Abstract
Wireless body area networks have become popular due to recent technological developments in sensor technology. A sensor can be used to collect data from different environments of interest, process and communicate the data to other nodes in a network. By its very nature, a sensor node is limited in resource usage. Due to these limitations, numerous security challenges have emerged in their applications, hence the need for more efficient and secure cryptosystems. In this paper, we give an efficient certificateless pairing-free signcryption scheme then design a secure access control scheme that can satisfy both the properties of ciphertext authentication and public verifiability using the signcryption scheme. A formal security proof of our scheme in random oracle model is provided. In addition, we compare the efficiency of our access control scheme with other existing schemes that are based on signcryption scheme. The analysis reveals that our scheme achieves better trade-off for computational and communication cost.
Similar content being viewed by others
References
Ullah, S., Higgins, H., Braem, B., Latre, B., Blondia, C., Moerman, I., et al. (2012). A comprehensive survey of wireless body area networks. Journal of Medical Systems, 36(3), 1065–1094.
Khan, R. A., & Pathan, A. K. (2018). The state-of-the-art wireless body area sensor networks: A survey. International Journal of Distributed Sensor Networks, 14(4), 1–23.
Vaniprabha, A., & Poongodi, P. (2017). Augmented lightweight security scheme with access control model for wireless medical sensor networks. Cluster Computing, 22(5), 12495–12505.
Virone, G., Wood, A., Selavo, L., Cao, Q., Fang, L., Doan, T., He, Z., & Stankovic, J. A. (2006). An advanced wireless sensor network for health. In Transdisciplinary conference on distributed diagnosis and home healthcare (D2H2).
Chipara, O., Lu, C., Bailey, T. C., & Roman G. C. (2009). Reliable patient monitoring: A clinical study in a step-down hospital unit. Technical Report WUCSE-2009-82.
Kobiltz, N. (1987). Elliptic curve cryptosystems. Mathematics of Computation, 48, 203–209.
Miller, V. (1985). Uses of elliptic curves in cryptography. In Advances in cryptology-Crypto ’85. Lecture notes in computer science.
Winkler, T., & Rinner, B. (2014). Security and privacy protection in visual sensor networks. ACM Computer Survey, 47, 97–116.
Cagalaban, G., & Kim, S. (2011). Towards a secure patient information access control in ubiquitous healthcare systems using identity-based signcryption. In 13th international conference on advanced communication technology (ICACT2011).
Li, F., Han, Y., & Jin, C. (2018). Cost effective and anonymous access control for wireless body area networks. IEEE Systems Journal, 12(1), 747–758.
Li, M., Lou, W., & Kui, R. (2010). Data security and privacy in wireless body area networks. IEEE Wireless Communication, 17(1), 51–58.
Ashraf, S., Uddin, N., Sher, M., Ghani, A., & Naqvi, H. (2014). An efficient signcryption scheme with forward secrecy and public verifiability based on hyper elliptic curve cryptography. Berlin: Springer.
Zheng, Y. (1997). Digital signcryption or how to achieve cost(signature and encryption). In Advances in cryptology CRYPTO ’97. Lecture note in computer science (vol. 1294, pp. 165–179). Springer.
Alharbi, K., & Lin, X. (2016). Efficient and privacy-preserving smartgrid downlink communication using identity based signcryption. In Global communications conference (GLOBECOM) (pp. 1–6). IEEE.
Saeed, M. E., Liu, Q., Tian, G., Gao, B., & Li, F. (2017). HOOSC: Heterogeneous online/offline signcryption for the internet of things. Wireless Networks, 24, 3141–3160.
Yuan, Y. (2020). Security analysis of an enhanced certificateless signcryption in the standard model. Wireless Personal Communications, 112, 387–394.
Chen, L., & Malone-Lee, J. (2005). Improved identity-based signcryption. In Public key cryptography-PKC (pp. 362–379). Berlin: Springer.
Sun, D., Huang, D., & Mu, X. (2008). Identity-based on-line, off-line signcryption. In IFIP international conference on network and parallel computing.
Sharma, G., Bala, S., & Verma, A. K. (2012). An identity-based ring signcryption scheme. In IT convergence and security.
Li, F., Shirase, M., & Takagi, T. (2013). Certificateless hybrid signcryption. Mathematical and Computer Modelling, 57, 324–343.
Barreto, P. L., Libert, B., & McCullagh, N. (2005). Efficient and provably-secure identity-based signatures and signcryption from bilinear maps. In Advances in cryptology-ASIACRYPT 2005 (pp. 515–532).
Al-Riyami, S. S., & Paterson, K. G. (2003). Certificateless public key cryptography. In Advances in cryptology-ASIACRYPT (pp. 452–473).
Barbosa, M., & Farshim, P. (2008). Certificateless signcryption. In ACM symposium on information computer and communication security (ASIACCS 08).
Li, F., & Hong, J. (2016). Efficient certificateless access control for wireless body area networks. Sensor Journal, 16(13), 5389–5396.
Barreto, P. L., Lynn, B., & Scott, M. (2004). Efficient implementation of pairing based crypto systems. Journal of Cryptology, 17(14), 321–334.
Freeman, D., Scott, M., & Teske, E. (2010). A taxonomy of pairing-friendly elliptic curves. Journal of Cryptology, 23(2), 224–280.
Chatterjee, S., Das, A. K., & Sing, J. K. (2013). A novel and efficient user access control scheme for wireless body area sensor networks. Journal of King Saud University, 26, 181–201.
Shen, J., Chang, S., Shen, J., Liu, Q., & Sun, X. (2018). A lightweight multi-layer authentication protocol for wireless body area networks. Future Generation Computer Systems, 78, 956–963.
