skip to main content
Primo Search
Search in: Busca Geral

Provable secure authentication key agreement for wireless body area networks

MA, Yuqian ; SHI, Wenbo ; LI, Xinghua ; CHENG, Qingfeng

Frontiers of Computer Science, 2024-10, Vol.18 (5), p.185811, Article 185811 [Periódico revisado por pares]

Beijing: Higher Education Press

Texto completo disponível

Citações Citado por
  • Título:
    Provable secure authentication key agreement for wireless body area networks
  • Autor: MA, Yuqian ; SHI, Wenbo ; LI, Xinghua ; CHENG, Qingfeng
  • Assuntos: Access control ; Agreements ; BAN logic ; Bans ; Body area networks ; certificateless cryptography ; Communication ; Computer Science ; Confidentiality ; Cryptography ; Data collection ; Data processing ; Design ; Lightweight ; Physiology ; Privacy ; Research Article ; Scyther ; Sensors ; wireless body area networks ; Wireless networks
  • É parte de: Frontiers of Computer Science, 2024-10, Vol.18 (5), p.185811, Article 185811
  • Notas: certificateless cryptography
    wireless body area networks
    BAN logic
    Document received on :2022-08-24
    Document accepted on :2023-06-01
    Scyther
  • Descrição: Wireless body area networks (WBANs) guarantee timely data processing and secure information preservation within the range of the wireless access network, which is in urgent need of a new type of security technology. However, with the speedy development of hardware, the existing security schemes can no longer meet the new requirements of anonymity and lightweight. New solutions that do not require complex calculations, such as certificateless cryptography, attract great attention from researchers. To resolve these difficulties, Wang et al. designed a new authentication architecture for the WBANs environment, which was claimed to be secure and efficient. However, in this paper, we will show that this scheme is prone to ephemeral key leakage attacks. Further, based on this authentication scheme, an anonymous certificateless scheme is proposed for lightweight devices. Meanwhile, user anonymity is fully protected. The proposed scheme is proved to be secure under a specific security model. In addition, we assess the security attributes our scheme meets through BAN logic and Scyther tool. The comparisons of time consumption and communication cost are given at the end of the paper, to demonstrate that our scheme performs prior to several previous schemes.
  • Editor: Beijing: Higher Education Press
  • Idioma: Inglês

Buscando em bases de dados remotas. Favor aguardar.