{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,8]],"date-time":"2025-11-08T22:45:05Z","timestamp":1762641905697,"version":"build-2065373602"},"reference-count":22,"publisher":"MDPI AG","issue":"11","license":[{"start":{"date-parts":[[2016,11,17]],"date-time":"2016-11-17T00:00:00Z","timestamp":1479340800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"DOI":"10.13039\/501100006683","name":"XJTLU","doi-asserted-by":"publisher","award":["RDF140243","RDF150246"],"award-info":[{"award-number":["RDF140243","RDF150246"]}],"id":[{"id":"10.13039\/501100006683","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100004608","name":"Natural Science Foundation of Jiangsu Province","doi-asserted-by":"publisher","award":["BK20150376","BK20140404"],"award-info":[{"award-number":["BK20150376","BK20140404"]}],"id":[{"id":"10.13039\/501100004608","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Suzhou Science and Technology Development Plan","award":["SYG201516"],"award-info":[{"award-number":["SYG201516"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Symmetry"],"abstract":"<jats:p>The IEEE Std 802.15.6 is an international standard for wireless body area networks (WBANs). It contains many aspects of communications, and also provides security services, since some communications in WBANs can carry sensitive information. In this standard, the password authenticated association is a protocol for two participants to identify each other and establish a new master key based on a pre-shared short password. However, recent research shows that this protocol is vulnerable to several attacks. In this paper, we propose an improved protocol which can resist all of these attacks. Moreover, the improved protocol alleviates computational burden on one side of the two participants, the node, which is usually less powerful compared with the other side, the hub.<\/jats:p>","DOI":"10.3390\/sym8110131","type":"journal-article","created":{"date-parts":[[2016,11,17]],"date-time":"2016-11-17T10:11:30Z","timestamp":1479377490000},"page":"131","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":12,"title":["An Improved Protocol for the Password Authenticated Association of IEEE 802.15.6 Standard That Alleviates Computational Burden on the Node"],"prefix":"10.3390","volume":"8","author":[{"given":"Jie","family":"Zhang","sequence":"first","affiliation":[{"name":"Department of Computer Science and Software Engineering, Xi\u2019an Jiaotong-Liverpool University, Suzhou 215123, China"},{"name":"School of Electrical Engineering and Electronics and Computer Science, University of Liverpool, Liverpool L69 3BX, UK"}]},{"given":"Xin","family":"Huang","sequence":"additional","affiliation":[{"name":"Department of Computer Science and Software Engineering, Xi\u2019an Jiaotong-Liverpool University, Suzhou 215123, China"}]},{"given":"Paul","family":"Craig","sequence":"additional","affiliation":[{"name":"Department of Computer Science and Software Engineering, Xi\u2019an Jiaotong-Liverpool University, Suzhou 215123, China"}]},{"given":"Alan","family":"Marshall","sequence":"additional","affiliation":[{"name":"School of Electrical Engineering and Electronics and Computer Science, University of Liverpool, Liverpool L69 3BX, UK"}]},{"given":"Dawei","family":"Liu","sequence":"additional","affiliation":[{"name":"Department of Computer Science and Software Engineering, Xi\u2019an Jiaotong-Liverpool University, Suzhou 215123, China"}]}],"member":"1968","published-online":{"date-parts":[[2016,11,17]]},"reference":[{"key":"ref_1","first-page":"30","article-title":"Human interactive secure key and identity exchange protocols in body sensor networks","volume":"7","author":"Huang","year":"2013","journal-title":"Inf. Sec."},{"key":"ref_2","doi-asserted-by":"crossref","unstructured":"Huang, X., Wang, Q., Chen, B., Markham, A., J\u00e4ntti, R., and Roscoe, A.W.F. (2011, January 26\u201329). Body sensor network key distribution using human interactive channels. Proceedings of the 4th International Symposium on Applied Sciences in Biomedical and Communication Technologies, Barcelona, Spain.","DOI":"10.1145\/2093698.2093841"},{"key":"ref_3","doi-asserted-by":"crossref","first-page":"1065","DOI":"10.1007\/s10916-010-9571-3","article-title":"A comprehensive survey of wireless body area networks","volume":"36","author":"Ullah","year":"2012","journal-title":"J. Med. Syst."},{"key":"ref_4","doi-asserted-by":"crossref","first-page":"1658","DOI":"10.1109\/SURV.2013.121313.00064","article-title":"Wireless body area networks: A survey","volume":"16","author":"Movassaghi","year":"2014","journal-title":"IEEE Commun. Surv. Tutor."