A privacy protection user authentication and key agreement scheme tailored for the Internet of Things environment: PriAuth

Chen, Yuwen and López Santidrián, M. Lourdes and Castillejo Parrilla, Pedro and Martínez Ortega, José Fernán (2017). A privacy protection user authentication and key agreement scheme tailored for the Internet of Things environment: PriAuth. "Wireless Communications and Mobile Computing", v. 2017 ; pp. 1-17. ISSN 1530-8669. https://doi.org/10.1155/2017/5290579.

Description

Title: A privacy protection user authentication and key agreement scheme tailored for the Internet of Things environment: PriAuth
Author/s:
  • Chen, Yuwen
  • López Santidrián, M. Lourdes
  • Castillejo Parrilla, Pedro
  • Martínez Ortega, José Fernán
Item Type: Article
Título de Revista/Publicación: Wireless Communications and Mobile Computing
Date: December 2017
ISSN: 1530-8669
Volume: 2017
Subjects:
Faculty: E.T.S.I. y Sistemas de Telecomunicación (UPM)
Department: Ingeniería Telemática y Electrónica
Creative Commons Licenses: Recognition - No derivative works - Non commercial

Full text

[img] PDF - Requires a PDF viewer, such as GSview, Xpdf or Adobe Acrobat Reader
Download (1MB)

Abstract

In a wearable sensor-based deployment, sensors are placed over the patient to monitor their body health parameters. Continuous physiological information monitored by wearable sensors helps doctors have a better diagnostic and a suitable treatment. When doctors want to access the patient?s sensor data remotely via network, the patient will authenticate the identity of the doctor first, and then they will negotiate a key for further communication. Many lightweight schemes have been proposed to enable a mutual authentication and key establishment between the two parties with the help of a gateway node, but most of these schemes cannot enable identity confidentiality. Besides, the shared key is also known by the gateway, whichmeans the patient?s sensor data could be leaked to the gateway. In PriAuth, identities are encrypted to guarantee confidentiality. Additionally, Elliptic Curve Diffie?Hellman (ECDH) key exchange protocol has been adopted to ensure the secrecy of the key, avoiding the gateway access to it. Besides, only hash and XOR computations are adopted because of the computability and power constraints of the wearable sensors.The proposed scheme has been validated by BAN logic and AVISPA, and the results show the scheme has been proven as secure.

Funding Projects

TypeCodeAcronymLeaderTitle
Government of SpainTSI-010400- 2010-100UnspecifiedUnspecifiedLifeWear Project

More information

Item ID: 50775
DC Identifier: http://oa.upm.es/50775/
OAI Identifier: oai:oa.upm.es:50775
DOI: 10.1155/2017/5290579
Official URL: https://www.hindawi.com/journals/wcmc/2017/5290579/
Deposited by: Memoria Investigacion
Deposited on: 30 May 2018 11:30
Last Modified: 31 May 2018 05:40
  • Logo InvestigaM (UPM)
  • Logo GEOUP4
  • Logo Open Access
  • Open Access
  • Logo Sherpa/Romeo
    Check whether the anglo-saxon journal in which you have published an article allows you to also publish it under open access.
  • Logo Dulcinea
    Check whether the spanish journal in which you have published an article allows you to also publish it under open access.
  • Logo de Recolecta
  • Logo del Observatorio I+D+i UPM
  • Logo de OpenCourseWare UPM