Abstract
Wireless body area network can be employed to collect patient’s electronic health data. To guarantee the reliability and confidentiality of the collected data, secure data transmission in wireless body area network is required. In wireless body area network, a mutual authentication process has to be carried out between the controller and sensors to ensure their legitimacy, and a key distribution mechanism is required to secure communication after successful mutual authentication. Li et al. proposed a cryptographic solution, which allows group device pairing authentication and key agreement but has low authentication efficiency and key leakage problems. To address these issues, a group authentication and key distribution scheme is proposed in this article. It enables effectively mutual authentication between controller and sensors, supports all signatures of sensors in the group to be checked by the controller through aggregation verification to achieve efficient authentication, and allows key distribution during authentication to improve the computation efficiency. Security analysis indicates that the proposed scheme enjoys existentially unforgeability, and theoretical and experimental comparison demonstrates its practicality in terms of computation and communication cost.
Keywords
Introduction
Wireless body area network (WBAN) is an important branch of the Internet of things (IoT). 1 With the development of the sensor technology, WBAN has great practical significance in remote medicine detection, health care and service, 2 and so on. WBAN is mainly composed of sensors equipped or implanted into a human body. Sensor nodes can sense and collect physiological data of a human body as well as surrounding environmental information. 3 The collected data can be sent to the controller with powerful storage and computing capacities. The data are forwarded to the remote medicine data center for processing and analysis. According to these data, the doctor would be able to make treatment plan. For example, wearable pulse oximetry sensors can be used by patients with vascular disease to measure blood oxygen saturation. 4 For emergency case detected by sensors, relevant measures can be taken to relieve the suffering of patients, for example, implanted blood glucose sensors can be employed to analyze the blood glucose index of the patient in real-time to trigger the insulin pump for insulin injection when necessary. 5
While WBAN brings convenience to patients, some security and privacy issues are also arising. The collected data may contain the private information of users, which are at risk of being leaked and tampered during transmission. 6 Therefore, it is extremely important to protect the security and privacy of users’ sensitive data. Due to the openness of the transmission channel, attackers can affect the accuracy of data by replaying, forgery, and interference, which may lead to misdiagnosis of patients, slow down the recovery speed, and even worsen the condition. 7
For preventing malicious nodes from joining WBAN, the entities authentication is an effective way to ensure the authenticity of entities. Since there are a lot of sensors in WBAN, it is necessary to use group authentication to improve the efficiency of one-by-one authentication. Li et al. 8 proposed a group device pairing authentication method based on secure sensor association and key management. All sensor nodes should be authenticated not only by the controller, but also by each sensor in the same group. The system assigns a serial number to each node in advance, so that the authentication message and group key can be computed using the parameters of adjacent nodes in the authentication and key negotiation phase. Note that it is difficult to ensure the true identity of each node due to the authentication process mainly depends on the verification of the group size. Thus, malicious nodes can impersonate honest nodes to participate in the authentication process and key negotiation without being detected.
Our contributions
This article proposes a group authentication and key distribution scheme, which supports mutual authentication between controller and sensors. The main contributions of this article are summarized as follows:
The controller in our scheme is able to aggregate the signatures of sensor nodes, which improves the authentication efficiency. It is especially suitable for WBAN with a large number of sensor nodes.
Secure distribution of session key can be accomplished during authentication. No additional communication for key agreement is required after authentication.
The proposed protocol can prevent malicious entities from joining the system, ensure the authenticity of sensor nodes, and guarantee the confidentiality of the session key. It can also resist traditional attacks.
Theoretical comparison and experimental results show that our scheme has higher transmission and communication efficiency than existing schemes.
Compared with the preliminary version, 9 this article provides a secure session key distribution method during authentication, security model, security proof, and experimental results of the proposed scheme.
Article organization
The rest of the article is arranged as follows. Section “Related works” reviews related works. Section “System model and security requirements” presents system model and security requirements. Section “Identity based aggregate authentication” provides the proposed scheme. Sections “Security analysis” and “Performance analysis” show the security analysis and the performance analysis, respectively. Finally, section “Conclusion” concludes the article.
Related works
To address the key management issue against malicious key generation center in public key cryptosystems, many certificateless signature schemes have been proposed10,11 and proved unforgeable under adaptively chosen message attacks. Due to the key escrow problem, Mwitende et al. 12 proposed a pairing-based certificateless authentication scheme. Restricted by the computing and storage resources of entities in WBAN, Huang et al. 13 presented an identity-based signature scheme suitable for sensor networks, which reduces the online computation cost and resists replay attacks effectively. Xu et al. 14 proposed a lightweight anonymous authentication scheme with only hash operations and XOR operations. Thumbur et al. 15 presented an efficient certificateless signature scheme for resource-constrained devices using lightweight computing operations. However, Xu et al. 16 found that Thumbur et al.’s 15 scheme cannot resist signature forgery attack and proposed an improved scheme with high efficiency.
