vulnerable to node spoofing attack. Second we
propose a new security solution that protects the M.
Koya and Deepthi P. P from the node spoofing
attack hence, it provides anonymity.
Figure 1: Architecture of typical tow-tiers WBAN.
The paper is structured as follows: section 2
presents related works, section 3 reviews the M.
Koya and Deepthi P. P. scheme and shows how it is
vulnerable from the sensor node spoofing attack,
section 4 presents and analyzes our solution to the
sensor node spoofing attack of the M. Koya and
Deepthi P. P. scheme while section 5 concludes the
paper.
2 RELATED WORK
WBSN is an important entity for Internet of Things
(IoT), this type of wireless networks are able to
sense physiological signs of person and exchange
them with cloud servers or other data customers. The
security and privacy of sensors and associated data
is of great importance especially for critical
application like E-health.
In 2012, The IEEE have proposed the 802.15.6
(IEEE Std 802.15.6, 2012), it purpose is to provide
an international standard for a short-range (i.e.,
about human body range), low power, and highly
reliable wireless communication for use in close
proximity to, or inside, a human body. A number of
security protocols are presented in the standard,
however, rather than these security protocols are
vulnerable to a wide range of attacks (M. Toorani,
2016), they are based on Elliptic Curve
Cryptography (ECC) asymmetric cryptography
which is not suitable for the wireless body area
network with high energy limitation.
Anonymous and mutual authentication for
WBAN is a hot research topic (Z. Zhao, 2014), (D.
He and S. Zeadally, 2015), (D. He et al, 2016),
(M.H. Ibrahim et al, 2016), (X. Li et al, 2017); all
works in this area propose strong and lightweight
solutions to be incorporated in IoT revolution.
Cryptography based authentication schemes have
been attracting increasing attention, recently, Li et
al. (Li et al, 2017)presented an authenticated key
agreement scheme suitable for WBANs, it is based
only upon hash functions and exclusive or (XOR)
operations, they do not require any additional
infrastructure, and the associated computation and
communication overheads are acceptable.
Khan et al. (H. Khan et al, 2018) have analyzed
the Li et al. scheme (Li et al, 2017) and they find
that it does not provide session unlinkability. In fact,
they proposed a key agreement protocol that
improves upon (Li et al, 2017) and provision
requisite security and privacy properties, while
preserving the efficiency offered by the original
scheme.
M. Koya and Deepthi P. P (M. Koya and
Deepthi P. P, 2018)have reviewed the Li et al.
scheme and they find that is vulnerable to
impersonation attack, in fact they proposed a new
authentication solution over that scheme. In the next
section, we review and analyze this new scheme and
we show that is vulnerable to spoofing node attack.
3 SECURITY ANALYSIS OF THE
M. KOYA AND DEEPTHI P. P
SCHEME
3.1 Assumptions
M. Koya and Deepthi P. P gave the following
assumptions in their paper:
The adversary can eavesdrop, corrupt,
replace, or replay the messages.
The super node is assumed to be
trustworthy.
The threat model is the well-known Dolev-
Yao model.
3.2 Review of the M. Koya and
Deepthi P. P Scheme
The goal of the authentication scheme in (M. Koya
and Deepthi P. P, 2018), is allows sensor nodes
attached to the patient’s body to authenticate with