ID-Based Deniable Authentication Protocol with Key Agreement and Time-Bound Properties for 6G-Based WBAN Healthcare Environments

被引:0
|
作者
Hsu, Chien-Lung [1 ,2 ,3 ,4 ,5 ]
Nguyen, Anh-Tuan [2 ]
Cheng, Guan-Lin [1 ]
机构
[1] Chang Gung Univ, Dept Informat Management, Taoyuan 33302, Taiwan
[2] Chang Gung Univ, Grad Inst Management, Taoyuan 33302, Taiwan
[3] Ming Chi Univ Technol, Dept Visual Commun Design, New Taipei 24301, Taiwan
[4] Chang Gung Mem Hosp, Adm, Taoyuan 33305, Taiwan
[5] Chang Gung Univ, Hlth Aging Res Ctr, Taoyuan 33302, Taiwan
关键词
ID-based; deniability; authentication; mutual key agreement; time-bound; 6G; WBAN; healthcare environment; EFFICIENT; SECURE;
D O I
10.3390/electronics12122682
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The advent of 6G technology is expected to bring a paradigm shift in the field of wireless communication. With its faster data transfer rates and lower latency, 6G could be an ideal solution for the challenges faced by Wireless Body Area Networks (WBANs) in terms of efficient data bandwidth and edge computing. Smart healthcare systems with 6G-based WBANs might provide more efficient and higher-quality healthcare services. However, 6G-based WBAN healthcare systems might face potential security and safety challenges from cybersecurity threats. This paper will propose an ID-based deniable authentication protocol with key agreement and time-bound properties for 6G-based WBAN healthcare environments by considering user privacy, secure communications, authentication, authorization, and scalability of 6G-based WBANs. As compared with previously proposed protocols, the proposed protocol will achieve the following security requirements: mutual authentication, key agreement for secure communication, deniability, time-bound access privilege control, and identity-based public key management for scalable wearable devices and 6G-based WBAN Service Providers. We proved the claimed security requirements of the proposed protocol by using AVISPA simulation and discussed its computational complexities. As compared with previous works, the proposed protocol can gain better contributions in terms of security requirements and performance evaluations for 6G-based WBAN healthcare environments.
引用
收藏
页数:26
相关论文
共 50 条
  • [1] Improvement of an ID-Based Deniable Authentication Protocol
    Tzu-Chun Lin
    [J]. Journal of Electronic Science and Technology., 2018, 16 (02) - 144
  • [4] A new ID-based deniable authentication protocol
    Lu, Rongxing
    Cao, Zhenfu
    Wang, Shengbao
    Bao, Haiyong
    [J]. INFORMATICA, 2007, 18 (01) : 67 - 78
  • [5] An enhanced ID-based deniable authentication protocol on pairings
    Lim, Meng-Hui
    Lee, Sanggon
    Park, Youngho
    Lee, Hoonjae
    [J]. COMPUTATIONAL SCIENCE AND ITS APPLICATIONS - ICCSA 2007, PT 2, PROCEEDINGS, 2007, 4706 : 1008 - 1017
  • [6] ID-based non-interactive deniable authentication protocol
    Shi Wei-min
    [J]. FIFTH INTERNATIONAL CONFERENCE ON INFORMATION ASSURANCE AND SECURITY, VOL 1, PROCEEDINGS, 2009, : 479 - 482
  • [7] An efficient ID-based deniable authentication protocol from pairings
    Cao, TJ
    Lin, DD
    Xue, R
    [J]. 19TH INTERNATIONAL CONFERENCE ON ADVANCED INFORMATION NETWORKING AND APPLICATIONS, VOL 1, PROCEEDINGS: AINA 2005, 2005, : 388 - 391
  • [8] Efficient ID-based authentication and key agreement protocols for the session initiation protocol
    Kilinc, Haci Hakan
    Allaberdiyev, Yolguly
    Yanik, Tugrul
    Erdem, Serdar Suer
    [J]. TURKISH JOURNAL OF ELECTRICAL ENGINEERING AND COMPUTER SCIENCES, 2015, 23 (02) : 560 - 579
  • [9] An Improved ID-Based Group Key Agreement Protocol
    Hu, Kangwen
    Xue, Jingfeng
    Hu, Changzhen
    Ma, Rui
    Li, Zhiqiang
    [J]. TSINGHUA SCIENCE AND TECHNOLOGY, 2014, 19 (05) : 421 - 428
  • [10] An Improved ID-Based Group Key Agreement Protocol
    Kangwen Hu
    Jingfeng Xue
    Changzhen Hu
    Rui Ma
    Zhiqiang Li
    [J]. Tsinghua Science and Technology, 2014, 19 (05) : 421 - 428