Font Size: a A A

Study On Secure Association Scheme In Wireless Body Area Network

Posted on:2015-07-16Degree:MasterType:Thesis
Country:ChinaCandidate:J X ZhangFull Text:PDF
GTID:2308330464966651Subject:Communication and Information System
Abstract/Summary:PDF Full Text Request
Wireless Body Area Networks(WBANs), can be seen as a special application of wireless sensor networks(WSNs). They are wireless networks consisting of dozens of wireless sensor devices that can be worn. Human body becomes one part of communication network, making people increasingly depend on wireless networks in their daily lives. It carries forward the ubiquitous network in true sense. With the rising of IEEE802.15.6 standards, WBAN applications can follow standardized definitions. However, with the popularity of WBANs, the security issues involved in WABNs are getting people’s attention more and more. It is practically significant that the research on the security issues in WBANs.Firstly, detailed analyses about the common threat model and security requirements faced by WBANs are made. These threats include denial of service(Do S) attacks, privacy leak, as well as physical attacks. Data transmitted in WBANs needs to meet the confidentiality, integrity, authentication, confidentiality freshness and the protection of user’s privacy. IEEE 802.15.6 standard of the WBANs, the security association protocols of sensor nodes in the association process are not perfect, such as association process depends only on the confidentiality of the pre-shared key. Therefore, the protocols can not resist all security threats. The password association protocol and public key hidden association protocol could only resist middle-man attacks. In the display association protocol, the user is required to participate in the authentication procedure, which increases the complexity of the authentication. To solve these problems mentioned above, this paper put forward an identity-based ECC security association scheme. The new scheme uses PKG manage nodes’ and Hubs’ identity-based public and private keys. PKG is an assurance to achieve the authentication of the entity. The new scheme simplifies the steps of associated procedure using Diffie-Hellman key agreement protocol, with higher security and higher efficiency.Secondly, the security of the new scheme is proved. With contrast to the schemes of security and safety certification proposed in IEEE802.15.6, a formal proof is given under the random oracle model. The results show that the new scheme can resist forgery attacks, middle attacks, replay attacks, and other common attacks in security. Theproposed scheme could decrease the amount of data transmission by 30%, which leads to 32% reduction of the energy consumption.Therefore, it can extend the lifespan of the node largely.Finally, we achieve a large integer arithmetic library on DSP platform. Combining with sliding window method and Jacobi coordinates notation, a fast elliptic curve calculation method which is suit for running in a DSP platform is proposed. Simulation results of identity-based ECC authentication protocol on the CCS platform show that the new scheme could be implemented with high utility.
Keywords/Search Tags:Wireless Body Area Network, Identity Based Cryptography, Security Association, Random Oracle Model
PDF Full Text Request
Related items