Table of Contents Author Guidelines Submit a Manuscript
Security and Communication Networks
Volume 2017, Article ID 4364376, 16 pages
https://doi.org/10.1155/2017/4364376
Research Article

LEPA: A Lightweight and Efficient Public Auditing Scheme for Cloud-Assisted Wireless Body Sensor Networks

1School of Computer Science and Technology, Anhui University, Hefei, Anhui, China
2School of Software and Electrical Engineering, Swinburne University of Technology, Melbourne, VIC, Australia

Correspondence should be addressed to Jie Cui; nc.ude.ctsu.liam@eijiuc

Received 26 March 2017; Accepted 23 May 2017; Published 19 July 2017

Academic Editor: Chang Liu

Copyright © 2017 Song Li et al. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

Linked References

  1. S. Movassaghi, M. Abolhasan, J. Lipman, D. Smith, and A. Jamalipour, “Wireless body area networks: a survey,” IEEE Communications Survey & Tutorials, vol. 16, no. 3, pp. 1658–1686, 2014. View at Publisher · View at Google Scholar
  2. T. G. Zimmerman, “Personal area networks: near-field intrabody communication,” IBM Systems Journal, vol. 35, no. 3-4, pp. 609–617, 1996. View at Publisher · View at Google Scholar · View at Scopus
  3. S. Ivanov, C. Foley, S. Balasubramaniam, and D. Botvich, “Virtual groups for patient WBSNs monitoring in medical environment,” IEEE Transactions on Biomedical Engineering, vol. 59, no. 11, pp. 3238–3246, 2012. View at Google Scholar
  4. T. Gao, T. Massey, L. Selavo et al. et al., “The Advanced Health and Disaster Aid Network: a Light-Weight Wireless Medical System for Triage,” IEEE Transactions on Biomedical Circuits Systems, vol. 1, no. 3, pp. 203–216, 2007. View at Publisher · View at Google Scholar
  5. E. Jovanov, A. Milenković, C. Otto et al., “A WBAN system for ambulatory monitoring of physical activity and health status: applications and challenges,” in Proceedings of the 27th Annual International Conference of the Engineering in Medicine and Biology Society (IEEE-EMBS '05), pp. 3810–3813, September 2005. View at Scopus
  6. K. Lorincz, D. J. Malan, T. R. F. Fulford-Jones et al., “Sensor networks for emergency response: challenges and opportunities,” IEEE Pervasive Computing, vol. 3, no. 4, pp. 16–23, 2004. View at Publisher · View at Google Scholar · View at Scopus
  7. F. Axisa, C. Gehin, G. Delhomme, C. Collet, O. Robin, and A. Dittmar, “Wrist ambulatory monitoring system and smart glove for real time emotional, sensorial and physiological analysis,” in Proceedings of the 26th Annual International Conference of the IEEE Engineering in Medicine and Biology Society (EMBC '04), pp. 2161–2164, September 2004. View at Scopus
  8. C. Mundt W, K. Montgomery N, and U. Udoh E, “A multi parameter wearable physiologic monitoring system for space and terrestrial applications,” IEEE Transactions on Information Technology in Biomedicine, vol. 9, no. 3, pp. 382–391, 2005. View at Google Scholar
  9. J. Wannenburg and R. Malekian, “Body sensor network for mobile health monitoring, a diagnosis and anticipating system,” IEEE Sensors Journal, vol. 15, no. 12, pp. 6839–6852, 2015. View at Publisher · View at Google Scholar
  10. U. A. K. Chude-Okonkwo, R. Malekian, and B. T. Maharaj, “Biologically inspired bio-cyber interface architecture and model for internet of bio-Nanothings applications,” IEEE Transactions on Communications, vol. 64, no. 8, pp. 3444–3455, 2016. View at Publisher · View at Google Scholar · View at Scopus
  11. K. S. Kwak, S. Ullah, and N. Ullah, “An overview of IEEE 802.15.6 standard,” in Proceedings of the 3rd International Symposium on Applied Sciences in Biomedical and Communication Technologies (ISABEL '10), pp. 1–6, IEEE, November 2010. View at Publisher · View at Google Scholar · View at Scopus
