Cost-Effective and Anonymous Access Control for Wireless Body Area Networks

Wireless body area networks (WBANs) are expected to play an important role in monitoring the health information and creating a smart, reliable, and ubiquitous healthcare system. Only authorized users can access the network since the collected data by the WBANs are used to diagnosed and treated. However, it is still a challenging task to design a cost-effective and secure access control scheme because of inherent characteristics of the WBANs, such as open medium channel, limited resources of sensor nodes, and the absence of fixed infrastructure. In this paper, we first propose a novel certificateless signcryption scheme, and then, design a cost-effective and anonymous access control scheme for the WBANs using the novel signcryption. The proposed access control scheme achieves anonymity, confidentiality, authentication, integrity, and nonrepudiation. Compared with existing three access control schemes for the WBANs, our proposed scheme has the least computational cost and total energy consumption for the controller.

[1]  Yuh-Min Tseng,et al.  Revocable Certificateless Public Key Encryption , 2015, IEEE Systems Journal.

[2]  Xavier Boyen,et al.  Multipurpose Identity-Based Signcryption (A Swiss Army Knife for Identity-Based Cryptography) , 2003, CRYPTO.

[3]  Ingrid Moerman,et al.  A survey on wireless body area networks , 2011, Wirel. Networks.

[4]  Dan Boneh,et al.  Short Signatures Without Random Oracles , 2004, EUROCRYPT.

[5]  Seoksoo Kim,et al.  Towards a secure patient information access control in ubiquitous healthcare systems using identity-based signcryption , 2011, 13th International Conference on Advanced Communication Technology (ICACT2011).

[6]  Jacques Stern,et al.  Security Arguments for Digital Signatures and Blind Signatures , 2015, Journal of Cryptology.

[7]  Daojing He,et al.  A Novel and Lightweight System to Secure Wireless Medical Sensor Networks , 2014, IEEE Journal of Biomedical and Health Informatics.

[8]  Hans Eberle,et al.  Comparing Elliptic Curve Cryptography and RSA on 8-bit CPUs , 2004, CHES.

[9]  Kyung-Ah Shim,et al.  S2DRP: Secure implementations of distributed reprogramming protocol for wireless sensor networks , 2014, Ad Hoc Networks.

[10]  Ming Li,et al.  Data security and privacy in wireless body area networks , 2010, IEEE Wireless Communications.

[11]  Kyung-Ah Shim,et al.  EIBAS: An efficient identity-based broadcast authentication scheme in wireless sensor networks , 2013, Ad Hoc Networks.

[12]  Naveen K. Chilamkurti,et al.  A secure temporal-credential-based mutual authentication and key agreement scheme with pseudo identity for wireless sensor networks , 2015, Inf. Sci..

[13]  Xiaofeng Liao,et al.  Body Area Network Security: A Fuzzy Attribute-Based Signcryption Scheme , 2013, IEEE Journal on Selected Areas in Communications.

[14]  Dong Hoon Lee,et al.  Efficient Certificateless Signature Schemes , 2007, ACNS.

[15]  Yuliang Zheng,et al.  Digital Signcryption or How to Achieve Cost(Signature & Encryption) << Cost(Signature) + Cost(Encryption) , 1997, CRYPTO.

[16]  Fan Zhang,et al.  Securing communications between external users and wireless body area networks , 2013, HotWiSec '13.

[17]  Kenneth G. Paterson,et al.  Certificateless Public Key Cryptography , 2003 .

[18]  Abbas Jamalipour,et al.  Wireless Body Area Networks: A Survey , 2014, IEEE Communications Surveys & Tutorials.

[19]  Muhammad Khurram Khan,et al.  An Improved and Secure Biometric Authentication Scheme for Telecare Medicine Information Systems Based on Elliptic Curve Cryptography , 2015, Journal of Medical Systems.

[20]  Muhammad Sher,et al.  Cryptanalysis and Improvement of an Improved Two Factor Authentication Protocol for Telecare Medical Information Systems , 2015, Journal of Medical Systems.

[21]  Sherali Zeadally,et al.  Authentication protocol for an ambient assisted living system , 2015, IEEE Communications Magazine.

[22]  Liqun Chen,et al.  Improved Identity-Based Signcryption , 2005, Public Key Cryptography.

[23]  Brent Waters,et al.  Ciphertext-Policy Attribute-Based Encryption , 2007, 2007 IEEE Symposium on Security and Privacy (SP '07).

[24]  Dong Hoon Lee,et al.  Key Establishment Scheme for Sensor Networks with Low Communication Cost , 2007, ATC.

[25]  Jung Hee Cheon,et al.  An Identity-Based Signature from Gap Diffie-Hellman Groups , 2003, Public Key Cryptography.

[26]  Kyung Sup Kwak,et al.  Certificateless Remote Anonymous Authentication Schemes for WirelessBody Area Networks , 2014, IEEE Transactions on Parallel and Distributed Systems.

[27]  Daojing He,et al.  Lightweight and Confidential Data Discovery and Dissemination for Wireless Body Area Networks , 2014, IEEE Journal of Biomedical and Health Informatics.

[28]  Jiankun Hu,et al.  An Energy Efficient Key Management Scheme for Body Sensor Networks , 2013, IEEE Transactions on Parallel and Distributed Systems.

[29]  Vincent Rijmen,et al.  The Design of Rijndael: AES - The Advanced Encryption Standard , 2002 .

[30]  Xiaodong Lin,et al.  SPOC: A Secure and Privacy-Preserving Opportunistic Computing Framework for Mobile-Healthcare Emergency , 2013, IEEE Transactions on Parallel and Distributed Systems.

[31]  Peilin Hong,et al.  Distributed access control with adaptive privacy preserving property for wireless sensor networks , 2014, Secur. Commun. Networks.

[32]  Cheng-Chi Lee,et al.  Robust anonymous authentication protocol for health-care applications using wireless medical sensor networks , 2013, Multimedia Systems.

[33]  Bin Zhao,et al.  IMBAS: Identity-based multi-user broadcast authentication in wireless sensor networks , 2008, Comput. Commun..

[34]  Paulo S. L. M. Barreto,et al.  Efficient and Provably-Secure Identity-Based Signatures and Signcryption from Bilinear Maps , 2005, ASIACRYPT.

[35]  Amir Herzberg,et al.  Access control meets public key infrastructure, or: assigning roles to strangers , 2000, Proceeding 2000 IEEE Symposium on Security and Privacy. S&P 2000.

[36]  Manuel Barbosa,et al.  Certificateless signcryption , 2008, ASIACCS '08.

[37]  Sheng Zhong,et al.  IBE-Lite: A Lightweight Identity-Based Cryptography for Body Sensor Networks , 2009, IEEE Transactions on Information Technology in Biomedicine.

[38]  Yaning Liu,et al.  Online Anomaly Detection in Wireless Body Area Networks for Reliable Healthcare Monitoring , 2014, IEEE Journal of Biomedical and Health Informatics.

[39]  Matthew K. Franklin,et al.  Identity-Based Encryption from the Weil Pairing , 2001, CRYPTO.