Cost-Effective and Anonymous Access Control for Wireless Body Area Networks

被引:65
作者
Li, Fagen [1 ]
Han, Yanan [1 ]
Jin, Chunhua [1 ]
机构
[1] Univ Elect Sci & Technol China, Sch Comp Sci & Engn, Chengdu 611731, Sichuan, Peoples R China
来源
IEEE SYSTEMS JOURNAL | 2018年 / 12卷 / 01期
基金
中国国家自然科学基金;
关键词
Access control; certificateless cryptography (CLC); security; signcryption; wireless body area networks (WBANs); BROADCAST AUTHENTICATION; SIGNCRYPTION; EFFICIENT; LIGHTWEIGHT; SIGNATURES; SECURITY; PRIVACY; SCHEME; CRYPTOGRAPHY;
D O I
10.1109/JSYST.2016.2557850
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Wireless body area networks (WBANs) are expected to play an important role in monitoring the health information and creating a smart, reliable, and ubiquitous healthcare system. Only authorized users can access the network since the collected data by the WBANs are used to diagnosed and treated. However, it is still a challenging task to design a cost-effective and secure access control scheme because of inherent characteristics of the WBANs, such as open medium channel, limited resources of sensor nodes, and the absence of fixed infrastructure. In this paper, we first propose a novel certificateless signcryption scheme, and then, design a cost-effective and anonymous access control scheme for the WBANs using the novel signcryption. The proposed access control scheme achieves anonymity, confidentiality, authentication, integrity, and nonrepudiation. Compared with existing three access control schemes for the WBANs, our proposed scheme has the least computational cost and total energy consumption for the controller.
引用
收藏
页码:747 / 758
页数:12
相关论文
共 38 条
[1]  
Al-Riyami SS, 2003, LECT NOTES COMPUT SC, V2894, P452
[2]  
Barbosa M., 2008, P 2008 ACM S INF COM, P369
[3]  
Barreto PSLM, 2005, LECT NOTES COMPUT SC, V3788, P515
[4]   Ciphertext-policy attribute-based encryption [J].
Bethencourt, John ;
Sahai, Amit ;
Waters, Brent .
2007 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS, 2007, :321-+
[5]   Identity-based encryption from the Weil pairing [J].
Boneh, D ;
Franklin, M .
SIAM JOURNAL ON COMPUTING, 2003, 32 (03) :586-615
[6]  
Boneh D, 2004, LECT NOTES COMPUT SC, V3027, P56
[7]  
Boyen X, 2003, LECT NOTES COMPUT SC, V2729, P383
[8]  
Cagalaban G., 2011, Proceedings of the 2011 13th International Conference on Advanced Communication Technology (ICACT). Smart Service Innovation through Mobile Interactivity, P863
[9]   IMBAS: Identity-based multi-user broadcast authentication in wireless sensor networks [J].
Cao, Xuefei ;
Kou, Weidong ;
Dang, Lanjun ;
Zhao, Bin .
COMPUTER COMMUNICATIONS, 2008, 31 (04) :659-667
[10]  
Cha JC, 2003, LECT NOTES COMPUT SC, V2567, P18