108
Views
25
CrossRef citations to date
0
Altmetric
Innovations

Certificateless pairing-free authentication scheme for wireless body area network in healthcare management system

, &
Pages 12-19 | Received 03 Sep 2019, Accepted 17 Dec 2019, Published online: 15 Jan 2020

References

  • Yeh C, Chen HM, Lo JW. An authentication protocol for ubiquitous health monitoring systems. J Med Biol Eng. 2013;33(4):415–419.
  • Abedini E, Rezai A. A modified digital to digital encoding method to improve the wireless body area network (WBAN) transmission. 2015 2nd International Conference on Knowledge-Based Engineering and Innovation (KBEI). IEEE; 2015. p. 1067–1070.
  • Bradai N, Lamia C, Lotfi K. A comprehensive overview of wireless body area networks (WBAn). Int J E-Health Med Commun. 2011;2(3):1–30.
  • Jian S, Shaohua C, Jun S, et al. A lightweight multi-layer authentication protocol for wireless body area networks. Future Gener Comput Syst. 2018;78:956–963.
  • Anusya G, Sharmada MA, Anitha G, et al. An efficient and secure authentication scheme for wireless body area networks. 2nd International Conference on Inventive Communication and Computational Technologies (ICICCT 2018). IEEE; 2018. p. 1099–1104.
  • Khalilian R, Rezai A, Mesrinejad F. Secure wireless body area network (WBAN) communication method using new random key management scheme. IJSIA. 2016;10(11):13–22.
  • Al-Janabi S, Al-Shourbaji I, Shojafar M, Shamshirband S. Survey of main challenges (security and privacy) in wireless body area networks for healthcare applications. Egypt Inform J. 2016;18(2):113–122.
  • Mkongwa KG, Liu Q, Zhang C. Reliability and quality of service issues in wireless body area networks: a survey. IJSPS. 2019;7(1):26–31.
  • Wang C, Zhang Y. New authentication scheme for wireless body area networks using the bilinear pairing. J Med Syst. 2015;39(11):1–8.
  • Hu X, Zhiguang Q. Revocable and scalable certificateless remote authentication protocol with anonymity for wireless body area networks. IEEE Trans Inf Forensics Secur. 2015;10(7):1442–1455.
  • Izza S, Benssalah M, Ouchikh R. Security improvement of the enhanced 1-round authentication protocol for wireless body area networks. 2018 International Conference on Applied Smart Systems (ICASS'2018). Medea Algeria: IEEE; 2018.
  • Kardi A, Rachid Z, Mohammed A. Performance evaluation of RSA and elliptic curve cryptography in wireless sensor networks. 21st Saudi Computer Society National Computer Conference (NCC). IEEE; 2018.
  • Saeed ME, Liu Q, Tian G, et al. HOOSC: heterogeneous online/offline signcryption for the internet of things. Wireless Netw. 2017;24(8):3141–3160.
  • Al-Riyami SS, Paterson KG. Certificateless public key cryptography. In: Laih CS, editor. Advances in cryptology – ASIACRYPT 2003. Berlin; Heidelberg: Springer; 2003. p. 452–473.
  • Yeh HL, Chen TH, Liu PC, et al. A secured authentication protocol for wireless sensor networks using Elliptic Curves Cryptography. Sensors. 2011;11(5):4767–4779.
  • Han W. Weakness of a secured authentication protocol for wireless sensor networks using elliptic curves cryptography. IACR; 2011.
  • Sharavan PT, Sridharan D, Kumar R. A privacy preservation secure cross layer protocol design for IoT based. J Med Syst . 2018;42(10):196.
  • Zhong H, Zhao R, Cui J, et al. An improved ECDSA scheme for wireless sensor networks. Int J Future Gener Commun Networking. 2016;9(2):73–82.
  • Moon AH, Iqbal U, Bhat GM. Mutual entity authentication protocol based on ECDSA for WSN. Twelfth International Multi-Conference on Information Processing-2016 (IMCIP-2016). Elsevier; 2016.
  • Zhao Z. An efficient anonymous authentication scheme for wireless body area network using elliptic curve cryptography. J Med Syst. 2014;38(2):1–7.
  • Liu J, Zhang Z, Chen X, et al. Certificateless remote anonymous authentication schemes for wireless body area networks. IEEE Trans Parallel Distrib Syst. 2014;25(2):332–342.
  • Barreto PL, Lynn B, Scott M. Efficient implementation of pairing based crypto systems. J Cryptology. 2004;17(4):321–334.
  • Freeman D, Scott M, Teske E. A taxonomy of pairing-friendly elliptic curves. J Cryptol. 2010;23(2):224–280.
  • Omala AA, Kibiwott KP, Li F. An efficient remote authentication scheme for wireless body area network. Med Syst. 2017;41:25.
  • Khalilian R, Abdalhossein R, Ehsan A. An efficient method to improve WBAN security. Adv Sci Technol Lett. 2014;64:43–46.
  • Kobiltz N. Elliptic curve cryptosystems. Math Comput. 1987;48:203–209.
  • Miller V. Uses of elliptic curves in cryptography. In: Williams HC, editor. Advances in cryptology – CRYPTO ’85 Proceedings. CRYPTO 1985. Lecture Notes in Computer Science. Berlin; Heidelberg: Springer; 1985.
  • Vagle JL. 2000. A gentle introduction to elliptic curve cryptography. Cambridge (MA): BBN Technologies.
  • Silverman JH. 2006. A friendly introduction to number theory. Vol. 3. Beijing: China Machine Press.
  • Hankerson D, Menezes A, Vanstone S. Guide to elliptic curve cryptography. New York; London: Springer Science & Business Media; 2006.
  • Gonzalez ML, Gayoso MV, Martin MA. Secure elliptic curves in cryptography. In: Daimi K, editor. Computer and network security essenstials. Cham: Springer; 2018.
  • Rivest RL, Shamir A, Adleman L. A method for obtaining digital signatures and public-key cryptosystems. Commun Acm. 1978;21(2):120–126.
  • Rezai A, Keshavarzi P. High-performance implementation approach of elliptic curve cryptosystem for wireless network application. Commun Inform Sci Manag Eng. 2011;1(3):21–25.
  • Johnson D, Menezes A, Vanstone S. The elliptic curve digital signature algorithm. Int J Inform Secur. 2002;1:36–63.
  • Khaled AW. A survey on elliptic curves cryptosystems. J Adv Res Dyn Control Syst. 2019;11(1):359–362.
  • Islam S, Biswas G. A more efficient and secure ID-based remote mutual authentication with key agreement scheme for mobile devices on elliptic curve cryptosystem. J Syst Softw. 2011;84(11):1892–1898.
  • Samaneh M, Mehran A, Justin L, et al. Wireless body area networks: a survey. IEEE Commun. Surv. Tuts. 2014;16(3):1658–1686.
  • Parwinder DK, Kalra S. Multi-factor user authentication scheme for IoT-based healthcare services. J Reliable Intell Environ. 2018;4(3):141–160.
  • He D, Zeadally S, Kumar N, et al. Anonymous authentication for wireless body area networks with provable security. IEEE Syst J. 2017;11(4):2590–2601.

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.