Abstract

Wireless body area network can be employed to collect patient’s electronic health data. To guarantee the reliability and confidentiality of the collected data, secure data transmission in wireless body area network is required. In wireless body area network, a mutual authentication process has to be carried out between the controller and sensors to ensure their legitimacy, and a key distribution mechanism is required to secure communication after successful mutual authentication. Li et al. proposed a cryptographic solution, which allows group device pairing authentication and key agreement but has low authentication efficiency and key leakage problems. To address these issues, a group authentication and key distribution scheme is proposed in this article. It enables effectively mutual authentication between controller and sensors, supports all signatures of sensors in the group to be checked by the controller through aggregation verification to achieve efficient authentication, and allows key distribution during authentication to improve the computation efficiency. Security analysis indicates that the proposed scheme enjoys existentially unforgeability, and theoretical and experimental comparison demonstrates its practicality in terms of computation and communication cost.

Highlights

  • Wireless body area network (WBAN) is an important branch of the Internet of things (IoT).[1]

  • WBAN is mainly composed of sensors equipped or implanted into a human body

  • The data are forwarded to the remote medicine data center for processing and analysis

Read more

Summary

Introduction

Wireless body area network (WBAN) is an important branch of the Internet of things (IoT).[1]. The main contributions of this article are summarized as follows: The controller in our scheme is able to aggregate the signatures of sensor nodes, which improves the authentication efficiency. It is especially suitable for WBAN with a large number of sensor nodes. The proposed protocol can prevent malicious entities from joining the system, ensure the authenticity of sensor nodes, and guarantee the confidentiality of the session key.

Related works
Conclusion
Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.