Certificateless authenticated key agreement for blockchain-based WBANs

被引:44
作者
Mwitende, Gervais [1 ]
Ye, Yalan [1 ]
Ali, Ikram [1 ]
Li, Fagen [1 ]
机构
[1] Univ Elect Sci & Technol China, Sch Comp Sci & Engn, Chengdu 611731, Peoples R China
基金
中国国家自然科学基金;
关键词
WBAN; CLAKA; Session key; Blockchain; Ring signature; SCHEME;
D O I
10.1016/j.sysarc.2020.101777
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Authenticated key agreement (AKA) enables communicating parties to mutually establish a session key, in a way that each entity is assured of the authentication of its peer. Certificateless AKA (CLAKA) protocols are widely designed since they avoid the key escrow problem found in identity-based systems and overcome certificateless management overheads in Public Key Infrastructure (PKI). Furthermore, the existing CLAKA were designed to operate in centralized network. Such architecture is a single point of management and single point of failure. We need lightweight protocols that fit with body sensors capabilities. In order to mitigate the aforementioned vulnerabilities, we propose a pairing-based certificateless against the key escrow problem. Our protocol operates in a decentralized system against the single point of failure and management. The protocol establishes a session key in the first phase for communications. The ring signature is used in the second phase for node authentication. The ring signature has advantage of reducing computation costs where a node signs a signature on behalf of others. The signing node remains anonymous and other nodes can verify the signature. Another advantage of ring signature is that there is no specification about the size of the group.
引用
收藏
页数:13
相关论文
共 39 条
[1]  
Al-Riyami SS, 2003, LECT NOTES COMPUT SC, V2894, P452
[2]   A blockchain-based certificateless public key signature scheme for vehicle-to-infrastructure communication in VANETs [J].
Ali, Ikram ;
Gervais, Mwitende ;
Ahene, Emmanuel ;
Li, Fagen .
JOURNAL OF SYSTEMS ARCHITECTURE, 2019, 99
[3]   DNS rule-based schema to botnet detection [J].
Alieyan, Kamal ;
Almomani, Ammar ;
Anbar, Mohammed ;
Alauthman, Mohammad ;
Abdullah, Rosni ;
Gupta, B. B. .
ENTERPRISE INFORMATION SYSTEMS, 2021, 15 (04) :545-564
[4]  
Amara Moncef, 2011, 2011 7th International Workshop on Systems, Signal Processing and their Applications (WOSSPA 2011), P247, DOI 10.1109/WOSSPA.2011.5931464
[5]  
Cash D, 2008, LECT NOTES COMPUT SC, V4965, P127
[6]  
Chow S. S. M., 2007, IACR Cryptol. ePrint Arch., P236
[7]   A Survey on Security and Privacy Issues of Bitcoin [J].
Conti, Mauro ;
Kumar, E. Sandeep ;
Lal, Chhagan ;
Ruj, Sushmita .
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2018, 20 (04) :3416-3452
[8]   An efficient eCK secure certificateless authenticated key agreement scheme with security against public key replacement attacks [J].
Daniel, Renu Mary ;
Rajsingh, Elijah Blessing ;
Silas, Salaja .
JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2019, 47 :156-172
[9]  
De La Rosa J.L., 2017, P 4 ANN WORLD OP INN, P14
[10]  
Dent Alexander W., 2009, Public Key Infrastructures, Services & Applications. 6th European Workshop. EuroPKI 2009. Revised Selected Papers, P1