29
Views
1
CrossRef citations to date
0
Altmetric
Articles

A novel lightweight authentication protocol for body area networks based on elliptic-curve cryptography

&

References

  • Al-Riyami, S.S., Paterson, K.G.: Certificateless public key cryptography. In: International conference on the theory and application of cryptology and information security. pp. 452–473. Springer (2003 )
  • Bellare, M., Neven, G.: Multi-signatures in the plain public-key model and a general forking lemma. In: Proceedings of the 13th ACM conference on Computer and communications security. pp. 390–399. ACM (2006)
  • Chhajed, P., Baviskar, D., Ahire, R., Bumb, A., Korade, M.: Certificateless remote anonymous authentication technique for wireless body area networks. In: 2015 International Conference on Green Computing and Internet of Things (ICGCIoT). pp. 1035–1041. IEEE (2015)
  • Cilardo, A., Coppolino, L., Mazzocca, N., Romano, L.: Elliptic curve cryptography engineering. Proceedings of the IEEE 94(2), 395–406 (2006 ) doi: 10.1109/JPROC.2005.862438
  • Debiao, H., Jianhua, C., Jin, H.: An id-based client authentication with key agreement protocol for mobile client–server environment on ecc with provable security. Information Fusion 13(3), 223–230 (2012 ) doi: 10.1016/j.inffus.2011.01.001
  • He, D., Zeadally, S., Kumar, N., Lee, J.H.: Anonymous authentication for wireless body area networks with provable security. IEEE Systems Journal 11(4), 2590–2601 (2016 ) doi: 10.1109/JSYST.2016.2544805
  • Joshi, A., Mohapatra, A.K.: Security analysis of wireless authentication protocols. International Journal of Sensors Wireless Communications and Control 9(2), 247–252 (2019 ) doi: 10.2174/2210327908666180806112157
  • Joshi, A., Mohapatra, A.K.: Authentication protocols for wireless body area network with key management approach. Journal of Discrete Mathematical Sciences and Cryptography 22(2), 219–240 (2019 ) doi: 10.1080/09720529.2019.1582869
  • Lamport, L.: Password authentication with insecure communication. Communications of the ACM 24(11), 770–772 (1981 ) doi: 10.1145/358790.358797
  • Li, M., Yu, S., Guttman, J.D., Lou, W., Ren, K.: Secure ad hoc trust initialization and key management in wireless body area networks. ACM Transactions on sensor Networks (TOSN) 9(2), 18 (2013 ) doi: 10.1145/2422966.2422975
  • Li, M., Yu, S., Lou, W., Ren, K.: Group device pairing based secure sensor association and key management for body area networks. In: 2010 Proceedings IEEE INFOCOM. pp. 1–9. IEEE (2010)
  • Li, X., Peng, J., Kumari, S., Wu, F., Karuppiah, M., Choo, K.K.R.: An enhanced 1-round authentication protocol for wireless body area networks with user anonymity. Computers & Electrical Engineering 61, 238–249 (2017 ) doi: 10.1016/j.compeleceng.2017.02.011
  • Liu, J., Zhang, Z., Sun, R., Kwak, K.S.: An efficient certificateless remote anonymous authentication scheme for wireless body area networks. In: 2012 IEEE International Conference on Communications (ICC). pp. 3404–3408. IEEE (2012)
  • Seo, J.H., Emura, K.: Revocable identity-based cryptosystem revisited: Security models and constructions. IEEE Transactions on Information Forensics and Security 9(7), 1193–1205 (2014) doi: 10.1109/TIFS.2014.2327758
  • Shamir, A.: Identity-based cryptosystems and signature schemes. In: Workshop on the theory and application of cryptographic techniques. pp. 47–53. Springer (1984 )
  • Shen, J., Gui, Z., Ji, S., Shen, J., Tan, H., Tang, Y.: Cloud-aided lightweight certificateless authentication protocol with anonymity for wireless body area networks. Journal of Network and Computer Applications 106, 117–123 (2018 ) doi: 10.1016/j.jnca.2018.01.003
  • Singh, R., Joshi, A., Mohapatra, A., Jha, V.: An efficient implementation of revocable functionality in authentication protocol for wireless body area network. Journal of Information and Optimization Sciences pp. 1–11 (2020)
  • Tsai, T.T., Tseng, Y.M.: Revocable certificateless public key encryption. IEEE Systems Journal 9(3), 824–833 (2013 ) doi: 10.1109/JSYST.2013.2289271
  • Xiong, H.: Cost-effective scalable and anonymous certificateless remote authentication protocol. IEEE Transactions on Information Forensics and Security 9(12), 2327–2339 (2014 ) doi: 10.1109/TIFS.2014.2363553
  • Xiong, H., Qin, Z.: Revocable and scalable certificateless remote authentication protocol with anonymity for wireless body area networks. IEEE transactions on information forensics and security 10(7), 1442–1455 (2015 ) doi: 10.1109/TIFS.2015.2414399
  • Yang, J.H., Chang, C.C.: An id-based remote mutual authentication with key agreement scheme for mobile devices on elliptic curve cryptosystem. Computers & security 28(3-4), 138–143 (2009 ) doi: 10.1016/j.cose.2008.11.008
  • Zimmerman, T.G.: Personal area networks: near-field intrabody communication. IBM systems Journal 35(3.4), 609–617 (1996) doi: 10.1147/sj.353.0609

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.