Next Article in Journal
Freezing Damage to Tunnels in Cold Regions and Weights of Influencing Factors
Previous Article in Journal
Matchmaking the Emerging Demand and Supply Need in the Maritime Supply Chain Domain: A System Design Framework
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Dynamic Key Extraction Technique Using Pulse Signal and Lightweight Cryptographic Authentication Scheme for WBAN

1
Industrial Engineering Department, College of Engineering, King Saud University, P.O. Box 800, Riyadh 11421, Saudi Arabia
2
University Institute of Information Technology, Pir Mehr Ali Shah Arid Agriculture University, Rawalpindi 46000, Pakistan
3
Department of Statistics and Operations Research, College of Science, King Saud University, P.O. Box 2455, Riyadh 11451, Saudi Arabia
4
School of Information Technology, Deakin University, Burwood, VIC 3128, Australia
5
Pakistan Space & Upper Atmosphere Research Commission, Islamabad 44000, Pakistan
*
Authors to whom correspondence should be addressed.
Sustainability 2022, 14(21), 14625; https://doi.org/10.3390/su142114625
Submission received: 1 August 2022 / Revised: 1 November 2022 / Accepted: 1 November 2022 / Published: 7 November 2022

Abstract

:
As a key component of ubiquitous computing, the wireless body area network (WBAN) can be used in a variety of disciplines, including health monitoring. Our everyday routines have been transformed by wearable technology, which has changed the medical industry and made our lives more convenient. However, the openness of the wireless network has raised concerns about the privacy and security of patient’s data because of the latent threat imposed by attackers. Patients’ sensitive data are safeguarded with authentication schemes against a variety of cyberattacks. Using pulse signals and a lightweight cryptographic approach, we propose a hybrid, anonymous, authentication scheme by extracting the binarized stream (bio-key) from pulse signal. We acquired 20 different sample signals to verify the unpredictability and randomness of keys, which were further utilized in an authentication algorithm. Formal proof of mutual authentication and key agreement was provided by the widely known BAN logic, and informal verification was provided by the Automated Validation of Internet Security Protocol and Applications (AVISPA) tool. The performance results depicted that storage cost on the sensor side was only 640 b, whereas communication cost was 512 b. Similarly, the computation time and energy consumption requirements were 0.005 ms and 0.55 µJ, respectively. Hence, it could be asserted that the proposed authentication scheme provided sustainable communication cost along with efficient computation, energy, and storage overheads as compared to peer work.

1. Introduction

New research opportunities have arisen as a result of recent technological advancements. The wireless body area network (WBAN) has gained substantial interest as a promising research path. Emerging advancements in this technology have made it easier for us to get the medical care we need. However, the use of wireless technology comes with the potential risk of an attacker passively sliding into the network and compromising the privacy and security of medical data. The sensing nodes are attached to the body and used to collect physiological data, which are then transmitted via cellphones to the medical practitioner [1].
Authentication techniques offer a solution to protect one’s most sensitive personal data, such as ECG, pulse signal, BP, and sugar level. A wide range of literary classifications can be found in many studies [2,3,4]. Patients’ physiological traits can be used to authenticate devices with limited resources, such as WBANs [5,6,7]. Their main disadvantage is that they are prone to DoS attacks, and it is difficult to collect identical signals from diverse devices located throughout the body [8]. However, physiological signals have been combined with machine learning techniques to come up with innovative authentication schemes that provide efficient results [9].
Furthermore, Donida et al. [10] developed an ECG biometrics system using a deep convolutional neural network (CNN). By transforming the ECG into binary form, their proposed method improved accuracy. Similarly, machine learning (ML) was used in another study for authentication using EEG (brain) signals. EEG has additional advantages, such as the inability to fake results, supplying a foolproof authentication technique that was more reliable than other biometric traits [11]. Moreover, multimodal techniques that rely on more than one physiological feature such as ECG fingerprints have proven higher accuracy in authentication than unimodal techniques. They provide more robust authentication and resilience against cyberattacks (e.g., [12]).
Another promising area of research is the development of anonymous authentication methods. Suitable for WBAN environments, they provide lightweight cryptography solutions. Binary logical operations such as XOR and hash functions were used by Kompara et al. [13] to create an anonymous, lightweight, key agreement and authentication. Their work provided resilience against several known attacks and provided better results in terms of computational, communicational, storage, and energy overheads. However, Kompara et al.’s [10] scheme was found to be vulnerable to a few attacks, i.e., base station compromise, sensor node impersonation, and intermediate node (IN) compromise. The remedies of the identified weaknesses were rectified in our earlier study [14], where we made significant architectural-level improvements to the original system in terms of communicational, computational, and energy consumption cost. Similarly, the studies in [15,16,17] were also based on hashing and XOR operations.
Several promising results have been obtained by mixing physiological signals such photoplethysmogram (PPG), electroencephalogram (EEG), and ECG with cryptographic methods to come up with hybrid authentication schemes, which have attracted great attention in the research community. The authentication schemes were subsequently found to be more versatile and resilient than their predecessors. The authentication scheme of Li et al. [12] was combined with ECG signals by Koya et al. [18] to create a hybrid approach. The ECG signal was used to extract a 128 bit bio-key to improve authentication and, ultimately, security. Tao et al. [19] adopted the bio-key generation technique of Koya et al. [18] to present a more energy- and time-efficient continuous authentication scheme. Another example of using biometric signals in conjunction with cryptographic techniques to develop cost-effective authentication schemes can be found in [20,21,22]. The same may be said for this study, whose major contributions are summarized below.
  • We utilized a pulse signal to extract an unpredictable variable-length bio-key pattern for the authentication process in conjunction with a lightweight cryptographic algorithm. Moreover, it increased key entropy and robustness, in addition to making the bio-keys more uncertain. As a further benefit, it strengthened resistance against assaults such as anonymous, key escrow, non-linkable sessions, and eavesdropping.
  • We collected pulse signals from 20 different subjects, both male and female, to test characteristics such as the randomness, variability, and unpredictability of bio-keys. The results showed high randomness and uncertainty in bio-key extraction.
  • The well-adopted BAN logic and informal verification using the Automated Validation of Internet Security Protocol and Applications (AVISPA) tool demonstrated the correctness of our method.
  • We further optimized the proposed work in terms of storage, computational, and communicational overheads as compared to related studies. Our proposed scheme outperformed those in the literature, providing more efficient results.
The remainder of the paper is organized as follows: Section 2 defines the system model; Section 3 entails the proposed scheme; Section 4 demonstrates the security analysis; Section 5 compares the performance of the proposed scheme with the literature; Section 6 provides a discussion and conclusion.

