Cloud-aided lightweight certificateless authentication protocol with anonymity for wireless body area networks

被引:215
作者
Shen, Jian [1 ,2 ]
Gui, Ziyuan [1 ]
Ji, Sai [1 ]
Shen, Jun [1 ]
Tan, Haowen [3 ]
Tang, Yi [4 ]
机构
[1] Nanjing Univ Informat Sci & Technol, Jiangsu Engn Ctr Network Monitoring, Nanjing, Jiangsu, Peoples R China
[2] Chinese Acad Sci, Inst Informat Engn, State Key Lab Informat Secur, Beijing, Peoples R China
[3] Chosun Univ, Dept Comp Sci, Gwangju, South Korea
[4] Guangzhou Univ, Sch Math & Informat Sci, Guangzhou, Guangdong, Peoples R China
基金
美国国家科学基金会;
关键词
Cloud-aided lightweight authentication; WBANs; Anonymity; Privacy; Insecure channel; EFFICIENT; SECURITY; PRIVACY; SCHEME;
D O I
10.1016/j.jnca.2018.01.003
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
With the development of cloud computing and wireless body area networks (WBANs), wearable equipments are able to become new intelligent terminals to provide services for users, which plays an important role to improve the human health-care service. However, The traditional WBANs devices have limited computing and storage capabilities. These restrictions limit the services that WBANs can provide to users. Thus the concept of Cloud-aided WBANs has been proposed to enhance the capabilities of WBANs. In addition, due to the openness of the cloud computing environment, the protection of the user's physiological information and privacy remains a major concern. In previous authentication protocols, few of them can protect the user's private information in insecure channel. In this paper, we propose a cloud-aided lightweight certificateless authentication protocol with anonymity for wireless body area networks. Our protocol ensures that no one can obtain user's real identity except for the network manager in the registration phase. Moreover, in the authentication phase, the network manager cannot know the user's real identity. Note that, through the security analysis, we can conclude that our protocol can provide stronger security protection of private information than most of existing schemes in insecure channel.
引用
收藏
页码:117 / 123
页数:7
相关论文
共 36 条
[1]  
[Anonymous], 2003, Certificateless Public Key Cryptography
[2]  
[Anonymous], 2009, P 2009 IEEE INT C PE
[3]  
[Anonymous], 2015, 2015 INT C INN INF E
[4]  
[Anonymous], INF SCI
[5]  
[Anonymous], 2017, IEEE T DEPENDABLE SE
[6]  
[Anonymous], INT J DISTRIBUTED SE, DOI DOI 10.1016/J.FIT0TE.2015.03.001
[7]   A View of Cloud Computing [J].
Armbrust, Michael ;
Fox, Armando ;
Griffith, Rean ;
Joseph, Anthony D. ;
Katz, Randy ;
Konwinski, Andy ;
Lee, Gunho ;
Patterson, David ;
Rabkin, Ariel ;
Stoica, Ion ;
Zaharia, Matei .
COMMUNICATIONS OF THE ACM, 2010, 53 (04) :50-58
[8]   Short signatures from the Weil pairing [J].
Boneh, D ;
Lynn, B ;
Shacham, H .
JOURNAL OF CRYPTOLOGY, 2004, 17 (04) :297-319
[9]   Integration of Cloud computing and Internet of Things: A survey [J].
Botta, Alessio ;
de Donato, Walter ;
Persico, Valerio ;
Pescape, Antonio .
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2016, 56 :684-700
[10]  
Castro R, 2007, LECT NOTES COMPUT SC, V4784, P85