Mutual Authentication in Body Area Networks (BANs) Using Multi-Biometric and Physiological Signal-Based Key Agreement
DOI:
https://doi.org/10.33736/jita.3847.2021Keywords:
Body area network (BANs), secure communication, biometric-based security, physiological signal, key agreement.Abstract
The development of wireless technology has had a major impact on the wireless body area networks (WBANs) especially in the medical field where a small wireless sensor is installed in, on, or around the patient’s body for real-time health monitoring and personalized medical treatment. However, the data is collected by the sensors and transmitted via wireless channels. This could make the channel vulnerable to being accessed and falsified by an unauthorized user and may put the lives of the patient at risk and might give a false alarm. Therefore, a secure authentication and data encryption scheme in BANs is needed in a device to establish the interaction. The asymmetric cryptosystems that function in BANs can cause a Man-in-the-Middle attack because the initial requirement in BAN requires the user to configure a master key or password. The impersonation attack may also involve BAN where other individual pretends to be the owner of the devices and lastly Eavesdropping attack where the attack eavesdrops on transmission to unlock devices. With the existing schemes, mutual authentication using the biometric features (fingerprint) and the physiological signal from the electrocardiogram database is used to make sure the authentication is more secure, reliable, and accurate. In this paper, we proposed a new multifactor authentication scheme on biometric authentication which is the retina scan. We proposed the retina scan because the retina of the human eye is unique, remains the same, and cannot be obtained from anywhere which makes it difficult to forge. We also added a new device which is a smart watch to receive a key agreement message from the fingerprint to double confirm the same identification. This is to make sure high security is obtained and offered simplicity, efficiency, and precision scheme for the authentication.
References
[2] P. S. Babu and B. Sankar Panda, "Light Weight Security and Authentication in Wireless Body Area Network(Wban)," 2020 International Conference on Computer Science, Engineering and Applications (ICCSEA), 2020, pp. 1-7, doi: 10.1109/ICCSEA49143.2020.9132854.
[3] S. Shokeen and D. Parkash, "A Systematic Review of Wireless Body Area Network," 2019 International Conference on Automation, Computational and Technology Management(ICACTM), 2019, pp. 58-62, doi: 10.1109/ICACTM.2019.8776847
[4] E. Baba, A. Jilbab and A. Hammouch, "A health remote monitoring application based on wireless body area networks," 2018 International Conference on Intelligent Systems and Computer Vision (ISCV), 2018, pp. 1-4, doi: 10.1109/ISACV.2018.8354042.
[5] S. Dharshini and M. M. Subashini, "An overview on wireless body area networks," 2017 Innovations in Power and Advanced Computing Technologies (i-PACT), 2017, pp. 1-10, doi: 10.1109/IPACT.2017.8244985.
[6] Sridhar, M., Priya, N., & Muniyappan, A. (2020). Wireless body area networks: requirements, characteristics, design consideration, and challenges. Incorporating the Internet of Things in Healthcare Applications and Wearable Devices (pp. 67-85). IGI Global.
[7] Alzahrani, B. A., Irshad, A., Albeshri, A., & Alsubhi, K. (2021). A provably secure and lightweight patient-healthcare authentication protocol in wireless body area networks. Wireless Personal Communications, 117(1), 47-69.
[8] Roy, S., Dutta, P., Bhowmik, A., Roy, B., Sourav, K., & Kumari, L. (2019, November). Identification of medical disorders in eye and biometric authentication analysis with iris retina scan using machine learning. Biotechnology and Biological Sciences: Proceedings of the 3rd International Conference of Biotechnology and Biological Sciences (BIOSPECTRUM 2019), August 8-10, 2019, Kolkata, India (p. 29). CRC Press.
[9] Dharanesh, C. M., Prasad, R., & Patil, C. M. (2017, September). Feature extraction classification for personal identification using iris. 2017 international conference on current trends in computer, electrical, electronics and communication (CTCEEC) (pp. 431-435). IEEE.
[10] B. Mazumdar, J. (2018). RETINA BASEDBIOMETRIC AUTHENTICATION SYSTEM: A REVIEW. International Journal of Advanced Research in Computer Science, 9(1), 711-718. doi:10.26483/ijarcs.v9i1.5322
[11] M. Abuhamad, A. Abusnaina, D. Nyang and D. Mohaisen, "Sensor-Based Continuous Authentication of Smartphones’ Users Using Behavioral Biometrics: A Contemporary Survey," in IEEE Internet of Things Journal, vol. 8, no. 1, pp. 65-84, 1 Jan.1, 2021, doi: 10.1109/JIOT.2020.3020076.
[12] T. O. Adetunji, T. Zuva and M. Appiah, "A Framework of Bimodal Biometrics for E-assessment Authentication Systems," 2018 International Conference on Intelligent and Innovative Computing Applications (ICONIC), 2018, pp. 1-5, doi: 10.1109/ICONIC.2018.8601246.
[13] Ma, Z., Yang, Y., Liu, X., Liu, Y., Ma, S., Ren, K., & Yao, C. (2020). EmIr-Auth: Eye Movement and Iris-Based Portable Remote Authentication for Smart Grid. IEEE Transactions on Industrial Informatics, 16(10), 6597–6606. https://doi.org/10.1109/tii.2019.2946047
[14] Al Reshan, M., Liu, H., Hu, C., & Yu, J. (2019). MBPSKA: Multi-Biometric and Physiological Signal-Based Key Agreement for Body Area Networks. IEEE Access, 7, 78484-78502.
