Research Article

Design and Simulation of Lightweight Identity Authentication Mechanism in Body Area Network

Algorithm 1

Authentication protocol under normal circumstances.
(1)//INPUT: The excitation response pairs generated by PUF
(2)//OUTPUT: Authentication success/failure message
(3)BEGIN
(4)Execute butterfly seed generation algorithm to generate and key , ;
(5) and sensor nodes simultaneously execute pseudo-random sequence generator to generate ;
(6)The sensor node calculates the value of by , and then sends it to ;
(7) reads the database to get , and calculates by ;
(8)IF the error between and is within the acceptable range, ;
(9)THEN authenticates the sensor node successfully, considers the sensor node to be a trusted entity, and sends authentication success message, ;
(10)ELSE send authentication failure message, ;
(11) calculates by and sends it to sensor node;
(12)END IF
(13)IF the error between and is within the acceptable range, ;
(14) THEN the sensor node authenticates successfully and considers as a trusted entity, and sends an authentication success message, ;
(15)ELSE send authentication failure message, ;
(16)END IF
(17)END