{"title":"基于区块链技术的WBAN终端设备认证方案","authors":"Ying Wang, Lei Cheng, Jianbo Xu, Shaobo Zhang","doi":"10.1109/CSCloud-EdgeCom58631.2023.00076","DOIUrl":null,"url":null,"abstract":"The wireless body area network (WBAN) plays a vital role in the application of smart health care. However, due to the openness of wireless networks, the potential threats posed by attackers increase concerns about the security and privacy of patient data. In this paper, we combine blockchain technology with WBAN and propose a lightweight terminal device authentication scheme based on blockchain technology suitable for WBAN. This scheme uses physiological information combined with a limited number of hash operations and XOR operations to share session keys during authentication, ensure confidentiality, achieve cross-domain authentication, and improve authentication efficiency. Finally, the safety analysis shows that the scheme achieves a better safety.","PeriodicalId":56007,"journal":{"name":"Journal of Cloud Computing-Advances Systems and Applications","volume":"2 1","pages":"411-416"},"PeriodicalIF":3.7000,"publicationDate":"2023-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"A Terminal Device Authentication Scheme Based on Blockchain Technology in WBAN\",\"authors\":\"Ying Wang, Lei Cheng, Jianbo Xu, Shaobo Zhang\",\"doi\":\"10.1109/CSCloud-EdgeCom58631.2023.00076\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"The wireless body area network (WBAN) plays a vital role in the application of smart health care. However, due to the openness of wireless networks, the potential threats posed by attackers increase concerns about the security and privacy of patient data. In this paper, we combine blockchain technology with WBAN and propose a lightweight terminal device authentication scheme based on blockchain technology suitable for WBAN. This scheme uses physiological information combined with a limited number of hash operations and XOR operations to share session keys during authentication, ensure confidentiality, achieve cross-domain authentication, and improve authentication efficiency. Finally, the safety analysis shows that the scheme achieves a better safety.\",\"PeriodicalId\":56007,\"journal\":{\"name\":\"Journal of Cloud Computing-Advances Systems and Applications\",\"volume\":\"2 1\",\"pages\":\"411-416\"},\"PeriodicalIF\":3.7000,\"publicationDate\":\"2023-07-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Journal of Cloud Computing-Advances Systems and Applications\",\"FirstCategoryId\":\"94\",\"ListUrlMain\":\"https://doi.org/10.1109/CSCloud-EdgeCom58631.2023.00076\",\"RegionNum\":3,\"RegionCategory\":\"计算机科学\",\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"Q2\",\"JCRName\":\"COMPUTER SCIENCE, INFORMATION SYSTEMS\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Journal of Cloud Computing-Advances Systems and Applications","FirstCategoryId":"94","ListUrlMain":"https://doi.org/10.1109/CSCloud-EdgeCom58631.2023.00076","RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q2","JCRName":"COMPUTER SCIENCE, INFORMATION SYSTEMS","Score":null,"Total":0}
A Terminal Device Authentication Scheme Based on Blockchain Technology in WBAN
The wireless body area network (WBAN) plays a vital role in the application of smart health care. However, due to the openness of wireless networks, the potential threats posed by attackers increase concerns about the security and privacy of patient data. In this paper, we combine blockchain technology with WBAN and propose a lightweight terminal device authentication scheme based on blockchain technology suitable for WBAN. This scheme uses physiological information combined with a limited number of hash operations and XOR operations to share session keys during authentication, ensure confidentiality, achieve cross-domain authentication, and improve authentication efficiency. Finally, the safety analysis shows that the scheme achieves a better safety.
期刊介绍:
The Journal of Cloud Computing: Advances, Systems and Applications (JoCCASA) will publish research articles on all aspects of Cloud Computing. Principally, articles will address topics that are core to Cloud Computing, focusing on the Cloud applications, the Cloud systems, and the advances that will lead to the Clouds of the future. Comprehensive review and survey articles that offer up new insights, and lay the foundations for further exploratory and experimental work, are also relevant.