[15] Park, K., Noh, S., Lee, H., Das, A. K., Kim, M., Park, Y., & Wazid, M. (2020). LAKS-NVT: Provably Secure and Lightweight Authentication and Key Agreement Scheme Without Verification Table in Medical Internet of Things. IEEE Access, 8, 119387–119404. https://doi.org/10.1109/access.2020.3005592
[16] Almuhaideb, A. M., & Alqudaihi, K. S. (2020). A Lightweight and Secure Anonymity Preserving Protocol for WBAN. IEEE Access, 8,178183–178194. https://doi.org/10.1109/access.2020.3025733
[17] Umar, M., Wu, Z. and Liao, X., (2020). Mutual Authentication in Body Area Networks Using Signal Propagation Characteristics. IEEE Access, 8, pp.66411-66422.
[18] Kalaiarasi, S., et al., (2019). Securing Cloud in Industrial IoT Using Iris and Retina Scanner. International Journal of Engineering and Advanced Technology, vol. 9, no. 1, pp. 6050–6054. doi:10.35940/ijeat.a1882.109119.
[19] Wang, C., et al., (2018). Identify-Based Fast Authentication Scheme for Smart Mobile Devices in Body Area Networks. https://doi.org/10.1155/2018/4028196
[20] Rather, M. A., & Argawal, R., (2018). Development of Retina Based Biometric Authentication Tool for University Security System. International Journal of Advance Research in Science and Engineering. vol.7, no. 4, pp. 204-211.
[21] Ji, S., Gui, Z., Zhou, T., Yan, H., & Shen, J. (2018). An efficient and certificateless conditional privacy-preserving authentication scheme for wireless body area networks big data services. IEEE Access, 6, 69603-69611. doi:10.1109/access.2018.2880898
[22] A Survey on Biometrics Security System. (2018). International Journal of Recent Trends in Engineering and Research, 4(3), 263–268. https://doi.org/10.23883/ijrter.2018.4127.p2pms
[23] Fatima, K., Nawaz, S., & Mehrban, S. (2019). Biometric Authentication in Health Care Sector: A Survey. 2019 International Conference on Innovative Computing (ICIC). doi:10.1109/icic48496.2019.8966699
[24] M, L., & V, K. (2019). A Survey on Iris Biometric and Recognition. Journal of Advanced Research in Dynamical and Control Systems, 11(11-SPECIAL ISSUE), 331–337. https://doi.org/10.5373/jardcs/v11sp11/20193039
[25] Harakannanavar, S. S., Renukamurthy, P. C., & Raja, K. B. (2019). Comprehensive Study of Biometric Authentication Systems, Challenges and Future Trends. International Journal of Advanced Networking and Applications, 10(4), 3958–3968. https://doi.org/10.35444/ijana.2019.10048
[26] Kumari, A., Kumar, V., Abbasi, M. Y., Kumari, S., Chaudhary, P., & Chen, C. M. (2020). CSEF: Cloud-based secure and efficient framework for smart medical system using ECC. IEEE Access, 8, 107838-107852.
Downloads
Published
How to Cite
Issue
Section
License
Copyright Transfer Statement for Journal
1) In signing this statement, the author(s) grant UNIMAS Publisher an exclusive license to publish their original research papers. The author(s) also grant UNIMAS Publisher permission to reproduce, recreate, translate, extract or summarize, and to distribute and display in any forms, formats, and media. The author(s) can reuse their papers in their future printed work without first requiring permission from UNIMAS Publisher, provided that the author(s) acknowledge and reference publication in the Journal.
2) For open access articles, the author(s) agree that their articles published under UNIMAS Publisher are distributed under the terms of the CC-BY-NC-SA (Creative Commons Attribution-Non Commercial-Share Alike 4.0 International License) which permits unrestricted use, distribution, and reproduction in any medium, for non-commercial purposes, provided the original work of the author(s) is properly cited.
3) For subscription articles, the author(s) agree that UNIMAS Publisher holds copyright, or an exclusive license to publish. Readers or users may view, download, print, and copy the content, for academic purposes, subject to the following conditions of use: (a) any reuse of materials is subject to permission from UNIMAS Publisher; (b) archived materials may only be used for academic research; (c) archived materials may not be used for commercial purposes, which include but not limited to monetary compensation by means of sale, resale, license, transfer of copyright, loan, etc.; and (d) archived materials may not be re-published in any part, either in print or online.
4) The author(s) is/are responsible to ensure his or her or their submitted work is original and does not infringe any existing copyright, trademark, patent, statutory right, or propriety right of others. Corresponding author(s) has (have) obtained permission from all co-authors prior to submission to the journal. Upon submission of the manuscript, the author(s) agree that no similar work has been or will be submitted or published elsewhere in any language. If submitted manuscript includes materials from others, the authors have obtained the permission from the copyright owners.
5) In signing this statement, the author(s) declare(s) that the researches in which they have conducted are in compliance with the current laws of the respective country and UNIMAS Journal Publication Ethics Policy. Any experimentation or research involving human or the use of animal samples must obtain approval from Human or Animal Ethics Committee in their respective institutions. The author(s) agree and understand that UNIMAS Publisher is not responsible for any compensational claims or failure caused by the author(s) in fulfilling the above-mentioned requirements. The author(s) must accept the responsibility for releasing their materials upon request by Chief Editor or UNIMAS Publisher.
6) The author(s) should have participated sufficiently in the work and ensured the appropriateness of the content of the article. The author(s) should also agree that he or she has no commercial attachments (e.g. patent or license arrangement, equity interest, consultancies, etc.) that might pose any conflict of interest with the submitted manuscript. The author(s) also agree to make any relevant materials and data available upon request by the editor or UNIMAS Publisher.