2. System Model

The proposed authentication scheme uses a system model that includes network and rival models.

2.1. Network Model

The network design is based on a three-tiered architecture, as depicted in Figure 1. The sensor node (N) comprises Tier 1, an intermediate node (IN) constitutes Tier 2, and a server, i.e., hub node (HN), represents Tier 3. The connection between N and HN was reworked such that IN serves as a relay in the entire model. It passes any received data from either N or HN to the destination without storing any information or identity of its own. As a result, IN plays a supporting role rather than an authoritative function. Figure 1 depicts the network model.

2.2. Rival Model

The following assumptions were made in support of the proposed scheme:
  • HN’s security may prevent an opponent from recovering K U N Dolev–Yao [23].
  • By intercepting the communication, the data can be erroneously injected, edited, or replayed.
  • The sensor nodes N can be compromised by an attacker to disrupt communication and, as a result, the authentication process. In addition, the cost of securing N prevents it from being accessed physically.
  • In our scheme, parties communicate using insecure Dolev–Yao [23] channels.

3. The Proposed Scheme

Compared to our previous work [14], we further optimized the storage, computing cost, and energy usage of the proposed scheme. In terms of performance parameters (i.e., storage, energy consumption, and computational overheads) and security characteristics, our proposed authentication scheme exceeds the competition by a wide margin. Our proposed scheme includes five phases: preprocessing and feature extraction, bio-key generation, registration phase, authentication phase, and update key phase. The “upstream node” (UN) refers to both the intermediate node (IN) and the hub node (HN). Table 1 lists the various notations that were employed.

3.1. Preprocessing and Feature Extraction Phase

Symlet4 (Sym4) wavelet transform was used to preprocess the pulse signal. In terms of peak detection, the Sym4 wavelet is considered to be a suitable option. The number of vanishing moments or the length of the filter was set to 8. Our main aim was to preserve the peaks while removing all other frequency components. As a result, a wavelet transform is necessary to separate the signal components into diverse frequency bands, which can be accomplished via bandpass action. By reducing undesired frequency ranges (high and low), bandpass filtering is achieved.

3.2. Bio-Key Generation

The bio-key extraction process commences by calculating the inter-pulse interval (IPI) of the pulse signal after the previous stage. Gray coding is then applied to make the resultant bit stream (bio-key) more random and unpredictable in terms of variable length.
The experiment was conducted using a fingertip pulse oximeter connected with Arduino UNO to collect pulse signals from 20 subjects, both male and female. Figure 2 depicts the testbed designed for this purpose. Figure 3 shows the preprocessing and peak detection of the acquired signal via Matlab 2016b, as well as the bio-key extracted after applying gray coding. We randomly selected four subjects (as a case study) and generated bio-keys from the acquired signals. In order to ensure unpredictability and uncertainty of the bio-keys, we calculated key entropy H(X) and Hamming distance (HD) as shown in Table 2, Figure 4 and Figure 5. Moreover, H(X) values closer to 1 denote higher uncertainty, and greater HD values indicate more difference and unpredictability. Both these characteristics are highly desirable.

3.3. Registration Phase

This phase commences after registration of the new node sensor (NS) via a secure connection. The steps involved here resemble our previous work [14].
  • A unique ID is chosen for NS i d N along with key K N .
  • a N = K U N i d N K N .
  • I N = h ( K U N K N ) .
The values of i d N , a N , and I N are saved on the NS, whereas parameters such as i d N , K N , and K U N are saved on the UN.

