期刊
IEEE SYSTEMS JOURNAL
卷 11, 期 4, 页码 2590-2601出版社
IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC
DOI: 10.1109/JSYST.2016.2544805
关键词
Attack; authentication; security; wireless body area network (WBAN)
类别
资金
- National Natural Science Foundation of China [61572379, 61501333, U1536204]
- National High-tech R&D Program of China (863 Program) [2015AA016004]
- Guangxi Key Laboratory of Trusted Software [kx201529]
- Natural Science Foundation of Hubei Province of China [2015CFB257]
- National Research Foundation of Korea (NRF) - Ministry of Science, ICT & Future Planning [NRF-2014R1A1A1006770]
- National Research Foundation of Korea [2014R1A1A1006770] Funding Source: Korea Institute of Science & Technology Information (KISTI), National Science & Technology Information Service (NTIS)
Advances in wireless communications, embedded systems, and integrated circuit technologies have enabled the wireless body area network (WBAN) to become a promising networking paradigm. Over the last decade, as an important part of the Internet of Things, we have witnessed WBANs playing an increasing role in modern medical systems because of its capabilities to collect real-time biomedical data through intelligent medical sensors in or around the patients' body and send the collected data to remote medical personnel for clinical diagnostics. WBANs not only bring us conveniences but also bring along the challenge of keeping data's confidentiality and preserving patients' privacy. In the past few years, several anonymous authentication (AA) schemes for WBANs were proposed to enhance security by protecting patients' identities and by encrypting medical data. However, many of these schemes are not secure enough. First, we review the most recent AA scheme for WBANs and point out that it is not secure for medical applications by proposing an impersonation attack. After that, we propose a new AA scheme for WBANs and prove that it is provably secure. Our detailed analysis results demonstrate that our proposed AA scheme not only overcomes the security weaknesses in previous schemes but also has the same computation costs at a client side.
作者
我是这篇论文的作者
点击您的名字以认领此论文并将其添加到您的个人资料中。
推荐
暂无数据