Efficient and Anonymous Authentication Scheme for Wireless Body Area Networks

被引:61
作者
Wu, Libing [1 ,2 ]
Zhang, Yubo [1 ,2 ]
Li, Li [3 ]
Shen, Jian [4 ]
机构
[1] Wuhan Univ, State Key Lab Software Engn, Wuhan 430072, Peoples R China
[2] Wuhan Univ, Sch Comp Sci, Wuhan 430072, Peoples R China
[3] Wuhan Univ, Int Sch Software, Wuhan 430072, Peoples R China
[4] Nanjing Univ Informat Sci & Technol, Sch Comp & Software, Nanjing, Jiangsu, Peoples R China
基金
中国国家自然科学基金;
关键词
Wireless body area network; Authentication; Security; SMART-CARD; DIGITAL-SIGNATURES; SECURE;
D O I
10.1007/s10916-016-0491-8
中图分类号
R19 [保健组织与事业(卫生事业管理)];
学科分类号
摘要
As a significant part of the Internet of Things (IoT), Wireless Body Area Network (WBAN) has attract much attention in this years. In WBANs, sensors placed in or around the human body collect the sensitive data of the body and transmit it through an open wireless channel in which the messages may be intercepted, modified, etc. Recently, Wang et al. presented a new anonymous authentication scheme for WBANs and claimed that their scheme can solve the security problems in the previous schemes. Unfortunately, we demonstrate that their scheme cannot withstand impersonation attack. Either an adversary or a malicious legal client could impersonate another legal client to the application provider. In this paper, we give the detailed weakness analysis of Wang et al.'s scheme at first. Then we present a novel anonymous authentication scheme for WBANs and prove that it's secure under a random oracle model. At last, we demonstrate that our presented anonymous authentication scheme for WBANs is more suitable for practical application than Wang et al.'s scheme due to better security and performance. Compared with Wang et al.'s scheme, the computation cost of our scheme in WBANs has reduced by about 31.58 %.
引用
收藏
页数:12
相关论文
共 37 条
[1]  
Abi-Char PE, 2007, INT CONF NEXT GEN, P235
[2]  
[Anonymous], 2010, Proc. Wireless Communications and Networking Conf. (WCNC 2010) IEEE
[3]  
[Anonymous], 2010, IEEE STANDARD LOCAL
[4]  
Bellare M, 2000, LECT NOTES COMPUT SC, V1807, P139
[5]   Identity-Based Anonymous Remote Authentication for Value-Added Services in Mobile Networks [J].
Cao, Xuefei ;
Zeng, Xingwen ;
Kou, Weidong ;
Hu, Liangbing .
IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2009, 58 (07) :3508-3517
[6]  
Cha JC, 2003, LECT NOTES COMPUT SC, V2567, P18
[7]  
Chen MG, 2007, PROCEEDINGS OF 2007 INTERNATIONAL CONFERENCE ON MACHINE LEARNING AND CYBERNETICS, VOLS 1-7, P2179
[8]   China's Rapidly Aging Population Creates Policy Challenges In Shaping A Viable Long-Term Care System [J].
Feng, Zhanlian ;
Liu, Chang ;
Guan, Xinping ;
Mor, Vincent .
HEALTH AFFAIRS, 2012, 31 (12) :2764-2773
[9]  
Gamal T.E., 1984, P WORKSH THEOR APPL, V196, P10, DOI DOI 10.1007/3-540-39568-7_2
[10]   Anonymous Authentication for Wireless Body Area Networks With Provable Security [J].
He, Debiao ;
Zeadally, Sherali ;
Kumar, Neeraj ;
Lee, Jong-Hyouk .
IEEE SYSTEMS JOURNAL, 2017, 11 (04) :2590-2601