A bilinear pairing based anonymous authentication scheme in wireless body area networks for mHealth

被引:41
作者
Jiang, Qi [1 ]
Lian, Xinxin [1 ]
Yang, Chao [1 ]
Ma, Jianfeng [1 ]
Tian, Youliang [2 ,3 ]
Yang, Yuanyuan [4 ]
机构
[1] Xidian Univ, Sch Cyber Engn, Xian, Peoples R China
[2] Guizhou Prov Key Lab Publ Big Data, Guiyang, Peoples R China
[3] Nanjing Univ Informat Sci & Technol, Sch Comp & Software, Nanjing, Jiangsu, Peoples R China
[4] Minist Publ Secur, Res Inst 3, Shanghai, Peoples R China
基金
中国国家自然科学基金;
关键词
Authentication; Anonymity; Privacy; m-Health; Wireless body area network (WBAN); PROTOCOL; SECURITY; PRIVACY;
D O I
10.1007/s10916-016-0587-1
中图分类号
R19 [保健组织与事业(卫生事业管理)];
学科分类号
摘要
Wireless body area networks (WBANs) have become one of the key components of mobile health (mHealth) which provides 24/7 health monitoring service and greatly improves the quality and efficiency of healthcare. However, users' concern about the security and privacy of their health information has become one of the major obstacles that impede the wide adoption of WBANs. Anonymous and unlinkable authentication is critical to protect the security and privacy of sensitive physiological information in transit from the client to the application provider. We first show that the anonymous authentication scheme of Wang and Zhang based on bilinear pairing is prone to client impersonation attack. Then, we propose an enhanced anonymous authentication scheme to remedy the flaw inWang and Zhang's scheme. We give the security analysis to demonstrate that the enhanced scheme achieves the desired security features and withstands various known attacks.
引用
收藏
页数:10
相关论文
共 41 条
[1]  
[Anonymous], 2010, IEEE STANDARD LOCAL
[2]   Identity-based encryption from the Weil pairing [J].
Boneh, D ;
Franklin, M .
SIAM JOURNAL ON COMPUTING, 2003, 32 (03) :586-615
[3]   Achieving Efficient Cloud Search Services: Multi-Keyword Ranked Search over Encrypted Cloud Data Supporting Parallel Computing [J].
Fu, Zhangjie ;
Sun, Xingming ;
Liu, Qi ;
Zhou, Lu ;
Shu, Jiangang .
IEICE TRANSACTIONS ON COMMUNICATIONS, 2015, E98B (01) :190-200
[4]   A Variable Threshold-Value Authentication Architecture for Wireless Mesh Networks [J].
Guo, Ping ;
Wang, Jin ;
Geng, Xue Hua ;
Kim, Chang Seob ;
Kim, Jeong-Uk .
JOURNAL OF INTERNET TECHNOLOGY, 2014, 15 (06) :929-935
[5]  
Hankerson D, 2004, LECT NOTES COMPUTER
[6]   A Provably-Secure Cross-Domain Handshake Scheme with Symptoms-Matching for Mobile Healthcare Social Network [J].
He, Debiao ;
Kumar, Neeraj ;
Wang, Huaqun ;
Wang, Lina ;
Choo, Kim-Kwang Raymond ;
Vinel, Alexey .
IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2018, 15 (04) :633-645
[7]   Anonymous Authentication for Wireless Body Area Networks With Provable Security [J].
He, Debiao ;
Zeadally, Sherali ;
Kumar, Neeraj ;
Lee, Jong-Hyouk .
IEEE SYSTEMS JOURNAL, 2017, 11 (04) :2590-2601
[8]   Certificateless Public Auditing Scheme for Cloud-Assisted Wireless Body Area Networks [J].
He, Debiao ;
Zeadally, Sherali ;
Wu, Libing .
IEEE SYSTEMS JOURNAL, 2018, 12 (01) :64-73
[9]   An Efficient Identity-Based Conditional Privacy-Preserving Authentication Scheme for Vehicular Ad Hoc Networks [J].
He, Debiao ;
Zeadally, Sherali ;
Xu, Baowen ;
Huang, Xinyi .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2015, 10 (12) :2681-2691
[10]   Authentication Protocol for an Ambient Assisted Living System [J].
He, Debiao ;
Zeadally, Sherali .
IEEE COMMUNICATIONS MAGAZINE, 2015, 53 (01) :71-77