In order to achieve efficient and secure data transmission, many schemes have been proposed to support mutual authentication and session key establishment between sensor nodes and controller in the form of groups. 17 Keoh et al. 18 presented a sensor association scheme based on synchronous LED flashing mode, where the controller and each sensor need to be authenticated by digital signatures and then the user verifies the flashing result of LEDs. Therefore, multiple associations between sensors and the controller would bring more time costs. Li et al. 8 proposed a scheme of sensor association and key management, which supports mutual authentication of group membership through group device pairing. Shen et al. 19 proposed a lightweight multi-layer authentication and secure session key generation scheme. This scheme allows one-to-many authentication and group key to be established between the controller and each sensor node, which has the advantage of efficient authentication. Liu et al. 20 noticed that Shen et al.’s 19 scheme is vulnerable to impersonation attacks and proposed an improved two-layer authentication scheme. Tan and Chung 21 proposed a group key management scheme with cooperative sensors association, which utilizes the Chinese remainder theorem to realize group key management and supports batch key update. Shu et al. 22 proposed aggregated signatures for WBAN applications, whose computational efficiency is independent of the number of signers. The secret sharing 23 is used to realize multi-group key establishment protocol, where users only need to keep one share to recover multiple group keys. When a group member leaves or joins, there is no need to rebuild the key.
Secure key distribution is the basic requirement for achieving secure data transmission. The scheme proposed by Kuo et al. 24 can send the key material to designated sensors without being eavesdropped, where the closed Faraday-cage is used as a secure channel for key distribution. The cage not only prevents the joining of external malicious sensor nodes but also increases the difficulty of new nodes joining. Benmansour et al. 25 designed a secure key management scheme to improve the system security, which enables all information can be communicated in ciphertext format. Owing to the limited sensor resources, most WBAN systems have the structure of distributed perception acquisition and centralized processing mechanism. 5 Besides, WBAN has small network scale, and there is no necessity to communicate with sensor nodes. Thus, the star topology structure is often adopted in the distributed acquisition phase. 26 In Li et al.’s 27 scheme, WBAN is divided into two layers, where sensors act as the second layer to send the collected data to the central node through the first layer with powerful storage, calculation, and communication capabilities. Li et al.’s 8 scheme also divides WBAN into two layers, and the data collected by sensor nodes in the second layer is transmitted to users through controllers in the first layer.
When the decryption key is exposed, the decryption functionality of the key needs to be revoked. Almuhaideb and Alqudaihi 28 introduced the user revocation function to the factor authentication scheme. Xiong and Qin 29 proposed a certificate-free remote anonymous authentication scheme supporting scalable revocation, which is suitable to the large-scale WBAN. However, Shim 30 pointed out Xiong and Qin’s 29 scheme cannot resist forgery attacks. Also, it requires resource-intensive bilinear pairings, which is not suitable for WBAN applications. Shen et al. 19 improved the efficiency of the schemes by Li et al. 8 and Xiong and Qin. 29 Besides, Cai and Niu 31 proposed a lightweight data fusion method to solve the problems of long data transmission time and low efficiency. To make the authentication process more efficient and secure, the verification process needs to be simplified to reduce the number of interactions between the sensor and the controller. Therefore, Abro et al. 32 proposed an authentication scheme based on ElGamal, which can reduce communication overhead and resist man-in-the-middle attacks. Jegadeesan et al. 33 and Wang et al. 34 also proposed an efficient and secure mutual authentication scheme for privacy protection, which can reduce the cost of computation and communication, and introduces time stamp to prevent replay attacks.
System model and security requirements
System model
As shown in Figure 1, a WBAN system consists of two types of entities, namely, sensors deployed on and around users and the controller for data collection. There is a private key generator (PKG) to initialize the system and issue private keys for all entities.

System model.
The sensors can collect physiological data of users and information of surrounding environment. Limited by the storage space of sensors, the collected data need to be transmitted to the controller for storing and computing. Before collection data, sensors and the controller need to perform mutual authentication to confirm their authenticity. When the controller is legal, the sensor sends the collected data to the controller. During the mutual authentication procedure, the controller is able to securely distribute a session key to the sensors in a group, so that all sensors in the same group can share the same session key.
Security requirements
In WBAN, it is important to prevent malicious sensors and controller from impersonating honest entities and eavesdropping sensitive data during data collection and transmission. Therefore, a secure WBAN authentication and key distribution scheme supporting aggregate verification needs to meet the following security requirements.
Authenticity of controller: The signature issued by the legal controller can be successfully verified by sensor nodes in a group. A malicious attacker cannot forge a signature to pass the verification conditions.
