Font Size: a A A

Design And Implemention Of The Access Control Schemes For Wireless Body Area Networks

Posted on:2019-03-31Degree:MasterType:Thesis
Country:ChinaCandidate:Y Y ZhouFull Text:PDF
GTID:2348330563453926Subject:Information security
Abstract/Summary:PDF Full Text Request
As the main technology for implementing smart health care,the wireless body area networks(WBANs)is a self-organizing network consisting of sensors or controllers that can be worn or implanted in the human body.When a sensor in WBANs is used to collect and process user-related physiological characteristics data,how to guaderantee the user's personal privacy data will become very import.First of all,we must realize the confidentiality and integrity of the message,ensure that message,will not be illegally accessed and maliciously tampered with.Second,we must achieve user/device identity authentication to ensure that message are only accessible to authorized users.Therefore,to ensure that authorized legal users(principals)access corresponding resources(objects),the realization of user access control of data is a problem that must be solved in the actual deployment of WBANs.However,because of the limited resource of sensor nodes in the WBANs,the energy restriction is very strict.Therefore,the existing mature and secure information protection methods cannot be directly applied to the actual deployment of the WBANs.Based on this,this thesis mainly finishes the following two tasks:(1)Three identity-based combined public key cryptography schemes were designed and based on this,an access control scheme for WBANs was proposed.The first can use the same key pair to implement message encryption and signature.The second and third can use the same key pair to implement message encryption,signature and signcryption.Under the random oracle model,we proved that the schemes can meet the indistinguishability against adaptive chosen ciphertext attacks under chosen identity attacks and satisfy existential unforgeability against adaptive chosen messages attacks under chosen identity attacks.The scheme was implemented by PBC library,which verified that the scheme has obvious advantages in communication cost and computational.(2)A heterogeneous signcryption scheme was designed and a heterogeneous access control scheme for WBANs was proposed.The sender is a sensor node and belongs to an identity-based environment.The receiver is a user and belongs to a certificateless environment.Similarity,this scheme was implemented by PBC library.The heterogeneity of the scheme saves the cryptographic operation time,and has the advantage of computational cost and communication cost compared with the same type of cryptographic scheme.Both of the above schemes are designed based on the actual characteristics of the existing WBANs.They can simultaneously achieve confidentiality,integrity,authentication,and non-repudiation.They all have less computational costs and enery consumption,and have certain application value in solving the user access control in the WBANs.
Keywords/Search Tags:WBANs, access control, combined public key cryptography, heterogeneous signcryption
PDF Full Text Request
Related items