YPAP: The yoking-proofs based authentication protocol for wearable devices in wireless communications

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

4 Scopus citations

Abstract

Along with the development of wireless communications, wearable devices are becoming popular for monitoring user data to provide intelligent service support. It makes that the wearable devices confront severe security issues compared with the traditional short-range communications. Due to limitations of computation capabilities and communication resources, it brings more challenges to design security schemes for the wearable devices. In this work, a yoking-proofs based authentication protocol (YPAP) is proposed for the wearable devices during secure wireless communications. In the YPAP, lightweight cryptographic operators are applied to realize authentication between a smart phone and two wearable devices, and yoking-proofs are established for the remote cloud server to perform simultaneous identification during a session. Meanwhile, Rubin logic based security formal analysis is performed to prove that the YPAP has theoretical design correctness. It indicates that the proposed protocol is flexible for ubiquitous wearable device applications.

Original languageEnglish
Title of host publicationProceedings - 2015 IEEE 12th International Conference on Ubiquitous Intelligence and Computing, 2015 IEEE 12th International Conference on Advanced and Trusted Computing, 2015 IEEE 15th International Conference on Scalable Computing and Communications, 2015 IEEE International Conference on Cloud and Big Data Computing, 2015 IEEE International Conference on Internet of People and Associated Symposia/Workshops, UIC-ATC-ScalCom-CBDCom-IoP 2015
EditorsJianhua Ma, Ali Li, Huansheng Ning, Laurence T. Yang
PublisherInstitute of Electrical and Electronics Engineers Inc.
Pages1638-1643
Number of pages6
ISBN (Electronic)9781467372114
DOIs
StatePublished - 20 Jul 2016
Externally publishedYes
EventProceedings - 2015 IEEE 12th International Conference on Ubiquitous Intelligence and Computing, 2015 IEEE 12th International Conference on Advanced and Trusted Computing, 2015 IEEE 15th International Conference on Scalable Computing and Communications, 2015 IEEE International Conference on Cloud and Big Data Computing, 2015 IEEE International Conference on Internet of People and Associated Symposia/Workshops, UIC-ATC-ScalCom-CBDCom-IoP 2015 - Beijing, China
Duration: 10 Aug 201514 Aug 2015

Publication series

NameProceedings - 2015 IEEE 12th International Conference on Ubiquitous Intelligence and Computing, 2015 IEEE 12th International Conference on Advanced and Trusted Computing, 2015 IEEE 15th International Conference on Scalable Computing and Communications, 2015 IEEE International Conference on Cloud and Big Data Computing, 2015 IEEE International Conference on Internet of People and Associated Symposia/Workshops, UIC-ATC-ScalCom-CBDCom-IoP 2015

Conference

ConferenceProceedings - 2015 IEEE 12th International Conference on Ubiquitous Intelligence and Computing, 2015 IEEE 12th International Conference on Advanced and Trusted Computing, 2015 IEEE 15th International Conference on Scalable Computing and Communications, 2015 IEEE International Conference on Cloud and Big Data Computing, 2015 IEEE International Conference on Internet of People and Associated Symposia/Workshops, UIC-ATC-ScalCom-CBDCom-IoP 2015
Country/TerritoryChina
CityBeijing
Period10/08/1514/08/15

Keywords

  • Authentication protocol
  • Rubin logic
  • Security
  • Wearable device
  • Yokingproof

Fingerprint

Dive into the research topics of 'YPAP: The yoking-proofs based authentication protocol for wearable devices in wireless communications'. Together they form a unique fingerprint.

Cite this