amazon

Monday, November 24, 2014

Certificateless Remote Anonymous Authentication Schemes for Wireless Body Area Networks

Certificateless Remote Anonymous Authentication Schemes for Wireless Body Area Networks
ABSTRACT:
Wireless body area network (WBAN) has been recognized as one of the promising wireless sensor technologies for improving healthcare service, thanks to its capability of seamlessly and continuously exchanging medical information in real time. However, the lack of a clear in-depth defense line in such a new networking paradigm would make its potential users worry about the leakage of their private information, especially to those unauthenticated or even malicious adversaries. In this paper, we present a pair of efficient and light-weight authentication protocols to enable remote WBAN users to anonymously enjoy healthcare service. In particular, our authentication protocols are rooted with a novel certificateless signature (CLS) scheme, which is computational, efficient, and provably secure against existential forgery on adaptively chosen message attack in the random oracle model. Also, our designs ensure that application or service providers have no privilege to disclose the real identities of users. Even the network manager, which serves as private key generator in the authentication protocols, is prevented from impersonating legitimate users. The performance of our designs is evaluated through both theoretic analysis and experimental simulations, and the comparative studies demonstrate that they outperform the existing schemes in terms of better trade-off betweendesirable security properties and computational overhead, nicely meeting the needs of WBANs.

EXISTING SYSTEM:
In WBAN, where biological information of concerns like heartbeat rate and blood pressure are gathered by the sensors around the body (in-body networks) and transmitted to body area network (BAN) controller nodes (out-body networks), such as PDA and smart phones, which serve as a gateway for anonymously accessing the services provided by external networks and servers.

DISADVANTAGES OF EXISTING SYSTEM:
·        leakage of privacy information due to WBAN's unique characteristics, such as open medium channel, signal noise, mobile terminals, flexible infrastructure, and so on.



PROPOSED SYSTEM:
Ø We develop a new CLS scheme as the cryptographic primitive, which is cost-effective, efficient, and provably secure against existential forgery on adaptively chosen message attack in the random oracle model by assuming that CDHP is intractable.
Ø The proposed CLS scheme then serves as a design basis for two remote anonymous authentication protocols, which are particularly suitable for resource-constrained mobile clients. In particular, the protocols use an anonymous account index instead of a WBAN client’s real identity to access WBAN service, thereby preventing the potential privacy leakage to application providers (APs) and network managers (NMs).
Ø A formal security analysis on our proposed protocols is conducted, laying a theoretic foundation for examining the soundness and performance of the similar designs.

ADVANTAGES OF PROPOSED SYSTEM:
Ø Cost-effective, efficient, and provably secure against existential forgery.
Ø The protocols use an anonymous account index instead of a WBAN client’s real identity to access WBAN service.
Ø Examining the soundness and performance of the similar designs.

SYSTEM REQUIREMENTS:
HARDWARE REQUIREMENTS:

Ø System                          :         Pentium IV 2.4 GHz.
Ø Hard Disk                      :         40 GB.
Ø Floppy Drive                 :         1.44 Mb.
Ø Monitor                         :         15 VGA Colour.
Ø Mouse                            :         Logitech.
Ø Ram                               :         512 Mb.

SOFTWARE REQUIREMENTS:

Ø Operating system           :         Windows XP/7.
Ø Coding Language :         ASP.net, C#.net
Ø Tool                     :         Visual Studio 2010
Ø Database              :         SQL SERVER 2008

REFERENCE:

Jingwei Liu, Zonghua Zhang, Xiaofeng Chen, and Kyung Sup Kwa,“Certificateless Remote Anonymous Authentication Schemes for WirelessBody Area Networks”, VOL. 25, NO. 2,FEBRUARY 2014.

No comments:

Post a Comment