Skip to main content
Top
Published in: Journal of Medical Systems 2/2014

01-02-2014 | Research Article

An Efficient Anonymous Authentication Scheme for Wireless Body Area Networks Using Elliptic Curve Cryptosystem

Author: Zhenguo Zhao

Published in: Journal of Medical Systems | Issue 2/2014

Login to get access

Abstract

With the development of wireless networks and medical sensors, wireless body area networks are playing more and more important role in the field of healthcare service. The data transmitted in WBANs is very sensitive since it will be used in clinical diagnoses or measurements. Therefore, security and privacy of communication in WBANs derive increasing attentions from the academia and industry. In this paper, we propose an identity (ID)-based efficient anonymous authentication scheme for WBANs using elliptic curve cryptosystem (ECC). Due to the ID-based concept, there is no certificate is needed in the proposed scheme. Moreover, the proposed scheme not only provides mutual authentication between the client and the application provider but also provides client anonymity. Performance analysis shows that improvements of 50.58 % and 3.87 % in the client side and the application provider side separately. Then the proposed scheme is more suitable for WBANs.
Literature
1.
go back to reference Zimmerman, T. G., Personal area networks: near-field intrabody communication. IBM Syst. J. 35(3/4):609–617, 1996.CrossRef Zimmerman, T. G., Personal area networks: near-field intrabody communication. IBM Syst. J. 35(3/4):609–617, 1996.CrossRef
2.
go back to reference Kwak, K. S., Sana, U., and Niamat, U., An overview of IEEE 802.15.6 standard. In: Proc. ISABEL 2010, pp. 1–6, 2010. Kwak, K. S., Sana, U., and Niamat, U., An overview of IEEE 802.15.6 standard. In: Proc. ISABEL 2010, pp. 1–6, 2010.
3.
go back to reference The Institute of Electrical and Electronics Engineers, 802.15.6–2012 - IEEE standard for local and metropolitan area networks - Part 15.6: Wireless body area networks, 2012. The Institute of Electrical and Electronics Engineers, 802.15.6–2012 - IEEE standard for local and metropolitan area networks - Part 15.6: Wireless body area networks, 2012.
4.
go back to reference Rivest, R. L., Shamir, A., and Adleman, L., A method for obtaining digital signatures and public key cryptosystems. Commun. ACM 21(2):120–126, 1978.CrossRefMATHMathSciNet Rivest, R. L., Shamir, A., and Adleman, L., A method for obtaining digital signatures and public key cryptosystems. Commun. ACM 21(2):120–126, 1978.CrossRefMATHMathSciNet
5.
go back to reference ElGamal, T., A public key cryptosystem and a signature scheme based on discrete logarithms. IEEE Trans. Inf. IT-31:469–472, 1985.CrossRefMathSciNet ElGamal, T., A public key cryptosystem and a signature scheme based on discrete logarithms. IEEE Trans. Inf. IT-31:469–472, 1985.CrossRefMathSciNet
6.
go back to reference Tian, X., Wong, D., and Zhu, R., Analysis and improvement of authenticated key exchange protocol for sensor networks. IEEE Commun. Lett. 9(11):970–972, 2005.CrossRef Tian, X., Wong, D., and Zhu, R., Analysis and improvement of authenticated key exchange protocol for sensor networks. IEEE Commun. Lett. 9(11):970–972, 2005.CrossRef
7.
go back to reference Jia, Z., Zhang, Y., Shao, H., Lin, Y., and Wang, J., A remote user authentication scheme using bilinear pairings and ECC. In: Proceedings of the sixth international conference on intelligent system design and applications; 1091–1094, 2006. Jia, Z., Zhang, Y., Shao, H., Lin, Y., and Wang, J., A remote user authentication scheme using bilinear pairings and ECC. In: Proceedings of the sixth international conference on intelligent system design and applications; 1091–1094, 2006.
8.
