Skip to main content

Research on Authentication and Key Agreement Protocol of Smart Medical Systems Based on Blockchain Technology

  • Conference paper
  • First Online:
Book cover Algorithms and Architectures for Parallel Processing (ICA3PP 2021)

Part of the book series: Lecture Notes in Computer Science ((LNTCS,volume 13156))

  • 1764 Accesses

Abstract

The wireless body area network in the smart medical systems uses wearable devices to remotely monitor the patient’s physiological information and transmits the information to the medical center through an open channel. To prevent security issues such as privacy leakage and malicious attacks in the wireless body area network, anonymous authentication and key negotiation are required between the sensor and the server. The protocol must not only satisfy confidentiality and security but also provide anonymity and untraceability for sensor nodes. In response to this problem, this paper proposes an authentication and key agreement protocol for sensors and servers based on blockchain technology in the wireless body area network, with the help of session keys for subsequent access and data transmission. The safety of our scheme was evaluated through an informal safety analysis. In addition, our scheme was also simulated by using ProVerif. The experimental results showed that the scheme is safe.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 89.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 119.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Surantha, N., Atmaja, P., David, W.M.: A review of wearable internet-of-things device for healthcare. Procedia Comput. Sci. 179, 936–943 (2021)

    Article  Google Scholar 

  2. Wei, L.A., Zn, B., Sx, A., et al.: Secure fusion approach for the internet of things in smart autonomous multi-robot systems. Inform. Sci. 579(1), 468–482 (2021)

    MathSciNet  Google Scholar 

  3. Liang, W., Huang, W., Long, J., Zhang, K., Li, K., Zhang, D.: Deep reinforcement learning for resource protection and real-time detection in IoT environment. IEEE Internet Things J. 7(7), 6392–6401 (2020). https://doi.org/10.1109/JIOT.2020.2974281

    Article  Google Scholar 

  4. Narwal, B., Mohapatra, A.K.: A survey on security and authentication in wireless body area networks. J. Syst. Architect. 113, 101883 (2020)

    Article  Google Scholar 

  5. Odelu, V., Saha, S., Prasath, R., Sadineni, L., Conti, M., Jo, M.: Efficient privacy preserving device authentication in WBAN for industrial e-health applications. Comput. Secur. 83, 312 (2019)

    Article  Google Scholar 

  6. Xie, Y., Zhang, S., Li, X., Li, Y., Chai, Y., Zhang, M.: CasCP: efficient and secure certificateless authentication scheme for wireless body area networks with conditional privacy-preserving. Secur. Commun. Networks 2019, 1–13 (2019)

    Article  Google Scholar 

  7. Xu, Z., Liang, W., Li, K.C., et al.: A blockchain-based Roadside Unit- assisted authentication and key agreement protocol for Internet of Vehicles. J. Parallel Distrib. Comput. 149(6), 29–39 (2021)

    Article  Google Scholar 

  8. Chen, C.-M., Xiang, B., Wu, T.-Y., Wang, K.-H.: An anonymous mutual authenticated key agreement scheme for wearable sensors in wireless body area networks. Appl. Sci. 8(7), 1074 (2018)

    Article  Google Scholar 

  9. Kompara, M., Hafizul Islam, S.K., Hölbl, M.: A robust and efficient mutual authentication and key agreement scheme with untraceability for WBAN. Comput. Networks 148, 196–213 (2019)

    Article  Google Scholar 

  10. Koya, A.M., Deepthi, P.P.: Anonymous hybrid mutual authentication and key agreement scheme for wireless body area network. Comput. Networks 140, 138–151 (2018)

    Article  Google Scholar 

  11. Meng, X., Xu, J., Liang, W., Li, K.-C.: An anonymous mutual authentication and key agreement scheme in WBAN. In: 2019 IEEE 5th International Conference on Big Data Security on Cloud (BigDataSecurity), IEEE International Conference on High Performance and Smart Computing, (HPSC) and IEEE International Conference on Intelligent Data and Security (IDS), Washington, DC, USA, pp. 31–36 (2019). https://doi.org/10.1109/BigDataSecurity-HPSCIDS.2019.00017

  12. Mwitende, G., Ye, Y., Ali, I., Li, F.: Certificateless authenticated key agreement for blockchain-based WBAN. J. Syst. Archit. 110, 101777 (2020)

    Article  Google Scholar 

  13. Xu, J., Meng, X., Liang, W., et al.: A secure mutual authentication scheme of blockchain- based in WBAN. China Commun. 17(9), 34–49 (2020)

    Article  Google Scholar 

  14. Liang, W., Zhang, D., Lei, X., Tang, M., Zomaya, Y.: Circuit copyright blockchain: block chainbased homomorphic encryption for IP circuit protection. IEEE Trans. Emerg. Topics Comput. 9(3), 1414–1420 (2020). https://doi.org/10.1109/TETC.2020.2993032

    Article  Google Scholar 

  15. Liang, W., Zhang, D., Lei, X., et al.: Circuit copyright blockchain: blockchain-based homomorphic encryption for IP circuit protection. IEEE Trans. Emerg. Topics Comput. 99, 1–1 (2020)

    Google Scholar 

  16. Liang, W., Xiao, L., Zhang, K., et al.: Data fusion approach for collaborative anomaly intrusion detection in blockchain-based systems. IEEE Internet Things J. 99, 1–1 (2021)

    Google Scholar 

  17. Zisang, X., Wei, L., Ching, L.K., Jianbo, X., Hai, J.: A blockchain-based roadside unit-assisted authentication and key agreement protocol for internet of vehicles. J. Parallel Distrib. Comput. 149, 29–39 (2021)

    Article  Google Scholar 

  18. Blanchet, B.: ProVerif Automatic Cryptographic Protocol Verifier User Manual. Departement dInformatique, Ecole Normale Superieure, CNRS, Paris, France (2005)

    Google Scholar 

  19. Burrows, M., Abadi, M., Needham, R.M., et al.: A logic of authentication. ACM Trans. Comput. Syst. 8(1), 18–36 (1990)

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Jianbo Xu .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2022 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Wu, X., Xu, J., Liang, W., Jian, W. (2022). Research on Authentication and Key Agreement Protocol of Smart Medical Systems Based on Blockchain Technology. In: Lai, Y., Wang, T., Jiang, M., Xu, G., Liang, W., Castiglione, A. (eds) Algorithms and Architectures for Parallel Processing. ICA3PP 2021. Lecture Notes in Computer Science(), vol 13156. Springer, Cham. https://doi.org/10.1007/978-3-030-95388-1_29

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-95388-1_29

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-95387-4

  • Online ISBN: 978-3-030-95388-1

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics