期刊文献+

Bilinear pair based authentication protocol for wireless medical sensor network

Bilinear pair based authentication protocol for wireless medical sensor network
原文传递
导出
摘要 With the development of wirdess network and electronic technologies, the wireless sensor network (WSN) has been widely used in many applications. One of the most important applications is wireless medical sensor network (WMSN) , which makes modern heahh-care more popular. However, most of the sensor data transmitted in the WMSN is patient-related information. The sensor data are important and should be confidential. In addition, the attackers may also maliciously modify these sensor data. Therefore, both security and privacy are two very important issues in WMSN. A user authentication protocol and data security transmission mechanism based on bilinear pairing is proposed to protect data security and privacy. The proposed protocol enables the medical staff to monitor the health status of health care workers and provide timely and comprehensive health care information to the patient. Finally, through security and performance analysis, it can be found that the proposed authentication and key agreement protocol can resist common attacks such as impersonation attack, replay attack, online or offline password guessing attack, and stolen verifier attack. At the same time, this agreement is also in line with the performance of WMSN application environment. With the development of wirdess network and electronic technologies, the wireless sensor network (WSN) has been widely used in many applications. One of the most important applications is wireless medical sensor network (WMSN) , which makes modern heahh-care more popular. However, most of the sensor data transmitted in the WMSN is patient-related information. The sensor data are important and should be confidential. In addition, the attackers may also maliciously modify these sensor data. Therefore, both security and privacy are two very important issues in WMSN. A user authentication protocol and data security transmission mechanism based on bilinear pairing is proposed to protect data security and privacy. The proposed protocol enables the medical staff to monitor the health status of health care workers and provide timely and comprehensive health care information to the patient. Finally, through security and performance analysis, it can be found that the proposed authentication and key agreement protocol can resist common attacks such as impersonation attack, replay attack, online or offline password guessing attack, and stolen verifier attack. At the same time, this agreement is also in line with the performance of WMSN application environment.
出处 《The Journal of China Universities of Posts and Telecommunications》 EI CSCD 2018年第2期28-38,共11页 中国邮电高校学报(英文版)
基金 supported by the National Natural Science Foundation of China(61772477) Henan Scientific and Technological Research Projects(162102210217) Key Scientific Research Projects of Colleges and Universities in Henan Province(16A520075)
关键词 WSN medical system authentication protocol privacy preservation WSN medical system authentication protocol privacy preservation
  • 相关文献

参考文献1

二级参考文献30

  • 1Gnawali O, Jang K Y, Paek J, et al. The tenet architecture for tiered sensor networks [C] //Proc of the 4th Int Conf on Embedded Networked Sensor Systems. New York: ACM, 2006: 153-166.
  • 2Diao Y, Ganesan D, Mathur G, et al. Rethinking data management for storage-centric sensor networks [C] //Proc of the 3rd Biennial Conf on Innovative Data Systems Research. New York ACM, 2007: 22-32.
  • 3Sheng B, Li Q. Verifiable privacy-preserving range query in two-tiered sensor networks [C] /Proc of the 27th IEEE Int Conf on Computer Communications. Piscataway, NJ.- IEEE, 2008:46-50.
  • 4Shi J, Zhang R, Zhang Y. Secure range queries in tiered sensor networks [C] //Proc of the 28th IEEE Int Conf on Computer Communications. Piscataway, NJ: IEEE, 2009:945-953.
  • 5Shi J, Zhang R, Zhang Y. A spatiotemporal approach for secure range queries in tiered sensor networks [J]. IEEE Trans on Wireless Communications, 2011, 10(1): 264-273.
  • 6Sheng B, Li Q. Verifiable privacy preserving sensor network storage for range query [J]. IEEE Trans on Mobile Computing, 2011, 10(9) : 1312-1326.
  • 7Chen F, Liu A X. SafeQ: Secure and efficient query processing in sensor networks [C] //Proc of the 29th IEEE Int Conf on Computer Communications. Piseataway, NJ: IEEE, 2010: 2642-2650.
  • 8Chen F, Liu A X. Privacy and integrity-preserving range queries in sensor networks [J]. IEEE/ACM Trans on Networks, 2012, 20(6): 1774-1787.
  • 9Lin H, Tzeng W. An efficient solution to the millionaires' problem based on homomorphic encryption [C] //Proc of the 3rd Int Conf on Applied Cryptography and Network Security. Berlin: Springer, 2005:456-466.
  • 10Krawczyk H, Canetti R, Bellare M. HMAC: Keyed-hashing for message authentication, RFC 2104 [R]. Fremont, CA.- IETF Community, 1997.

共引文献8

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部