Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Skip to main content

Towards an Efficient Certificateless Access Control Scheme for Wireless Body Area Networks

  • Published:
Wireless Personal Communications Aims and scope Submit manuscript

Abstract

Wireless body area networks have become popular due to recent technological developments in sensor technology. A sensor can be used to collect data from different environments of interest, process and communicate the data to other nodes in a network. By its very nature, a sensor node is limited in resource usage. Due to these limitations, numerous security challenges have emerged in their applications, hence the need for more efficient and secure cryptosystems. In this paper, we give an efficient certificateless pairing-free signcryption scheme then design a secure access control scheme that can satisfy both the properties of ciphertext authentication and public verifiability using the signcryption scheme. A formal security proof of our scheme in random oracle model is provided. In addition, we compare the efficiency of our access control scheme with other existing schemes that are based on signcryption scheme. The analysis reveals that our scheme achieves better trade-off for computational and communication cost.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4

Similar content being viewed by others

References

  1. Ullah, S., Higgins, H., Braem, B., Latre, B., Blondia, C., Moerman, I., et al. (2012). A comprehensive survey of wireless body area networks. Journal of Medical Systems, 36(3), 1065–1094.

    Google Scholar 

  2. Khan, R. A., & Pathan, A. K. (2018). The state-of-the-art wireless body area sensor networks: A survey. International Journal of Distributed Sensor Networks, 14(4), 1–23.

    Google Scholar 

  3. Vaniprabha, A., & Poongodi, P. (2017). Augmented lightweight security scheme with access control model for wireless medical sensor networks. Cluster Computing, 22(5), 12495–12505.

    Google Scholar 

  4. Virone, G., Wood, A., Selavo, L., Cao, Q., Fang, L., Doan, T., He, Z., & Stankovic, J. A. (2006). An advanced wireless sensor network for health. In Transdisciplinary conference on distributed diagnosis and home healthcare (D2H2).

  5. Chipara, O., Lu, C., Bailey, T. C., & Roman G. C. (2009). Reliable patient monitoring: A clinical study in a step-down hospital unit. Technical Report WUCSE-2009-82.

  6. Kobiltz, N. (1987). Elliptic curve cryptosystems. Mathematics of Computation, 48, 203–209.

    MathSciNet  Google Scholar 

  7. Miller, V. (1985). Uses of elliptic curves in cryptography. In Advances in cryptology-Crypto ’85. Lecture notes in computer science.

  8. Winkler, T., & Rinner, B. (2014). Security and privacy protection in visual sensor networks. ACM Computer Survey, 47, 97–116.

    Google Scholar 

  9. Cagalaban, G., & Kim, S. (2011). Towards a secure patient information access control in ubiquitous healthcare systems using identity-based signcryption. In 13th international conference on advanced communication technology (ICACT2011).

  10. Li, F., Han, Y., & Jin, C. (2018). Cost effective and anonymous access control for wireless body area networks. IEEE Systems Journal, 12(1), 747–758.

    Google Scholar 

  11. Li, M., Lou, W., & Kui, R. (2010). Data security and privacy in wireless body area networks. IEEE Wireless Communication, 17(1), 51–58.

    Google Scholar 

  12. Ashraf, S., Uddin, N., Sher, M., Ghani, A., & Naqvi, H. (2014). An efficient signcryption scheme with forward secrecy and public verifiability based on hyper elliptic curve cryptography. Berlin: Springer.

    Google Scholar 

  13. Zheng, Y. (1997). Digital signcryption or how to achieve cost(signature and encryption). In Advances in cryptology CRYPTO ’97. Lecture note in computer science (vol. 1294, pp. 165–179). Springer.

  14. Alharbi, K., & Lin, X. (2016). Efficient and privacy-preserving smartgrid downlink communication using identity based signcryption. In Global communications conference (GLOBECOM) (pp. 1–6). IEEE.

  15. Saeed, M. E., Liu, Q., Tian, G., Gao, B., & Li, F. (2017). HOOSC: Heterogeneous online/offline signcryption for the internet of things. Wireless Networks, 24, 3141–3160.

    Google Scholar 

  16. Yuan, Y. (2020). Security analysis of an enhanced certificateless signcryption in the standard model. Wireless Personal Communications, 112, 387–394.

