浏览全部资源
扫码关注微信
安徽大学计算机科学与技术学院,安徽 合肥 230601
[ "张顺(1982-),男,安徽安庆人,安徽大学副教授、硕士生导师,主要研究方向为信息安全、信息计算复杂性。" ]
[ "范鸿丽(1993-),女,安徽滁州人,安徽大学硕士生,主要研究方向为网络与信息安全。" ]
[ "仲红(1965-),女,安徽固镇人,安徽大学教授、博士生导师,主要研究方向为无线传感网、安全多方计算、私有信息保护。" ]
[ "田苗苗(1987-),男,安徽阜阳人,安徽大学副教授、硕士生导师,主要研究方向为密码学和信息安全。" ]
网络出版日期:2018-04,
纸质出版日期:2018-04-25
移动端阅览
张顺, 范鸿丽, 仲红, 等. 无线体域网中高效可撤销的无证书远程匿名认证协议[J]. 通信学报, 2018,39(4):100-111.
Shun ZHANG, Hongli FAN, Hong ZHONG, et al. Efficient revocable certificateless remote anonymous authentication protocol for wireless body area network[J]. Journal on communications, 2018, 39(4): 100-111.
张顺, 范鸿丽, 仲红, 等. 无线体域网中高效可撤销的无证书远程匿名认证协议[J]. 通信学报, 2018,39(4):100-111. DOI: 10.11959/j.issn.1000-436x.2018064.
Shun ZHANG, Hongli FAN, Hong ZHONG, et al. Efficient revocable certificateless remote anonymous authentication protocol for wireless body area network[J]. Journal on communications, 2018, 39(4): 100-111. DOI: 10.11959/j.issn.1000-436x.2018064.
为了保证无线体域网(WBAN
wireless body area network)中病人生理数据的安全和隐私,通信双方必须进行相互认证。现有的一些方案使用双线性对导致用户计算代价较大,其采用树形结构进行撤销会导致用户的存储代价较大。为了实现撤销同时降低用户端的代价,构造了基于椭圆曲线的可撤销无证书远程匿名认证协议,基于即时更新时间密钥技术进行撤销。协议满足匿名性,相互认证和会话密钥建立等安全需求。与现有方案相比,实验分析表明认证协议用户端的计算代价和存储代价大幅降低,更适用于资源受限的无线体域网。安全性分析证实了协议在随机预言模型下是安全的。
To ensure the security and privacy of patients’ health data in wireless body area network (WBAN)
communication parties must be mutual authenticated.Now some bilinear pairings led to a larger computation cost for users and tree structure revocation would lead to larger user storage cost.In order to achieve revocation and reduce the cost of the user side
a novel revocable certificate less remote anonymous authentication protocol for WBAN was proposed by using elliptic curve cryptography and revoke algorithm that could revoke users by updating their time-private-keys.Security requirements including anonymity
mutual authentication and session key establishment were satisfied in proposed scheme.Compared with the existing schemes
the experimental analysis shows that the computation cost and storage cost of the authentication protocol are greatly reduced
which is more suitable for resource-constrained WBAN.Security analysis also shows that the protocol is secure in the random oracle model.
ZIMMERMAN T G . Personal area networks:near-field intra body communications [J ] . IBM System Journal , 1996 , 35 ( 3/4 ): 609 - 617 .
LAMPORT L . Password authentication with insecure communication [J ] . Communications of the ACM , 1981 , 24 ( 24 ): 770 - 772 .
LI M , YU S , LOU W , et al . Group device pairing based secure sensor association and key management for body area networks [C ] // Conference on Information Communications . 2010 : 2651 - 2659 .
LI M , YU S , GUTTMAN J D , et al . Secure ad hoc trust initialization and key management in wireless body area networks [J ] . ACM Transactions on Sensor Networks , 2013 , 9 ( 2 ): 1 - 35 .
YANG J H , CHANG C C . An ID-based remote mutual authentication with key agreement scheme for mobile devices on elliptic curve cryptosystem [J ] . Computer Security , 2009 , 28 ( 3-4 ): 138 - 143 .
HE D , CHEN J , HU J . An ID-based client authentication with key agreement protocol for mobile client-server environment on ECC with provable security [J ] . Information Fusion , 2012 , 13 ( 3 ): 223 - 230 .
HE D , ZEADALLY S , KUMAR N , et al . Anonymous authentication for wireless body area networks with provable security [J ] . IEEE System Journal , 2016 ,( 99 ): 1 - 12 .
SHAMIR A . Identity-based cryptosystems and signature schemes [M ] // Advances in Cryptology (Lecture Notes in Computer Science) . Springer-Verlag , 1984 ,196: 47 - 53 .
Al-RIYAMI S S , PATERSON K G . Certificateless public key cryptography [C ] // International Conference on the Theory and Application of Cryptology and Information Security . 2003 : 452 - 473 .
LIU J , ZHANG Z , SUN R , et al . An efficient certificateless remote anonymous authentication scheme for wireless body area networks [C ] // IEEE International Conference on Communications . 2012 : 3404 - 3408 .
LIU J , ZHANG Z , CHEN X , et al . Certificateless remote anonymous authentication schemes for wireless body area networks [J ] . IEEE Transactions on Parallel & Distributed Systems , 2014 , 25 ( 2 ): 332 - 342 .
XIONG H . Cost-effective scalable and anonymous certificateless remote authentication protocol [J ] . IEEE Transactions on Information Forensics & Security , 2014 , 9 ( 12 ): 2327 - 2339 .
XIONG H , QIN Z . Revocable and scalable certificateless remote authentication protocol with anonymity for wireless body area networks [J ] . IEEE Transactions on Information Forensics & Security , 2015 , 10 ( 7 ): 1442 - 1455 .
SEO J H , EMURA K . Revocable identity-based cryptosystem revisited:security models and constructions [M ] . IEEE Press , 2014 .
TSAI T T , TSENG Y M . Revocable certificateless public key encryption [J ] . IEEE Systems Journal , 2015 , 9 ( 3 ): 824 - 833 .
CILARDO A , COPPOLINO L , MAZZOCCA N , et al . Elliptic curve cryptography engineering [J ] . Proceedings of the IEEE , 2006 , 94 ( 2 ): 395 - 406 .
BELLARE M , NEVEN G . Multi-signatures in the plain public-key model and a general forking lemma [C ] // ACM Conference on Computer and Communications Security . 2006 : 390 - 399 .
CARO A D , IOVINO V . jPBC:Java pairing based cryptography [C ] // Computers and Communications . 2011 : 850 - 855 .
CHATTERJEE S , DAS A , SING J . An enhanced access control scheme in wireless sensor networks [J ] . Ad-Hoc Sensor Wireless Network , 2014 , 21 ( 1-2 ): 121 - 149 .
0
浏览量
1129
下载量
4
CSCD
关联资源
相关文章
相关作者
相关机构