4.6 Article

Anonymous Authentication for Wireless Body Area Networks With Provable Security

期刊

IEEE SYSTEMS JOURNAL
卷 11, 期 4, 页码 2590-2601

出版社

IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC
DOI: 10.1109/JSYST.2016.2544805

关键词

Attack; authentication; security; wireless body area network (WBAN)

资金

  1. National Natural Science Foundation of China [61572379, 61501333, U1536204]
  2. National High-tech R&D Program of China (863 Program) [2015AA016004]
  3. Guangxi Key Laboratory of Trusted Software [kx201529]
  4. Natural Science Foundation of Hubei Province of China [2015CFB257]
  5. National Research Foundation of Korea (NRF) - Ministry of Science, ICT & Future Planning [NRF-2014R1A1A1006770]
  6. National Research Foundation of Korea [2014R1A1A1006770] Funding Source: Korea Institute of Science & Technology Information (KISTI), National Science & Technology Information Service (NTIS)

向作者/读者索取更多资源

Advances in wireless communications, embedded systems, and integrated circuit technologies have enabled the wireless body area network (WBAN) to become a promising networking paradigm. Over the last decade, as an important part of the Internet of Things, we have witnessed WBANs playing an increasing role in modern medical systems because of its capabilities to collect real-time biomedical data through intelligent medical sensors in or around the patients' body and send the collected data to remote medical personnel for clinical diagnostics. WBANs not only bring us conveniences but also bring along the challenge of keeping data's confidentiality and preserving patients' privacy. In the past few years, several anonymous authentication (AA) schemes for WBANs were proposed to enhance security by protecting patients' identities and by encrypting medical data. However, many of these schemes are not secure enough. First, we review the most recent AA scheme for WBANs and point out that it is not secure for medical applications by proposing an impersonation attack. After that, we propose a new AA scheme for WBANs and prove that it is provably secure. Our detailed analysis results demonstrate that our proposed AA scheme not only overcomes the security weaknesses in previous schemes but also has the same computation costs at a client side.

作者

我是这篇论文的作者
点击您的名字以认领此论文并将其添加到您的个人资料中。

评论

主要评分

4.6
评分不足

次要评分

新颖性
-
重要性
-
科学严谨性
-
评价这篇论文

推荐

暂无数据
暂无数据