Table of Contents Author Guidelines Submit a Manuscript
Security and Communication Networks
Volume 2017, Article ID 4167549, 8 pages
https://doi.org/10.1155/2017/4167549
Research Article

Efficient Anonymous Authenticated Key Agreement Scheme for Wireless Body Area Networks

1School of Engineering Science, University of Chinese Academy of Sciences, Beijing 100049, China
2School of Computer and Software, Nanjing University of Information Science & Technology, Nanjing 210044, China

Correspondence should be addressed to Ti Zhou; nc.ude.uds@ituohz

Received 5 September 2017; Accepted 18 October 2017; Published 21 November 2017

Academic Editor: Lianyong Qi

Copyright © 2017 Tong Li et al. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

Linked References

  1. T. G. Zimmerman, “Personal area networks: Near-field intrabody communication,” IBM Systems Journal, vol. 35, no. 3-4, pp. 609–617, 1996. View at Publisher · View at Google Scholar · View at Scopus
  2. Y. M. Chi and G. Cauwenberghs, “Wireless non-contact EEG/ECG electrodes for body sensor networks,” in Proceedings of the International Conference on Body Sensor Networks (BSN '10), pp. 297–301, Singapore, June 2010. View at Publisher · View at Google Scholar · View at Scopus
  3. A. Sapio and G. R. Tsouri, “Low-power body sensor network for wireless ECG based on relaying of creeping waves at 2.4GHz1,” in Proceedings of the 2010 International Conference on Body Sensor Networks, BSN 2010, pp. 167–173, Singapore, June 2010. View at Publisher · View at Google Scholar · View at Scopus
  4. Z. Wang, F. Xiao, N. Ye, R. Wang, and P. Yang, “A See-through-wall system for device-free human motion sensing based on battery-free RFID,” ACM Transactions on Embedded Computing Systems, vol. 17, article 6, no. 1, pp. 1–21, 2017. View at Google Scholar
  5. H. Zhu, F. Xiao, L. Sun, R. Wang, and P. Yang, “R-TTWD: Robust device-free through-the-wall detection of moving human With WiFi,” IEEE Journal on Selected Areas in Communications, vol. 35, no. 5, pp. 1090–1103, 2017. View at Publisher · View at Google Scholar
  6. G. Xie, G. Zeng, Z. Li, R. Li, and K. Li, “Adaptive dynamic scheduling on multifunctional mixed-criticality automotive cyber-physical systems,” IEEE Transactions on Vehicular Technology, vol. 66, no. 8, pp. 6676–6692, 2017. View at Publisher · View at Google Scholar
  7. F. Xiao, L. Sha, Z. Yuan, and R. Wang, “VulHunter: A discovery for unknown Bugs based on Analysis for known patches in industry internet of things,” IEEE Transactions on Emerging Topics in Computing, vol. PP, no. 99, pp. 1–13, 2017. View at Publisher · View at Google Scholar
  8. J.-H. Yang and C.-C. Chang, “An ID-based remote mutual authentication with key agreement scheme for mobile devices on elliptic curve cryptosystem,” Computers & Security, vol. 28, no. 3-4, pp. 138–143, 2009. View at Publisher · View at Google Scholar · View at Scopus
  9. T.-T. Truong, M.-T. Tran, and A.-D. Duong, “Improvement of the more efficient and secure ID-based remote mutual authentication with key agreement scheme for mobile devices on ECC,” in Proceedings of the 26th IEEE International Conference on Advanced Information Networking and Applications Workshops (WAINA '12), pp. 698–703, Fukuoka, Japan, March 2012. View at Publisher · View at Google Scholar · View at Scopus
  10. J. Shen, T. Zhou, D. He, Y. Zhang, X. Sun, and Y. Xiang, “Block design-based key agreement for group data sharing in cloud computing,” IEEE Transactions on Dependable and Secure Computing, vol. PP, no. 99, 2017. View at Publisher · View at Google Scholar
  11. H. Du and Q. Wen, “Efficient and provably-secure certificateless short signature scheme from bilinear pairings,” Computer Standards & Interfaces, vol. 31, no. 2, pp. 390–394, 2009. View at Publisher · View at Google Scholar · View at Scopus