  12. M. Toorani, “On vulnerabilities of the security association in the IEEE 802.15.6 standard,” in Financial Cryptography and Data Security, vol. 8976 of Lecture Notes in Computer Science, pp. 245–260, Springer, Berlin, Heidelberg, 2015. View at Publisher · View at Google Scholar · View at MathSciNet
  13. M. Toorani, “Cryptanalysis of two PAKE protocols for body area networks and smart environments,” International Journal of Network Security, vol. 17, no. 5, pp. 629–636, 2015. View at Google Scholar · View at Scopus
  14. G. Fortino and M. Pathan, “Integration of cloud computing and body sensor networks,” Future Generation Computer Systems, vol. 35, no. 5, pp. 57–61, 2014. View at Publisher · View at Google Scholar · View at Scopus
  15. M. Chen, “NDNC-BAN: supporting rich media healthcare services via named data networking in cloud-assisted wireless body area networks,” Information Sciences, vol. 284, no. 10, pp. 142–156, 2014. View at Publisher · View at Google Scholar
  16. O. Diallo, J. J. P. C. Rodrigues, M. Sene, and J. Niu, “Real-time query processing optimization for cloud-based wireless body area networks,” Information Sciences, vol. 284, pp. 84–94, 2014. View at Publisher · View at Google Scholar · View at Scopus
  17. G. Fortino, G. Di Fatta, M. Pathan, and A. V. Vasilakos, “Cloud-assisted body area networks: state-of-the-art and future challenges,” Wireless Networks, vol. 20, no. 7, pp. 1925–1938, 2014. View at Publisher · View at Google Scholar · View at Scopus
  18. H. Shacham and B. Waters, “Compact proofs of retrievability,” in Advances in Cryptology—ASIACRYPT 2008: Proceedings of the 14th International Conference on the Theory and Application of Cryptology and Information Security, Melbourne, Australia, December 2008, vol. 5350 of Lecture Notes in Computer Science, pp. 90–107, Springer, Berlin, Germany, 2008. View at Publisher · View at Google Scholar · View at MathSciNet
  19. Z. Hao, S. Zhong, and N. Yu, “A privacy-preserving remote data integrity checking protocol with data dynamics and public verifiability,” IEEE Transactions on Knowledge and Data Engineering, vol. 23, no. 9, pp. 1432–1437, 2011. View at Publisher · View at Google Scholar · View at Scopus
  20. C. Wang, Q. Wang, K. Ren, N. Cao, and W. Lou, “Toward secure and dependable storage services in cloud computing,” IEEE Transactions on Services Computing, vol. 5, no. 2, pp. 220–232, 2012. View at Publisher · View at Google Scholar · View at Scopus
  21. C. Wang, S. S. Chow, Q. Wang, K. Ren, and W. Lou, “Privacy-preserving public auditing for secure cloud storage,” Institute of Electrical and Electronics Engineers. Transactions on Computers, vol. 62, no. 2, pp. 362–375, 2013. View at Publisher · View at Google Scholar · View at MathSciNet · View at Scopus
  22. K. Huang, M. Xian, S. Fu, and J. Liu, “Securing the cloud storage audit service: defending against frame and collude attacks of third party auditor,” IET Communications, vol. 8, no. 12, pp. 2106–2113, 2014. View at Publisher · View at Google Scholar · View at Scopus
  23. H. Wang, J. Domingo-Ferrer, Q. Wu, and B. Qin, “Identity-based remote data possession checking in public clouds,” IET Information Security, vol. 8, no. 2, pp. 114–121, 2014. View at Publisher · View at Google Scholar · View at Scopus
  24. S. Tan and Y. Jia, “NaEPASC: a novel and efficient public auditing scheme for cloud data,” Frontiers of Information Technology & Electronic Engineering, vol. 15, no. 9, pp. 794–804, 2014. View at Publisher · View at Google Scholar · View at Scopus
  25. H. Wang, “Identity-based distributed provable data possession in multi-cloud storage,” IEEE Transactions on Services Computing, vol. 8, no. 2, pp. 328–340, 2015. View at Publisher · View at Google Scholar
  26. B. Wang, B. Li, H. Li, and F. Li, “Certificateless public auditing for data integrity in the cloud,” in Proceedings of the 1st IEEE International Conference on Communications and Network Security (CNS '13), pp. 136–144, National Harbo, Md, USA, October 2013. View at Publisher · View at Google Scholar · View at Scopus
