Cloud-aided lightweight certificateless authentication protocol with anonymity for wireless body area networks

Abstract With the development of cloud computing and wireless body area networks (WBANs), wearable equipments are able to become new intelligent terminals to provide services for users, which plays an important role to improve the human health-care service. However, The traditional WBANs devices have limited computing and storage capabilities. These restrictions limit the services that WBANs can provide to users. Thus the concept of Cloud-aided WBANs has been proposed to enhance the capabilities of WBANs. In addition, due to the openness of the cloud computing environment, the protection of the user's physiological information and privacy remains a major concern. In previous authentication protocols, few of them can protect the user's private information in insecure channel. In this paper, we propose a cloud-aided lightweight certificateless authentication protocol with anonymity for wireless body area networks. Our protocol ensures that no one can obtain user's real identity except for the network manager in the registration phase. Moreover, in the authentication phase, the network manager cannot know the user's real identity. Note that, through the security analysis, we can conclude that our protocol can provide stronger security protection of private information than most of existing schemes in insecure channel.

[1]  Abbas Jamalipour,et al.  Wireless Body Area Networks: A Survey , 2014, IEEE Communications Surveys & Tutorials.

[2]  Sakshi Kaushal,et al.  Cloud Computing Security Issues and Challenges: A Survey , 2011, ACC.

[3]  Ashutosh Saxena,et al.  A dynamic ID-based remote user authentication scheme , 2004, IEEE Transactions on Consumer Electronics.

[4]  Alfred Menezes,et al.  The State of Elliptic Curve Cryptography , 2000, Des. Codes Cryptogr..

[5]  Ricardo Dahab,et al.  Two Notes on the Security of Certificateless Signatures , 2007, ProvSec.

[6]  Yong Yu,et al.  Cloud computing security and privacy: Standards and regulations , 2017, Comput. Stand. Interfaces.

[7]  Sherali Zeadally,et al.  Certificateless Public Auditing Scheme for Cloud-Assisted Wireless Body Area Networks , 2018, IEEE Systems Journal.

[8]  Jian Shen,et al.  An Efficient RFID Authentication Protocol Providing Strong Privacy and Security , 2016 .

[9]  Jian Shen,et al.  Block Design-Based Key Agreement for Group Data Sharing in Cloud Computing , 2019, IEEE Transactions on Dependable and Secure Computing.

[10]  Emil C. Lupu,et al.  Securing body sensor networks: Sensor association and key management , 2009, 2009 IEEE International Conference on Pervasive Computing and Communications.

[11]  Kyung Sup Kwak,et al.  Hybrid security mechanisms for wireless body area networks , 2010, 2010 Second International Conference on Ubiquitous and Future Networks (ICUFN).

[12]  Min-Shiang Hwang,et al.  A new remote user authentication scheme using smart cards , 2000, IEEE Trans. Consumer Electron..

[13]  Jin Li,et al.  Insight of the protection for data security under selective opening attacks , 2017, Inf. Sci..

[14]  Wang Yu-min Certificateless Authentication Protocol Without Pairing , 2010 .

[15]  Fatos Xhafa,et al.  Secure deduplication storage systems supporting keyword search , 2015, J. Comput. Syst. Sci..

[16]  Randy H. Katz,et al.  A view of cloud computing , 2010, CACM.

[17]  Sherali Zeadally,et al.  Anonymous Authentication for Wireless Body Area Networks With Provable Security , 2017, IEEE Systems Journal.

[18]  Zhiguang Qin,et al.  Revocable and Scalable Certificateless Remote Authentication Protocol With Anonymity for Wireless Body Area Networks , 2015, IEEE Transactions on Information Forensics and Security.

[19]  Xiaofei Wang,et al.  Cloud-enabled wireless body area networks for pervasive healthcare , 2013, IEEE Network.

[20]  Lu Zhang,et al.  An Efficient and Lightweight Certificateless Authentication Protocol for Wireless Body Area Networks , 2013, 2013 5th International Conference on Intelligent Networking and Collaborative Systems.

[21]  Adi Shamir,et al.  Identity-Based Cryptosystems and Signature Schemes , 1984, CRYPTO.

[22]  Raouf Boutaba,et al.  Cloud computing: state-of-the-art and research challenges , 2010, Journal of Internet Services and Applications.

[23]  D. Boneh,et al.  Short Signatures from the Weil Pairing , 2001, Journal of Cryptology.

[24]  Hu Xiong,et al.  Cost-Effective Scalable and Anonymous Certificateless Remote Authentication Protocol , 2014, IEEE Transactions on Information Forensics and Security.

[25]  Jianhong Zhang,et al.  An efficient RSA-based certificateless signature scheme , 2012, J. Syst. Softw..

[26]  Jin Li,et al.  Ensuring attribute privacy protection and fast decryption for outsourced data security in mobile cloud computing , 2017, Inf. Sci..

[27]  Qiaoyan Wen,et al.  Efficient and provably-secure certificateless short signature scheme from bilinear pairings , 2009, Comput. Stand. Interfaces.

[28]  Kenneth G. Paterson,et al.  Certificateless Public Key Cryptography , 2003 .

[29]  Mansi Gupta,et al.  A survey on wireless body area network: Security technology and its design methodology issue , 2015, 2015 International Conference on Innovations in Information, Embedded and Communication Systems (ICIIECS).

[30]  Jian Shen,et al.  A secure cloud-assisted urban data sharing framework for ubiquitous-cities , 2017, Pervasive Mob. Comput..

[31]  Antonio Pescapè,et al.  Integration of Cloud computing and Internet of Things: A survey , 2016, Future Gener. Comput. Syst..

[32]  Jian Shen,et al.  An Efficient Public Auditing Protocol With Novel Dynamic Structure for Cloud Data , 2017, IEEE Transactions on Information Forensics and Security.

[33]  Jin Li,et al.  New Algorithms for Secure Outsourcing of Large-Scale Systems of Linear Equations , 2015, IEEE Transactions on Information Forensics and Security.

[34]  Jian Shen,et al.  A lightweight multi-layer authentication protocol for wireless body area networks , 2018, Future Gener. Comput. Syst..