Computation-transferable authenticated key agreement protocol for smart healthcare

被引:16
|
作者
Wang, Wenming [1 ,2 ]
Huang, Haiping [1 ,3 ]
Xiao, Fu [1 ,3 ]
Li, Qi [1 ,3 ]
Xue, Lingyan [1 ,3 ]
Jiang, Jiansheng [2 ]
机构
[1] Nanjing Univ Posts & Telecommun, Sch Comp Sci, Nanjing 210003, Jiangsu, Peoples R China
[2] Anqing Normal Univ, Univ Key Lab Intelligent Percept & Comp Anhui Pro, Anqing 246011, Anhui, Peoples R China
[3] Jiangsu High Technol Res Key Lab Wireless Sensor, Nanjing 210003, Jiangsu, Peoples R China
基金
中国国家自然科学基金;
关键词
Smart healthcare; Authenticated key agreement (AKA); Security; Privacy; MUTUAL AUTHENTICATION; USER AUTHENTICATION; SCHEME; CRYPTOGRAPHY; INTERNET; THINGS;
D O I
10.1016/j.sysarc.2021.102215
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Smart healthcare plays an important role in contemporary society while its security and privacy issues remain inevitable challenges. Authenticated key agreement (AKA) mechanism, as the foundation of secure communication, has been recognized as an important measure for solving this problem. Most existing AKA protocols utilize cloud-based centralized architecture, data privacy and security can be exposed easily once the centralized authority is attacked. In addition, most past solutions require the online registration center to assist mutual authentication and consume considerable amounts of resources. To address these drawbacks, a computationtransferable authenticated key agreement protocol without an online registration center for smart healthcare is designed. Specifically, the proposed protocol can realize mutual authentication and key agreement without the need for an online registration center, as well as being able to satisfy security and privacy protection requirements. By transferring partial computation tasks to the server, the proposed scheme incurs lower computation and communication overhead on the user side. Moreover, the proposed scheme adopts certificateless public key cryptography, which can solve the problems of certificate management and key escrow. Performance analysis indicates that the proposal reduces 9.9% of the computation overhead on the resource-limited terminal, which is suitable for low-power IoT applications, including smart healthcare.
引用
收藏
页数:10
相关论文
共 50 条
  • [41] Identity based authenticated group key agreement protocol
    Reddy, KC
    Nalla, D
    [J]. PROGRESS IN CRYPTOLOGY - INDOCRYPT 2002, PROCEEDINGS, 2002, 2551 : 215 - 233
  • [42] Improved authenticated multiple-key agreement protocol
    Yen, SM
    Joye, M
    [J]. ELECTRONICS LETTERS, 1998, 34 (18) : 1738 - 1739
  • [43] A Dynamic Scheme For Authenticated Group Key Agreement Protocol
    Yu, Yang
    Zhang, Aixin
    Tang, Junhua
    Chen, Haopeng
    [J]. NOVEL ALGORITHMS AND TECHNIQUES IN TELECOMMUNICATIONS AND NETWORKING, 2010, : 245 - 250
  • [44] An authenticated key agreement protocol resistant to a dictionary attack
    Ryu, EK
    Kim, KW
    Yoo, KY
    [J]. COMPUTATIONAL SCIENCE AND ITS APPLICATIONS - ICCSA 2004, PT 4, 2004, 3046 : 603 - 610
  • [45] Improved Authenticated Multi-Key Agreement Protocol
    ZHANG Hua
    [J]. Wuhan University Journal of Natural Sciences, 2006, (06) : 1915 - 1918
  • [46] A new authenticated key agreement for session initiation protocol
    Xie, Qi
    [J]. INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2012, 25 (01) : 47 - 54
  • [47] Authenticated Group Key Agreement Protocol Without Pairing
    Sharma, Gaurav
    Sahu, Rajeev Anand
    Kuchta, Veronika
    Markowitch, Olivier
    Bala, Suman
    [J]. INFORMATION AND COMMUNICATIONS SECURITY, ICICS 2017, 2018, 10631 : 606 - 618
  • [48] Improvement of HWWM-authenticated key agreement protocol
    Lee, SW
    Kim, HS
    Yoo, KY
    [J]. APPLIED MATHEMATICS AND COMPUTATION, 2005, 162 (03) : 1315 - 1320
  • [49] A Secure Certificateless Authenticated Group Key Agreement Protocol
    Geng, Manman
    Zhang, Futai
    Gao, Meng
    [J]. MINES 2009: FIRST INTERNATIONAL CONFERENCE ON MULTIMEDIA INFORMATION NETWORKING AND SECURITY, VOL 1, PROCEEDINGS, 2009, : 342 - 346
  • [50] Authenticated key agreement protocol for wireless sensor networks
    Li, Zhang
    Bin, Xie
    Qiang, He Z.
    Quan, Jin Y.
    [J]. Open Cybernetics and Systemics Journal, 2014, 8 (01): : 98 - 103