  12. J. Shen, J. Shen, X. Chen, X. Huang, and W. Susilo, “An efficient public auditing protocol with novel dynamic structure for cloud data,” IEEE Transactions on Information Forensics and Security, vol. 12, no. 10, pp. 2402–2415, 2017. View at Publisher · View at Google Scholar
  13. N. P. Smart, “Identity-based authenticated key agreement protocol based on Weil pairing,” IEEE Electronics Letters, vol. 38, no. 13, pp. 630–632, 2002. View at Publisher · View at Google Scholar · View at Scopus
  14. J. Liu, Z. Zhang, R. Sun, and K. S. Kwak, “An efficient certificateless remote anonymous authentication scheme for wireless body area networks,” in Proceedings of the 2012 IEEE International Conference on Communications, ICC 2012, pp. 3404–3408, can, June 2012. View at Publisher · View at Google Scholar · View at Scopus
  15. J. Liu, Z. Zhang, X. Chen, and K. S. Kwak, “Certificateless remote anonymous authentication schemes for wireless body area networks,” IEEE Transactions on Parallel and Distributed Systems, vol. 25, no. 2, pp. 332–342, 2013. View at Publisher · View at Google Scholar · View at Scopus
  16. H. Xiong, “Cost-effective scalable and anonymous certificateless remote authentication protocol,” IEEE Transactions on Information Forensics & Security, vol. 9, no. 12, pp. 2327–2339, 2014. View at Publisher · View at Google Scholar
  17. Z. Zhao, “An efficient anonymous authentication scheme for wireless body area networks using elliptic curve cryptosystem,” Journal of Medical Systems, vol. 38, article 13, 7 pages, 2014. View at Publisher · View at Google Scholar · View at Scopus
  18. C. Wang and Y. Zhang, “New authentication scheme for wireless body area networks using the bilinear pairing,” Journal of Medical Systems, vol. 39, no. 11, article 136, 2015. View at Publisher · View at Google Scholar · View at Scopus
  19. D. He, S. Zeadally, N. Kumar, and J.-H. Lee, “Anonymous authentication for wireless body area networks with provable security,” IEEE Systems Journal, 2016. View at Publisher · View at Google Scholar · View at Scopus
  20. J. Shen, H. Tan, S. Moh, I. Chung, Q. Liu, and X. Sun, “Enhanced secure sensor association and key management in wireless body area networks,” Journal of Communications and Networks, vol. 17, no. 5, pp. 453–462, 2015. View at Publisher · View at Google Scholar · View at Scopus
  21. B. Dan and M. Franklin, Identity-Based Encryption from the Weil Pairing, Springer Berlin, Heidelberg, Germany, 2001.
  22. I. F. Blake, G. Seroussi, and N. P. Smart, “Advances in elliptic curve cryptography,” vol. 22, no. 03, 2005. View at Google Scholar
  23. V. Mainanwal, M. Gupta, and S. K. Upadhayay, “A survey on wireless body area network: Security technology and its design methodology issue,” in Proceedings of the 2nd IEEE International Conference on Innovations in Information, Embedded and Communication Systems, ICIIECS 2015, India, March 2015. View at Publisher · View at Google Scholar · View at Scopus
  24. S. Movassaghi, M. Abolhasan, J. Lipman, D. Smith, and A. Jamalipour, “Wireless body area networks: a survey,” IEEE Communications Survey & Tutorials, vol. 16, no. 3, pp. 1658–1686, 2014. View at Publisher · View at Google Scholar
  25. Z.-T. Li, Q. Chen, G.-M. Zhu, Y.-J. Choi, and H. Sekiya, “A low latency, energy efficient MAC protocol for wireless sensor networks,” International Journal of Distributed Sensor Networks, vol. 2015, Article ID 946587, 9 pages, 2015. View at Publisher · View at Google Scholar
  26. Z. Tang, A. Liu, Z. Li, Y.-J. Choi, H. Sekiya, and J. Li, “A trust-based model for security cooperating in vehicular cloud computing,” Mobile Information Systems, vol. 2016, Article ID 9083608, 22 pages, 2016. View at Publisher · View at Google Scholar
  27. Q. Jiang, X. Lian, C. Yang, J. Ma, Y. Tian, and Y. Yang, “A bilinear pairing based anonymous authentication scheme in wireless body area networks for mHealth,” Journal of Medical Systems, vol. 40, no. 11, article no. 231, 2016. View at Publisher · View at Google Scholar · View at Scopus