},{"key":"ref_5","doi-asserted-by":"crossref","first-page":"184","DOI":"10.1016\/j.compeleceng.2015.03.030","article-title":"An end-to-end secure key management protocol for e-health applications","volume":"44","author":"Abdmeziem","year":"2015","journal-title":"Comput. Electr. Eng."},{"key":"ref_6","doi-asserted-by":"crossref","unstructured":"Jovanov, E. (2005, January 1\u20134). Wireless technology and system integration in body area networks for m-health applications. Proceedings of the 27th Annual International Conference of the Engineering in Medicine and Biology Society, Shanghai, China.","DOI":"10.1109\/IEMBS.2005.1616158"},{"key":"ref_7","unstructured":"IEEE Standards IEEE Standard for Local and Metropolitan Area Networks-Part 15.6: Wireless Body Area Networks. Available online: http:\/\/standards.ieee.org\/about\/get\/802\/802.15.html."},{"key":"ref_8","unstructured":"Boyd, C., and Mathuria, A. (2013). Protocols for Authentication and Key Establishment, Springer Science & Business Media."},{"key":"ref_9","unstructured":"Abdalla, M. (2014). Provable Security, Springer."},{"key":"ref_10","doi-asserted-by":"crossref","unstructured":"Huang, X., Liu, D., and Zhang, J. (2015, January 2\u20134). An improved IEEE 802.15.6 password authenticated association protocol. Proceedings of the 4th IEEE\/CIC International Conference on Communications in China (ICCC 2015), Shenzhen, China.","DOI":"10.1109\/ICCChina.2015.7448641"},{"key":"ref_11","doi-asserted-by":"crossref","unstructured":"Toorani, M. (2016). Security analysis of the IEEE 802.15.6 standard. Int. J. Commun. Syst.","DOI":"10.1002\/dac.3120"},{"key":"ref_12","unstructured":"Toorani, M. (2015). Financial Cryptography and Data Security, Springer."},{"key":"ref_13","doi-asserted-by":"crossref","first-page":"644","DOI":"10.1109\/TIT.1976.1055638","article-title":"New directions in cryptography","volume":"22","author":"Diffie","year":"1976","journal-title":"IEEE Trans. Inf. Theory"},{"key":"ref_14","doi-asserted-by":"crossref","first-page":"203","DOI":"10.1090\/S0025-5718-1987-0866109-5","article-title":"Elliptic curve cryptosystems","volume":"48","author":"Koblitz","year":"1987","journal-title":"Math. Comput."},{"key":"ref_15","unstructured":"Miller, V. (1986). Advances in Cryptology, CRYPTO85 Proceedings, Springer."},{"key":"ref_16","doi-asserted-by":"crossref","unstructured":"Barker, E., Chen, L., Roginsky, A., and Smid, M. (2012). Recommendation for Pair-Wise Key Establishment Schemes Using Discrete Logarithm Cryptography, National Institute of Standards and Technology (NIST). Technical Report.","DOI":"10.6028\/NIST.SP.800-56Ar2"},{"key":"ref_17","unstructured":"Bellovin, S.M., and Merritt, M. (1992, January 4\u20136). Encrypted key exchange: Password-based protocols secure against dictionary attacks. Proceedings of the 1992 IEEE Computer Society Symposium on Research in Security and Privacy, Oakland, CA, USA."},{"key":"ref_18","unstructured":"MacKenzie, P., Patel, S., and Swaminathan, R. (2000). Advances in Cryptology-Asiacrypt 2000, Springer."},{"key":"ref_19","doi-asserted-by":"crossref","first-page":"648","DOI":"10.1109\/49.223865","article-title":"Protecting poorly chosen secrets from guessing attacks","volume":"11","author":"Gong","year":"1993","journal-title":"IEEE J. Sel. Areas Commun."},{"key":"ref_20","unstructured":"Gong, L. (1995, January 13\u201315). Optimal authentication protocols resistant to password guessing attacks. Proceedings of the 8th IEEE Computer Security Foundations Workshop, County Kerry, Ireland."},{"key":"ref_21","doi-asserted-by":"crossref","first-page":"853","DOI":"10.1016\/S0140-3664(98)00153-4","article-title":"Efficient and secure password-based authentication protocols against guessing attacks","volume":"21","author":"Kwon","year":"1998","journal-title":"Comput. Commun."},{"key":"ref_22","doi-asserted-by":"crossref","first-page":"230","DOI":"10.1145\/322510.322514","article-title":"Public-key cryptography and password protocols","volume":"2","author":"Halevi","year":"1999","journal-title":"ACM Trans. Inf. Syst. Sec. (TISSEC)"}],"container-title":["Symmetry"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/2073-8994\/8\/11\/131\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,11]],"date-time":"2025-10-11T19:35:44Z","timestamp":1760211344000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/2073-8994\/8\/11\/131"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,11,17]]},"references-count":22,"journal-issue":{"issue":"11","published-online":{"date-parts":[[2016,11]]}},"alternative-id":["sym8110131"],"URL":"https:\/\/doi.org\/10.3390\/sym8110131","relation":{},"ISSN":["2073-8994"],"issn-type":[{"type":"electronic","value":"2073-8994"}],"subject":[],"published":{"date-parts":[[2016,11,17]]}}}