Articles
| Open Access | GUARDING MOBILITY: A COMPOSABLE AUTHENTICATION PROTOCOL FOR SECURE ROAMING IN CLOUD-ASSISTED BODY SENSOR NETWORKS
Shun-Chen Wang , Department of Information Engineering and Computer Science, Feng Chia University, Wenhwa Rd., Seatwen, Taichung, TaiwanAbstract
The proliferation of Body Sensor Networks (BSNs) has revolutionized healthcare monitoring, but it also introduces security challenges, particularly in roaming scenarios. This article presents a novel Composable Authentication Protocol (CAP) designed to ensure secure roaming in Cloud-assisted Body Sensor Networks. CAP leverages a dynamic, context-aware approach to authentication, adapting to diverse environments and scenarios while guaranteeing data privacy and integrity. We explore CAP's architecture and demonstrate its effectiveness in safeguarding BSNs during roaming, thereby enhancing the security and reliability of healthcare monitoring.
Keywords
Body Sensor Networks (BSNs), Secure roaming, Authentication protocol
References
M. Burmester, T. V. Le, B. D. Medeiros, and G. Tsudik, “Universally composable RFID identification and authentication protocols,” ACM Transactions on Information and System Security (TISSEC), vol. 12, no. 4, pp. 21-33, 2009.
C. C. Chang and H. C. Tsai, “An anonymous and self-verified mobile authentication with authenticated key agreement for large-scale wireless networks,” IEEE Transactions on Wireless Communication, vol. 9, no. 11, pp. 3346–3353, 2010.
S. Chari, C. Jutla, and A. Roy, “Universally composable security analysis of Oauth v2.0,” IACR Cryptology ePrint Archive, pp. 526, 2011.
M. Chen, S. Gonzalez, A. Vasilakos, H. Cao, and V.Leung, “Body area networks: A survey,” Mobile Networks and Applications, vol. 16, no. 2, pp. 171– 193, 2011.
S. F. Doghmi, J. D. Guttman, and F. J. Thayer, “Completeness of the authentication test,” in The 12th European Symposium on Research in Computer Security (ESORICS 2007), LNCS 4734, pp. 106–121, Springer, 2007.
W. Du, R. Wang, and P. Ning, “An efficient scheme for authenticating public keys in sensor networks,” in The 6th ACM International Symposium on Mo- bile Ad Hoc Networking and Computing, pp.58–67, Chicago, IL, 2005.
T. Feng, W. Zhou, and X. Li, “Anonymous identity authentication scheme in wireless roaming communication,” in 2012 8th International Conference on Computing Technology and Information Management (ICCM’12), vol. 1, pp.124–129, Seoul, Korea, 2012.
G. Fortino, M. Pathan, and G. Fatta, “BodyCloud: Integration of cloud computing and body sensor networks,” in 2012 IEEE 4th International Conference on Cloud Computing Technology and Science (Cloud-Com), pp. 851–856, Taipei, Taiwan, 2012.
J. D. Guttman, “Cryptographic protocol composition via the authentication tests,” in The 12th International Conference on Foundations of Software Science and Computational Structures, vol. 5504, pp. 303–317, York, UK, 2009.