YPAP: The Yoking-Proofs Based Authentication Protocol for Wearable Devices in Wireless Communications

Along with the development of wireless communications, wearable devices are becoming popular for monitoring user data to provide intelligent service support. It makes that the wearable devices confront severe security issues compared with the traditional short-range communications. Due to limitations of computation capabilities and communication resources, it brings more challenges to design security schemes for the wearable devices. In this work, a yoking-proofs based authentication protocol (YPAP) is proposed for the wearable devices during secure wireless communications. In the YPAP, lightweight cryptographic operators are applied to realize authentication between a smart phone and two wearable devices, and yoking-proofs are established for the remote cloud server to perform simultaneous identification during a session. Meanwhile, Rubin logic based security formal analysis is performed to prove that the YPAP has theoretical design correctness. It indicates that the proposed protocol is flexible for ubiquitous wearable device applications.

[1]  Yi-Bing Lin,et al.  EasyConnect: A Management System for IoT Devices and Its Applications for Interactive Design and Art , 2015, IEEE Internet of Things Journal.

[2]  Ari Juels,et al.  "Yoking-proofs" for RFID tags , 2004, IEEE Annual Conference on Pervasive Computing and Communications Workshops, 2004. Proceedings of the Second.

[3]  Peter Honeyman,et al.  Nonmonotonic cryptographic protocols , 1994, Proceedings The Computer Security Foundations Workshop VII.

[4]  Mohsen Guizani,et al.  User privacy and data trustworthiness in mobile crowd sensing , 2015, IEEE Wireless Communications.

[5]  Sherali Zeadally,et al.  Toward self-authenticable wearable devices , 2015, IEEE Wireless Communications.

[6]  Laurence T. Yang,et al.  Grouping-Proofs-Based Authentication Protocol for Distributed RFID Systems , 2013, IEEE Transactions on Parallel and Distributed Systems.

[7]  Hung-Yu Chien,et al.  Tree-Based RFID Yoking Proof , 2009, 2009 International Conference on Networks Security, Wireless Communications and Trusted Computing.

[8]  Chris Greenhalgh,et al.  Social Access vs. Privacy in Wearable Computing: A Case Study of Autism , 2015, IEEE Pervasive Computing.

[9]  Sergey D. Andreev,et al.  Communication challenges in high-density deployments of wearable wireless devices , 2015, IEEE Wireless Communications.

[10]  Seung Eun Lee,et al.  Secure communication system for wearable devices wireless intra body communication , 2015, 2015 IEEE International Conference on Consumer Electronics (ICCE).