3.4. Authentication Phase

  • The NS receives a synchronization signal from the UN and extracts bio-key r N from the pulse signals it receives. NS creates a timestamp t N and extracts a new bio-key
  • r N S from yet another pulse signal.
    (i)
    c N = I N r N
    (ii)
    t i d N = h ( i d N     t N     r N ) .
    (iii)
    Sends ( t i d N ,   a N ,   c N ,   t N ) to UN.
  • After ensuring the validity of received timestamp ( t i d N ,   a N ,   c N ,   t N ) , the UN then calculates the following:
    (iv)
    i d N   K N = a N   K U N .
    (v)
    Confirms valid i d N from the saved values
    (vi)
    I N * = h ( K N   K U N ) ,   r N * = I N *   c N .
    (vii)
    t i d N * = h ( i d N     t N     r N * ) .
    (viii)
    Checks t i d N *   ? = t i d N . Ends if it fails.
    (ix)
    Computes the HD among two bit streams (bio-keys) r N and r N S . If less than threshold level, then both entities (NS, UN) can be authenticated.
    (x)
    Calculates new K N + = r N S .
    (xi)
    I N + = h ( K U N K N + ) .
    (xii)
    e N S + = h ( r N S     K U N ) .
    (xiii)
    γ = ( r N   e N S +     I N + ) .
    (xiv)
    η = e N S + I N * .
    (xv)
    δ = K U N     K N +     γ .
    (xvi)
    ρ = h ( r N   e N S +   η δ )
    (xvii)
    Completes the key session.
    (xviii)
      k S = γ   e N S +
    (xix)
    The UN sends the tuple ( ρ , δ , η ) to N.
  • On reception of ( ρ , δ , η ) , N computes the following:
    (xx)
    e N S + * = η   I N .
    (xxi)
    ρ * = h ( r N   e N S + *     η δ ) .
    (xxii)
    Confirms if ρ * = ρ .
    (xxiii)
    γ = (   r N     e N S +     I N ) .
    (xxiv)
    a N + = δ   γ   i d N .
    (xxv)
    k S = γ   e N S + * .
    (xxvi)
    NS   replaces   parameters   ( I N , a N )   w i t h   ( I N + ,   a N + ) .
The authentication phase is depicted in Figure 6.

3.5. Update Master Key

There are two methods to keep the UN key uptodate: pre-deploying it during node installation or dynamically adding nodes later on. After the initial round of authentication, the computable bio-key is utilized to update all connected parameters. The master key updating procedure begins with the following steps:
  • The master key can be updated using the bio-key r S N created during the registration phase.
  • K UN + = K UN   r NS .
  • All parameter links ( I N + ,   a N + ) can be modified using this new master.

4. Security Analysis

The proposed scheme’s soundness is verified using a formal proof based on mathematical modeling generally built on well-established BAN logic [23]. Secondly, we discuss the security features presented by the proposed scheme and, lastly, the outcomes of informal analysis through simulation results.

4.1. Mathematical Modeling Using BAN Logic

4.1.1. Objectives

The following objectives are set to prove the mathematical modeling:
Ob 1 :   U N   | N S   | ( N S   I N +   U N ) .
Ob 2 :   U N   | ( N S   I N +   U N ) .
Ob 3 :   N S   | U N   | ( N S   k S   U N ) .
Ob 4 :   N S   | ( N S   k S   U N ) .

4.1.2. Ideal Form (Idf)

The following messages are portrayed in idealized form as follows:
Idf 1 :   N S   U N :   ( N S   I N +   U N ,   r N ,   t N ) N S   i d N   U N .
Idf 2 :   U N N S : ( N   I N +   U N ,   r N ,   N S   k S   U N ) N S   i d N   U N .

4.1.3. Preliminary Assumptions (PA)

The objectives are achieved with the help of PAS.
PA 1 :   U N | ( N S i d N U N ) .
PA 2 :   U N | # ( t N ) .
PA 3 :   U N | N S | ( N S I N U N ) .
PA 4 :   N S | ( N S i d N U N ) .
PA 5 :   N S | # ( r N ) .
PA 6 :   N S | U N | ( N S k S U N ) .

4.1.4. Formal Analysis (FA)

The FA is performed with the help of PA, objectives, Idf, and message rules.
FA1: From the message meaning rule, Idf1, and PA1, we obtain
U N | ( N S i d N U N ) ,   U N ( N S   I N +   U N ,   r N ,   t N ) N S   i d N   U N U N | N S | ~ ( N S   I N +   U N ,   r N ,   t N ) .
FA2: From PA2 and the freshness rule, we obtain
U N | # ( t N ) U N   |   # ( N S   I N +   U N ,   r N ,   t N ) .
FA3: From Equations (1) and (2), by applying the nonce verification rule, we infer
U N   |   # ( N S   I N +   U N ,   r N ,   t N ) ,   U N | N S | ~ ( N S   I N +   U N ,   r N ,   t N ) U N   |   N S   |   ( N S   I N +   U N ,   r N ,   t N ) .
FA4: From Equation (3) and the believe rule, we attain the objective Ob1 as
U N   |   N S   |   ( N S   I N +   U N ,   r N ,   t N ) U N   |   N S   |   ( N S   I N +   U N ) .
Therefore, we attained Objective Ob1.
FA5: Through Equation (4), PA3, and the jurisdiction rule, we get
U N | N S | ( N S I N + U N ) ,   U N   |   N S   |   ( N S   I N +   U N ) U N   |   ( N S   I N +   U N ) .
Therefore, we accomplished Objective Ob2.
FA6: Through PA4, Idf2, and the message meaning rule, we acquire
N S   |   ( N S   i d N   U N ) ,   N S ( I N , I N + ,   r N , N S k S U N ) N S i d N U N N S |   U N   | ~   ( I N ,   I N + ,   r N , N S k S U N ) .
FA7: Through PA5 and the freshness rule, we achieve
N S | # ( r N ) N S   |   # ( I N ,   I N + ,   r N , N S k S U N ) .
FA8: Through Equations (6) and (7) and the nonce verification rule, we obtain
N S | # ( I N ,   I N + ,   r N , N S k S U N , N S   i d N   U N   ) ,   N S |   U N   | ~   ( I N ,   I N + ,   r N , N S k S U N )   N S |   U N   |   ( I N ,   I N + ,   r N , N S k S U N ) .
FA9: Using Equation (8) and the belief rule, we get
  N S |   U N   |   ( I N ,   I N + ,   r N , N k S U N )   N S |   U N   |   ( N S k S U N ) .
Hence, we achieved Objective Ob3.
FA10: Using Equation (9), PA6, and the jurisdiction rule, we attain
  N S |   U N   | ( N S k S U N ) ,   N S |   U N   |   ( I N ,   I N + ,   r N , N S k S U N )   N S   |   ( N S k S U N ) .
Hence, we achieved Objective Ob4.

