Page 129 - 2023-Vol19-Issue2
P. 129

125 |                                                              Rashid et al.

                                                                   Fig. 8. Specification of authentication server role in HLPSLL

Fig. 6. Specification of sensor role in HLPSLL

Fig. 7. Specification of the personal device of each patient       Fig. 9. Specification of session and environment role in
role in HLPSLL                                                     HLPSL

work[13, 15, 22, 23, 24].                                          licious attacks (such as MITM, replay, and eavesdropping) and
                                                                   supports security features such as mutual authentication and
                  VI. CONCLUSION                                   anonymous password. Each work includes a limitation. The
                                                                   limitation of our work is summarized by the energy efficiency
In this paper, a robust, lightweight authentication scheme for     enhancement of sensors as well as the quality of sensors, in-
WBAN, which provides additional security and is based on           tersensor communication, and power efficiency of sensors. In
symmetric encryption, hash function, and key management,           the future, our work could be applied in different fields such as
is proposed. Preserving the sensor’s energy is suggested. The      sports, where sensors can be used to measure navigation, time,
vital signals should be divided into normal and abnormal sig-      distance, pulse rate, and body temperature; military, where
nals so that the personal device can determine certain cases       sensors can be used for communication between soldiers and
without referring to a doctor. The comparisons with related        sending information about attacking, retreating, or running to
schemes show that our proposed scheme is cost effective in         their base commander; and lifestyle and entertainment, where
terms of computational and communication costs. Addition-          sensors can be used in wireless music players and making
ally, the scheme’s security analysis based on the AVISPA tool      video calls. There are the major limitations of authentica-
verifies the security of the presented scheme that can resist ma-  tion schemes in Wireless Body Area Networks (WBANs) and
                                                                   healthcare systems are scalability and complexity. As the
   124   125   126   127   128   129   130   131   132   133   134