  27. D. He, S. Zeadally, and L. Wu, “Certificateless public auditing scheme for cloud-assisted wireless body area networks,” IEEE Systems Journal, no. 99, pp. 1–10, 2015. View at Publisher · View at Google Scholar · View at Scopus
  28. J. Yu, K. Ren, and C. Wang, “Enabling cloud storage auditing with verifiable outsourcing of key updates,” IEEE Transactions on Information Forensics and Security, vol. 11, no. 6, pp. 1362–1375, 2016. View at Publisher · View at Google Scholar · View at Scopus
  29. C. C. Y. Poon, Y.-T. Zhang, and S.-D. Bao, “A novel biometrics method to secure wireless body area sensor networks for telemedicine and M-health,” IEEE Communications Magazine, vol. 44, no. 4, pp. 73–81, 2006. View at Publisher · View at Google Scholar · View at Scopus
  30. S.-D. Bao, Y.-T. Zhang, and L.-F. Shen, “Physiological signal based entity authentication for body area sensor networks and mobile healthcare systems,” in Proceedings of the 2005 27th Annual International Conference of the Engineering in Medicine and Biology Society (IEEE-EMBS '05), pp. 2455–2458, September 2005. View at Scopus
  31. K. K. Venkatasubramanian, A. Banerjee, and S. K. S. Gupta, “EKG-based key agreement in body sensor networks,” in Proceedings of the 2008 IEEE INFOCOM Workshops, pp. 1–6, IEEE Xplore, April 2008. View at Publisher · View at Google Scholar · View at Scopus
  32. S. Cherukuri, K. K. Venkatasubramanian, and S. K. S. Gupta, “Biosec: a biometric based approach for securing communication in wireless networks of biosensors implanted in the human body,” in Proceedings of the 32nd International Conference on Parallel Processing (ICPP ’03), pp. 432–439, October 2003. View at Publisher · View at Google Scholar
  33. A. Juels and M. Sudan, “A fuzzy vault scheme,” in Proceedings of the IEEE International Symposium on Information Theory, pp. 408–415, July 2002. View at Scopus
  34. K. K. Venkatasubramanian, A. Banerjee, and S. K. Gupta, “SKA: usable and secure key agreement scheme for body area networks,” IEEE Transactions on Information Technology in Biomedicine, vol. 14, no. 1, pp. 60–68, 2010. View at Google Scholar · View at MathSciNet
  35. F. Miao, S.-D. Bao, and Y. Li, “A modified fuzzy vault scheme for biometrics-based body sensor networks security,” in Proceedings of the 53rd IEEE Global Communications Conference (GLOBECOM '10), pp. 1–5, December 2010. View at Publisher · View at Google Scholar · View at Scopus
  36. H. Liu, D. Sun, K. Xiong, and Z. Qiu, “A new fuzzy vault method using cubic spline interpolation,” in Proceedings of the 2010 International Conference on Artificial Intelligence and Computational Intelligence (AICI '10), pp. 103–106, October 2010. View at Publisher · View at Google Scholar · View at Scopus
  37. Z. Zhang, H. Wang, A. V. Vasilakos, and H. Fang, “ECG-cryptography and authentication in body area networks,” IEEE Transactions on Information Technology in Biomedicine, vol. 16, no. 6, pp. 1070–1078, 2012. View at Publisher · View at Google Scholar · View at Scopus
  38. J. Mohana and V. T. Bai, “128 bit key generations from the dynamic behavior of ECG for securing wireless body area network,” ARPN Journal of Engineering and Applied Sciences, vol. 10, no. 18, pp. 8048–8051, 2015. View at Google Scholar · View at Scopus
  39. F. Hu, M. Jiang, M. Wagner, and D.-C. Dong, “Privacy-preserving telecardiology sensor networks: Toward a low-cost portable wireless hardware/software codesign,” IEEE Transactions on Information Technology in Biomedicine, vol. 11, no. 6, pp. 619–627, 2007. View at Publisher · View at Google Scholar · View at Scopus
  40. P. Kumar, Y. Lee D, and D. Lee Y, “Secure health monitoring using medical wireless sensor networks,” in Proceedings of the Sixth International Conference on Networked Computing and Advanced Information Management, pp. 491–494, 2010.