4.2. Security Features Offered by Proposed Scheme

The key security characteristics offered by the proposed authentication scheme are outlined below.

4.2.1. Key Escrow Resilience

In the event of an insider threat, such as a system administrator or physician, the fixed master key K U N could constitute a risk. By producing a new master key from a new bio-key, we were able to dynamically update the original master key. Nodes NS and UN can no longer be impersonated with the help of this feature. As a result, the key escrow issue was rectified.

4.2.2. Eavesdropping Attack

Eavesdroppers can collect parameters such as ( t i d N ,   a N ,   c N ,   t N ) and ( ρ , δ , η ) . If they do, they cannot create a bio-key r N , r N S , I N + , K U N + , K N + , I N , and K N . Some of these variables are XORed with other secret parameters, making elimination difficult. Similarly, eavesdroppers cannot discover or build k S .

4.2.3. Unlinkable Session and Anonymity

It is possible to hide one’s identity from an adversary using anonymity. In our technique, we use a nonreversible hash function to protect the temporary identity t i d N which also comprises the bio-key r N computed by NS. It is impossible for an attacker to figure out what tuples are valid for t i d N ; therefore, they cannot link the two sessions. Additionally, all parameters transferred via public network are formalized using secret and fresh values. Some parameters, such as I N + and K N + , are constantly changing in each session. Because of this, our proposed approach ensures that no two sessions are ever connected.

4.2.4. NS Capture and Impersonation Attack

Due to the unpredictability of bio-key and I N , it would be difficult for an attacker to construct a valid record (e.g., a N , c N , and t N ) to conduct an NS impersonation attack. As the master key K U N is updated later on and requires a fresh bio-key r S N , an adversary would not be able to get access to a sensor node. Therefore, the proposed system is able to withstand both sorts of attacks.

4.2.5. Backward/Forward Attack

An adversary may use previous session information to predict a future session, which is not possible in proposed scheme. To create the session key k S , an adversary would need to know the parameters γ and e N S + , which is impossible; even if they succeed, they will not be able to discover the session keys for the past or future. All parameters are computed dynamically during each session, and their values are updated. Thus, this functionality is supplementary.

4.2.6. UN Capture Attack

This attack may only succeed if the base station (in this example, UN) is breached and the master key K U N is obtained. The parameters e N S + ,   γ ,   ρ ,   η ,   k S , and a random bio-key r N S , generated from a random patient’s pulse sample, are also required by an adversary. The master key is also updated with these parameters. As a result, this attack is ruled out.

4.2.7. IN Compromise Attack

No identifying information is stored in the intermediate node (IN); hence, a compromise of this node would have no effect. Therefore, it would be impossible to initiate a series of impersonation attacks. As parameters such as bio-key r N and I N are not made public, they are difficult to forge.

4.2.8. Jamming Attack

To prevent a synchronized updating of mutual parameters between communicating entities (in our case, NS and UN), this attack jams the link. No new values for ( I N + ,   a N + ) can be calculated by the sensor node NS in this situation. Notwithstanding, the proposed scheme can continue to use earlier values ( I N ,   a N ) with a new authentication phase.

4.3. Simulation Using AVISPA Tool

The safety of the proposed method was verified informally using the well-established AVISPA tool [24], broadly utilized for security protocol verification. The proposed scheme was coded using the High-Level Protocol Specification Language (HLPSL) and interpreted into Intermediate Format (IF). Two backend models, namely, On-the-Fly Model Check (OFMC) and Constraint Logic-Based Attack Searcher (CL-AtSe), were used to verify the IF. These models ensure that the proposed system is safe and resilient to both active and passive attacks. Figure 7a,b show the summary reports for OFMC and CL-AtSe, respectively.

5. The Evaluation of Performance Results

The performance results for the proposed scheme was compared with the literature, i.e., Koya et al. [18], Tao et al. [19], Wazid, et al. [20], Xu, et al. [25], Almuhaideb et al. [26], and Rehman et al. [14]. We compared our proposed scheme with currently available state-of-the-state authentication schemes in the same category. This makes it simple to evaluate the effectiveness of our authentication scheme. Table 3 provides a comparison of the security aspects.

5.1. Storage Cost

The storage cost of the proposed scheme depends upon the number of parameters stored on each entity, i.e., NS, IN, and HN. Hence, the NS stores only three parameters ( i d N ,   a N ,   I N ) along with session key k S , which needs 160 bits each, whereas no value is stored on the IN. The UN saves three parameters, i.e., ( K U N ,   i d N ,   K N ) , along with k S , again needing 160 bits/parameter. A comparison of storage overhead is shown in Table 4.

