Remote Authentication Schemes for Wireless Body Area Networks Based on the Internet of Things

被引:60
作者
Saeed, Mutaz Elradi S. [1 ]
Liu, Qun-Ying [1 ]
Tian, Guiyun [2 ]
Gao, Bin [1 ]
Li, Fagen [3 ]
机构
[1] Univ Elect Sci & Technol China, Sch Automat Engn, Chengdu 611731, Sichuan, Peoples R China
[2] Newcastle Univ, Sch Elect & Elect Engn, Newcastle Upon Tyne, Tyne & Wear, England
[3] Univ Elect Sci & Technol China, Sch Comp Sci & Engn, Chengdu 611731, Sichuan, Peoples R China
来源
IEEE INTERNET OF THINGS JOURNAL | 2018年 / 5卷 / 06期
关键词
Anonymity; certificateless cryptography; Internet of Things (IoT); public key infrastructure (PKI); remote authentication; wireless body area networks (WBANs); ELLIPTIC CURVE CRYPTOGRAPHY; SENSOR NETWORKS; BROADCAST AUTHENTICATION; SECURITY; CHALLENGES; SIGNATURES;
D O I
10.1109/JIOT.2018.2876133
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Internet of Things (IoT) is a new technology which offers enormous applications that make people's lives more convenient and enhances cities' development. In particular, smart healthcare applications in IoT have been receiving increasing attention for industrial and academic research. However, due to the sensitiveness of medical information, security and privacy issues in IoT healthcare systems are very important. Designing an efficient secure scheme with less computation time and energy consumption is a critical challenge in IoT healthcare systems. In this paper, a lightweight online/offline certificateless signature (L-OOCLS) is proposed, then a heterogeneous remote anonymous authentication protocol (HRAAP) is designed to enable remote wireless body area networks (WBANs) users to anonymously enjoy healthcare service based on the IoT applications. The proposed L-OOCLS scheme is proven secure in random oracle model and the proposed HRAAP can resist various types of attacks. Compared with the existing relevant schemes, the proposed HRAAP achieves less computation overhead as well as less power consumption on WBANs client. In addition, to nicely meet the application in the IoT, an application scenario is given.
引用
收藏
页码:4926 / 4944
页数:19
相关论文
共 73 条
  • [11] [Anonymous], TELECOMMUNICATION SY
  • [12] [Anonymous], REM SEC ELL CURV CRY
  • [13] [Anonymous], 2015, ERCIM NEWS
  • [14] [Anonymous], 2001, S CRYPT INF SEC SCIS
  • [15] EFFICIENT IMPLEMENTATION OF ELLIPTIC CURVE CRYPTOGRAPHY IN WIRELESS SENSORS
    Aranha, Diego F.
    Dahab, Richardo
    Lopez, Julio
    Oliveira, Leonardo B.
    [J]. ADVANCES IN MATHEMATICS OF COMMUNICATIONS, 2010, 4 (02) : 169 - 187
  • [16] The Internet of Things: A survey
    Atzori, Luigi
    Iera, Antonio
    Morabito, Giacomo
    [J]. COMPUTER NETWORKS, 2010, 54 (15) : 2787 - 2805
  • [17] Efficient pairing computation on supersingular Abelian varieties
    Barreto, Paulo S. L. M.
    Galbraith, Steven D.
    O'hEigeartaigh, Colm
    Scott, Michael
    [J]. DESIGNS CODES AND CRYPTOGRAPHY, 2007, 42 (03) : 239 - 271
  • [18] Barreto PSLM, 2005, LECT NOTES COMPUT SC, V3788, P515
  • [19] Barreto PSLM, 2002, LECT NOTES COMPUT SC, V2442, P354
  • [20] End-to-End Trust and Security for Internet of Things Applications
    Bhattarai, Sulabh
    Wang, Yong
    [J]. COMPUTER, 2018, 51 (04) : 20 - 27