Cloud-aided lightweight certificateless authentication protocol with anonymity for wireless body area networks

被引:215
作者
Shen, Jian [1 ,2 ]
Gui, Ziyuan [1 ]
Ji, Sai [1 ]
Shen, Jun [1 ]
Tan, Haowen [3 ]
Tang, Yi [4 ]
机构
[1] Nanjing Univ Informat Sci & Technol, Jiangsu Engn Ctr Network Monitoring, Nanjing, Jiangsu, Peoples R China
[2] Chinese Acad Sci, Inst Informat Engn, State Key Lab Informat Secur, Beijing, Peoples R China
[3] Chosun Univ, Dept Comp Sci, Gwangju, South Korea
[4] Guangzhou Univ, Sch Math & Informat Sci, Guangzhou, Guangdong, Peoples R China
基金
美国国家科学基金会;
关键词
Cloud-aided lightweight authentication; WBANs; Anonymity; Privacy; Insecure channel; EFFICIENT; SECURITY; PRIVACY; SCHEME;
D O I
10.1016/j.jnca.2018.01.003
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
With the development of cloud computing and wireless body area networks (WBANs), wearable equipments are able to become new intelligent terminals to provide services for users, which plays an important role to improve the human health-care service. However, The traditional WBANs devices have limited computing and storage capabilities. These restrictions limit the services that WBANs can provide to users. Thus the concept of Cloud-aided WBANs has been proposed to enhance the capabilities of WBANs. In addition, due to the openness of the cloud computing environment, the protection of the user's physiological information and privacy remains a major concern. In previous authentication protocols, few of them can protect the user's private information in insecure channel. In this paper, we propose a cloud-aided lightweight certificateless authentication protocol with anonymity for wireless body area networks. Our protocol ensures that no one can obtain user's real identity except for the network manager in the registration phase. Moreover, in the authentication phase, the network manager cannot know the user's real identity. Note that, through the security analysis, we can conclude that our protocol can provide stronger security protection of private information than most of existing schemes in insecure channel.
引用
收藏
页码:117 / 123
页数:7
相关论文
共 36 条
[11]   New Algorithms for Secure Outsourcing of Large-Scale Systems of Linear Equations [J].
Chen, Xiaofeng ;
Huang, Xinyi ;
Li, Jin ;
Ma, Jianfeng ;
Lou, Wenjing ;
Wong, Duncan S. .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2015, 10 (01) :69-78
[12]  
Das M. L., 2007, IEEE T CONSUM ELECTR, V50, P629
[13]   Efficient and provably-secure certificateless short signature scheme from bilinear pairings [J].
Du, Hongzhen ;
Wen, Qiaoyan .
COMPUTER STANDARDS & INTERFACES, 2009, 31 (02) :390-394
[14]   Privacy-Preserving Smart Similarity Search Based on Simhash over Encrypted Data in Cloud Computing [J].
Fu, Zhangjie ;
Shu, Jiangang ;
Wang, Jin ;
Liu, Yuling ;
Lee, Sungyoung .
JOURNAL OF INTERNET TECHNOLOGY, 2015, 16 (03) :453-460
[15]   Anonymous Authentication for Wireless Body Area Networks With Provable Security [J].
He, Debiao ;
Zeadally, Sherali ;
Kumar, Neeraj ;
Lee, Jong-Hyouk .
IEEE SYSTEMS JOURNAL, 2017, 11 (04) :2590-2601
[16]   Certificateless Public Auditing Scheme for Cloud-Assisted Wireless Body Area Networks [J].
He, Debiao ;
Zeadally, Sherali ;
Wu, Libing .
IEEE SYSTEMS JOURNAL, 2018, 12 (01) :64-73
[17]   Insight of the protection for data security under selective opening attacks [J].
Huang, Zhengan ;
Liu, Shengli ;
Mao, Xianping ;
Chen, Kefei ;
Li, Jin .
INFORMATION SCIENCES, 2017, 412 :223-241
[18]  
Hwang M. S., 2000, NEW REMOTE USER AUTH
[19]   The state of elliptic curve cryptography [J].
Koblitz, N ;
Menezes, A ;
Vanstone, S .
DESIGNS CODES AND CRYPTOGRAPHY, 2000, 19 (2-3) :173-193
[20]   Secure deduplication storage systems supporting keyword search [J].
Li, Jin ;
Chen, Xiaofeng ;
Xhafa, Fatos ;
Barolli, Leonard .
JOURNAL OF COMPUTER AND SYSTEM SCIENCES, 2015, 81 (08) :1532-1541