无线体域网络的安全三方认证协议

Rahul Vishwakarma, R. Mohapatra
{"title":"无线体域网络的安全三方认证协议","authors":"Rahul Vishwakarma, R. Mohapatra","doi":"10.1109/SSPS.2017.8071573","DOIUrl":null,"url":null,"abstract":"Wireless Body Area Network (WBAN) is one of the most rapidly growing technologies in the field of healthcare. However, providing a secure communication system over WBAN is a challenging task due to the sensitive data exchanged in resource-constrained WBAN. In this paper, we propose an efficient three-party authentication protocol for WBAN using Elliptic Curve Cryptography (ECC). We are using two-hop star network topology based on WBAN standard. The analysis results of BAN Logic and AVIS PA tool provide the security proofs of the proposed protocol. Moreover, the implementation results prove the efficiency of our proposed protocol.","PeriodicalId":382353,"journal":{"name":"2017 Third International Conference on Sensing, Signal Processing and Security (ICSSS)","volume":"30 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2017-05-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"5","resultStr":"{\"title\":\"A secure three-party authentication protocol for wireless body area networks\",\"authors\":\"Rahul Vishwakarma, R. Mohapatra\",\"doi\":\"10.1109/SSPS.2017.8071573\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Wireless Body Area Network (WBAN) is one of the most rapidly growing technologies in the field of healthcare. However, providing a secure communication system over WBAN is a challenging task due to the sensitive data exchanged in resource-constrained WBAN. In this paper, we propose an efficient three-party authentication protocol for WBAN using Elliptic Curve Cryptography (ECC). We are using two-hop star network topology based on WBAN standard. The analysis results of BAN Logic and AVIS PA tool provide the security proofs of the proposed protocol. Moreover, the implementation results prove the efficiency of our proposed protocol.\",\"PeriodicalId\":382353,\"journal\":{\"name\":\"2017 Third International Conference on Sensing, Signal Processing and Security (ICSSS)\",\"volume\":\"30 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2017-05-04\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"5\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2017 Third International Conference on Sensing, Signal Processing and Security (ICSSS)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/SSPS.2017.8071573\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2017 Third International Conference on Sensing, Signal Processing and Security (ICSSS)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/SSPS.2017.8071573","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 5

摘要

无线体域网络(WBAN)是医疗领域发展最为迅速的技术之一。然而,由于无线宽带网络中交换的敏感数据受到资源的限制,在无线宽带网络上提供安全的通信系统是一项具有挑战性的任务。本文提出了一种基于椭圆曲线加密(ECC)的高效无线宽带网络三方认证协议。我们采用基于WBAN标准的两跳星型网络拓扑结构。BAN逻辑和AVIS PA工具的分析结果为协议的安全性提供了证明。实现结果证明了协议的有效性。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
A secure three-party authentication protocol for wireless body area networks
Wireless Body Area Network (WBAN) is one of the most rapidly growing technologies in the field of healthcare. However, providing a secure communication system over WBAN is a challenging task due to the sensitive data exchanged in resource-constrained WBAN. In this paper, we propose an efficient three-party authentication protocol for WBAN using Elliptic Curve Cryptography (ECC). We are using two-hop star network topology based on WBAN standard. The analysis results of BAN Logic and AVIS PA tool provide the security proofs of the proposed protocol. Moreover, the implementation results prove the efficiency of our proposed protocol.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信