  41. S. Raazi, H. Lee, S. Lee, and Y.-K. Lee, “BARI+: a biometric based distributed key management approach for wireless body area networks,” Sensors, vol. 10, no. 4, pp. 3911–3933, 2010. View at Publisher · View at Google Scholar · View at Scopus
  42. A. B. Waluyo, I. Pek, X. Chen, and W. S. Yeoh, “Design and evaluation of lightweight middleware for personal wireless body area network,” Personal and Ubiquitous Computing, vol. 13, no. 7, pp. 509–525, 2009. View at Publisher · View at Google Scholar · View at Scopus
  43. X. Yi, J. Willemson, and F. Nait-Abdesselam, “Privacy-preserving wireless medical sensor network,” in Proceedings of the 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom '13), pp. 118–125, July 2013. View at Publisher · View at Google Scholar · View at Scopus
  44. H. Zhao, J. Qin, and J. Hu, “An energy efficient key management scheme for body sensor networks,” IEEE Transactions on Parallel and Distributed Systems, vol. 24, no. 11, pp. 2202–2210, 2013. View at Publisher · View at Google Scholar · View at Scopus
  45. D. He, S. Chan, and S. Tang, “A novel and lightweight system to secure wireless medical sensor networks,” IEEE Journal of Biomedical and Health Informatics, vol. 18, no. 1, pp. 316–326, 2014. View at Publisher · View at Google Scholar · View at Scopus
  46. Y. M. Huang, M. Y. Hsieh, H. C. Chao, S. H. Hung, and J. H. Park, “Pervasive, secure access to a hierarchical sensor-based healthcare monitoring architecture in wireless heterogeneous networks,” IEEE Journal on Selected Areas in Communications, vol. 27, no. 4, pp. 400–411, 2009. View at Publisher · View at Google Scholar · View at Scopus
  47. X. H. Le, M. Khalid, R. Sankar, and S. Lee, “An efficient mutual authentication and access control scheme for wireless sensor networks in healthcare,” Journal of Networks, vol. 6, no. 3, pp. 355–364, 2011. View at Publisher · View at Google Scholar · View at Scopus
  48. X. Lin, R. Lu, X. Shen, Y. Nemoto, and N. Kato, “Sage: a strong privacy-preserving scheme against global eavesdropping for ehealth systems,” IEEE Journal on Selected Areas in Communications, vol. 27, no. 4, pp. 365–378, 2009. View at Publisher · View at Google Scholar · View at Scopus
  49. K. Malasri and L. Wang, “Design and implementation of a secure wireless mote-based medical sensor network,” Sensors, vol. 9, no. 8, pp. 6273–6297, 2009. View at Publisher · View at Google Scholar · View at Scopus
  50. J. Misic and V. Misic, “Enforcing patient privacy in healthcare WSNs through key distribution algorithms,” Security & Communication Networks, vol. 1, no. 5, pp. 417–429, 2008. View at Publisher · View at Google Scholar
  51. A. Shamir, “Identity-based cryptosystems and signature schemes,” in Advances in Cryptology: Proceedings of (CRYPTO '84), vol. 196 of Lecture Notes in Computer Science, pp. 47–53, Springer, Berlin, Germany, 1985. View at Publisher · View at Google Scholar · View at MathSciNet
  52. S. S. Al-Riyami and K. G. Paterson, “Certificateless public key cryptography,” in Advances in Cryptology-ASIACRYPT, vol. 2894 of Lecture Notes in Computer Science, pp. 452–473, Springer, 2003. View at Publisher · View at Google Scholar · View at MathSciNet · View at Scopus
  53. J. Liu, Z. Zhang, X. Chen, and K. S. Kwak, “Certificateless remote anonymous authentication schemes for wireless body area networks,” IEEE Transactions on Parallel and Distributed Systems, vol. 25, no. 2, pp. 332–342, 2014. View at Publisher · View at Google Scholar · View at Scopus
  54. Z. Zhao, “An efficient anonymous authentication scheme for wireless body area networks using elliptic curve cryptosystem,” Journal of Medical Systems, vol. 38, no. 2, pp. 1–7, 2014. View at Publisher · View at Google Scholar · View at Scopus
