A privacy protection user authentication and key agreement scheme tailored for the Internet of Things environment: PriAuth

Chen, Yuwen; López Santidrián, M. Lourdes; Castillejo Parrilla, Pedro y Martínez Ortega, José Fernán (2017). A privacy protection user authentication and key agreement scheme tailored for the Internet of Things environment: PriAuth. "Wireless Communications and Mobile Computing", v. 2017 ; pp. 1-17. ISSN 1530-8669. https://doi.org/10.1155/2017/5290579.

Descripción

Título: A privacy protection user authentication and key agreement scheme tailored for the Internet of Things environment: PriAuth
Autor/es:
  • Chen, Yuwen
  • López Santidrián, M. Lourdes
  • Castillejo Parrilla, Pedro
  • Martínez Ortega, José Fernán
Tipo de Documento: Artículo
Título de Revista/Publicación: Wireless Communications and Mobile Computing
Fecha: Diciembre 2017
Volumen: 2017
Materias:
Escuela: E.T.S.I. y Sistemas de Telecomunicación (UPM)
Departamento: Ingeniería Telemática y Electrónica
Licencias Creative Commons: Reconocimiento - Sin obra derivada - No comercial

Texto completo

[img] PDF (Document Portable Format) - Se necesita un visor de ficheros PDF, como GSview, Xpdf o Adobe Acrobat Reader
Descargar (1MB)

Resumen

In a wearable sensor-based deployment, sensors are placed over the patient to monitor their body health parameters. Continuous physiological information monitored by wearable sensors helps doctors have a better diagnostic and a suitable treatment. When doctors want to access the patient?s sensor data remotely via network, the patient will authenticate the identity of the doctor first, and then they will negotiate a key for further communication. Many lightweight schemes have been proposed to enable a mutual authentication and key establishment between the two parties with the help of a gateway node, but most of these schemes cannot enable identity confidentiality. Besides, the shared key is also known by the gateway, whichmeans the patient?s sensor data could be leaked to the gateway. In PriAuth, identities are encrypted to guarantee confidentiality. Additionally, Elliptic Curve Diffie?Hellman (ECDH) key exchange protocol has been adopted to ensure the secrecy of the key, avoiding the gateway access to it. Besides, only hash and XOR computations are adopted because of the computability and power constraints of the wearable sensors.The proposed scheme has been validated by BAN logic and AVISPA, and the results show the scheme has been proven as secure.

Proyectos asociados

TipoCódigoAcrónimoResponsableTítulo
Gobierno de EspañaTSI-010400- 2010-100Sin especificarSin especificarLifeWear Project

Más información

ID de Registro: 50775
Identificador DC: http://oa.upm.es/50775/
Identificador OAI: oai:oa.upm.es:50775
Identificador DOI: 10.1155/2017/5290579
URL Oficial: https://www.hindawi.com/journals/wcmc/2017/5290579/
Depositado por: Memoria Investigacion
Depositado el: 30 May 2018 11:30
Ultima Modificación: 31 May 2018 05:40
  • GEO_UP4
  • Open Access
  • Open Access
  • Sherpa-Romeo
    Compruebe si la revista anglosajona en la que ha publicado un artículo permite también su publicación en abierto.
  • Dulcinea
    Compruebe si la revista española en la que ha publicado un artículo permite también su publicación en abierto.
  • Recolecta
  • InvestigaM
  • Observatorio I+D+i UPM
  • OpenCourseWare UPM