Composable Secure Roaming Authentication Protocol for Cloud-assisted Body Sensor Networks
نویسندگان
چکیده
The cloud-assisted Body Sensor Networks (BSN) often has an architecture of Multi-hop Wireless Networks (MWN) model, in which both the body sensors and the users must be secure to protect the whole infrastructure. Unfortunately, both the information providers and the users are movable and resource-constrained in communication and computation. Thus some new security problems are proposed, such as the light weight-secure authentication caused by limited resource, re-authentication in foreign zone caused by mobility, and composablilty security caused by heterogeneity between the transmission subnet, many BSN subnets. We propose a Random Roaming Authentication Protocol (RanRAP) for BSNs with these cloud-assisted infrastructure. We test the composable security at an AP/cluster head/gateway node by using strand spaces theory, and analyze the performance of RanRAP protocol in both the theoretical analysis and experiment simulations. It was shown that RanRAP has some advantages of composable security, computation and communication overheads over some related protocols.
منابع مشابه
A TESLA-based mutual authentication protocol for GSM networks
The widespread use of wireless cellular networks has made security an ever increasing concern. GSM is the most popular wireless cellular standard, but security is an issue. The most critical weakness in the GSM protocol is the use of one-way entity authentication, i.e., only the mobile station is authenticated by the network. This creates many security problems including vulnerability against m...
متن کاملA novel key management scheme for heterogeneous sensor networks based on the position of nodes
Wireless sensor networks (WSNs) have many applications in the areas of commercial, military and environmental requirements. Regarding the deployment of low cost sensor nodes with restricted energy resources, these networks face a lot of security challenges. A basic approach for preparing a secure wireless communication in WSNs, is to propose an efficient cryptographic key management protocol be...
متن کاملGSLHA: Group-based Secure Lightweight Handover Authentication Protocol for M2M Communication
Machine to machine (M2M) communication, which is also known as machine type communication (MTC), is one of the most fascinating parts of mobile communication technology and also an important practical application of the Internet of Things. The main objective of this type of communication, is handling massive heterogeneous devices with low network overheads and high security guarantees. Hence, v...
متن کاملA Secure Mutual Authentication Protocol for Roaming in Wireless Mesh Networks
Roaming in wireless mesh networks (WMNs) requires that mobile nodes complete access authentication fast while protecting the identities of mobile nodes. In this paper, after analyzing some current authentication protocols for roaming in wireless mesh networks, we propose a new protocol based on multi-signature and three-party key agreement with a zone-based hierarchical network topology and pro...
متن کاملAn Improved Anonymous Authentication Scheme for Roaming Services
In wireless network and mobile network, a two-factor authentication scheme for roaming services enables a mobile user to achieve mutual authentication and key agreement with the foreign agent. In this paper, we review Kim et al.’s anonymous authentication scheme in global mobility networks. Analysis shows that Kim et al.’s scheme fails to achieve anonymity and two-factor authentication. In addi...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
- I. J. Network Security
دوره 18 شماره
صفحات -
تاریخ انتشار 2016