A Secure and Efficient Group Key Management Protocol with Cooperative Sensor Association in WBANs

The wireless body area network (WBAN) is considered as one of the emerging wireless techniques in the healthcare system. Typical WBAN sensors, especially implantable sensors, have limited power capability, which restricts their wide applications in the medical environment. In addition, it is necessary for the healthcare center (HC) to broadcast significant notifications to different patient groups. Considering the above issues, in this paper, the novel practical WBAN system model with group message broadcasting is built. Subsequently, a secure and efficient group key management protocol with cooperative sensor association is proposed. In the proposed protocol, the Chinese remainder theorem (CRT) is employed for group key management between HC and the personal controller (PC), which also supports batch key updating. The proposed sensor association scheme is motivated by coded cooperative data exchange (CCDE). The formal security proofs are presented, indicating that the proposed protocol can achieve the desired security properties. Moreover, performance analysis demonstrates that the proposed protocol is efficient compared with state-of-the-art group key management protocols.

[1]  Arputharaj Kannan,et al.  Dual Authentication and Key Management Techniques for Secure Data Transmission in Vehicular Ad Hoc Networks , 2016, IEEE Transactions on Intelligent Transportation Systems.

[2]  Chin-Chen Chang,et al.  An authenticated group key distribution protocol based on the generalized Chinese remainder theorem , 2014, Int. J. Commun. Syst..

[3]  Chao Yang,et al.  Efficient end-to-end authentication protocol for wearable health monitoring systems , 2017, Comput. Electr. Eng..

[4]  Alexander Sprintson,et al.  A randomized algorithm and performance bounds for coded cooperative data exchange , 2010, 2010 IEEE International Symposium on Information Theory.

[5]  Cem Ersoy,et al.  Wireless sensor networks for healthcare: A survey , 2010, Comput. Networks.

[6]  Alexander Sprintson,et al.  On coding for cooperative data exchange , 2010, 2010 IEEE Information Theory Workshop on Information Theory (ITW 2010, Cairo).

[7]  Jiankun Hu,et al.  Identity-Based Data Outsourcing With Comprehensive Auditing in Clouds , 2017, IEEE Transactions on Information Forensics and Security.

[8]  Kyung Sup Kwak,et al.  Certificateless Remote Anonymous Authentication Schemes for WirelessBody Area Networks , 2014, IEEE Transactions on Parallel and Distributed Systems.

[9]  Yuan-Ting Zhang,et al.  Heartbeats Based Biometric Random Binary Sequences Generation to Secure Wireless Body Sensor Networks , 2018, IEEE Transactions on Biomedical Engineering.

[10]  Kenneth G. Paterson,et al.  Certificateless Public Key Cryptography , 2003 .

[11]  Jianfeng Ma,et al.  A new authentication scheme with anonymity for wireless environments , 2004, IEEE Trans. Consumer Electron..

[12]  Sung Bum Pan,et al.  Secure Certificateless Authentication and Road Message Dissemination Protocol in VANETs , 2018, Wirel. Commun. Mob. Comput..

[13]  Kazue Sako,et al.  k-Times Anonymous Authentication , 2009, IEICE Trans. Fundam. Electron. Commun. Comput. Sci..

[14]  Arputharaj Kannan,et al.  Chinese remainder theorem based centralised group key management for secure multicast communication , 2014, IET Inf. Secur..

[15]  Baocang Wang,et al.  Group key agreement for secure group communication in dynamic peer systems , 2012, J. Parallel Distributed Comput..

[16]  Sherali Zeadally,et al.  Certificateless Public Auditing Scheme for Cloud-Assisted Wireless Body Area Networks , 2018, IEEE Systems Journal.

[17]  Jian Shen,et al.  An untraceable temporal-credential-based two-factor authentication scheme using ECC for wireless sensor networks , 2016, J. Netw. Comput. Appl..

[18]  Jian Shen,et al.  Enhanced secure sensor association and key management in wireless body area networks , 2015, Journal of Communications and Networks.

[19]  Giancarlo Fortino,et al.  Collaborative Body Sensor Networks , 2011, 2011 IEEE International Conference on Systems, Man, and Cybernetics.

[20]  Thomas A. Courtade,et al.  Coded Cooperative Data Exchange for a Secret Key , 2014, IEEE Transactions on Information Theory.

[21]  Sajal K. Das,et al.  ZoneTrust: Fast Zone-Based Node Compromise Detection and Revocation in Wireless Sensor Networks Using Sequential Hypothesis Testing , 2012, IEEE Transactions on Dependable and Secure Computing.

[22]  Yuan-Ting Zhang,et al.  An Efficient Biometric-Based Algorithm Using Heart Rate Variability for Securing Body Sensor Networks , 2015, Sensors.

[23]  Eun-Jun Yoon,et al.  Robust ID-Based Remote Mutual Authentication with Key Agreement Scheme for Mobile Devices on ECC , 2009, 2009 International Conference on Computational Science and Engineering.