5.2. Communication Cost

The quantity of messages sent between NS and UN was used to calculate the communication cost of proposed strategy. The initial message exchanged between NS and UN contains ( t i d N ,   a N ,   c N ,   t N ) and timestamp | t N | = 32 b. Hence, the total cost is equivalent to 512 b (from NS to UN), whereas it is 480 b in the opposite direction. A comparison of the communication cost is revealed in Table 5.

5.3. Computational Time and Cost

The time values t h and t x o r denote the time needed to compute hash function and XOR operation, respectively. In the authentication phase, the NS side employed seven XOR operations and two hash functions, while the UN side featured 11 XOR and five hash functions. Therefore, the equations for both sides could be denoted as 2 t h + 7 t x o r 2 t h and 5 t h + 11 t x o r 5 t h , respectively; the XOR takes negligible time and is, hence, ignored. According to a previous experiment [25], t r = 0.65 ms, t h = 0.0023 ms, and t e c m   = 0.123 ms. As a result, the proposed scheme took 0.007 ms on the NS side and 0.014 ms on the UN side. Table 6 presents a comparison of the computational cost and time.

5.4. Power Consumption Overhead

The power consumption in active mode was computed as 118.8 mW, with the proposed scheme requiring (0.0046 × 118.8)/1000 0.55 µJ on the NS side and (0.0115 × 118.8)/1000 1.37 µJ on the UN side. Table 7 depicts the comparison.

5.5. Comparison of Performance Resutls

Since there are no data stored on the IN and even fewer storage requirements on the NS than any of schemes, as shown in Table 4, we can conclude that the overall storage demand is lower than any other scheme. Figure 8 depicts a comparison of the storage overhead when both m and n are considered as 1. It is also apparent that the proposed scheme generally attained more optimal results, even better than our previous study [14]. The lack of storage on IN, as well as the lower storage on NS, had a favorable impact on communication costs, as shown in Table 5; nonetheless, the proposed scheme’s overall communication costs remained the same as in [14]. Hence, the proposed scheme experienced the lowest communication costs compared to the related peer work. From Figure 9, it is apparent that there was a major improvement in communication between IN and UN, and vice versa. To be clear, the communication costs indicated here include the entire process from NS to UN and back again.
It is clear from Table 6 that the proposed authentication scheme produced the lowest computation between UN and NS (in our example) when compared to the literature, including our earlier study [14]. As a result, our authentication scheme is also cost-effective in terms of computing, as demonstrated in Figure 10. Moreover, by comparing our results with those of others, we concluded that the proposed scheme is energy-efficient, as also shown in Table 7 and Figure 11.

6. Discussion

The pulse signal can be utilized to extract variable-length bio-keys by maintaining characteristics such as high key entropy and randomness, which are highly desirable for keys. The bio-keys can be further utilized in the proposed authentication process by combining it with a lightweight cryptographic algorithm. The resultant authentication scheme offers multiple security features such as resilience against various attacks, e.g., key escrow, eavesdropping, NS, and base-station compromise. It is notoriously hard to apply impersonation attacks because the bio-keys are updated during the session. It had the lowest storage requirements on NS compared to the literature, which makes it more efficient in terms of storage requirements. A reduced communication cost is one of the features that our scheme offers, which is achieved by not storing anything on IN side. Therefore, it is also efficient in this regard, as depicted in Figure 8. The proposed scheme takes less computation cost in calculating bio-keys, as well as in executing whole scheme. This is made clear in Figure 9, enabling us to claim its improved efficacy.
Moreover, the proposed scheme incurs less energy overhead compared to related work (another highly desirable feature for such schemes). It costs only 0.55 µJ on the NS side, sufficient for sensor nodes, and 1.37 µJ on the UN side (a resourceful node), which is even lesser than our previous work [14], as shown in Figure 10. Therefore, the proposed scheme performs better than other hybrid schemes. Even though our work was improved in terms of storage, computational cost, and energy consumption, the communicational costs remained the same as before [14] because they have already been fully optimized. Accordingly, the proposed scheme improves on existing authentication schemes due to its effectiveness in providing anonymous and lightweight authentication and key agreement.

7. Conclusions and Future Directions

We presented a hybrid authentication scheme that uses physiological features extracted from pulse signals to generate a variable-length bio-key and combined it with further optimized version of a cryptographic solution from our previous work [14]. We extracted bio-keys from 20 different pulse samples through a testbed in order to verify the uncertainty and unpredictability of bio-keys. The results showed higher entropy and an unpredictability rate closer to 1 (highly recommended in this regard). Formal proof of the scheme was provided through well-established BAN logic, demonstrating that the proposed scheme achieved its security objectives while also allowing mutual authentication. The AVISPA tool’s simulation results showed that the scheme was safe, and it was able to withstand against various known security breaches. The performance evaluation results revealed that the proposed scheme required only 512 b in one-way communication, which was the lowest value in the comparison. Similarly, only 640 b storage was required on the NS side, which was again the lowest value in the comparison. Moreover, 0.005 ms of computational time was required on the NS side, i.e., the resource-limited side. Lastly, it consumes 0.55 µJ energy on the resource-limited side, i.e., NS, which was again the lowest value in the comparison. Therefore, it can be claimed that the proposed scheme is efficient in terms of communication, storage, computation, and energy consumption overheads. It can also be asserted that the proposed work contributes effectively to the exploration of sustainable means for remote patient monitoring (i.e., in the field of IoT).
Future development can focus on the following recommendations:
  • The use of multimodal biometric features to further explore the authentication possibilities;
  • The potential utilization of gestures for authentication purposes to open new dimensions;
  • The utilization of more effective AI techniques to enhance the scheme;
  • The exploration of potentially less expensive means of authentication to provide more sustainable energy consumption.