    Google Scholar 

  17. Chen, L., & Malone-Lee, J. (2005). Improved identity-based signcryption. In Public key cryptography-PKC (pp. 362–379). Berlin: Springer.

  18. Sun, D., Huang, D., & Mu, X. (2008). Identity-based on-line, off-line signcryption. In IFIP international conference on network and parallel computing.

  19. Sharma, G., Bala, S., & Verma, A. K. (2012). An identity-based ring signcryption scheme. In IT convergence and security.

  20. Li, F., Shirase, M., & Takagi, T. (2013). Certificateless hybrid signcryption. Mathematical and Computer Modelling, 57, 324–343.

    MathSciNet  MATH  Google Scholar 

  21. Barreto, P. L., Libert, B., & McCullagh, N. (2005). Efficient and provably-secure identity-based signatures and signcryption from bilinear maps. In Advances in cryptology-ASIACRYPT 2005 (pp. 515–532).

  22. Al-Riyami, S. S., & Paterson, K. G. (2003). Certificateless public key cryptography. In Advances in cryptology-ASIACRYPT (pp. 452–473).

  23. Barbosa, M., & Farshim, P. (2008). Certificateless signcryption. In ACM symposium on information computer and communication security (ASIACCS 08).

  24. Li, F., & Hong, J. (2016). Efficient certificateless access control for wireless body area networks. Sensor Journal, 16(13), 5389–5396.

    Google Scholar 

  25. Barreto, P. L., Lynn, B., & Scott, M. (2004). Efficient implementation of pairing based crypto systems. Journal of Cryptology, 17(14), 321–334.

    MathSciNet  MATH  Google Scholar 

  26. Freeman, D., Scott, M., & Teske, E. (2010). A taxonomy of pairing-friendly elliptic curves. Journal of Cryptology, 23(2), 224–280.

    MathSciNet  MATH  Google Scholar 

  27. Chatterjee, S., Das, A. K., & Sing, J. K. (2013). A novel and efficient user access control scheme for wireless body area sensor networks. Journal of King Saud University, 26, 181–201.

    Google Scholar 

  28. Shen, J., Chang, S., Shen, J., Liu, Q., & Sun, X. (2018). A lightweight multi-layer authentication protocol for wireless body area networks. Future Generation Computer Systems, 78, 956–963.

    Google Scholar 

  29. Zhou, Z., & Huang, D. (2010). On efficient ciphertext-policy attribute based encryption and broadcast encryption. In 17th ACM conference on computer and communications security, Chicago, IL, USA.

  30. Ali, M., Sadeghi, M. R., & Liu, X. (2020). Lightweight fine-grained access control for wireless body area networks. Sensors, 20(4), 1088.

    Google Scholar 

  31. Hu, C., Li, H., Huo, Y., Xiang, T., & Liao, C. (2016). Secure and efficient data communication protocol for wireless body. Multi-Scale Computing Systems, 2(2), 94–107.

    Google Scholar 

  32. Arfaoui, A., Boudia, O. R. M., Kribeche, A., Senouci, S. M., & Hamdi, M. (2019). Context-aware access control and anonymous authentication in WBANs. Computers & Security, 88, 101496.

    Google Scholar 

  33. Hu, C., Zhang, F., Cheng, X., Liao, X., & Chen, D. (2013) Securing communications between external users and wireless body area networks. In 2nd ACM workshop hot topics wireless network security privacy, Budapest, Hungary.

  34. Narwal, B., & Mohapatra, A. K. (2020). SEEMAKA: Secured energy-efficient mutual authentication and key agreement scheme for wireless body area networks. Wireless Personal Communication. https://doi.org/10.1007/s11277-020-07304-3.

    Article  Google Scholar 

  35. Ma, C., Xue, K., & Hong, P. (2014). Distributed access control with adaptive privacy preserving property for wireless sensor networks. Security and Communication Networks, 7(4), 759–773.

    Google Scholar 

  36. Luo, M., Luo, Y., Wan, Y., & Wang, Z. (2018). Secure and efficient access control scheme for wireless sensor networks in the cross-domain context of the IoT. Security and Communication Networks, 2018, 1–10.