Authenticity of sensors: The signatures issued by legitimate sensors in a group can be successfully verified by the controller by means of aggregation. Malicious nodes cannot impersonate legitimate sensor nodes to pass the authentication conditions, so as to join the group communication.
Confidentiality of session key: When the controller and sensors in a group perform mutual authentication, the session key can be securely shared.
Efficiency: As the number of sensor nodes increases, the computations during authentication will be increased at both sides of the controller and sensors. Therefore, the WBAN system should support aggregate verification to improve the authentication efficiency.
Security model
The security model for the unforgeability of sensor’s identity in WABN is defined by the following game between a probabilistic polynomial time adversary
The challenger runs the initialization algorithm and gives the system public parameter
When
When
When
Finally,
Adversary
The security model for the unforgeability of controller’s identity in WABN is defined by the following game between a probabilistic polynomial time adversary
The challenger runs the initialization algorithm and gives the system public parameter
When
When
Finally,
Adversary
Identity-based aggregate authentication scheme
The security of the proposed scheme depends on the following discrete logarithm (DLog) problem.
Discrete logarithm problem: Let
Scheme design
The controller performs mutual authentication with sensor nodes in a group, where the validity of each entity’s identity can be checked through aggregate authentication. Figure 2 shows the authentication process of the proposed scheme.

Mutual authentication between controller and sensors.
Initialization
PKG chooses a cyclic group
KeyGen
PKG chooses a random integer
and gives the private key
Group registration
The controller chooses
Group authentication request
When the controller communicates with group
where
and
where
computes
and broadcasts signature
Sensor verification and response
After receiving the signature and tuple, each sensor node in group
If equation (1) does not hold, the authentication request from the controller will be rejected. Otherwise, each sensor node
as session key for secure communication. Then each sensor node
and
and sends the signature
Aggregate verification
After the controller receives the signatures and identities from a group
and
If equation (2) does not hold, the authentication responses from sensors will be rejected. Otherwise, the controller is able to communicate with sensor nodes in group
Correctness verification
Theorem 1
The proposed authentication scheme for WBAN is correct.
Proof
To prove the correctness of the proposed scheme, we only need to show both equations (1) and (2) hold.
First, each sensor node
Second, the controller can verify the authenticity of all sensor nodes in group
Therefore, the signatures generated by the controller and all sensor nodes in a group can be successfully verified. Thus, the proposed authentication scheme for WBAN is correct.□
Security analysis
This section analyzes the security of the proposed scheme.
Theorem 2
The proposed scheme can ensure the authenticity of sensors during the authentication process. That is, the proposed scheme is
and
Proof
Suppose an adversary
Note that
In the hash queries, due to its ideal randomness, the hash query is always queried with a probability of
The time complexity of
Theorem 3
The proposed scheme can ensure the authenticity of controller during the authentication process. That is, the proposed scheme is
and
Proof
Suppose an adversary
Note that
In the hash queries, due to its ideal randomness, the hash query is always queried with a probability of
The time complexity of
Theorem 4
The proposed scheme can guarantee the confidentiality of the session key, that is, only the legitimate controller and sensor nodes in the group can get the session key after authentication.
Proof
The session key
Replay attack
In the authentication phase of the proposed scheme, random numbers
Forward security
In the proposed scheme, the session key is randomly selected. Thus, if the adversary obtains a session key, it would be unable to deduce the session keys in previous stages. Therefore, the proposed scheme can ensure the forward security.
Table 1 shows the comparison of security property. All schemes except SCSLS I 20 allow mutual authentication between sensors and the controller in the form of group. The difference is that the controller in our scheme can perform aggregate authentication on all signatures of sensor nodes in the group, which improves the efficiency of authentication. Whereas the other authentication schemes do not support aggregation verification and require the members in the group to be authenticated one by one. Moreover, our scheme and the ones in Tan and Chung’s 36 scheme and Huang et al. 37 scheme support the distribution of the session key during authentication, while GDP 8 and SCSLS I 20 require symmetric encryption to obtain the group key after authentication and then establish the session key. Thus, the solutions in GDP 8 and SCSLS I 20 do not enjoy high efficiency in session key generation.
Security properties comparison.
Y: supported; N: not supported.
Moreover, GDP 8 is vulnerable to replay attack and forgery attack, SCSLS I 20 cannot resist replay attacks, and Tan and Chung’s 36 scheme and Huang et al.’s 37 scheme cannot achieve forward security. It can be seen from the Table 1 that the proposed scheme has more security functionalities than the existing schemes.
Performance analysis
Efficiency analysis
This section compares the efficiency of the proposed scheme with existing ones in terms of computation costs at each stage. In Table 2, the exponentiation operation is represented as
Theoretical computation overhead comparison.