Zhou, Z., & Huang, D. (2010). On efficient ciphertext-policy attribute based encryption and broadcast encryption. In 17th ACM conference on computer and communications security, Chicago, IL, USA.
Ali, M., Sadeghi, M. R., & Liu, X. (2020). Lightweight fine-grained access control for wireless body area networks. Sensors, 20(4), 1088.
Hu, C., Li, H., Huo, Y., Xiang, T., & Liao, C. (2016). Secure and efficient data communication protocol for wireless body. Multi-Scale Computing Systems, 2(2), 94–107.
Arfaoui, A., Boudia, O. R. M., Kribeche, A., Senouci, S. M., & Hamdi, M. (2019). Context-aware access control and anonymous authentication in WBANs. Computers & Security, 88, 101496.
Hu, C., Zhang, F., Cheng, X., Liao, X., & Chen, D. (2013) Securing communications between external users and wireless body area networks. In 2nd ACM workshop hot topics wireless network security privacy, Budapest, Hungary.
Narwal, B., & Mohapatra, A. K. (2020). SEEMAKA: Secured energy-efficient mutual authentication and key agreement scheme for wireless body area networks. Wireless Personal Communication. https://doi.org/10.1007/s11277-020-07304-3.
Ma, C., Xue, K., & Hong, P. (2014). Distributed access control with adaptive privacy preserving property for wireless sensor networks. Security and Communication Networks, 7(4), 759–773.
Luo, M., Luo, Y., Wan, Y., & Wang, Z. (2018). Secure and efficient access control scheme for wireless sensor networks in the cross-domain context of the IoT. Security and Communication Networks, 2018, 1–10.
Tan, C. C., Wang, H., Zhong, S., & Li, Q. (2009). IBE-Lite: A lightweight identity-based cryptography for body sensor networks. IEEE Transactions on Information Technology in Biomedicine, 13(6), 926–932.
Ramadan, M., Liao, Y., Li, F., Zhou, S., & Abdalla, H. (2020). IBEET-RSA: Identity-based encryption with equality test over RSA for wireless body area networks. Mobile Networks and Applications, 25(1), 223–233.
Shuai, M., Liu, B., Yu, N., Xiong, L., & Wang, C. (2020). Efficient and privacy-preserving authentication scheme for wireless body area networks. Journal of Information Security and Applications, 52, 102499.
Abidi, B., Jilbab, A., & Mohamed, E. H. (2020). Wireless body area networks: A comprehensive survey. Journal of Medical Engineering & Technology, 1–11.
Li, F., Hong, J., & Andrew, A. O. (2016). Efficient certificateless access control for industrial Internet of Things. Future Generation Computer Systems, 76, 285–292.
Barreto, P., Deusajute, A. M., Cruz, E., Pereira, G., & Silva, R. (2008). Toward efficient certificateless signcryption from (and without) bilinear pairings. Preprint.
Liu, J., Zhang, Z., Chen, X., & Kwak, K. S. (2014). Certificateless remote anonymous authentication scheme for wireless body area networks. IEEE Transactions on Parallel and Distributed Systems, 25(2), 332–342.
Sukanya, M., Sindhu, K. V., Gowri, G., & Nandhini, S. G. (2017). Trustworthy access control for wireless body area networks. In 2017 international conference on information communication and embedded systems (ICICES).
Gao, G. M., Peng, X. G., & Jin, L. Z. (2019). Efficient access control scheme with certificateless signcryption for wireless body area networks. International Journal of Network Security, 21(3), 428–437.
Pawar, R., & Kalbande, D. R. (2019). Elliptical curve cryptography based access control solution for IoT based WSN. In International conference on innovative data communication technologies and application.
Zou, S., Xu, Y., Wang, H., Li, Z., Chen, S., & Hu, B. (2017). A survey on secure wireless body area networks. In Security and communication networks.
Bellare, M., & Rogaway, P. (1996). The exact security of digital signatures-how to sign with RSA and Rabin. In Advances in cryptology-EUROCRYPT’96, LNCS 0950, Ireland.
Shao, Z., & Gao, Y. (2014). A provable secure signature scheme based on factoring and discrete logarithms. Applied Mathematics and Information Sciences, 8(4), 1553–1558.
Cui, S., Duan, P., Chan, C. W., & Cheng, X. (2007). An efficient identity-based signature scheme and its applications. IJ Network Security, 5(1), 89–98.
Gura, N., Patel, A., Wander, A., Eberle, H., & Shantz, S. C. (2004). Comparing elliptic curve cryptography and RSA on 8-bit CPUs. Cryptographic Hardware and Embedded Systems, 3156, 119–132.
Lynch, J. P., & Kenneth, J. L. (2006). A summary review of wireless sensors and sensor networks for structural health monitoring. Shock and Vibration Digest, 38(2), 91–130.
Shim, K. A., Lee, Y. R., & Park, C. M. (2013). EIBAS: An efficient identity-based broadcast authentication scheme in wireless sensor networks. Ad Hoc Network, 11(1), 182–189.
Funding
The authors received no financial support for the research, authorship, and publication of this article.
Author information
Authors and Affiliations
Corresponding author
Ethics declarations
Conflict of interest
The authors declare that they have no conflict of interest.
Ethical Approval
This article does not contain any studies with human participants or animals performed by any of the author.
Additional information
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
About this article
Cite this article
Kasyoka, P., Kimwele, M. & Angolo, S.M. Towards an Efficient Certificateless Access Control Scheme for Wireless Body Area Networks. Wireless Pers Commun 115, 1257–1275 (2020). https://doi.org/10.1007/s11277-020-07621-7
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11277-020-07621-7