Author Contributions

Conceptualization, S.A. (Shafiq Ahmad), Z.u.R., S.A. (Saud Altaf) and M.Z.; methodology, S.A. (Shafiq Ahmad), Z.u.R., M.Z. and S.A. (Saud Altaf); software, Z.u.R. and M.H; validation, Z.u.R., S.A. (Shafiq Ahmad) and M.H.; formal analysis, S.A. (Shafiq Ahmad), Z.u.R., S.A. (Saud Altaf) and M.Z.; investigation, Z.u.R., S.A. (Saud Altaf), S.I. and S.H.; resources, S.A. (Shafiq Ahmad); data curation, S.A. (Saud Altaf), M.H, S.H. and S.A. (Shafiq Ahmad); writing—original draft preparation, Z.u.R., S.H. and M.H.; writing—review and editing, Z.u.R., S.A. (Saud Altaf), M.Z. and S.A. (Shafiq Ahmad); visualization, Z.u.R., M.Z., S.I., S.A. (Shafiq Ahmad) and S.A. (Saud Altaf); supervision, S.A. (Saud Altaf) and S.H.; project administration, S.A. (Shafiq Ahmad); funding acquisition, S.A. (Shafiq Ahmad). All authors read and agreed to the published version of the manuscript.

Funding

This research was funded by King Saud University, grant number RSP-2021/387, and the APC was funded by RSP-2021/387.

Institutional Review Board Statement

According to our institutional ethics regulations, no ethical approval was required for this research work because it was very unlikely that respondents would experience psychological or physiological impairments; participation was anonymous.

Informed Consent Statement

Informed consent was obtained from all subjects involved in the study.

Data Availability Statement

The data presented in this research work are available on request from the corresponding author. The data are not publicly available because another publication is being planned by the authors on a different part of the dataset.

Acknowledgments

The authors extend their appreciation to King Saud University for funding this work through the Researchers Supporting Project (RSP-2021/387), King Saud University, Riyadh, Saudi Arabia.

Conflicts of Interest

The authors declare no conflict of interest.