As shown in Table 2, for the group authentication request generation phase, the computational complexity of our scheme and the ones in SCSLS I
20
and Huang et al.’s
37
scheme are determined by the number of sensor nodes in the group, while the complexity in GDP
8
and Tan and Chung’s
36
scheme is independent of the number
Communication cost analysis
This section compares the communication cost of the proposed scheme with related ones.8,20,36,37 Suppose the length of random number, identity, time stamp, hash value, the element in cyclic group
The comparison of communication cost is summarized in Table 3. It can be seen that the total communication cost of the proposed scheme is better than the GDP 8 and SCSLS I 20 schemes. Although it is higher than the schemes in Tan and Chung’s 36 scheme and Huang et al.’s 37 scheme, our scheme is able to resist more types of attacks.
Communication overhead comparison.
Experimental analysis
In this section, the code is implemented based on the pairing-based cryptography library (PBC-0.5.14, https://crypto.stanford.edu/pbc/). The simulation is conducted run on a virtual machine with 4-core 4GB memory, 64 bit Linux Ubuntu 18.04 operating system, and Intel (R) core (TM) i7-8550u CPU (1.80 GHz). Figure 3 compares the time required in each phase of mutual authentication between 100 sensor nodes and the controller. The element of cyclic group is 512 bits, and the length of

Performance of mutual authentication between sensor nodes and controller in each phase.
As shown in Figure 3, Tan and Chung’s 36 scheme takes less time than our scheme in the group authentication request generation and sensor verification phases. Our scheme needs to distribute the session key during authentication, while Tan and Chung’s 36 scheme distributes the key after authentication. Moreover, in the controller verification phase, our scheme shows distinct advantages. Another outstanding feature is that Huang et al.’s 37 scheme needs more time in each stage than other schemes. Besides, SCSLS I 20 and our scheme have almost the same efficiency in the group authentication request generation and sensor verification phases, and our scheme is more efficient than SCSLS I 20 in the controller verification phase. Compared with GDP, 8 our scheme enjoys higher computational efficiency in all phases except sensor verification.
As shown in Figure 4, the mutual authentication performance is compared, where the group size is considered to be

Performance comparison of mutual authentication.
In the mutual authentication phase, after the controller receives the signature of all sensor nodes, it needs to verify the authenticity of their identities, so as to share the session key with sensor nodes in the group. When there are multiple sensor nodes, the efficiency comparison between aggregate verification and single verification is shown in Figure 5. It can be seen that for the same number of nodes, the time required for aggregate verification is less than that for single verification. Moreover, when the number of nodes increases, the time required for aggregate verification shows a better linear relationship with the number of nodes, and the growth rate of running time is slower than that for single verification.

Time comparison between aggregate and single verification.
From the above analysis, it can be seen that our scheme can not only ensure the authenticity of each entity’s identity in WBAN and the confidentiality of session key during mutual authentication but also enjoys higher computing efficiency than single verification. Compared with existing schemes, the proposed scheme has lower computation cost, lower communication cost, and higher authentication efficiency.
Conclusion
To address the problems of identity authentication and key distribution of WBAN with a large number of sensor nodes, this article proposed a group authentication and session key distribution scheme supporting aggregate authentication. The controller can verify the authenticity of all sensor nodes in the way of aggregation, which improves the efficiency of mutual authentication between the controller and each sensor node. At the same time of mutual authentication, the session key can be shared between the controller and valid sensor nodes. Security analysis showed that the proposed scheme can resist impersonate attacks, assuming the discrete logarithm problem is hard and can guarantee the confidentiality of the session key. Theoretical performance analysis and experimental results indicated that, compared with existing schemes, our scheme has less computational overhead and higher authentication efficiency. Regarding future research, we would study the efficient joining and exiting of sensor nodes without revealing any private information.
Footnotes
Handling Editor: Benny Lo
Declaration of conflicting interests
The author(s) declared no potential conflicts of interest with respect to the research, authorship, and/or publication of this article.
Funding
The author(s) disclosed receipt of the following financial support for the research, authorship, and/or publication of this article: This article is supported in part by the National Natural Science Foundation of China (grant nos. 61772150, 61862012, and 61962012); the Guangxi Natural Science Foundation (grant nos. 2019GXNSFFA245015, 2019GXNSFGA245004, and AD19245048); the Peng Cheng Laboratory Project of Guangdong Province (grant no. PCL2018KP004); the Guangxi Young Teachers’ Basic Ability Improvement Program (grant no. 2021KY0214); the Open Program of Guangxi Key Laboratory of Cryptography and Information Security (grant no. GCIS201930); and the Innovation Projects of GUET Graduate Education (grant nos. 2021YCXS116 and 2021YCXS115).
