期刊论文详细信息
Cybersecurity
Practical pairing-Free sensor cooperation scheme for cloud-Assisted wireless body area networks
Haowen Tan1  Yuanzhao Song2 
[1] Department of Computer Engineering, Chosun University, 309 Pilmun-daero, 61452, Dong-gu, Gwangju, Korea;Department of Global Business, Gachon University, 1342 Seongnam-daero, 13120, Sujeong-gu, Seongnam-si, Gyeonggi-do, Korea;
关键词: WBANs;    Security;    Authentication;    Anonymous identity;    Conditional privacy;   
DOI  :  10.1186/s42400-020-00061-7
来源: Springer
PDF
【 摘 要 】

Nowadays, the design and construction of efficient internet of things (IoTs) has become a new strategies for improving living quality of all aspects. Emerging as one of the most significant extension of medical IoTs, wireless body area networks (WBANs) is capable of monitoring crucial physiological and behavioral information through wearable sensors, offering a new paradigm for the next-generation healthcare systems. As a matter of fact, due to the inherent open wireless communicating characteristics, data security and user privacy issues of WBANs have attracted attentions from both industry and academia. So far, lots of relevant researches emphasize on secure transmission and privacy protection. However, the computation and communication limitations for individual WBAN sensor have not been taken proper consideration. Moreover, the implementation of cloud computing infrastructure has provided WBANs with superior transmission and processing qualities. Emphasizing on the above issues, this paper construct a pairing-free authentication and sensor cooperation scheme in cloud-assisted WBANs, where most of the practical requirements for WBAN sensors could be satisfied. Our design guarantee the sensor anonymity in the whole transmission session. Note that our design offers pairing-free validation procedure followed with active sensor cooperation, which is suitable for massive sensor scenarios. The security analysis proves that our designed scheme is capable of achieving desired security properties and offer adequate resistances to the charted malicious attacks. Meanwhile, security comparison demonstrates that the proposed protocol is secure compared with the state-of-the-arts.

【 授权许可】

CC BY   

【 预 览 】
附件列表
Files Size Format View
RO202104286760916ZK.pdf 1200KB PDF download
  文献评价指标  
  下载次数:11次 浏览次数:14次