A Secure and Efficient Group Key Management Protocol with Cooperative Sensor Association in WBANs
Abstract
:1. Introduction
- A novel WBAN model with message broadcasting: In practical medical WBAN scenarios, patients who receive services from HC are allocated to different departments according to their physical conditions and diseases. As a result, it is necessary for HC to provide a notification service to different patient groups. To the best of our knowledge, we are the first to propose the system model providing a specific group communication channel for message broadcasting between HC and patients. Moreover, the medical data transmission channel from sensors to PC is also taken into consideration in our design.
- Group key management between HC and PC with CRT: The Chinese remainder theorem is employed for the group key management between HC and PC, which also supports batch key updating. In this case, HC is capable of broadcasting messages to different patient groups. Moreover, patients in the same group are capable of exchanging information about their physical conditions.
- Group key management between PC and sensors with CCDE: In our design, the group key management between PC and sensors is motivated by coded cooperative data exchange for the purpose of minimizing the communication rounds for group key generation. Hence, the communication and computation complexity can be drastically reduced, which is efficient for resource-limited wireless sensors in WBAN.
2. Related Works
3. Preliminaries and Model Definitions
3.1. Bilinear Pairing
- Bilinearity: For , and , there is .
- Non-degeneracy: For and , there is .
- Computability: For and , there exists an efficient algorithm to compute .
3.2. Coded Cooperative Data Exchange Problem
3.3. Chinese Remainder Theorem
3.4. System Model
3.5. Network Assumption
4. Proposed Schemes
4.1. Notations
4.2. Group Key Generation for HC and PCs
4.2.1. Registration Phase
4.2.2. Group Key Computation Phase
4.2.3. Group Key Derivation Phase
4.3. PC Join and Leave Operations
4.3.1. PC Join Operation Phase
4.3.2. PC Leave Operation Phase
4.3.3. Batch Updating Phase
4.4. Group Key Generation for PC and Sensors
4.4.1. Setup Phase
4.4.2. Key Generation Phase
4.5. Sensor Join and Leave Operations
4.5.1. Sensor Join Operation
4.5.2. Sensor Leave Operation
5. Security Analysis
5.1. Resistance to Replay Attack
5.2. Resistance to Forgery Attack
5.3. Forward Security
5.4. Resistance to Collusion Attack
6. Performance Analysis
6.1. Group Key Management between HC and PCs
6.1.1. Computational Cost and Storage
6.1.2. Communication Cost
6.2. Group Key Management between PC and Sensors
6.2.1. Computational Cost and Storage
6.2.2. Communication Cost
6.3. Simulation Experiments and Results
7. Conclusions
Author Contributions
Funding
Acknowledgments
Conflicts of Interest
References
- Alemdar, H.; Ersoy, C. Wireless Sensor Networks for Healthcare: A Survey. Comput. Netw. 2010, 54, 2688–2710. [Google Scholar] [CrossRef]
- Liu, J.; Zhang, Z.; Chen, X.; Kwak, K.S. Certificateless Remote Anonymous Authentication Schemes for Wireless Body Area Networks. IEEE Trans. Parallel Distrib. Syst. 2014, 25, 332–342. [Google Scholar] [CrossRef]
- He, D.; Zeadally, S.; Wu, L. Certificateless Public Auditing Scheme for Cloud-Assisted Wireless Body Area Networks. IEEE Syst. J. 2018, 12, 64–73. [Google Scholar] [CrossRef]
- Shen, J.; Tan, H.; Moh, S.; Chung, I.; Liu, Q.; Sun, X. Enhanced Secure Sensor Association and Key Management in Wireless Body Area Networks. J. Commun. Netw. 2015, 17, 453–462. [Google Scholar] [CrossRef]
- Halford, T.R.; Courtade, T.A.; Chugg, K.M.; Li, X.; Thatte, G. Energy-Efficient Group Key Agreement for Wireless Networks. IEEE Trans. Wirel. Commun. 2015, 14, 5552–5564. [Google Scholar] [CrossRef]
- Zhang, P.; Ma, J. Channel Characteristic Aware Privacy Protection Mechanism in WBAN. Sensors 2018, 18, 2703. [Google Scholar] [CrossRef] [PubMed]
