Font Size: a A A

Research On Security Authentication And Key Agreement Mechanism For Wireless Body Area Networks

Posted on:2016-10-27Degree:MasterType:Thesis
Country:ChinaCandidate:Q LiFull Text:PDF
GTID:2348330488973997Subject:Communication and Information System
Abstract/Summary:PDF Full Text Request
In recent years, Wireless sensor technology has gained rapid development, it plays an important role in the fields of military, medical, commercial and other aspects. At the same time, wireless body area network(WBAN), which can be regarded as a special application of wireless sensor networks(WSNs) emerges at the right moment?Wireless body area network is a kind of network placed on human body, which can benefit to monitor and improve health conditions of people, surveillance of old age, and handicapped people. The architecture of wireless body area network could be divided into two parts, they are classified as intra-body communication and extra-body communication. The intra-body part is consist of several mini-type sensor nodes and a control node, and the extra-body part includes our mobiles or PCs and Remote medical institutions. However, due to the open wireless environment and the lack of appropriate physical protection, both intra-body communication and extra-body communication inevitably suffer from a lot of security threats. So, there should be some security mechanisms to ensure the security of the networks.Firstly, detailed analyses about the common threat model and security requirements faced by WBANs are made. These threats include network wiretapping, replay attacks, tampering of message and denial of service(DoS) attacks. Data transmitted in WBAN needs to meet confidentially, authentication, integrity and confidentiality freshness. Although a large set of security mechanisms have been designed for WSNs, few of them can be applied for WBAN because of its unique networking and communications characteristics. Both intra-body and extra-body authentication and key agreement protocols are proposed in this paper. By taking into account the special design requirements and communications characteristics, we propose four authentication and key agreement protocols based on Symmetric key algorithm. Among them, Protocol ? and Protocol ? are two-party authentication and key agreement protocols without the help of relays, Protocol ? and Protocol ? are three-party authentication and key agreement protocols with the help of relays, Protocol ? and Protocol ? are initiated by BAN central node periodically in normal conditions, Protocol ? and Protocol ? are initiated by normal sensor node in some urgent cases. The protocols provides certification selectively under different scenarios of WBAN. To realize the authentication and key agreement between Mobile Node and Storage site, this paper put forward an efficient handover authentication and key agreement scheme by using identity based signcryption technique. Through comparisons, the new scheme shows a higher security and efficiency level.Secondly, the security of the new schemes are proved. A formal security proof of Protocol ? and Protocol ? are given by using AUTLOG logic. Also, detailed analyses about the security of the new protocols shows that the new schemes can resist Do S attacks, replay attacks, middle attacks and other common attacks in security. At the same time, the security analysis of the new authentication and key agreement protocol designed for extra-body is made in detail, the result shows that the new protocol could satisfy the security requirements of wireless body area network.Finally, performance evaluations are made. On the one hand, we make simulations of the Protocol ? and Protocol ?. The experiments mainly contain two parts, namely, computational time and energy consumption on computation. On the other hand, the simulations of the proposed identity-based handover authentication scheme and other existing schemes are proceed under Linux OS using PBC database. The simulations including the running time of mobile node and storage site, it shows that our protocol offers a better tradeoff between the efficiency and the security features.
Keywords/Search Tags:wireless body area network, security authentication, BAN logic, key agreement
PDF Full Text Request
Related items