Flexible Authentication Protocol with Key Reconstruction in WBAN Environments

被引:0
|
作者
Fan, Chun-I [1 ]
Wang, Jian-Sheng [1 ]
Huang, Jheng-Jia [1 ]
Tseng, Yi-Fan [1 ]
Juang, Wen-Shenq [2 ]
Kikuchi, Hiroaki [3 ]
机构
[1] Natl Sun Yat Sen Univ, Dept Comp Sci & Engn, Kaohsiung, Taiwan
[2] Natl Kaohsiung First Univ Sci & Technol, Dept Informat Management, Kaohsiung, Taiwan
[3] Meiji Univ, Dept Frontier Media Sci, Tokyo, Japan
关键词
wireless body area network; healthcare; authentication; key reconstruction; homomorphic secret sharing;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Wireless body area network (WBAN) plays an important part in mobile healthcare. WBAN can be imagined as a small wireless local area network around our body. In WBAN, there exist three roles: sensors, gateway, and healthcare center. However, the communication distance between sensors and gateway is only 1-2 meters. If the gateway is lost or leaves the range of WBAN consisting of the sensors, the sensed data will not be aggregated and forwarded. Furthermore, the original gateway holds the long-term key shared with the healthcare center, but the user's devices which may serve as the backup gateway do not hold the long-term key. In order to deal with the problems, we propose a key reconstruction protocol for WBAN. In the proposed protocol, the original gateway enables the backup gateway to reconstruct a temporary token, and the backup gateway will use the temporary token to establish a secure channel with the healthcare center without using the long-term key of the original gateway.
引用
收藏
页码:220 / 224
页数:5
相关论文
共 50 条
  • [41] A new authentication and key exchange protocol in WLAN
    Zhuo, C
    Fan, H
    Liang, H
    [J]. ITCC 2005: International Conference on Information Technology: Coding and Computing, Vol 2, 2005, : 552 - 556
  • [42] Weaknesses in EHA authentication and key distribution protocol
    Stanek, M
    Olejár, D
    [J]. SECURE INFORMATION NETWORKS: COMMUNICATIONS AND MULTIMEDIA SECURITY, 1999, 23 : 87 - 95
  • [43] On the security of an enhanced authentication key exchange protocol
    Hwang, MS
    Chang, TY
    Lin, SC
    Tsai, CS
    [J]. 18TH INTERNATIONAL CONFERENCE ON ADVANCED INFORMATION NETWORKING AND APPLICATIONS, VOL 2 (REGULAR PAPERS), PROCEEDINGS, 2004, : 160 - 163
  • [44] A dynamic key authentication protocol for RFID system
    [J]. Mu, Haibing (hbmu@bjtu.edu.cn), 1600, Inderscience Publishers, 29, route de Pre-Bois, Case Postale 856, CH-1215 Geneva 15, CH-1215, Switzerland (07): : 3 - 4
  • [45] Key Management and Authentication Protocol for UAV Network
    Zhu, Hui
    Zhang, Yeping
    Yu, Pan
    Zhang, Zhiyi
    Wu, Heng
    Zhao, Haiqiang
    [J]. Gongcheng Kexue Yu Jishu/Advanced Engineering Sciences, 2019, 51 (03): : 158 - 166
  • [46] Efficient and secure three-party mutual authentication key agreement protocol for WSNs in IoT environments
    Chen, Chi-Tung
    Lee, Cheng-Chi
    Lin, Iuon-Chang
    [J]. PLOS ONE, 2020, 15 (04):
  • [47] A computationally efficient authentication and key agreement scheme for multi-server switching in WBAN
    Xu, Zisang
    Xu, Cheng
    Xu, Jianbo
    Meng, Xiangwei
    [J]. INTERNATIONAL JOURNAL OF SENSOR NETWORKS, 2021, 35 (03) : 143 - 160
  • [48] Authentication Key Exchange Protocol for IMS Network
    Bao, Hui
    Xu, Fangqin
    Huang, Xia
    [J]. 2010 ASIA-PACIFIC POWER AND ENERGY ENGINEERING CONFERENCE (APPEEC), 2010,
  • [49] Key generation schemes for channel authentication in quantum key distribution protocol
    Borodin, Mikhail
    Zhilyaev, Andrey
    Urivskiy, Alexey
    [J]. IET QUANTUM COMMUNICATION, 2021, 2 (03): : 90 - 97
  • [50] Authentication and key distribution methods in mobile computing environments
    Zhang, B
    Wu, JX
    [J]. 2003 INTERNATIONAL CONFERENCE ON COMPUTER NETWORKS AND MOBILE COMPUTING, PROCEEDINGS, 2003, : 353 - 356