go back to reference Jiang, C., Li, B., and Xu, H., An efficient scheme for user authentication in wireless sensor networks. In: Proceedings of 21st international conference on advanced information networking and applications workshops; 438–442, 2007. Jiang, C., Li, B., and Xu, H., An efficient scheme for user authentication in wireless sensor networks. In: Proceedings of 21st international conference on advanced information networking and applications workshops; 438–442, 2007.
9.
go back to reference Liao, Y., and Wang, S., A secure and efficient scheme of remote user authentication based on bilinear pairings. In: Proceedings of 2007 I.E. region 10 conference; 1–4, 2007. Liao, Y., and Wang, S., A secure and efficient scheme of remote user authentication based on bilinear pairings. In: Proceedings of 2007 I.E. region 10 conference; 1–4, 2007.
10.
go back to reference Abichar, P., Mhamed, A., Elhassan, B., A fast and secure elliptic curve based authenticated key agreement protocol for low power mobile communications. In: Proceedings of the 2007 international conference on next generation mobile applications, services and technologies; 235–240, 2007. Abichar, P., Mhamed, A., Elhassan, B., A fast and secure elliptic curve based authenticated key agreement protocol for low power mobile communications. In: Proceedings of the 2007 international conference on next generation mobile applications, services and technologies; 235–240, 2007.
11.
go back to reference Miller, V. S., Use of elliptic curves in cryptography. In: Advances in cryptology, proceedings of CRYPTO’85, 417–26, 1986. Miller, V. S., Use of elliptic curves in cryptography. In: Advances in cryptology, proceedings of CRYPTO’85, 417–26, 1986.
13.
go back to reference Yang, J., and Chang, C., An ID-based remote mutual authentication with key agreement scheme for mobile devices on elliptic curve cryptosystem. Comput. Secur. 28:138–143, 2009.CrossRef Yang, J., and Chang, C., An ID-based remote mutual authentication with key agreement scheme for mobile devices on elliptic curve cryptosystem. Comput. Secur. 28:138–143, 2009.CrossRef
14.
go back to reference Cao, X., Zeng, X., Kou, W., and Hu, L., Identity-based anonymous remote authentication for value-added services in mobile networks. IEEE Trans. Veh. Technol. 58(7):3508–3517, 2009.CrossRef Cao, X., Zeng, X., Kou, W., and Hu, L., Identity-based anonymous remote authentication for value-added services in mobile networks. IEEE Trans. Veh. Technol. 58(7):3508–3517, 2009.CrossRef
15.
go back to reference Lu, R., Lin, X., Zhu, H., Ho, P., and Shen, X., A novel anonymous mutual authentication protocol with provable link-layer location privacy. IEEE Trans. Veh. Technol. 58(3):1454–1466, 2009.CrossRef Lu, R., Lin, X., Zhu, H., Ho, P., and Shen, X., A novel anonymous mutual authentication protocol with provable link-layer location privacy. IEEE Trans. Veh. Technol. 58(3):1454–1466, 2009.CrossRef
16.
go back to reference Chen, T.-H., Chen, Y.-C., Shih, W.-K., An advanced ECC ID-Based remote mutual authentication scheme for mobile devices. Ubiquitous Intelligence & Computing and 7th International Conference on Autonomic & Trusted Computing (UIC/ATC), 1–5, 2010. Chen, T.-H., Chen, Y.-C., Shih, W.-K., An advanced ECC ID-Based remote mutual authentication scheme for mobile devices. Ubiquitous Intelligence & Computing and 7th International Conference on Autonomic & Trusted Computing (UIC/ATC), 1–5, 2010.
17.
go back to reference Islam, S. K., and Biswas, G. P., A more efficient and secure ID-based remote mutual authentication with key agreement scheme for mobile devices on elliptic curve cryptosystem. J. Syst. Softw. 84(11):1892–1898, 2011.CrossRef Islam, S. K., and Biswas, G. P., A more efficient and secure ID-based remote mutual authentication with key agreement scheme for mobile devices on elliptic curve cryptosystem. J. Syst. Softw. 84(11):1892–1898, 2011.CrossRef