    Google Scholar 

  37. Tan, C. C., Wang, H., Zhong, S., & Li, Q. (2009). IBE-Lite: A lightweight identity-based cryptography for body sensor networks. IEEE Transactions on Information Technology in Biomedicine, 13(6), 926–932.

    Google Scholar 

  38. Ramadan, M., Liao, Y., Li, F., Zhou, S., & Abdalla, H. (2020). IBEET-RSA: Identity-based encryption with equality test over RSA for wireless body area networks. Mobile Networks and Applications, 25(1), 223–233.

    Google Scholar 

  39. Shuai, M., Liu, B., Yu, N., Xiong, L., & Wang, C. (2020). Efficient and privacy-preserving authentication scheme for wireless body area networks. Journal of Information Security and Applications, 52, 102499.

    Google Scholar 

  40. Abidi, B., Jilbab, A., & Mohamed, E. H. (2020). Wireless body area networks: A comprehensive survey. Journal of Medical Engineering & Technology, 1–11.

  41. Li, F., Hong, J., & Andrew, A. O. (2016). Efficient certificateless access control for industrial Internet of Things. Future Generation Computer Systems, 76, 285–292.

    Google Scholar 

  42. Barreto, P., Deusajute, A. M., Cruz, E., Pereira, G., & Silva, R. (2008). Toward efficient certificateless signcryption from (and without) bilinear pairings. Preprint.

  43. Liu, J., Zhang, Z., Chen, X., & Kwak, K. S. (2014). Certificateless remote anonymous authentication scheme for wireless body area networks. IEEE Transactions on Parallel and Distributed Systems, 25(2), 332–342.

    Google Scholar 

  44. Sukanya, M., Sindhu, K. V., Gowri, G., & Nandhini, S. G. (2017). Trustworthy access control for wireless body area networks. In 2017 international conference on information communication and embedded systems (ICICES).

  45. Gao, G. M., Peng, X. G., & Jin, L. Z. (2019). Efficient access control scheme with certificateless signcryption for wireless body area networks. International Journal of Network Security, 21(3), 428–437.

    Google Scholar 

  46. Pawar, R., & Kalbande, D. R. (2019). Elliptical curve cryptography based access control solution for IoT based WSN. In International conference on innovative data communication technologies and application.

  47. Zou, S., Xu, Y., Wang, H., Li, Z., Chen, S., & Hu, B. (2017). A survey on secure wireless body area networks. In Security and communication networks.

  48. Bellare, M., & Rogaway, P. (1996). The exact security of digital signatures-how to sign with RSA and Rabin. In Advances in cryptology-EUROCRYPT’96, LNCS 0950, Ireland.

  49. Shao, Z., & Gao, Y. (2014). A provable secure signature scheme based on factoring and discrete logarithms. Applied Mathematics and Information Sciences, 8(4), 1553–1558.

    Google Scholar 

  50. Cui, S., Duan, P., Chan, C. W., & Cheng, X. (2007). An efficient identity-based signature scheme and its applications. IJ Network Security, 5(1), 89–98.

    Google Scholar 

  51. Gura, N., Patel, A., Wander, A., Eberle, H., & Shantz, S. C. (2004). Comparing elliptic curve cryptography and RSA on 8-bit CPUs. Cryptographic Hardware and Embedded Systems, 3156, 119–132.

    MATH  Google Scholar 

  52. Lynch, J. P., & Kenneth, J. L. (2006). A summary review of wireless sensors and sensor networks for structural health monitoring. Shock and Vibration Digest, 38(2), 91–130.

    Google Scholar 

  53. Shim, K. A., Lee, Y. R., & Park, C. M. (2013). EIBAS: An efficient identity-based broadcast authentication scheme in wireless sensor networks. Ad Hoc Network, 11(1), 182–189.

    Google Scholar 

Download references

Funding

The authors received no financial support for the research, authorship, and publication of this article.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Philemon Kasyoka.

Ethics declarations

Conflict of interest

The authors declare that they have no conflict of interest.

Ethical Approval

This article does not contain any studies with human participants or animals performed by any of the author.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Kasyoka, P., Kimwele, M. & Angolo, S.M. Towards an Efficient Certificateless Access Control Scheme for Wireless Body Area Networks. Wireless Pers Commun 115, 1257–1275 (2020). https://doi.org/10.1007/s11277-020-07621-7

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11277-020-07621-7

Keywords