TY - JOUR
T1 - Selective disclosure and yoking-proof based privacy-preserving authentication scheme for cloud assisted wearable devices
AU - Liu, Hong
AU - Ning, Huansheng
AU - Yue, Yinliang
AU - Wan, Yueliang
AU - Yang, Laurence T.
N1 - Publisher Copyright:
© 2017 Elsevier B.V.
PY - 2018/1
Y1 - 2018/1
N2 - Along with the development of user-centric wireless communications, wearable devices appear to be popular for real-time collecting a user's private data to provide intelligent service support. Compared with traditional short-range communications, the wearable devices confront more severe system vulnerabilities and security threats during interactions. Considering the limitations of computational capabilities and communication resources, it brings more challenges to design privacy-preserving authentication schemes for the resource-constrained wearable devices. In this work, local authentication and remote authentication are respectively designed for cloud assisted wearable devices. In the local authentication mode, hash based selective disclosure mechanism and Chebyshev chaotic map are jointly applied to achieve mutual authentication between a wearable device and a smart phone. In the remote authentication mode, Merkle hash tree based selective disclosure mechanism is designed to improve the structure of data fields in the certificate, and a yoking-proof is established to realize interactions between two wearable devices and a smart phone, and is further transmitted to the cloud server for simultaneous verification. Meanwhile, security formal analysis is performed based on the BAN logic for proving that the proposed remote authentication protocol has theoretical design correctness. It indicates that the proposed authentication scheme is available and flexible for ubiquitous wearable devices.
AB - Along with the development of user-centric wireless communications, wearable devices appear to be popular for real-time collecting a user's private data to provide intelligent service support. Compared with traditional short-range communications, the wearable devices confront more severe system vulnerabilities and security threats during interactions. Considering the limitations of computational capabilities and communication resources, it brings more challenges to design privacy-preserving authentication schemes for the resource-constrained wearable devices. In this work, local authentication and remote authentication are respectively designed for cloud assisted wearable devices. In the local authentication mode, hash based selective disclosure mechanism and Chebyshev chaotic map are jointly applied to achieve mutual authentication between a wearable device and a smart phone. In the remote authentication mode, Merkle hash tree based selective disclosure mechanism is designed to improve the structure of data fields in the certificate, and a yoking-proof is established to realize interactions between two wearable devices and a smart phone, and is further transmitted to the cloud server for simultaneous verification. Meanwhile, security formal analysis is performed based on the BAN logic for proving that the proposed remote authentication protocol has theoretical design correctness. It indicates that the proposed authentication scheme is available and flexible for ubiquitous wearable devices.
KW - Authentication protocol
KW - Security
KW - Selective disclosure
KW - Wearable device
KW - Yoking-proof
UR - https://www.scopus.com/pages/publications/85019892456
U2 - 10.1016/j.future.2017.04.014
DO - 10.1016/j.future.2017.04.014
M3 - 文章
AN - SCOPUS:85019892456
SN - 0167-739X
VL - 78
SP - 976
EP - 986
JO - Future Generation Computer Systems
JF - Future Generation Computer Systems
ER -