  55. C. Wang and Y. Zhang, “New authentication scheme for wireless body area networks using the bilinear pairing,” Journal of Medical Systems, vol. 39, no. 11, article 136, 2015. View at Publisher · View at Google Scholar · View at Scopus
  56. D. He, S. Zeadally, N. Kumar, and J.-H. Lee, “Anonymous authentication for wireless body area networks with provable security,” IEEE Systems Journal, vol. 99, pp. 1–12, 2016. View at Publisher · View at Google Scholar · View at Scopus
  57. H. Xiong, “Cost-effective scalable and anonymous certificateless remote authentication protocol,” IEEE Transactions on Information Forensics & Security, vol. 9, no. 12, pp. 2327–2339, 2014. View at Publisher · View at Google Scholar
  58. H. Xiong and Z. Qin, “Revocable and scalable certificateless remote authentication protocol with anonymity for wireless body area networks,” IEEE Transactions on Information Forensics and Security, vol. 10, no. 7, pp. 1442–1455, 2015. View at Publisher · View at Google Scholar · View at Scopus
  59. R. Lu, X. Lin, and X. Shen, “SPOC: a secure and privacy-preserving opportunistic computing framework for mobile-healthcare emergency,” IEEE Transactions on Parallel and Distributed Systems, vol. 24, no. 3, pp. 614–624, 2013. View at Publisher · View at Google Scholar · View at Scopus
  60. C.-C. Lee, C.-W. Hsu, Y.-M. Lai, and A. Vasilakos, “An enhanced mobile-healthcare emergency system based on extended chaotic maps,” Journal of Medical Systems, vol. 37, no. 5, article 9973, pp. 1–12, 2013. View at Publisher · View at Google Scholar · View at Scopus
  61. X. Yi, A. Bouguettaya, D. Georgakopoulos, A. Song, and J. Willemson, “Privacy protection for wireless medical sensor data,” IEEE Transactions on Dependable and Secure Computing, vol. 13, no. 3, pp. 369–380, 2016. View at Publisher · View at Google Scholar · View at Scopus
  62. J. Zhou, Z. Cao, X. Dong, N. Xiong, and A. V. Vasilakos, “4S: a secure and privacy-preserving key management scheme for cloud-assisted wireless body area network in m-healthcare social networks,” Information Sciences, vol. 314, pp. 255–276, 2015. View at Publisher · View at Google Scholar
  63. N. D. Han, L. Han, D. M. Tuan, H. P. In, and M. Jo, “A scheme for data confidentiality in cloud-assisted wireless body area networks,” Information Sciences, vol. 284, no. 5, pp. 157–166, 2014. View at Publisher · View at Google Scholar · View at Scopus
  64. J. Wan, C. Zou, S. Ullah, C.-F. Lai, M. Zhou, and X. Wang, “Cloud-Enabled wireless body area networks for pervasive healthcare,” IEEE Network, vol. 27, no. 5, pp. 56–61, 2013. View at Publisher · View at Google Scholar · View at Scopus
  65. Q.-Q. Xie, S.-R. Jiang, L.-M. Wang, and C.-C. Chang, “Composable secure roaming authentication protocol for cloud-assisted body sensor networks,” International Journal of Network Security, vol. 18, no. 5, pp. 816–831, 2016. View at Google Scholar · View at Scopus
  66. H. Zhu, L. Gao, and H. Li, “Secure and privacy-preserving body sensor data collection and query scheme,” Sensors, vol. 16, no. 2, article 179, 2016. View at Publisher · View at Google Scholar · View at Scopus
  67. P. K. Gupta, B. T. Maharaj, and R. Malekian, “A novel and secure IoT based cloud centric architecture to perform predictive analysis of users activities in sustainable health centres,” Multimedia Tools and Applications, pp. 1–24, 2016. View at Publisher · View at Google Scholar
  68. A. de Caro and V. Iovino, “jPBC: Java pairing based cryptography,” in Proceedings of the 16th IEEE Symposium on Computers and Communications (ISCC '11), pp. 850–855, July 2011. View at Publisher · View at Google Scholar · View at Scopus