, A. F., & Anandharaj, G. (2021). Ahkm: an improved class of hash based key management mechanism with combined solution for single hop and multi hop nodes in iot. Egyptian Informatics Journal, 22(2), 119-124.
[10]Soni, M., & Singh, D. K. (2022). LAKA: lightweight authentication and key agreement protocol for internet of things based wireless body area network. Wireless Personal Communications, 127(2), 1067-1084.
[11]Guermazi, A., Belghith, A., Abid, M., & Gannouni, S. (2017). KMMR: An efficient and scalable key management protocol to secure multi-hop communications in large scale wireless sensor networks. KSII Transactions on Internet and Information Systems (TIIS), 11(2), 901-923.
[12]Xie, Q., Liu, D., Ding, Z., Tan, X., & Han, L. (2023). Provably secure and lightweight patient monitoring protocol for wireless body area network in IoHT. Journal of Healthcare Engineering, 2023(1), 4845850.
[13]Alese, B. K., Philemon, E. D., & Falaki, S. O. (2012). Comparative analysis of public-key encryption schemes. International Journal of Engineering and Technology, 2(9), 1552-1568.
[14]Hussain, S. Z., & Kumar, M. (2021). Secured key agreement schemes in wireless body area network-a review. Indian Journal of Science and Technology, 14(24), 2005-2033.
[15]Kim, D., Kang, S., & An, S. (2016). Secure and Efficient Time Synchronization for Border Surveillance Wireless Sensor Networks. IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, 99(1), 385-401.
[16]Louw, J., Niezen, G., Ramotsoela, T. D., & Abu-Mahfouz, A. M. (2016). A key distribution scheme using elliptic curve cryptography in wireless sensor networks. In 2016 IEEE 14th International Conference on Industrial Informatics (INDIN) (pp. 1166-1170). IEEE.
[17]Arunkumar, S., & Puranik, V. (2018). Key Management Scheme for Wireless Sensor Networks using HECC. International Journal of Advanced Studies of Scientific Research, 3(9).
[18]Gudivada, R. B., & Hansdah, R. C. (2018, May). Energy efficient secure communication in wireless sensor networks. In 2018 IEEE 32nd International Conference on Advanced Information Networking and Applications (AINA) (pp. 311-319). IEEE.
[19]Abbasinezhad-Mood, D., Nikooghadam, M., Mazinani, S. M., Babamohammadi, A., & Ostad-Sharif, A. (2019). More efficient key establishment protocol for smart grid communications: design and experimental evaluation on ARM-based hardware. Ad Hoc Networks, 89, 119-131.
[20]Khan, S., Alzahrani, A. I., Alfarraj, O., Alalwan, N., & Al-Bayatti, A. H. (2019). Resource efficient authentication and session key establishment procedure for low-resource IoT devices. IEEE Access, 7, 170615-170628.
[21]Salem, F. M., Ibrahim, E., & Elghandour, O. (2020). A lightweight authenticated key establishment scheme for secure smart grid communications. Int. J. Safety Security Eng., 10(4), 549-558.
[22]Rehman, Z. U., Altaf, S., & Iqbal, S. (2020). An efficient lightweight key agreement and authentication scheme for WBAN. IEEE Access, 8, 175385-175397.
[23]Zagrouba, R., AlAbdullatif, A., AlAjaji, K., Al-Serhani, N., & Alhaidari, F, (2020). Authenblue: A New Authentication Protocol for the Industrial Internet of Things.
[24]Pathak, G., Gutierrez, J., Ghobakhlou, A., & Rehman, S. U. (2022). LPWAN Key Exchange: A Centralised Lightweight Approach. Sensors, 22(13), 5065.
[25]Sheu, R. K., Pardeshi, M. S., & Chen, L. C. (2022). Autonomous Mutual Authentication Protocol in the Edge Networks. Sensors, 22(19), 7632.