- Lee, D.; Lee, I. Dynamic Group Authentication and Key Exchange Scheme Based on Threshold Secret Sharing for IoT Smart Metering Environments. Sensors 2018, 18, 3534. [Google Scholar] [CrossRef] [PubMed]
- Tan, H.; Choi, D.; Kim, P.; Pan, S.; Chung, I. Secure Certificateless Authentication and Road Message Dissemination Protocol in VANETs. Wirel. Commun. Mob. Comput. 2018, 2018, 7978027. [Google Scholar] [CrossRef]
- Augimeri, A.; Fortino, G.; Galzarano, S.; Gravina, R. Collaborative Body Sensor Networks. In Proceedings of the IEEE International Conference on Systems, Man, and Cybernetics, Anchorage, AK, USA, 9–12 October 2011; pp. 3427–3432. [Google Scholar]
- Horn, G.; Preneel, B. Authentication and Payment in Future Mobile Systems. J. Comput. Secur. 2000, 8, 183–207. [Google Scholar] [CrossRef]
- Zhu, J.; Ma, J. A New Authentication Scheme With Anonymity for Wireless Environments. IEEE Trans. Consum. Electron. 2004, 50, 231–235. [Google Scholar]
- Shacham, H.; Brent, W. Compact Proofs of Retrievability. In Proceedings of the International Conference on the Theory and Application of Cryptology and Information Security, Melbourne, Australia, 7–11 December 2008; pp. 90–107. [Google Scholar]
- Hao, Z.; Zhong, S.; Yu, N. A Privacy-Preserving Remote Data Integrity Checking Protocol With Data Dynamics and Public Verifiability. IEEE Trans. Knowl. Data Eng. 2011, 23, 1432–1437. [Google Scholar]
- Wang, C.; Wang, Q.; Ren, K.; Cao, N.; Lou, W. Toward Secure and Dependable Storage Services in Cloud Computing. IEEE Trans. Serv. Comput. 2012, 5, 220–232. [Google Scholar] [CrossRef] [Green Version]
- Huang, K.; ** Authentication Protocol for Multiple Tags in Mobile Environment. Multimed. Tools Appl. 2017, 76, 22761–22783. [Google Scholar]
- Pirbhulal, S.; Zhang, H.; Wu, W.; Mukhopadhyay, S.C.; Zhang, Y. An Efficient Biometric-Based Algorithm Using Heart Rate Variability for Securing Body Sensor Networks. Sensors 2015, 15, 15067–15089. [Google Scholar] [CrossRef] [PubMed] [Green Version]
Notation | Description |
---|---|
HC, PC | Healthcare center, personal controller |
Patient | |
, | Symmetric secret key |
Secret key of | |
HC master key | |
, | HC and temporary identity |
g, u | Generators of and |
Time stamp | |
n | Number of patients in department j |
Group key for HC and PCs in department j | |
Symmetric encryption on M with x | |
Symmetric decryption on M with x | |
Signature on M | |
m | Number of sensors attached to |
One-way hash function | |
Master key subset preloaded to | |
Shared master key | |
Session key | |
Sensors preloaded with | |
Sensor group key of | |
Transmission times on the side | |
Number of sensors in | |
Number of sensors in |
Protocol | ESSA [4] | DAKM [44] | Our Protocol |
---|---|---|---|
Computation of HC | + + + + | + + + ()A | + + + + + ()A |
Computation of PC | + + + + | + + | + + + |
Storage of HC | + 10 | + 9 | + 10 |
Storage of PC | 13 | 10 | 8 |
Protocol | ESSA [4] | DAKM [44] | Our Protocol |
---|---|---|---|
Transmission Type | Unicast | Broadcast | Broadcast |
Communication Cost | 1 | 1 |
Protocol | ESSA [4] | Our Protocol |
---|---|---|
Computation of PC | ( + 1)p + + ()A + | ( + 1) + + |
Computation of Sensor | + + | |
Storage of PC | + 9 | + 8 |
Storage of Sensor | 15 | 9 + k |
Protocol | ESSA [4] | Our Protocol |
---|---|---|
Transmission Type | Unicast/Broadcast | Broadcast |
Communication Cost | + 1 |
© 2018 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (http://creativecommons.org/licenses/by/4.0/).
Share and Cite
Tan, H.; Chung, I. A Secure and Efficient Group Key Management Protocol with Cooperative Sensor Association in WBANs. Sensors 2018, 18, 3930. https://doi.org/10.3390/s18113930
Tan H, Chung I. A Secure and Efficient Group Key Management Protocol with Cooperative Sensor Association in WBANs. Sensors. 2018; 18(11):3930. https://doi.org/10.3390/s18113930
Chicago/Turabian StyleTan, Haowen, and Ilyong Chung. 2018. "A Secure and Efficient Group Key Management Protocol with Cooperative Sensor Association in WBANs" Sensors 18, no. 11: 3930. https://doi.org/10.3390/s18113930