A bilinear pairing based anonymous authentication scheme in wireless body area networks for mHealth

被引:38
作者
Jiang, Qi [1 ]
Lian, Xinxin [1 ]
Yang, Chao [1 ]
Ma, Jianfeng [1 ]
Tian, Youliang [2 ,3 ]
Yang, Yuanyuan [4 ]
机构
[1] Xidian Univ, Sch Cyber Engn, Xian, Peoples R China
[2] Guizhou Prov Key Lab Publ Big Data, Guiyang, Peoples R China
[3] Nanjing Univ Informat Sci & Technol, Sch Comp & Software, Nanjing, Jiangsu, Peoples R China
[4] Minist Publ Secur, Res Inst 3, Shanghai, Peoples R China
基金
中国国家自然科学基金;
关键词
Authentication; Anonymity; Privacy; m-Health; Wireless body area network (WBAN); PROTOCOL; SECURITY; PRIVACY;
D O I
10.1007/s10916-016-0587-1
中图分类号
R19 [保健组织与事业(卫生事业管理)];
学科分类号
摘要
Wireless body area networks (WBANs) have become one of the key components of mobile health (mHealth) which provides 24/7 health monitoring service and greatly improves the quality and efficiency of healthcare. However, users' concern about the security and privacy of their health information has become one of the major obstacles that impede the wide adoption of WBANs. Anonymous and unlinkable authentication is critical to protect the security and privacy of sensitive physiological information in transit from the client to the application provider. We first show that the anonymous authentication scheme of Wang and Zhang based on bilinear pairing is prone to client impersonation attack. Then, we propose an enhanced anonymous authentication scheme to remedy the flaw inWang and Zhang's scheme. We give the security analysis to demonstrate that the enhanced scheme achieves the desired security features and withstands various known attacks.
引用
收藏
页数:10
相关论文
共 41 条
  • [1] [Anonymous], 2010, IEEE STANDARD LOCAL
  • [2] Identity-based encryption from the Weil pairing
    Boneh, D
    Franklin, M
    [J]. SIAM JOURNAL ON COMPUTING, 2003, 32 (03) : 586 - 615
  • [3] Achieving Efficient Cloud Search Services: Multi-Keyword Ranked Search over Encrypted Cloud Data Supporting Parallel Computing
    Fu, Zhangjie
    Sun, Xingming
    Liu, Qi
    Zhou, Lu
    Shu, Jiangang
    [J]. IEICE TRANSACTIONS ON COMMUNICATIONS, 2015, E98B (01) : 190 - 200
  • [4] A Variable Threshold-Value Authentication Architecture for Wireless Mesh Networks
    Guo, Ping
    Wang, Jin
    Geng, Xue Hua
    Kim, Chang Seob
    Kim, Jeong-Uk
    [J]. JOURNAL OF INTERNET TECHNOLOGY, 2014, 15 (06): : 929 - 935
  • [5] Hankerson D, 2004, LECT NOTES COMPUTER
  • [6] A Provably-Secure Cross-Domain Handshake Scheme with Symptoms-Matching for Mobile Healthcare Social Network
    He, Debiao
    Kumar, Neeraj
    Wang, Huaqun
    Wang, Lina
    Choo, Kim-Kwang Raymond
    Vinel, Alexey
    [J]. IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2018, 15 (04) : 633 - 645
  • [7] Anonymous Authentication for Wireless Body Area Networks With Provable Security
    He, Debiao
    Zeadally, Sherali
    Kumar, Neeraj
    Lee, Jong-Hyouk
    [J]. IEEE SYSTEMS JOURNAL, 2017, 11 (04): : 2590 - 2601
  • [8] Certificateless Public Auditing Scheme for Cloud-Assisted Wireless Body Area Networks
    He, Debiao
    Zeadally, Sherali
    Wu, Libing
    [J]. IEEE SYSTEMS JOURNAL, 2018, 12 (01): : 64 - 73
  • [9] An Efficient Identity-Based Conditional Privacy-Preserving Authentication Scheme for Vehicular Ad Hoc Networks
    He, Debiao
    Zeadally, Sherali
    Xu, Baowen
    Huang, Xinyi
    [J]. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2015, 10 (12) : 2681 - 2691
  • [10] Authentication Protocol for an Ambient Assisted Living System
    He, Debiao
    Zeadally, Sherali
    [J]. IEEE COMMUNICATIONS MAGAZINE, 2015, 53 (01) : 71 - 77