References

  1. Yeh, C.K.; Chen, H.M.; Lo, J.W. An authentication protocol for ubiquitous health monitoring systems. J. Med. Biol. Eng. 2013, 33, 415–419. [Google Scholar] [CrossRef]
  2. Rehman, Z.U.; Altaf, S.; Iqbal, S. Survey of Authentication Schemes for Health Monitoring: A Subset of Cyber Physical System. In Proceedings of the 16th International Bhurban Conference on Applied Sciences & Technology, Islamabad, Pakistan, 8–12 January 2019; pp. 653–660. [Google Scholar]
  3. Habibzadeh, H.; Nussbaum, B.H.; Anjomshoa, F.; Kantarci, B.; Soyata, T. A survey on cybersecurity, data privacy, and policy issues in cyber-physical system deployments in smart cities. Sustain. Cities Soc. 2019, 50, 101660. [Google Scholar] [CrossRef]
  4. Hussain, M.; Mehmood, A.; Khan, S.; Khan, M.A.; Iqbal, Z. Authentication Techniques and Methodologies used in Wireless Body Area Networks. J. Syst. Archit. 2019, 101, 101655. [Google Scholar] [CrossRef]
  5. Farajidavar, A.; Weiss, G.; Alhayajneh, A.; Hayajneh, T.; Baccarini, A. Biometric Authentication and Verification for Medical Cyber Physical Systems. Electronics 2018, 7, 436. [Google Scholar] [CrossRef] [Green Version]
  6. Tan, H.; Chung, I. Secure Authentication and Group Key Distribution Scheme for WBANs Based on Smartphone ECG Sensor. IEEE Access 2019, 7, 151459–151474. [Google Scholar] [CrossRef]
  7. Dodangeh, P.; Jahangir, A.H. A biometric security scheme for wireless body area networks. J. Inf. Secur. Appl. 2018, 41, 62–74. [Google Scholar] [CrossRef]
  8. Venkatasubramanian, K.K.; Banerjee, A.; Gupta, S.K.S. PSKA: Usable and secure key agreement scheme for body area networks. IEEE Trans. Inf. Technol. Biomed. 2010, 14, 60–68. [Google Scholar] [CrossRef]
  9. Rehman, Z.; Altaf, S.; Ahmad, S.; Alqahtani, M.; Huda, S. Advanced Authentication Scheme with Bio-Key Using Artificial Neural Network. Sustainability 2022, 14, 3950. [Google Scholar] [CrossRef]
  10. Donida Labati, R.; Muñoz, E.; Piuri, V.; Sassi, R.; Scotti, F. Deep-ECG: Convolutional Neural Networks for ECG biometric recognition. Pattern Recognit. Lett. 2019, 126, 78–85. [Google Scholar] [CrossRef]
  11. Urmila, K.; Akshay, G.; Prakhar, S.; Mayuri, I.; Devika, B. Human Authentication from Brain EEG Signals using Machine Learning. Int. J. Pure Appl. Math. 2018, 118, 1–7. [Google Scholar]
  12. El_Rahman, S.A. Multimodal Biometric Systems Based on Different Fusion Levels of ECG and Fingerprint Using Different Classifiers; Springer: Berlin/Heidelberg, Germany, 2020; Volume 24, ISBN 0123456789. [Google Scholar]
  13. Kompara, M.; Islam, S.H.; Hölbl, M. A robust and efficient mutual authentication and key agreement scheme with untraceability for WBANs. Comput. Networks 2019, 148, 196–213. [Google Scholar] [CrossRef]
  14. Rehman, Z.U.; Altaf, S.; Iqbal, S. An Efficient Lightweight Key Agreement and Authentication Scheme for WBAN. IEEE Access 2020, 8, 175385–175397. [Google Scholar] [CrossRef]
  15. Li, X.; Ibrahim, M.H.; Kumari, S.; Sangaiah, A.K.; Gupta, V.; Choo, K.K.R. Anonymous mutual authentication and key agreement scheme for wearable sensors in wireless body area networks. Comput. Networks 2017, 129, 429–443. [Google Scholar] [CrossRef]
  16. He, D.; Zeadally, S.; Kumar, N.; Lee, J.; Member, S. Anonymous Authentication for Wireless Body Area Networks With Provable Security. IEEE Syst. J. 2017, 11, 2590–2601. [Google Scholar] [CrossRef]
  17. Chen, C.; Xiang, B.; Wu, T.; Wang, K. An Anonymous Mutual Authenticated Key Agreement Scheme for Wearable Sensors in Wireless Body Area Networks. Appl. Sci. 2018, 8, 1074. [Google Scholar] [CrossRef] [Green Version]
  18. Koya, A.M.; Deepthi, P.P. Anonymous hybrid mutual authentication and key agreement scheme for wireless body area network. Comput. Networks 2018, 140, 138–151. [Google Scholar] [CrossRef]
  19. Wan, T.; Wang, L.; Liao, W.; Yue, S. A lightweight continuous authentication scheme for medical wireless body area networks. Peer--Peer Netw. Appl. 2021, 14, 3473–3487. [Google Scholar] [CrossRef]
  20. Wazid, M.; Das, A.K.; Vasilakos, A.V. Authenticated key management protocol for cloud-assisted body area sensor networks. J. Netw. Comput. Appl. 2018, 123, 112–126. [Google Scholar] [CrossRef]
  21. Challa, S.; Das, A.K.; Odelu, V.; Kumar, N.; Kumari, S.; Khan, M.K.; Vasilakos, A.V. An efficient ECC-based provably secure three-factor user authentication and key agreement protocol for wireless healthcare sensor networks. Comput. Electr. Eng. 2018, 69, 534–554. [Google Scholar] [CrossRef]
  22. Chen, H.; Ding, D.; Su, S.; Yin, J. Biometrics-based cryptography scheme for E-Health systems. J. Phys. Conf. Ser. 2020, 1550, 022039. [Google Scholar] [CrossRef]
  23. Dolev, D.; Yao, A.C. On the security of public key protocols. IEEE Trans. Inf. Theory 1983, 29, 198–208. [Google Scholar] [CrossRef]
  24. Armando, A.; Basin, D.; Boichut, Y.; Chevalier, Y.; Compagna, L. The AVISPA Tool for the Automated Validation. Comput. Aided Verif. 2005, 3576, 281–285. [Google Scholar]
  25. Xu, Z.; Xu, C.; Liang, W.; Xu, J.; Chen, H. A lightweight mutual authentication and key agreement scheme for medical internet of things. IEEE Access 2019, 7, 53922–53931. [Google Scholar] [CrossRef]
  26. Almuhaideb, A.M.; Alqudaihi, K.S. A Lightweight and Secure Anonymity Preserving Protocol for WBAN. IEEE Access 2020, 8, 178183–178194. [Google Scholar] [CrossRef]
