Page 127 - 2023-Vol19-Issue2
P. 127

123 |                                                                                                                                        Rashid et al.

phase,   PDi     computes     anonymous            password                     '   =   cryption  (EPDi  ,  E     '       , ESi )  and mutual authentica-
                                                                                        tion ( <  IDSi,            PDi    ESi >,   <IDPi, PW Pi' , EPDi >,
                                                                      PW Pi

h(PW   Pi||  ShPDi  ||  RA)   that   is     generated           once  based         on                   PW       '    ,
                                                                                                                   Si
                                                             '                          <E'PDi >), can be used to protect the transmitted data.
RA. AS can ensure the validity of PW Pi because it owns
                                                                                ''
ShPDi ,  g   to  compute      R'A    and    then   obtains                          =   • Resisting Replay Attacks: Assuming that an adversary
                                                                      PW Pi
                                               '
h(PW   Pi||  ShPDi  ||  R'A)  =   PW                                                    ( A) intercepts request messages < IDSi, PW 'Si , ESi >
                                            Pi.

Hence, the present scheme supports anonymity and                                        or  <IDPi,  PW      '  ,  EPDi    >  and   attempts  to  use  these

untraceable metrics.                                                                                     Pi

                                                                                        messages to allow A to use the services of the system,

• Withstanding MITM Attacks: Assume an attacker                                         these parameters are generated once due to RA and ri

  ( A) has gained a requested demand from Si to PDi                                     so A cannot resend a message request. Furthermore,
  < IDSi, PW 'Si , ESi >, and from PDi to AS < IDPi, PW Pi',
  EPDi > and vice versa, any attempt to change these                                    A cannot access any other value of the system’s com-
  messages by A fails to verify from the other side, as
                                                                                        ponents because it does not know keys ShSi and ShPDi .
  the changed parameters do not match with the original                                 Therefore, the proposed scheme is secure against replay

  parameters. Additionally, A cannot obtain pivot pa-                                   attacks.

  rameters such as ShPDi , RA, RB, g, and ShSi . Moreover,                              • Resisting DoS Attacks: In the proposed scheme, all
  the exchanged messages between components are only                                      requested messages are linked to random values RA and
                                                                                           ri. In normal cases, messages must be variable and not
  produced once for each sign-in demand.                                                  fixed. Therefore, repeating the same message without
                                                                                          any alteration reveals the attack, and the repeated mes-
• Withstanding Eavesdropping, Traffic, Black Hole At-                                     sage is rejected. In this scheme, all exchanged messages
  tacks: Suppose (A˜ ) attempts to quote information to                                   within the system’s components are unique and gener-
                                                                                          ated once during the login and authentication phases.
  implement the current attack, and these messages com-                                   This feature can be considered a part of the message
                                                                                          validation. Therefore, the scheme resists DoS attacks.
  prise the exchange of information between all compo-
  nents (Si, PDi, AS), as shown below:

                    <I DSi ,  PW  '  Si  ,  ESi >

       Si                     ?                      PDi                                • Protecting from Stolen PDi Attack: If a (PDi) is stolen,
       Si                                          PDi                                    all the saved information (IDSi, PWsi, PWSi,
                 < pivot al?signal s>                                                     SHki), and (ShSi) would be available to an adversary
       PDi                                                AS                              ( A). However, A cannot resend older messages be-
       AS                                   '                                             cause this scheme is resistant to replay attack, and they
       PDi                                                                                cannot create new medical information because this
       PDi              <IDPi, PW?Pi , EPDi >                                             information contains the patient’s location. Owing to
                                                                                          these above reasons, A would not benefit from a stolen
                                 <?E'PDi >                            PDi                 PDi and access the system. Therefore, the proposed
                                                                                          scheme is protected from instances of stolen personal
                 Message  to renew          ShPDi  AS                                     devices. Unlinkability: Any two visible system compo-
                                                                                          nents’ connection cannot be specified. Various acts can
                           ?                                                              be changed privately and randomly without everyone
                                                                                          else knowing the connection between them.
                 <Case emer?gency o f Pi > AS

Previously, all the above messages have been gener-                                     • Smart Factor: The login to the system as a smart factor
ated once. Consequently, A cannot apply the eaves-                                        makes the system available permanently. This process
dropping and traffic attacks. Furthermore, the above                                      reduces the login efforts in applications, is performed
security analysis shows the proposed scheme can pro-                                      after the first login to the system or application, and
tect from a Forged Si and resist DoS and replay at-                                       adds efficiency and flexibility to the proposed scheme.
tacks. Furthermore, a Black Hole Attack can also occur
in Wireless Body Area Networks (WBANs), which                                           B. AVISPA
are small, low-power networks that connect wearable                                     Focus is on an official investigation called AVISPA to check
devices to a central hub. In a WBAN, a malicious                                        whether the proposed scheme is protected. This protocol de-
node can launch a Black Hole Attack by falsely ad-                                      pends on High-Level Protocol Specification Language (HLPSL)
vertising itself as having a stronger signal or a shorter                               [19, 20, 21], whose translated file is an intermediate format.
path to the central hub, causing other nodes to route
their data through it. The malicious node then dis-
cards or modifies the incoming data, potentially com-
promising sensitive medical information. In the pro-
posed work, the secure communication based on en-
   122   123   124   125   126   127   128   129   130   131   132