[26]Hegde, M., and Andrew, J. (2023). A Lightweight Authentication Framework for Fault-tolerant Distributed WSN. IEEE Access.
[27]Erskine, S. K., Chi, H., & Elleithy, A. (2023). SDAA: Secure Data Aggregation and Authentication Using Multiple Sinks in Cluster-Based Underwater Vehicular Wireless Sensor Network. Sensors, 23(11), 5270.
[28]Vellingiri, J., Vedhavathy, T. R., Senthil Pandi, S., & Bala Subramanian, C. (2024). Fuzzy logic and CPSO-optimized key management for secure communication in decentralized IoT networks: A lightweight solution. Peer-to-Peer Networking and Applications, 1-19.
[29]Karati, A., & Chang, L. C. (2024). AnonMAKE: Toward Secure and Anonymous Mutually Authenticated Key Exchange Protocol for Vehicular Communications. IEEE Transactions on Intelligent Transportation Systems.
[30]Tu, S., Badshah, A., Alasmary, H., & Waqas, M. (2023). EAKE-WC: Efficient and anonymous authenticated key exchange scheme for wearable computing. IEEE Transactions on Mobile Computing.
[31]Kumar, M., & Hussain, S. Z. (2023). An efficient and secure mutual authentication protocol in wireless body area network. EAI Endorsed Transactions on Pervasive Health and Technology,
[32]Liu, K., Xu, G., Cao, Q., Wang, C., Jia, J., Gao, Y., & Xu, G. (2023). A Rivest–Shamir–Adleman-Based Robust and Effective Three-Factor User Authentication Protocol for Healthcare Use in Wireless Body Area Networks. Sensors, 23(21), 8992.
[33]Gowda, N. C., Manvi, S. S., Malakreddy, B., & Lorenz, P. (2023). BSKM-FC: Blockchain-based secured key management in a fog computing environment. Future generation computer systems, 142, 276-291.
[34]M. Omar, I. Belalouache, S. Amrane, and B. Abbache,  “Efficient and energy-aware key management framework for dynamic sensor networks”. Computers & Electrical Engineering, 72, pp. 990-1005, 2018.
[35]Y. Ding, H. Xu, M. Zhao, H. Liang, and Y. Wang, “Group authentication and key distribution for sensors in wireless body area network”. International Journal of Distributed Sensor Networks, 17(9), 15501477211044338, 2021.
[36]Choi, Y., Lee, D., Kim, J., Jung, J., Nam, J., & Won, D. (2014). Security enhanced user authentication protocol for wireless sensor networks using elliptic curves cryptography. Sensors, 14(6), 10081-10106.
[37]Tripathy, A., Pradhan, S. K., Tripathy, A. R., & Nayak, A. K. (2019). A New Hybrid Cryptography Technique in Wireless Sensor Network. International Journal of Innovative Technology and Exploring Engineering (IJITEE), 8(10), 121-131.
[38]Kumar, V., Malik, N., Dhiman, G., & Lohani, T. K. (2021). Scalable and storage efficient dynamic key management scheme for wireless sensor network. Wireless Communications and Mobile Computing, 2021, 1-11.
[39]C. A. Lara-Nino, A. Diaz-Perez, and M. Morales-Sandoval “Key-Establishment Protocols for Constrained Cyber-Physical Systems”. In Security in Cyber-Physical Systems pp. 39-65. Springer, Cham. 2021
[40]Gandino, F., Celozzi, C., & Rebaudengo, M. (2017). A key management scheme for mobile wireless sensor networks. Applied Sciences, 7(5), 490.
[41]Umar, M., Wu, Z., & Liao, X. (2020). Mutual authentication in body area networks using signal propagation characteristics. IEEE Access, 8, 66411-66422.
[42]Zhao, G., Di, B., & He, H. (2022). A novel decentralized cross‐domain identity authentication protocol based on blockchain. Transactions on Emerging Telecommunications Technologies, 33(1), e4377.