The New Lightweight Anonymous Authentication Protocol (algorithm2)

The
communication of health related information between sensors in a WBAN and over
the Internet to servers is strictly private and confidential and should be
encrypted to protect the patient’s privacy. The medical staff collecting the
data needs to be confident that the data is not tampered with and indeed
originates from that patient. Moreover the network should be accessible when
the user is not capable of giving the password. Security and privacy protection
mechanisms use a significant part and it should be lightweight. Generally in
BAN, when data is send from LPU (ie) Control Unit (CU) to hospital server, security
is classified into two types: Network Security and Information Security11.
Network security deals with anonymity, authentication of user, secure
localization. Information security deals with freshness of the data, integrity
of the data and privacy of the data. In BAN, we proposed a Novel Lightweight
Anonymous Authentication Protocol.

 

ALGORITHM 1:

We Will Write a Custom Essay Specifically
For You For Only $13.90/page!


order now

Load the application

Send IMEI number
of a mobile

            If (IMEI==Valid)

{

                        Load home page

                        Enter the security code

                        if(Security code is
valid)

                                    Load Form
page

                        Else

                                    End    

            }

            Else

            End

End

 

            After algorithm1 is implemented, Our
proposed New Lightweight Anonymous Authentication Protocol (algorithm2) is
worked.

ALGORITHM 2:

1. CU sends its
identity ICL to the server.

2. Server generate
the key, Randseq and Kcs = h(ICL || Rand1) ? IS.

3. send the Kcs
value to the CU

4. CU generates

                
AIV = h(ICL || Kcs || Rand2|| Randseq

                
ECU = CAI ? h(Kcs || Rand2)

                
N = Kcs ? Rand2

                
B1 =  h(Rand2 || CAI || Kcs) and

5. send this data
to the CU in the form of AM1

               
AM1={ AIV, N , Randseq, ECU, B1}

6. server generate
the value of Tr, B2

               
Tr = h ( Kcs || ICL|| N1) ? Randseq

               
V2 = h (Tr || Kcs || ICL || Rand2}

7. send this data
to the CU.

8. CU verify the
value of B2.

9. if B2 is true

        then

10. establish the
connection to the server.

           

In
this Protocol, initially Identity of the Control unit (ICL) is send to the
server. Then Server Randomly Generate the number (Rand1), then the server
computes the key between the control unit and server (kcs). Kcs= h(ICL ||
Rand1) ? IS, whereas (IS) is the Identity
of the server. After that server randomly generate a sequence number (Randseq),
which is used to track the CU and increase the speed of the authentication
process is send to the CU. This value is stored in the server database also.
After that, this Randseq value is send to the server by the CU.  The value of {Kcs, Randse         q, h(.)} is send to the CU. The value
of ICL, Kcs, Randseq is stored in the sever for communication. If Randseq value
is not matched with the Value which was already stored in the server, then server
terminate the connection between the CU and the Server. This process is carry
out in the phase-1.

            In
phase-2, Initially CU generates a random number (Rand 2). Then it derives the
value of Authentication identity value (AIV), ECU and N value.  AIV= h(IDS || Kcs || Rand 2 || Randseq),

ECU=CAI ? h( Kcs || Rand 2 ), N= Kcs ? Rand2, B1= h( Rand 2 || CAI ||
Kcs),  where as AICU represents the Area
Identification of the Control Unit. It is used for authentication purpose. Then
Authentication Message (AM) is generated as  AM1= {AIV, N, Randseq, ECU, B1} and send to
the server from the Control Unit.

            Server
checks whether the values  B1, AIV, CAI
are valid or  not. From the server,
Authentication Message (AM2) is send to the CU. Server derives the values of Tr,
B2. Server generate the new randomnumber (RandSeq new). Server computes Tr=
h(Kcs || ICL || Rand2) ? RandSeq new. B2= h(Tr || Kcs || ICL || Rand2).
AM2 is formed as AM2= {Tr, B2} and send it to the CU. Then the server Computes
Kcsn= h(Kcs || ICL || Randseqn), then assign RandSeq= RandSeq new, Kcs= Kcs
new. If any value is not valid then the connection is terminated.

            After MA2 is received by the CU, it generate the value h(
Tr || Kcs || AICU || B1) then it compare the value of B2 is same or not. Then
CU compute the value RandSeq new= h(Kcs || AICU || Rand2) ? Tr, Kcu new= h (Kcs || AICU || RandSeq
new) and update the value RandSeq= RandSeqn, Kcs= Kcsn.

            Information Security mainly deals with the unaltered data
which is to be send from CU to Hospital Server. To ensure the data privacy and
integrity, data should be encrypted. In our proposed system AES-CBC, DES
encryption methods are used to provide information security.

AES-CBC takes a plaintext as the block and it
performs the chain process of encryption and result the ciphertext. AES-CBC encryption
process is shown in below figure.

x

Hi!
I'm Johnny!

Would you like to get a custom essay? How about receiving a customized one?

Check it out