Public-Key Authentication for Cloud-based WBANs

نویسندگان

  • Thaier Hayajneh
  • Athanasios V. Vasilakos
  • Ghada A. Al-Mashaqbeh
  • Bassam Jamil Mohd
  • Muhammad Ali Imran
  • M. Zeeshan Shakir
  • Khalid A. Qaraqe
چکیده

Merging WBAN systems with cloud computing is an efficient solution to overcome limitations inherent in WBAN, especially in critical human-related applications such as remote health monitoring. In cloud-based WBAN, the nodes are classified into WBAN sensors that report measurements about the human body and WBAN actuators that receive commands from the medical staff and perform actions. Authenticating these commands is a critical security issue as any alteration may lead to serious consequences. This paper presents a light-weight public-key authentication protocol for cloud-based WBAN systems. The proposed protocol is based on the modified Rabin authentication algorithm which is customized in this paper by making some of its components run in parallel. To prove the efficiency of the modified Rabin we implemented the algorithm with different hardware settings using Tmote Sky motes. The Rabin algorithm with and without the parallel settings is also programmed on FPGA to evaluate its design and performance. The results show that secure, direct, instant, and authenticated commands can be delivered from the medical staff located at the cloud side to the WBAN nodes located in/on the human body. Compared to other public-key protocols implemented on the motes, Rabin algorithm achieved extremely faster verification and reasonable signature gen∗Corresponding author. Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. To copy otherwise, to republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Copyright 20XX ACM X-XXXXX-XX-X/XX/XX ...$15.00. eration speed. Moreover, the suggested parallel settings of the Rabin signature generation significantly reduced the delays(by almost 80%) which is a critical issue in WBAN applications.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

DoS-Resistant Attribute-Based Encryption in Mobile Cloud Computing with Revocation

Security and privacy are very important challenges for outsourced private data over cloud storages. By taking Attribute-Based Encryption (ABE) for Access Control (AC) purpose we use fine-grained AC over cloud storage. In this paper, we extend previous Ciphertext Policy ABE (CP-ABE) schemes especially for mobile and resource-constrained devices in a cloud computing environment in two aspects, a ...

متن کامل

Ensuring Authenticity and Revocability for Wireless Body Area Network using Certificateless Cryptography

---------------------------------------------------------------------***--------------------------------------------------------------------Abstract Recently, with the technical advancements in wearable medical sensors and wireless communication techniques, Wireless Body Area Network (WBAN) has emerged as a new technology for e-health care service. The wearable medical device (WMD) aims at coll...

متن کامل

RESCUE: Reputation based Service for Cloud User Environment

Exceptional characteristics of Cloud computing has replaced all traditional computing. With reduced resource management and without in-advance investment, it has been victorious in making the IT world to migrate towards it. Microsoft announced its office package as Cloud, which can prevent people moving from Windows to Linux. As this drift is escalating in an exponential rate, the cloud environ...

متن کامل

Strengthen Cloud Computing Security with Federal Identity Management Using Hierarchical Identity-Based Cryptography

More and more companies begin to provide different kinds of cloud computing services for Internet users at the same time these services also bring some security problems. Currently the majority of cloud computing systems provide digital identity for users to access their services, this will bring some inconvenience for a hybrid cloud that includes multiple private clouds and/or public clouds. T...

متن کامل

Tight Finite Key Scheme for Quantum Key Distribution (qkd) Protocol to Authenticate Multi- Party System in Cloud Infrastructure

Confidentiality, integrity and authentication are the key concerns in this cloud infrastructure. The aim of this research is to introduce a new tight finite key scheme for authentication process in order to establish a connection between legitimate users in cloud infrastructure. In this case we are using quantum channel and also quantum key distribution (QKD) protocol to replace the existing co...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2014