WBAN CLIENT VERIFICATION USING REMOTE ANONYMOUS AUTHENTICATION SCHEMES WITHOUT CERTIFICATES

In this paper, communication between Client and Application provider should be authentic; so two protocols are used for authentication which is trivial and coherent performed through Network manager (NM). The authentication success between WBAN client and Application provider (AP) is used to activate users of WBAN in distant to access services such as healthcare, medical applications, military application etc, unknowingly. To design this authentication protocols a novel certificate less scheme with signature (CLS) is developed. Its computed, coherent, verified and secured. Service providers or Application providers do not have any advantage to reveal the private information of users. Private Key generator (PKG) served by Network manager cannot imitate legal users. Theoretic analysis, experimental simulations and comparative studies are conducted and evaluated. Computation cost, implementation & security gives better tradeoffs between two authenticated protocols. Comparison of running time gives better performance and results.

[1]  Fushan Wei,et al.  Improved Anonymous Authentication Scheme with Enhanced Security for Wireless Communications , 2012 .

[2]  Jan Camenisch,et al.  Anonymous credentials on a standard java card , 2009, CCS.

[3]  Adi Shamir,et al.  Identity-Based Cryptosystems and Signature Schemes , 1984, CRYPTO.

[4]  Michael Faulkner,et al.  A Survey on Intrabody Communications for Body Area Network Applications , 2013, IEEE Transactions on Biomedical Engineering.

[5]  Yong Tang,et al.  An Efficient Certificateless Signature from Pairings , 2007, The First International Symposium on Data, Privacy, and E-Commerce (ISDPE 2007).

[6]  P.E. Abi-Char,et al.  A Fast and Secure Elliptic Curve Based Authenticated Key Agreement Protocol For Low Power Mobile Communications , 2007, The 2007 International Conference on Next Generation Mobile Applications, Services and Technologies (NGMAST 2007).

[7]  Duncan S. Wong,et al.  Certificateless Public-Key Signature: Security Model and Efficient Construction , 2006, ACNS.

[8]  Ari Juels,et al.  RFID security and privacy: a research survey , 2006, IEEE Journal on Selected Areas in Communications.

[9]  Ashutosh Saxena,et al.  A novel remote user authentication scheme using bilinear pairings , 2006, Comput. Secur..

[10]  Frederik Armknecht,et al.  Anonymous Authentication for RFID Systems , 2010, RFIDSec.

[11]  Lein Harn,et al.  An Efficient Threshold Anonymous Authentication Scheme for Privacy-Preserving Communications , 2013, IEEE Transactions on Wireless Communications.