[24]  Adi Shamir,et al.  Identity-Based Cryptosystems and Signature Schemes , 1984, CRYPTO.

[25]  Im-Yeong Lee,et al.  Dynamic Group Authentication and Key Exchange Scheme Based on Threshold Secret Sharing for IoT Smart Metering Environments , 2018, Sensors.

[26]  Yang Xiang,et al.  A new lightweight RFID grouping authentication protocol for multiple tags in mobile environment , 2017, Multimedia Tools and Applications.

[27]  Michael Langberg,et al.  Coded Cooperative Data Exchange Problem for General Topologies , 2012, IEEE Transactions on Information Theory.

[28]  Jie Zhou,et al.  Key Tree and Chinese Remainder Theorem Based Group Key Distribution Scheme , 2009, ICA3PP.

[29]  Jian Liu,et al.  against frame and collude attacks of third party auditor , 2014 .

[30]  Günther Horn,et al.  Authentication and Payment in Future Mobile Systems , 1998, J. Comput. Secur..

[31]  Xiaochen Li,et al.  Energy-Efficient Group Key Agreement for Wireless Networks , 2015, IEEE Transactions on Wireless Communications.

[32]  Richard D. Wesel,et al.  Weighted universal recovery, practical secrecy, and an efficient algorithm for solving both , 2011, 2011 49th Annual Allerton Conference on Communication, Control, and Computing (Allerton).

[33]  Pin-Han Ho,et al.  A Novel Anonymous Mutual Authentication Protocol With Provable Link-Layer Location Privacy , 2009, IEEE Transactions on Vehicular Technology.

[34]  Chin-Chen Chang,et al.  An ID-based remote mutual authentication with key agreement scheme for mobile devices on elliptic curve cryptosystem , 2009, Comput. Secur..

[35]  Jie Zhou,et al.  Key tree and Chinese remainder theorem based group key distrubution scheme , 2009 .

[36]  Jie Ma,et al.  Channel Characteristic Aware Privacy Protection Mechanism in WBAN , 2018, Sensors.

[37]  Sung Bum Pan,et al.  An Efficient Hash-based RFID Grouping Authentication Protocol Providing Missing Tags Detection , 2018 .

[38]  Hu Xiong,et al.  Cost-Effective Scalable and Anonymous Certificateless Remote Authentication Protocol , 2014, IEEE Transactions on Information Forensics and Security.

[39]  Manyam Thaile,et al.  Node Compromise Detection based on NodeTrust in Wireless Sensor Networks , 2016, 2016 International Conference on Computer Communication and Informatics (ICCCI).

[40]  Zhiguang Qin,et al.  Revocable and Scalable Certificateless Remote Authentication Protocol With Anonymity for Wireless Body Area Networks , 2015, IEEE Transactions on Information Forensics and Security.

[41]  Nenghai Yu,et al.  A Privacy-Preserving Remote Data Integrity Checking Protocol with Data Dynamics and Public Verifiability , 2011, IEEE Transactions on Knowledge and Data Engineering.

[42]  Jianhua Chen,et al.  An ID-based client authentication with key agreement protocol for mobile client-server environment on ECC with provable security , 2012, Inf. Fusion.

[43]  Haowen Tan,et al.  Comments on “Dual Authentication and Key Management Techniques for Secure Data Transmission in Vehicular Ad Hoc Networks” , 2018, IEEE Transactions on Intelligent Transportation Systems.

[44]  Cong Wang,et al.  Toward Secure and Dependable Storage Services in Cloud Computing , 2012, IEEE Transactions on Services Computing.

[45]  Chin-Tser Huang,et al.  Chinese remainder theorem based group key management , 2007, ACM-SE 45.

[46]  Weidong Kou,et al.  Identity-Based Anonymous Remote Authentication for Value-Added Services in Mobile Networks , 2009, IEEE Transactions on Vehicular Technology.

[47]  Richard D. Wesel,et al.  Coded Cooperative Data Exchange in Multihop Networks , 2012, IEEE Transactions on Information Theory.

[48]  Alexander Sprintson,et al.  Cooperative data exchange with priority classes , 2016, 2016 IEEE International Symposium on Information Theory (ISIT).

[49]  Huaqun Wang,et al.  Identity-Based Distributed Provable Data Possession in Multicloud Storage , 2015, IEEE Transactions on Services Computing.

[50]  Kannan Ramchandran,et al.  Deterministic algorithm for the cooperative data exchange problem , 2011, 2011 IEEE International Symposium on Information Theory Proceedings.

[51]  Hu Jin,et al.  An ID-based client authentication with key agreement protocol for mobile client-server environment on ECC with provable security , 2012 .

[52]  Hovav Shacham,et al.  Compact Proofs of Retrievability , 2008, Journal of Cryptology.