浏览全部资源
扫码关注微信
1. 武汉大学空天信息安全与可信计算教育部重点实验室,湖北 武汉 430072
2. 武汉大学计算机学院,湖北 武汉 430072
[ "王俊(1983-),男,湖北潜江人,武汉大学博士生,主要研究方向为信息安全、隐私保护等。" ]
[ "刘树波(1970-),男,蒙古族,黑龙江齐齐哈尔人,博士,武汉大学教授、博士生导师,主要研究方向为信息安全、隐私保护、嵌入式系统等。" ]
[ "梁才(1993-),男,湖北仙桃人,武汉大学硕士生,主要研究方向为隐私保护。" ]
[ "李永凯(1988-),男,山东临沂人,武汉大学博士生,主要研究方向为信息安全、隐私保护等。" ]
网络出版日期:2017-06,
纸质出版日期:2017-06-25
移动端阅览
王俊, 刘树波, 梁才, 等. 基于PUF和IPI的可穿戴设备双因子认证协议[J]. 通信学报, 2017,38(6):127-135.
Jun WANG, Shu-bo LIU, Cai LIANG, et al. Two-factor wearable device authentication protocol based on PUF and IPI[J]. Journal on communications, 2017, 38(6): 127-135.
王俊, 刘树波, 梁才, 等. 基于PUF和IPI的可穿戴设备双因子认证协议[J]. 通信学报, 2017,38(6):127-135. DOI: 10.11959/j.issn.1000-436x.2017125.
Jun WANG, Shu-bo LIU, Cai LIANG, et al. Two-factor wearable device authentication protocol based on PUF and IPI[J]. Journal on communications, 2017, 38(6): 127-135. DOI: 10.11959/j.issn.1000-436x.2017125.
可穿戴设备正推进着移动医疗的快速发展,但无线体域网的开放式结构也给用户数据安全带来了更多威胁。为了数据安全,基于物理不可克隆函数和脉搏间隔,提出一种设备节点和数据中心之间的双因子认证协议。此协议利用设备物理特征和用户生物特征双重唯一性,有效地阻止了妥协和假冒等攻击,且适用于体域网环境下资源受限的医疗设备。与现有方案相比,增强了认证协议安全性。FPGA平台上实验证明了所提协议的实用性和有效性。
Wearable device is pushing the rapid development of mobile health
however
the open architecture of wireless body area network has brought challenges for the security of user data.In order to protect the security of user data
a two-factor authentication protocol between device note and data hub was proposed based on physically unclonable function and interpulse interval.Using dual uniqueness of device physical characteristic and user biometric trait
the protocol can resist compromise and impersonation attacks and was specially suitable for resource constrained wearable devices under body area network.Compared with the existing authentication schemes
the security of the proposed protocol was enhanced.The practicability and effectiveness of the protocol are confirmed by hardware implementation on FPGA.
METIN A . Wiley encyclopedia of biomedical engineering,6-volume set [M ] . United States : John Wiley and Sons,Inc pressPress , 2006 .
ALAA A , AMR M , TAREK E . Energy-cost distortion optimization for delay-sensitive m-health applications [C ] // Wireless Telecommunications Symposium(WTS) . 2015 : 1 - 5 .
SAXENA D , RAYCHOUDHURY V , NALLURI S . SmarthealthNDNoT:named data network of things for healthcare services [C ] // Proc 2015 Workshop on Pervasive Wireless Healthcare Mobilehealth . 2015 : 45 - 50 .
FRANCIS T , MADIAJAGAN M , KUMAR V . Privacy issues and techniques in e-health systems [C ] // 2015 ACM SIGMIS Conference on Computers and People Research . 2015 : 113 - 115 .
POON C C Y , ZHANG Y T , BAO S D . A novel biometrics method to secure wireless body area sensor networks for telemedicine and m-health [J ] . IEEE Communications Magazine , 2006 , 44 ( 4 ): 73 - 81 .
KONG J , KOUSHANFAR F , PENDYALA P , et al . PUFatt:embedded platform attestation based on novel processor-based PUFs [C ] // 51st Annual Design Automation Conference . 2014 : 1 - 6 .
MAJZOOBI M , ROSTAMI M , KOUSHANFAR F , et al . Slender PUF protocol:a lightweight,robust,and secure authentication by substring matching [C ] // 2012 IEEE Symposium on Security and Privacy Workshops . 2012 : 33 - 44 .
PAPPU R , RECHT B , TAYLOR J , et al . Physical one-way functions [J ] . Science , 2002 , 297 ( 5589 ): 2026 - 2030 .
SUH G E , DEVADAS S . Physical unclonable functions for device authentication and secret key generation [C ] // 44th Annual Design Automation Conference . 2007 : 9 - 14 .
BASSIL R , EL-BEAINO W , KAYSSI A , et al . A PUF-based ultra-lightweight mutual authentication RFID protocol [C ] // Internet Technology and Secured Transactions . 2011 : 495 - 499 .
