ML p(r)ior | BANZKP: a Secure Authentication Scheme Using Zero Knowledge Proof for WBANs

BANZKP: a Secure Authentication Scheme Using Zero Knowledge Proof for WBANs

2016-02-02
-Wireless body area network(WBAN) has shown great potential in improving healthcare quality not only for patients but also for medical staff. However, security and privacy are still an important issue in WBANs especially in multi-hop architectures. In this paper, we propose and present the design and the evaluation of a secure lightweight and energy efficient authentication scheme BANZKP based on an efficient cryptographic protocol, Zero Knowledge Proof (ZKP) and a commitment scheme. ZKP is used to confirm the identify of the sensor nodes, with small computational requirement, which is favorable for body sensors given their limited resources, while the commitment scheme is used to deal with replay attacks and hence the injection attacks by committing a message and revealing the key later. Our scheme reduces the memory requirement by 56.13 % compared to TinyZKP [13], the comparable alternative so far for Body Area Networks, and uses 10 % less energy.
PDF

Highlights - Most important sentences from the article

Login to like/save this paper, take notes and configure your recommendations

Related Articles

2019-03-24
1903.10018 | cs.CR

Wireless sensor networks consist of a large number of distributed sensor nodes so that potential ris… show more
PDF

Highlights - Most important sentences from the article

2018-12-11
1812.04216 | cs.CR

Privacy problems are lethal and getting more attention than any other issue with the notion of the I… show more
PDF

Highlights - Most important sentences from the article

2018-12-20

Wireless sensor networks suffer from false report injection attacks. This results in energy drain ov… show more
PDF

Highlights - Most important sentences from the article

2019-01-17

In this work, we analyze the advantages of multi-hop data fragmentation in unattended wireless senso… show more
PDF

Highlights - Most important sentences from the article

2019-02-10

Today, Internet of Things (IoT) technology is being increasingly popular which is applied in a wide … show more
PDF

Highlights - Most important sentences from the article

2019-01-04

In recent years, vehicles became able to establish connections with other vehicles and infrastructur… show more
PDF

Highlights - Most important sentences from the article

2018-08-15
1808.05272 | cs.NI

Wireless sensor networks (WSNs) have become one of the main research topics in computer science in r… show more
PDF

Highlights - Most important sentences from the article

2013-06-28

As an increasing amount of research is being done on various applications of sensor networks in adve… show more
PDF

Highlights - Most important sentences from the article

2018-07-11

Sensor networks technologies had proved their great practicability in the real world, being just a m… show more
PDF

Highlights - Most important sentences from the article

2013-10-14

Wireless sensor network comprises of small sensor nodes with limited resources. Clustered networks h… show more
PDF

Highlights - Most important sentences from the article

2014-02-10
1402.2108 | cs.NI

In this paper, we present an identity (ID) based protocol that secures AODV and TCP so that it can b… show more
PDF

Highlights - Most important sentences from the article

2014-09-22

Wireless sensor networks increasingly become viable solutions to many challenging problems and will … show more
PDF

Highlights - Most important sentences from the article

2015-05-08
1505.01941 | cs.CR

Wireless Sensor Network (WSN) consists of large number of low-cost, resource-constrained sensor node… show more
PDF

Highlights - Most important sentences from the article

2012-07-23
1207.5323 | cs.NI

A Wireless Sensor Network (WSN) is emerging field in Information and communication technology. In WS… show more
PDF

Highlights - Most important sentences from the article

2012-07-26

Secure communication mechanisms in Wireless Sensor Networks (WSNs) have been widely deployed to ensu… show more
PDF

Highlights - Most important sentences from the article

2013-02-05
1302.0939 | cs.CR

This book chapter identifies various security threats in wireless mesh network (WMN). Keeping in min… show more
PDF

Highlights - Most important sentences from the article