Page 129 - 2023-Vol19-Issue2
P. 129
125 | Rashid et al.
Fig. 8. Specification of authentication server role in HLPSLL
Fig. 6. Specification of sensor role in HLPSLL
Fig. 7. Specification of the personal device of each patient Fig. 9. Specification of session and environment role in
role in HLPSLL HLPSL
work[13, 15, 22, 23, 24]. licious attacks (such as MITM, replay, and eavesdropping) and
supports security features such as mutual authentication and
VI. CONCLUSION anonymous password. Each work includes a limitation. The
limitation of our work is summarized by the energy efficiency
In this paper, a robust, lightweight authentication scheme for enhancement of sensors as well as the quality of sensors, in-
WBAN, which provides additional security and is based on tersensor communication, and power efficiency of sensors. In
symmetric encryption, hash function, and key management, the future, our work could be applied in different fields such as
is proposed. Preserving the sensor’s energy is suggested. The sports, where sensors can be used to measure navigation, time,
vital signals should be divided into normal and abnormal sig- distance, pulse rate, and body temperature; military, where
nals so that the personal device can determine certain cases sensors can be used for communication between soldiers and
without referring to a doctor. The comparisons with related sending information about attacking, retreating, or running to
schemes show that our proposed scheme is cost effective in their base commander; and lifestyle and entertainment, where
terms of computational and communication costs. Addition- sensors can be used in wireless music players and making
ally, the scheme’s security analysis based on the AVISPA tool video calls. There are the major limitations of authentica-
verifies the security of the presented scheme that can resist ma- tion schemes in Wireless Body Area Networks (WBANs) and
healthcare systems are scalability and complexity. As the