Font Size: a A A

Research On Secure Key Management Protocols In WBANs

Posted on:2018-07-23Degree:MasterType:Thesis
Country:ChinaCandidate:S H ChangFull Text:PDF
GTID:2348330518498078Subject:Software engineering
Abstract/Summary:PDF Full Text Request
With the development of the Internet of Things in this information era, Wireless Body Area Networks (WBANs) as an important branch of IoT attracts more and more attention in various fields. People's demand of high quality of life and modern service largely has also promoted the development of WBANs. WBANs can be applied in various fields, and the research focuses on the application in medical treatment. Furthermore, secure and anonymous authentication protocol is a hot research topic. Due to the limitation of the resource and the sensitivity of the medical data, some deficiencies exist in the research of the security and privacy in WBANs.Therefore, a secure WBANs key management protocol is an initial issue in the development of the WBANs. It is a technology revolution that brings WBANs to the practical application.In this thesis, we focus on the WBANs secure key management protocol. First, we discuss the application of certificateless cryptograph in the authentication phase in WBANs. Then, based on the first research, we design an ECC based non-pairing certificateless authentication protocol and one -to-many group authentication. Finally,based on the previous research and the in-depth analysis of the WBANs, we propose an implicit authentication protocol with self-healing key management scheme that can satisfy the resting sensor nodes. The detailed contents of this thesis are as follows:First, we discuss the certificateless cryptograph technology and define a certificateless encryption and certificateless signature. Then, we design a WBANs certificateless authentication protocol which solves the key escrow problem and is effectively against man in the middle attack.Second, based on the certificateless authentication protocol, we propose an ECC based non-pairing certificateless authentication protocol. The protocol takes place of pairing operation with huge computational cost, and makes the protocol more lightweight and efficient. In addition, we propose a one-to-many authentication protocol for PDA and sensor nodes, which satisfy the authentication requirements for multi-lay of WBANs.Finally, according to the characteristics of WBANs, we propose an implicit authentication protocol and self-healing key management for WBANs. The protocol can meet the requirement of the resting nodes. Security and performance analysis shows that the protocol is security and efficiency with the value of practical application.
Keywords/Search Tags:WBANs, Authentication, Security, Privacy
PDF Full Text Request
Related items