18.
go back to reference He, D., Chen, J., and Hu, J., An ID-based client authentication with key agreement protocol for mobile client–server environment on ECC with provable security. Inf. Fusion 13(3):223–230, 2012.CrossRef He, D., Chen, J., and Hu, J., An ID-based client authentication with key agreement protocol for mobile client–server environment on ECC with provable security. Inf. Fusion 13(3):223–230, 2012.CrossRef
19.
go back to reference Shamir, A., Identity based cryptosystems and signature schemes. In: Proceedings of CRYPTO’ 84; 47–53, 1984. Shamir, A., Identity based cryptosystems and signature schemes. In: Proceedings of CRYPTO’ 84; 47–53, 1984.
20.
go back to reference Liu, J., Zhang, Z., Chen, X., and Kwak, K., Certificateless remote anonymous authentication schemes for wireless body sensor networks. IEEE Trans. Parallel Distrib. Syst. 25(2):332–342, 2014.CrossRef Liu, J., Zhang, Z., Chen, X., and Kwak, K., Certificateless remote anonymous authentication schemes for wireless body sensor networks. IEEE Trans. Parallel Distrib. Syst. 25(2):332–342, 2014.CrossRef
21.
go back to reference He, D., Chen, J., and Zhang, R., A more secure authentication scheme for telecare medicine information systems. J. Med. Syst. 36(3):1989–1995, 2012.CrossRef He, D., Chen, J., and Zhang, R., A more secure authentication scheme for telecare medicine information systems. J. Med. Syst. 36(3):1989–1995, 2012.CrossRef
22.
go back to reference Zhu, Z., An efficient authentication scheme for telecare medicine information systems. J. Med. Syst. 36(6):3833–3838, 2012.CrossRef Zhu, Z., An efficient authentication scheme for telecare medicine information systems. J. Med. Syst. 36(6):3833–3838, 2012.CrossRef
23.
go back to reference He, D., Chen, Y., and Chen, J., Cryptanalysis and improvement of an extended chaotic maps-based key agreement protocol. Nonlinear Dyn. 69(3):1149–1157, 2012.CrossRefMATHMathSciNet He, D., Chen, Y., and Chen, J., Cryptanalysis and improvement of an extended chaotic maps-based key agreement protocol. Nonlinear Dyn. 69(3):1149–1157, 2012.CrossRefMATHMathSciNet
24.
go back to reference Jiang, Q., Ma, J., Ma, Z., et al., A privacy enhanced authentication scheme for telecare medical information systems. J. Med. Syst. 37(1):1–8, 2013.CrossRef Jiang, Q., Ma, J., Ma, Z., et al., A privacy enhanced authentication scheme for telecare medical information systems. J. Med. Syst. 37(1):1–8, 2013.CrossRef
25.
go back to reference He, D., Kumar, N., Khan, M. K., and Lee, J.-H., Anonymous two-factor authentication for consumer roaming service in Global Mobility Networks. IEEE Trans. Consum. Electron. 59(4):1–8, 2013.CrossRef He, D., Kumar, N., Khan, M. K., and Lee, J.-H., Anonymous two-factor authentication for consumer roaming service in Global Mobility Networks. IEEE Trans. Consum. Electron. 59(4):1–8, 2013.CrossRef
26.
go back to reference Das, A. K., and Bruhadeshwar, B., An improved and effective secure password-based authentication and key agreement scheme using smart cards for the telecare medicine information system. J. Med. Syst. 37(5):1–17, 2013.CrossRef Das, A. K., and Bruhadeshwar, B., An improved and effective secure password-based authentication and key agreement scheme using smart cards for the telecare medicine information system. J. Med. Syst. 37(5):1–17, 2013.CrossRef
Metadata
Title
An Efficient Anonymous Authentication Scheme for Wireless Body Area Networks Using Elliptic Curve Cryptosystem
Author
Zhenguo Zhao
Publication date
01-02-2014
Publisher
Springer US
Published in
Journal of Medical Systems / Issue 2/2014
Print ISSN: 0148-5598
Electronic ISSN: 1573-689X
DOI
https://doi.org/10.1007/s10916-014-0013-5

Other articles of this Issue 2/2014

Journal of Medical Systems 2/2014 Go to the issue