WBAN CLIENT VERIFICATION USING REMOTE ANONYMOUS AUTHENTICATION SCHEMES WITHOUT CERTIFICATES

作者: Keerthana B , Madhusudhan U R , Poonam Tijare

DOI:

关键词:

摘要: In this paper, communication between Client and Application provider should be authentic; so two protocols are used for authentication which is trivial coherent performed through Network manager (NM). The success WBAN client (AP) to activate users of in distant access services such as healthcare, medical applications, military application etc, unknowingly. To design a novel certificate less scheme with signature (CLS) developed. Its computed, coherent, verified secured. Service providers or do not have any advantage reveal the private information users. Private Key generator (PKG) served by cannot imitate legal Theoretic analysis, experimental simulations comparative studies conducted evaluated. Computation cost, implementation & security gives better tradeoffs authenticated protocols. Comparison running time performance results.

参考文章(11)
Frederik Armknecht, Liqun Chen, Ahmad-Reza Sadeghi, Christian Wachsmann, Anonymous authentication for RFID systems radio frequency identification security and privacy issues. pp. 158- 175 ,(2010) , 10.1007/978-3-642-16822-2_14
Changji Wang, Dongyang Long, Yong Tang, An Efficient Certificateless Signature from Pairings International Journal of Network Security. ,vol. 8, pp. 96- 100 ,(2009) , 10.6633/IJNS.200901.8(1).11
Chen Yang, Wenping Ma, Xinmei Wang, Novel remote user authentication scheme using bilinear pairings autonomic and trusted computing. pp. 306- 312 ,(2007) , 10.1007/978-3-540-73547-2_32
Zhenfeng Zhang, Duncan S. Wong, Jing Xu, Dengguo Feng, Certificateless public-key signature: security model and efficient construction applied cryptography and network security. pp. 293- 308 ,(2006) , 10.1007/11767480_20
Adi Shamir, Identity-based cryptosystems and signature schemes international cryptology conference. ,vol. 196, pp. 47- 53 ,(1985) , 10.1007/3-540-39568-7_5
MirHojjat Seyedi, Behailu Kibret, Daniel T. H. Lai, Michael Faulkner, A Survey on Intrabody Communications for Body Area Network Applications IEEE Transactions on Biomedical Engineering. ,vol. 60, pp. 2067- 2079 ,(2013) , 10.1109/TBME.2013.2254714
Pierre E. ABI-CHAR, Abdallah MHAMED, Bachar EL-HASSAN, A Fast and Secure Elliptic Curve Based Authenticated Key Agreement Protocol For Low Power Mobile Communications next generation mobile applications, services and technologies. pp. 235- 240 ,(2007) , 10.1109/NGMAST.2007.4343427
A. Juels, RFID security and privacy: a research survey IEEE Journal on Selected Areas in Communications. ,vol. 24, pp. 381- 394 ,(2006) , 10.1109/JSAC.2005.861395
Jian Ren, Lein Harn, An Efficient Threshold Anonymous Authentication Scheme for Privacy-Preserving Communications IEEE Transactions on Wireless Communications. ,vol. 12, pp. 1018- 1025 ,(2013) , 10.1109/TWC.2012.12.112120
Patrik Bichsel, Jan Camenisch, Thomas Groß, Victor Shoup, Anonymous credentials on a standard java card computer and communications security. pp. 600- 610 ,(2009) , 10.1145/1653662.1653734