JIN Y M , XIN W , SUN H P , et al . PUF-based RFID authentication protocol against secret key leakage [C ] // 14th Asia-Pacific Web Conference . 2012 : 318 - 329 .
AKGÜN M , CAGLAYAN M U . Providing destructive privacy and scalability in RFID systems using PUFs [J ] . Ad Hoc Networks , 2015 , 32 : 32 - 42 .
ROSTAMI M , MAJZOOBI M , KOUSHANFAR F , et al . Robust and reverse engineering resilient PUF authentication and key exchange by substring matching [J ] . IEEE Transactions on Emerging Topics in Computing , 2014 , 2 ( 1 ): 37 - 49 .
DELVAUX J , PEETERS R , GU D , et al . A survey on lightweight entity authentication with strong PUFs [J ] . ACM Computing Surveys , 2015 , 48 ( 2 ): 1 - 42 .
BAO S D , ZHANG Y T , SHEN L F . Physiological signal based entity authentication for body area sensor networks and mobile healthcare systems [C ] // 27th Annual International Conference of the Engineering in Medicine and Biology Society (EMBS) . 2005 : 2455 - 2458 .
ZHENG G L , FANG G F , SHANKARAN R , et al . An ECG-based secret data sharing scheme supporting emergency treatment of implantable medical devices [C ] // 2014 International Symposium on Wireless Personal Multimedia Communications(WPMC) . 2014 : 624 - 628 .
ZHENG G L , FANG G F , SHANKARAN R , et al . A non-key based security scheme supporting emergency treatment of wireless implants [C ] // 2014 IEEE International Conference on Communications(ICC) . 2014 : 647 - 652 .
ZHANG G H , POON C C , ZHANG Y T . A fast key generation method based on dynamic biometrics to secure wireless body sensor networks for p-health [C ] // Annual International Conference of the IEEE Engineering in Medicine and Biology Society (EMBS) . 2010 : 2034 - 2036 .
ZHANG G H , POON C C , ZHANG Y T . Analysis of using interpulse intervals to generate 128-bit biometric random binary sequences for securing wireless body sensor networks [J ] . IEEE Transactions on Information Technology in Biomedicine , 2012 , 16 ( 1 ): 176 - 182 .
VENKATASUBRAMANIAN K K , BANERJEE A , GUPTA S K S . EKG- based key agreement in body sensor networks [C ] // IEEE INFOCOM Workshops . 2008 : 1 - 6 .
TEHRANIPOOR M , WANG C . Introduction to hardware security and trust [M ] . New York : Springer pressPress , 2012 .
LIM D , LEE J W , GASSEND B , et al . Extracting secret keys from integrated circuits [J ] . IEEE Transactions on Very Large Scale Intergration (VLSI) Systems , 2005 , 13 ( 10 ): 1200 - 1205 .
RÜHRMAIR U , SEHNKE F , SÖLTER J , et al . Modeling attacks on physical unclonable functions [C ] // 17th ACM Conference on Computer and Communications Security(CCS) . 2010 : 237 - 249 .
BHARGAVA M , MAI K . An efficient reliable PUF-based cryptographic key generator in 65nm CMOS [C ] // Design,Automation and Test in Europe Conference and Exhibition(DATE) . 2014 : 1 - 6 .
CAPOVILLA J , CORTES M , ARAUJO G . Improving the statistical variability of delay-based physical unclonable functions [C ] // 28th Symposium on Integrated Circuits and Systems Design(SBCCI) . 2015 : 1 - 7 .
DELVAUX J , VERBAUWHEDE I . Fault injection modeling attacks on 65 nm arbiter and RO sum PUFs via environmental changes [J ] . IEEE Transactions on Circuits and Systems I:Regular Papers , 2014 , 61 ( 6 ): 1701 - 1713 .
CHE W J , SAQIB F , PLUSQUELLIC J . PUF-based authentication [C ] // 2015 IEEE/ACM International Conference on Computer-Aided Design(ICCAD) . 2015 : 337 - 344 .
CHERIF Z , DANGER J L , LOZAC H F , et al . Evaluation of delay PUFs on CMOS 65 nm technology:ASIC vs FPGA [C ] // 2nd International Workshop on Hardware and Architectural Support for Security and Privacy(HASP) . 2013 : 1 - 8 .
DAS M L . Two-factor user authentication in wireless sensor networks [J ] . IEEE Transactions on Wireless Communications , 2009 , 8 ( 3 ): 1086 - 1090 .
SHELTON J , JENKINS J , ROY K , et al . Genetic based local ternary pattern feature extraction for mitigating replay attacks [C ] // SoutheastCon 2016 . 2016 : 1 - 2 .
0
浏览量
1325
下载量
3
CSCD
关联资源
相关文章
相关作者
相关机构