当前位置: X-MOL 学术Concurr. Comput. Pract. Exp. › 论文详情
Our official English website, www.x-mol.net, welcomes your feedback! (Note: you will need to create a separate account there.)
Cloud-assisted elliptic curve password authenticated key exchange protocol for wearable healthcare monitoring system
Concurrency and Computation: Practice and Experience ( IF 2 ) Pub Date : 2020-05-12 , DOI: 10.1002/cpe.5734
Zhihui Wang 1 , Liheng Gong 1 , Jingjing Yang 1 , Xiao Zhang 1
Affiliation  

Wearable devices (WDs) adopting advanced microsensors and IoT technology are facing severe security risks in the process of building wearable healthcare monitoring system. In particular, new requirements are proposed for the security of the identity authentication and key agreement protocol as well as the consumption of computing resources for WDs, such as replay attack, modification attack, server-spoofing attack, privileged-insider attack, and denial-of-service attack. To satisfy such requirements, cloud-assisted EC password authenticated key exchange (CEPAK), an identity dynamic authentication and key agreement protocol, is proposed, and it uses a cloud-assisted authentication service and elliptic curve algorithm. The capability of CEPAK protocol is analyzed to deal with network attack and consumption of computing resources and communication resources. It is shown that on the basis of satisfying the security requirements of the system, the cloud-assisted authentication server can greatly share the consumption of computing resources of intelligent terminals, effectively save the computing resources of intelligent terminals, and improve the system's ability to deal with attacks caused by consumption of computing resources.

中文翻译:

可穿戴医疗监控系统云辅助椭圆曲线密码认证密钥交换协议

采用先进的微传感器和物联网技术的可穿戴设备(WDs)在构建可穿戴医疗监控系统的过程中面临着严重的安全风险。特别是对身份认证和密钥协商协议的安全性以及WD的计算资源消耗提出了新的要求,如重放攻击、修改攻击、服务器欺骗攻击、特权内部攻击和拒绝-服务攻击。为了满足这样的需求,提出了云辅助EC密码认证密钥交换(CEPAK),一种身份动态认证和密钥协商协议,它使用云辅助认证服务和椭圆曲线算法。分析了CEPAK协议应对网络攻击以及计算资源和通信资源消耗的能力。结果表明,云辅助认证服务器在满足系统安全要求的基础上,可以大大分担智能终端的计算资源消耗,有效节省智能终端的计算资源,提高系统的处理能力。计算资源消耗引起的攻击。
更新日期:2020-05-12
down
wechat
bug