A PUF-based and cloud-assisted lightweight authentication for multi-hop body area network

Wireless sensor technology plays an important role in the military, medical, and commercial fields nowadays. Wireless Body Area Network (WBAN) is a special application of the wireless sensor network in human health monitoring, through which patients can know their physical condition in real time and respond to emergencies on time. Data reliability, guaranteed by the trust of nodes in WBAN, is a prerequisite for the effective treatment of patients. Therefore, authenticating the sensor nodes and the sink nodes in WBAN is necessary. This paper proposes a lightweight Physical Unclonable Function (PUF)-based and cloud-assisted authentication mechanism for multi-hop body area networks, which compared with the star single-hop network, can enhance the adaptability to human motion and the integrity of data transmission. Such authentication mechanism can significantly reduce the storage overhead and resource loss in the data transmission process.

[1]  David A. Wagner,et al.  TinySec: a link layer security architecture for wireless sensor networks , 2004, SenSys '04.

[2]  Benedikt Heinz,et al.  Localized electromagnetic analysis of RO PUFs , 2013, 2013 IEEE International Symposium on Hardware-Oriented Security and Trust (HOST).

[3]  Yintang Yang,et al.  Secure Authentication Protocol for Mobile Payment , 2018, Tsinghua Science and Technology.

[4]  Yipeng Ding,et al.  A Multi-Target Detection Algorithm Using High-Order Differential Equation , 2019, IEEE Sensors Journal.

[5]  Zheng Qin,et al.  Frequency Offset-Based Ring Oscillator Physical Unclonable Function , 2018, IEEE Transactions on Multi-Scale Computing Systems.

[6]  Gang Qu,et al.  Reconfigurable Binding against FPGA Replay Attacks , 2015, TODE.

[7]  Ming Li,et al.  Authenticated secret key extraction using channel characteristics for body area networks , 2012, CCS '12.

[8]  P. Samundiswary,et al.  Wireless body area network security issues — Survey , 2016, 2016 International Conference on Control, Instrumentation, Communication and Computational Technologies (ICCICCT).

[9]  Yongqiang Lyu,et al.  A PUF-FSM Binding Scheme for FPGA IP Protection and Pay-Per-Device Licensing , 2015, IEEE Transactions on Information Forensics and Security.

[10]  Peiru Fan,et al.  Lattice-based double-authentication-preventing ring signature for security and privacy in vehicular Ad-Hoc networks , 2019, Tsinghua Science and Technology.

[11]  Dawn Song,et al.  The TESLA Broadcast Authentication Protocol , 2002 .

[12]  Yuesheng Zhu,et al.  TinyZKP: A Lightweight Authentication Scheme Based on Zero-Knowledge Proof for Wireless Body Area Networks , 2014, Wirel. Pers. Commun..

[13]  Saleha Mubarak AlMheiri,et al.  Data link layer security protocols in Wireless Sensor Networks: A survey , 2013, 2013 10th IEEE INTERNATIONAL CONFERENCE ON NETWORKING, SENSING AND CONTROL (ICNSC).

[14]  Manoj Kumar Security Issues and Privacy Concerns in the Implementation of Wireless Body Area Network , 2014, 2014 International Conference on Information Technology.

[15]  Akram Alomainy,et al.  Double Threshold Authentication Using Body Area Radio Channel Characteristics , 2016, IEEE Communications Letters.

[16]  Qiang Zhou,et al.  Crossover Ring Oscillator PUF , 2017, 2017 18th International Symposium on Quality Electronic Design (ISQED).

[17]  Qiang Zhou,et al.  A Survey on Silicon PUFs and Recent Advances in Ring Oscillator PUFs , 2014, Journal of Computer Science and Technology.

[18]  Hesham N. Elmahdy,et al.  PMAS: A proposed mutual authentication scheme for wireless body area networks , 2015, 2015 International Conference on Information and Communication Technology Convergence (ICTC).

[19]  G. Edward Suh,et al.  Physical Unclonable Functions for Device Authentication and Secret Key Generation , 2007, 2007 44th ACM/IEEE Design Automation Conference.

[20]  Gang Qu,et al.  HCIC: Hardware-Assisted Control-Flow Integrity Checking , 2018, IEEE Internet of Things Journal.

[21]  Arun Kumar Sangaiah,et al.  A privacy-preserving friend recommendation scheme in online social networks , 2018 .

[22]  Richard E. Newman,et al.  Fast Response PKC-Based Broadcast Authentication in Wireless Sensor Networks , 2010, 6th International Conference on Collaborative Computing: Networking, Applications and Worksharing (CollaborateCom 2010).

[23]  Juan Zhang,et al.  Application of Linear Predictive Coding and Data Fusion Process for Target Tracking by Doppler Through-Wall Radar , 2019, IEEE Transactions on Microwave Theory and Techniques.

[24]  Kim-Kwang Raymond Choo,et al.  Secure hitch in location based social networks , 2017, Comput. Commun..

[25]  M. Luk,et al.  MiniSec: A Secure Sensor Network Communication Architecture , 2007, 2007 6th International Symposium on Information Processing in Sensor Networks.

[26]  Pardeep Kumar,et al.  Security Issues in Healthcare Applications Using Wireless Medical Sensor Networks: A Survey , 2011, Sensors.

[27]  Jiliang Zhang,et al.  A Practical Logic Obfuscation Technique for Hardware Security , 2016, IEEE Transactions on Very Large Scale Integration (VLSI) Systems.