Authenticated key agreement for blockchain-based WBAN

被引:24
|
作者
Mwitende, Gervais [1 ]
Ali, Ikram [1 ]
Eltayieb, Nabeil [1 ]
Wang, Baocang [2 ]
Li, Fagen [1 ]
机构
[1] Univ Elect Sci & Technol China, Sch Comp Sci & Engn, Ctr Cyber Secur, Chengdu 611731, Peoples R China
[2] Xuchang Univ, Sch Informat Engn, Xuchang 461000, Peoples R China
基金
中国国家自然科学基金;
关键词
WBAN; Key agreement; CLAKA; Blockchain; Blind signature; AREA NETWORKS; SCHEME; SYSTEM; PROTOCOL;
D O I
10.1007/s11235-020-00662-0
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
Certificateless authenticated key agreement (CLAKA) is important to prevent the escrow problem. It also mitigates the certificate management burden in storage and during the message exchange. However, many previously designed CLAKA protocols were designed in the centralized system architectures that may cause the single point of failure. A new CLAKA is designed in a decentralized (blockchain) architecture that is very suitable for wireless body area networks (WBANs). The proposed protocol is secure as long as it computes a common session key between WBAN user and blockchain nodes. An ID-based blind signature with message recovery is used between blockchain nodes. The blind signature with message recovery is used to achieve authentication and anonymity by acquiring a signature without disclosing the message. It also has advantage in minimizing the size of signature and it is efficient in a situation of limited bandwidth. The protocol analysis shows that it is secure and can resist many WBAN security attacks compared to the existing authenticated key agreement protocols.
引用
收藏
页码:347 / 365
页数:19
相关论文
共 50 条
  • [41] Blockchain-based Privacy-preserving Authentication Key Agreement Protocol for Industrial Wireless Sensor Networks
    Su, Xing
    Xie, Yong
    Wang, Hongyuan
    Wang, Hui
    2022 IEEE 28TH INTERNATIONAL CONFERENCE ON PARALLEL AND DISTRIBUTED SYSTEMS, ICPADS, 2022, : 234 - 241
  • [42] The GN-authenticated key agreement
    Stephanides, G
    Constantinescu, N
    APPLIED MATHEMATICS AND COMPUTATION, 2005, 170 (01) : 531 - 544
  • [43] A secure authenticated key agreement protocol
    Popescu, C
    MELECON 2004: PROCEEDINGS OF THE 12TH IEEE MEDITERRANEAN ELECTROTECHNICAL CONFERENCE, VOLS 1-3, 2004, : 783 - 786
  • [44] Authenticated group key agreement for multicast
    Wang, Liming
    Wu, Chuan-Kun
    CRYPTOLOGY AND NETWORK SECURITY, PROCEEDINGS, 2006, 4301 : 55 - +
  • [45] A Deniable Authenticated Key Agreement Protocol
    TIAN Haibo1
    2. Guangdong Key Laboratory of Information Security Technology
    WuhanUniversityJournalofNaturalSciences, 2008, (06) : 645 - 650
  • [46] Authenticated Key Agreement in Group Settings
    李明
    王勇
    谷大武
    白英彩
    Journal of Beijing Institute of Technology(English Edition), 2006, (02) : 186 - 189
  • [47] Simple authenticated key agreement algorithm
    Seo, DH
    Sweeney, P
    ELECTRONICS LETTERS, 1999, 35 (13) : 1073 - 1074
  • [48] Authenticated commutator key agreement protocol
    Ushakov A.
    Groups, Complexity, Cryptology, 2016, 8 (02) : 127 - 133
  • [49] AN IMPROVED AUTHENTICATED KEY AGREEMENT PROTOCOL
    Wang Changji Yang Bo Wu Jianping Network Research Center Tsinghua University Beijing China
    JournalofElectronics, 2005, (05) : 485 - 489
  • [50] A new authenticated key agreement protocol
    Abi-Char, Pierre E.
    Mhamed, Abdallah
    El-Hassan, Bachar
    NEW TECHNOLOGIES, MOBILITY AND SECURITY, 2007, : 629 - 629