Figure 1. The network architecture of proposed authentication scheme.
Figure 1. The network architecture of proposed authentication scheme.
Sustainability 14 14625 g001
Figure 2. The testbed setup for acquiring pulse signal.
Figure 2. The testbed setup for acquiring pulse signal.
Sustainability 14 14625 g002
Figure 3. (a) Preprocessing and peak detection; (b) bio-key extracted after gray coding (in blue).
Figure 3. (a) Preprocessing and peak detection; (b) bio-key extracted after gray coding (in blue).
Sustainability 14 14625 g003
Figure 4. Comparison of bio-keys among selected subjects using HD.
Figure 4. Comparison of bio-keys among selected subjects using HD.
Sustainability 14 14625 g004
Figure 5. Comparison of bio-keys using entropy H(x).
Figure 5. Comparison of bio-keys using entropy H(x).
Sustainability 14 14625 g005
Figure 6. The proposed scheme’s authentication phase.
Figure 6. The proposed scheme’s authentication phase.
Sustainability 14 14625 g006
Figure 7. The simulation results depicted as (a) OFMC implementation (b) CL-AtSe implementation.
Figure 7. The simulation results depicted as (a) OFMC implementation (b) CL-AtSe implementation.
Sustainability 14 14625 g007
Figure 8. Storage cost comparison [14,18,19,20,25,26].
Figure 8. Storage cost comparison [14,18,19,20,25,26].
Sustainability 14 14625 g008
Figure 9. Communicational cost comparison [14,18,19,20,25,26].
Figure 9. Communicational cost comparison [14,18,19,20,25,26].
Sustainability 14 14625 g009
Figure 10. Computational time comparison with the literature [14,18,19,20,25,26].
Figure 10. Computational time comparison with the literature [14,18,19,20,25,26].
Sustainability 14 14625 g010
Figure 11. Energy consumption comparison [14,18,19,20,25,26].
Figure 11. Energy consumption comparison [14,18,19,20,25,26].
Sustainability 14 14625 g011
Table 1. The symbolic notations used in proposed scheme.
Table 1. The symbolic notations used in proposed scheme.
Symbolic NotationsDescription
AdmAdmin of system
NUNode upstream
NSNode sensor
i d N ID of NS
t i d N Temp. ID
K U N NU’s master key
K N The ad hoc key for NS
r N S ,   r N Binarized (bio-key) form of pulse signal
e N ,   I N , c N , a N Authentication parameters
γ , δ , η Identifiers used for NS
ρ Integrity parameters
k S Key utilized for session
t N Timestamp
h (.)Non-reversible hash function
Concatenate operation
XOR operation
Table 2. Comparison of bio-keys using HD.
Table 2. Comparison of bio-keys using HD.
SubjectsSub01Sub02Sub03Sub04
Sub 010283137
Sub 022802531
Sub 033125030
Sub 043731300
Table 3. Comparison of the security aspects.
Table 3. Comparison of the security aspects.
[18] [19] [20] [25] [26] [14] [Our]
F1××
F2×
F3
F4
F5
F6××××
F7×××××
F8×××
F1: key escrow, F2: eavesdropping, F3: unlinkable session and anonymity, F4: NS capture and impersonation, F5: backward/forward secrecy, F6: UN capture, F7: IN compromise, F8: jamming attack.
Table 4. Storage overhead comparison.
Table 4. Storage overhead comparison.
UN (HN) (Bits)NS (Bits)IN (Bits)
[18](n × 160) + 320 640640
[19](m × 480) + (m × 480) + 160800 480
[20](m × 800) + (n × 800) + 160 1600800
[25](m × 32) + (n × 768) + 512128032
[26](m × 480) + (n × 960) + 32800480
[14]160 + (n × 480)8000
Ours(n × 480) + 1606400
m: No. of IN, n: No. of NS.
Table 5. Communication overhead comparison.
Table 5. Communication overhead comparison.
NS IN IN NS IN HN HN IN
[18]6724801344960
[19]672496864496
[20]512512672672
[25]83210888641120
[26]9039361063936
[14]512480512480
Ours512480512480
Table 6. Computation time and cost comparison.
Table 6. Computation time and cost comparison.
NodeCostTime
[18]N 5 t h + 5 t x o r 5 t h 0.012 ms
UN 8 t h + 11 t x o r 8 t h 0.018 ms
[19]N 13 t h + 4 t x o r + 2 t r 13 t h + 2 t r 0.160 ms
HN 11 t h + 4 t x o r + 3 t r 11 t h + 3 t r 0.220 ms
[20]N 14 t h + t e c m 0.155 ms
HN 19 t h 0.044 ms
[25]N 5 t h + 5 t x o r 5 t h 0.012 ms
HN 7 t h + 9 t x o r 7 t h 0.016 ms
[26]N 3 t h + 12 t x o r 3 t h 0.007 ms
HN 7 t h + 13 t x o r 7 t h 0.016 ms
[14]N 3 t h + 6 t x o r 3 t h 0.007 ms
UN 6 t h + 10 t x o r 6 t h 0.014 ms
OursNS 2 t h + 8 t x o r 2 t h 0.005 ms
UN 5 t h + 10 t x o r 5 t h 0.012 ms
Table 7. Power consumption comparison.
Table 7. Power consumption comparison.
HN (µJ)NS (µJ)
[18]2.191.37
[19]6.149.0
[20]5.198.4
[25]1.911.37
[26]1.930.82
[14]1.640.82
Ours1.370.55
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Share and Cite

MDPI and ACS Style

Ahmad, S.; Rehman, Z.u.; Altaf, S.; Zaindin, M.; Huda, S.; Haroon, M.; Iqbal, S. Dynamic Key Extraction Technique Using Pulse Signal and Lightweight Cryptographic Authentication Scheme for WBAN. Sustainability 2022, 14, 14625. https://doi.org/10.3390/su142114625

AMA Style

Ahmad S, Rehman Zu, Altaf S, Zaindin M, Huda S, Haroon M, Iqbal S. Dynamic Key Extraction Technique Using Pulse Signal and Lightweight Cryptographic Authentication Scheme for WBAN. Sustainability. 2022; 14(21):14625. https://doi.org/10.3390/su142114625

Chicago/Turabian Style

Ahmad, Shafiq, Zia ur Rehman, Saud Altaf, Mazen Zaindin, Shamsul Huda, Muhammad Haroon, and Sofia Iqbal. 2022. "Dynamic Key Extraction Technique Using Pulse Signal and Lightweight Cryptographic Authentication Scheme for WBAN" Sustainability 14, no. 21: 14625. https://doi.org/10.3390/su142114625

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop