 Research
 Open access
 Published:
Practical pairingFree sensor cooperation scheme for cloudAssisted wireless body area networks
Cybersecurity volumeÂ 3, ArticleÂ number:Â 21 (2020)
Abstract
Nowadays, the design and construction of efficient internet of things (IoTs) has become a new strategies for improving living quality of all aspects. Emerging as one of the most significant extension of medical IoTs, wireless body area networks (WBANs) is capable of monitoring crucial physiological and behavioral information through wearable sensors, offering a new paradigm for the nextgeneration healthcare systems. As a matter of fact, due to the inherent open wireless communicating characteristics, data security and user privacy issues of WBANs have attracted attentions from both industry and academia. So far, lots of relevant researches emphasize on secure transmission and privacy protection. However, the computation and communication limitations for individual WBAN sensor have not been taken proper consideration. Moreover, the implementation of cloud computing infrastructure has provided WBANs with superior transmission and processing qualities. Emphasizing on the above issues, this paper construct a pairingfree authentication and sensor cooperation scheme in cloudassisted WBANs, where most of the practical requirements for WBAN sensors could be satisfied. Our design guarantee the sensor anonymity in the whole transmission session. Note that our design offers pairingfree validation procedure followed with active sensor cooperation, which is suitable for massive sensor scenarios. The security analysis proves that our designed scheme is capable of achieving desired security properties and offer adequate resistances to the charted malicious attacks. Meanwhile, security comparison demonstrates that the proposed protocol is secure compared with the stateofthearts.
Introduction
Wireless Body Network (WBAN) is considered to be the basic infrastructure of IoTbased healthcare system in the future. Recent rapid advances in wireless communications and sensor manufacturing have accelerated the explosive popularity of WBAN applications and services. WBAN provides realtime, reliable medical monitoring for specific users (Liu et al. 2014). In the medical fields, WBAN can be used to continuously monitor the patientâ€™s health and to send menstrual information to medical institutions such as hospitals, community clinics, and first aid centers. In this case, doctors can provide timely medical help after performing the remote diagnosis of the patient (Zhang et al. 2020). In addition, prewarning and preventive measures against certain diseases can be implemented. Today, WBAN is committed to stateoftheart communication and data processing strategies such as 5G network and cloud computing technologies to be used in heterogeneous IoT environments, which could exchange highspeed, stable data with centralized servers (Hu et al. 2016; Zhou et al. 2020).
In order to meet different needs in different practical situations, WBANâ€™s architecture varies widely. The typically designed WBAN consists of the heathcare center (HC), the personal controller (PC), and many wireless medical sensors. These sensors can perform important biomedical information collection in various ways (Ji et al. 2018; Sambandam et al. 2020). Therefore, appropriate physiological data related to heart rate, body temperature and blood pressure can be measured separately through sensors. The collected personal physical information is then sent to the HC and processed. Based on this, regular medical services can be provided to large numbers of patients simultaneously (Zhang et al. 2013). It is important to note that HC is considered as a secure data center and an effective entity responsible for distributing core information. Hence, we assume that all participating sensors and PC secret key information is always safely stored at the HC side. Personal controller (PC) is a portable device used to aggregate personal sensor data (Yuan et al. 2020). Sensitive biomedical data is then transmitted to the remote server via PC. WBAN sensors (includes wearable and implantable sensors) are the lowpower wireless medical devices subject to computing, communication, power supply, and storage (Liu et al. 2020; Anjum et al. 2020). On the other hand, increasing the calculation and transmission load on the sensor side will release more energy into heat and eventually damage the human organs. As a result, lowcost operations should be performed in WBAN sensors side.
In actual WBAN scenarios, the frequent data exchange between the sensor and the PC is carried out in the open wireless environment, and the important biometric data transmitted is easily affected by various security attacks and privacy risks (Yang and Chang 2009; Li et al. 2018; Huang et al. 2020; Xiong and Qin 2015). In this case, advanced security strategies and privacy protection technologies are essential to WBANs. The effective authentication mechanism between wireless entities is mandatory, providing preliminary protection for WBAN interactions (Shen et al. 2016; He et al. 2017). Therefore, various charts and unknown security threats such as eavesdropping, impersonation, message replaying can be prevented (Liu et al. 2020). After mutual authentication, efficient group key distribution and management of all verified wearable sensors is of great significance (Anjum et al. 2020). Therefore, subsequent private biometric data can be safely transmitted. Message broadcasting between all legal sensors can also be realized (Liu et al. 2014).
In this paper, we develop a pairingfree authentication and sensor cooperation scheme in cloudassisted WBANs, where major security requirements for WBAN sensors could be satisfied. Our design guarantee the sensor anonymity in the whole transmission session. Note that our design offers pairingfree validation procedure followed with active sensor cooperation, which is suitable for massive sensor scenarios. The security analysis proves that our designed scheme is capable of achieving desired security properties and offer adequate resistances to the charted malicious attacks. Meanwhile, security comparison demonstrates that the proposed protocol is superior to other existing schemes.
Related work
Recently, many research papers have been published, which focus on secure data transmission for WBANs. Firstly, the traditional public key cryptography (TPKC) techniques has been utilized to the wireless mobile environment (Horn and Preneel 1998; Shen et al. 2017; Zhang et al. 2020). However, relatively large computation cost is made, which is not practical for resourceconstrained sensors. Thereafter, many schemes with elliptic curve cryptography (ECC) have been presented (Zhang et al. 2013).
Meanwhile, several identification and key agreement mechanisms have been proposed in (Yang and Chang 2009; Wang 2015), which all adopt the identitybased key cryptography (IDPKC). In IDPKC, the key generation center (KGC) is responsible for generating public keys, which could drastically decrease the computation cost for encrypting and decrypting procedure.
However, IDPKC schemes is vulnerable to key escrow problem. Hence, certificateless public key cryptography (CLPKC) is proposed (AlRiyami and Paterson 2003). So far many certificateless authentication schemes have been proposed. Xiong (2014) proved that protocols of (Liu et al. 2014) cannot provide scalability and forward security. Liu et al. (2014) designed the enhanced CLPKC protocol for WBAN scenarios. Meanwhile, the certificateless encrypting and signing mechanism is developed in (Xiong and Qin 2015). The efficient and scalable identity revocation mechanism is adopted. Li et al. (Li and Hong 2016) designed an efficient certificateless signcryption scheme with the corresponding access control method. Thereafter, ciphertextpolicy attributebased encryption is deployed (Hu et al. 2016). Focusing on preserving the user real identity, another anonymousidentity authenticating scheme is presented (He et al. 2017), which overcomes the security vulnerability in (Liu et al. 2014). In 2018, Ji et al. presented an certificateless conditional privacypreserving authentication (CPPA) scheme for WBAN (Ji et al. 2018). The proposed method offers batch authentication towards massive number of participant users, which could significantly reduce the computational cost of the WBAN service provider (SP). Currently, several novel WBAN authentication mechanisms are proposed (Li et al. 2018). Thereafter, X. Li and L. Wang (Li and Wang 2012) proposed a fast certificateless authentication scheme employing bilinear pairing in wireless communication scenarios.
Model definition and preliminaries
In this section, the related preliminaries are introduced. Thereafter, the corresponding notations, and system model are illustrated as follows.
Elliptic curve cryptosystem (ECC)
We define p>3 as a large prime, \(\mathbb {F}_{p}\) be the finite field of order p, where \(a,b\in \mathbb {F}_{p}\) could satisfy 4a^{3}+27b^{2} (mod p)â‰ 0. The elliptic curve E_{p}(a,b) on a finite field \(\mathbb {F}_{p}\) is defined as follows
where \(\left (x,y \right) \in \mathbb {F}_{p}\). As for E_{p}(a,b), the addition operation on this curve is defined as point doubling when the two points are identical. Otherwise, it is defined as point addition. All the points on the curve E_{p}(a,b), and the point at the infinity âˆž could form an additive Abelian group \(E\left (\mathbb {F}_{p} \right)\). In this way âˆž=(âˆ’âˆž) acts as the identity element.
Bilinear pairing
We define \(\mathbb {G}_{1}\) as a cyclic additive group generated by the large prime number q, and \(\mathbb {G}_{2}\) as the cyclic multiplicative group with the same prime order. A mapping function \(\hat {e}:\mathbb {G}_{1}\times \mathbb {G}_{1}\rightarrow \mathbb {G}_{2}\) is constructed as the bilinear pairing if and only if the following three properties could be satisfied all:

1
Bilinearity:\(\forall P, Q, R\in \mathbb {G}_{1}\) and \(\forall a, b \in \mathbb {Z}_{q}^{*}\), there is
$$\left\{ \begin{array}{l} \hat{e}\left(aP,bQ \right) =\hat{e}\left(P,bQ \right)^a=\hat{e}\left(aP,Q \right)^b=\hat{e}\left(P,Q \right)^{ab}\\ \hat{e}\left(P,Q+R \right) =\hat{e}\left(Q+R,P \right) =\hat{e}\left(P,Q \right) \hat{e}\left(P,R \right)\\ \end{array} \right.. $$ 
2
Nondegeneracy:\(\exists P,Q\in \mathbb {G}_{1}\) such that \(\hat {e}\left (P,Q \right) \ne 1_{\mathbb {G}_{2}}\), where \(1_{\mathbb {G}_{2}}\) is defined as the identity element of \(\mathbb {G}_{2}\).

3
Computability:\(\forall P,Q\in \mathbb {G}_{1}\), there exists an efficient algorithm to compute \(\hat {e}\left (P,Q \right)\).
In this way, the bilinear map \(\hat {e}\) that satisfies the above three properties can be constructed with the modified Weil pairing or Tate pairing under the supersingular elliptic curve \(\mathbb {G}_{1}\). The following related characteristics are presented.
Computational diffieHellman problem (CDHP)
We define \(P,aP,bP\in \mathbb {G}_{1}\) for \(a,b\in \mathbb {Z}_{q}^{*}\), where P is the generator of \(\mathbb {G}_{1}\), the advantage for any probabilistic polynomialtime (PPT) algorithm \(\mathcal {A}\) in computing abP so as to solve the CDHP problem is negligible, which can be defined as:
Elliptic curve discrete logarithm problem (ECDLP)
Given \(P,Q\in \mathbb {G}_{1}\), where Q=aP. In order to solve the ECDLP problem, the advantage for any probabilistic polynomialtime (PPT) algorithm \(\mathcal {A}\) in finding the integer \(a\in \mathbb {Z}_{q}^{*}\) can be defined as:
Hash function
The oneway hash function is defined to be secure if the following three properties can be satisfied:

1
If input a message x which is of arbitrary length, it is computationally easy to compute a message digest of the fixed length output h(x).

2
With y, it is difficult to compute x=h^{âˆ’1}(y).

3
With x, it is computationally infeasible to get x^{â€²}â‰ x such that h(x^{â€²})=h(x) holds.
Notations
The notations used in our design are briefly introduced in Table 1.
System model
The structure of our cloudassisted WBANs is shown in Fig. 1, where the whole WBAN system consists of three essential entities: the cloudbased healthcare center (HC), the personal controller (PCs) and the medical sensors. Note that the HC consists of medical database, central authority (CA), and law enforcement agency (LEA). Description of these entities are respectively illustrated below.
Healthcare center (HC)
HC is mainly composed of the central authority (CA), the medical database, and the law enforcement agency (LEA). Each of the entities play different roles. CA is responsible for processing the vital system operations, including patient registration and secret key generation. The significant user personal information, such as identity number and the private password, are stored in the medical database. It is worth noting that the remote cloud server could provide adequate storage for database. CA is infeasible to be compromised by the adversaries. The remaining LEA is for the illegal behavior management, which is usually performed as the government department. All the sensor revocation and registration process by CA should be fully acknowledged to the LEA department. The three entities: LEA, CA, and database together, are considered as the cloudassited HC. Typically, HC is defined as a medical service provider and a trusted key management center. The important personal data will be transmitted to HC, which could reflect the patientâ€™s realtime physical condition. Therefore, the corresponding medication for the specific patient is available.
Personal controllers (PCs)
In general, personal controllers (PCs) are defined as specialized medical equipment with specific medical purposes. It is assumed that the PC is a portable device with a function of collecting and communicating biometric information with HC. In other words, the importan physiological data collected from several WBANs sensors will be delivered to the personal controller. Note that each user of WBAN is connected with a specific personal controller.
Sensors
The sensor is assumed to be implanted or attached to the userâ€™s body as a wireless biomedical device. Sensors have limited computational power and battery capacity. The sensor is responsible for realtime measurement of various physiological indicators of specific user. Typically, multiple sensors, each responsible for monitoring different biometrics, are effective within the human body range. All important personal data collected is transferred to the PC via an open wireless connection. Note that all physiological sensor data collected are timerelated parameters.
Proposed authentication and key distribution scheme
In this section, we describe the proposed practical authentication and key distribution scheme in cloudassisted WBANs. The proposed scheme consists of two subsections: PCtosensor mutual authentication, and group key generation between sensors, which will be described respectively.
PCtoSensor mutual authentication
Our design on PCtosensor authentication does not need the secure transmission channels for crucial key extraction. As a matter of fact, the constant device identity and private password are the only two required parameters. The security assurance of our mechanism is based on the hardness of the previously introduced CDH problem, which has been briefly introduced in the previous section. The authenticating process of our design is shown in Fig. 2.
Firstly, in our design, each medical sensor should register to the LEA initially before use. Each sensor is assigned the unique identity number, which is defined as the static parameter representing the original identity of certain sensor. It is worth noting that the allocated identity will be kept unchanged since the beginning. Meanwhile, the confidential password for each sensor will be randomly generated by the WBAN managing system. In this way, the identity number, and the confidential password for each sesnor i, which are respectively denoted as Î›_{i} and Îº_{i}, are stored in the cloud medical database, where only CA and LEA have access to.
We define \(\mathbb {G}_{\mathcal {H}}\) as the cyclic additive group which is generated by the generator P with an order q. CA then chooses the system master key s randomly and then computes the system public key P_{pub} in the way of
The secure hash functions used in our method H_{1}, H_{2} and H_{3} are respectively defined as follows:
where \(\mathbb {Z}^{*}_{\mathcal {P}}\) is defined as the nonnegative integer set less than the predefined large prime number \(\mathcal {P}\).
It is worth noting that the generator P, the public key P_{pub}, the three oneway hash function H_{1}, H_{2}, and H_{3}, as well as \(\mathbb {G}_{\mathcal {H}}\) will all be published to the nearby WBAN devices, while the system master key s is kept secret during the whole session. The detailed steps for WBAN authentication are as follows:
First, each sensor i random generates Î¾_{i} as the original key seed. Hence, sensor will compute \(\mathcal {R}_{i}\) according to
Thereafter, the parameter Ï…_{i} is calculated, which combines the original identity number Î›_{i} and the generated random number Î¾_{i}. Note that the value of Î›_{i} remain constant. Hence, the random value Î¾_{i} could help improve the resistance to several malicious attacks. The Ï…_{i} is calculated as
For different authentication session, the Ï…_{i} is dynamic in this case. Also, it is worth emphasizing that CA will not reveal the identity number Î›_{i} of individual i to any user (PC). In this way, the real identity of sensor is beyond PCâ€™s reach. Thus, under extreme occasions with collision by malicious PC, the adversaries cannot retrieve the confidential message by tracing the unique identity of particular sensor. Moreover, instead of using the private secret key totally from the PC, the generated Î¾_{i} is considered as the partial private key and safely stored in sensor side.
Subsequently, the corresponding Ï•_{i} is generated by sensor i as follows:
where the sensor i adopts its previous generated password Îº_{i}. Vehicle i then gathers \(\left \langle \mathcal {R}_{i}, \upsilon _{i}, \phi _{i} \right \rangle \) and forwards it to PC.
As mentioned above, our method assign the heavy computation and storage task to the remote cloud server (medical database and CA). In this way, the portable PCs does not need to process the heavy tasks. Instead, PCs perform as the forwarding channel between massive sensors and cloud CA. It means a lot for practical consideration since the computation and storage of each PC are related restricted compared to the cloud server.
Moreover, in our system model we consider the PCs as the benign entities in most of the time. As mentioned above, in certain cases the PCs may be compromised or disabled physically. Hence in our assumption the PCs do not need to act as the vital key generation and verification center. In fact, in our design, upon receiving the message \(\left \langle \mathcal {R}_{i}, \upsilon _{i}, \phi _{i} \right \rangle \) from sensor i, PC is designed to directly forward the acquired medical data to the cloudbased CA, which is responsible for partial secret key distribution and identification.
As illustrated previously, the sensor iâ€™s identity number Î›_{i} and the corresponding password Îº_{i} are stored in cloud medical database. Initially, the value of H_{1}(Î›_{i}) for all the sensors are also calculated and stored in database. In this case, upon receiving the request, CA computes
using the received Ï…_{i}. Then CA first add \(\mathcal {R}_{i}\) to all the stored H_{1}(Î›_{i}) as follows
In this way, CA compares the computed Î”_{i} with the received Ï…_{i} and finally searches the IÎ›_{i} of the requesting sensor from remote database. Then CA checks the correctness of
The correctness is elaborated as follows:
If the above Î“_{i} is validated, CA will also check the correctness of the received Ï•_{i} by combing the stored sensor information (Î›_{i}, Îº_{i}) with the received \(\mathcal {R}_{i}\).
In practical application scenario with n assumed sensors, the verifying process in CA side is similar to the above single sensor situation. CA will then check the correctness as
That is,
In the occasions where both Ï…_{i} and Ï•_{i} are proved to be correct, CA is then capable of deriving Î¾_{i} by
where Î¾_{i} is stored in the medical database. The database processing is briefly shown in Fig. 3. Note that Î¾_{i} is shared between CA and sensor i, while PC has zero knowledge about it.
In the next, CA generates random value k_{i} for each sensor i. The value of W_{i} and y_{i} are calculated in the way of
Note that \(\left \langle \mathcal {R}_{i}, W_{i}, y_{i} \right \rangle \) will be broadcast to sensor i through PC. Sensor derives the assigned key P S K_{i} by
The validity of the received information will also be checked by sensor i:
That is,
As for multiple sensors, the following batch checking process can be done:
In this way, the sensor and CA are mutually authenticated. As for PC, necessary information are allocated by remote CA to help build the secure data transmission channel. Thus CA computes
and send to PC.
At this point, the sensitive medical data \(\mathcal {M}_{i}\) from sensor i is delivered as
The related verification can be done by PC as
The batch verification process is as follow:
Sensor revocation
If expired or illegal sensors detected, the relevant acknowledgment message should be sent to the law enforcement agency. After approval, the PC will revoke the sensors by deleting the stored Î¨_{i} and Î¥_{i} from its storage. The revocation can be done in this way.
Sensor group key distribution
In this subsection the sensor group key distribution scheme is presented, where all the participating sensors will cooperate with each other as shown in Fig. 4. The detailed steps are presented as follows:
We assume there are n legitimate sensor in PCâ€™s effective range. At first, all the sensors (iâˆˆ[1,n]) randomly generates its own Î³_{i} and computes
Then \(\left \langle z_{i}, \mathcal {W}_{i}, H(\mathcal {W}_{i}) \right \rangle \)((iâˆˆ[1,n]) is broadcast to all. All the n sensors can be informed of the rest nâˆ’1 messages. According to the value of z_{i}, the sensor i could sort the received message. Then the sequence of
is generated. Each sensor listed in this sequence computes
where \(\mathcal {W}_{i1}\) and \(\mathcal {W}_{i+1}\) refers to the values from sensor iâ€™s neighbors, that is, sensor iâˆ’1 and sensor i+1. In this way, all the n sensors acquire \(\mathbb {F}_{i}\) and then broadcast \(\left \langle \mathbb {I}, \mathbb {F}_{i}, H_{2}(\mathbb {I}, \mathbb {F}_{i})\right \rangle \) to all, where \(\mathbb {I}\) is the sequence number of sensors in ã€ˆz_{1},...,z_{iâˆ’1},z_{i},z_{i+1},...,z_{n}ã€‰ (\(\mathbb {I}\in [1,n]\)) The sensor cooperation procedure is shown in Fig. 5.
In this way, each sensor could finally received nâˆ’1 requests. After checking the validity of the hashed value \(H_{2}(\mathbb {I}, \mathbb {F}_{i})\), sensor i will combine all the values together in the way as follows
where \(\mathcal {Y}\) is defined as the intermediate key. In this way, all the sensors acquire the same \(\mathcal {Y}\). As we previous introduced, PC randomly choose Ï‰ and delivered Ï‰P_{pub} to all the sensors i first. Hence the final group key \(\mathcal {K}\) is achieved by combing \(\mathcal {Y}\) with Ï‰P generated by PC. That is,
Security analysis
In this section, we briefly describe the security properties of the proposed authentication scheme.
Certificateless authentication
As illustrated above, certificateless key distribution design is adopted in our scheme. That is, the CA only generates part of the secret for each sensors. Hence the key escrow problem can be addressed. That is, during the authentication phase, both HC and PC have zero knowledge on the selfgenerated random partial secret key in the sensor side. In this way, impersonation attack on specific sensor cannot pass the validation. The generated key is not revealed to PC during the whole process. Hence, the compromising of PC will not brings negative effect to the whole WBAN system. In this way, the certificateless authentication property is provided.
Mutual authentication
Our scheme deploys the proper authenticating strategies, which is able to provide mutual authentication property between the remote CA and sensors. Note that only two communication rounds are required during our mutual authentication process. Moreover, the batch authentication on multiple sensors is also available, which provides new prospect for practical implementation of WBANs.
Sensor anonymity & conditional privacy
In our design, instead of using the deviceâ€™s real identity, we apply the selfgenerated anonymous identity, which also combines the stored static identity information Î›_{i}. Hence illegal tracing towards certain sensor can be prevented. Moreover, the real identity of the sensor can be revealed if abnormal behavior is detected under extreme situations. Hence the accountability is presented.
Resistance to mITM attack
In the proposed scheme, the hash function is utilized in the whole authentication session with the purpose of resisting the ManInTheMiddle attack. The MITM attack is conducted by modifying the legitimate messages without being detected. In our design, the receiver side will check the validity upon receiving every message. With the adopted hash function for message confidentiality preservation, the MITM attack can be prevented.
Resistance to replay attack
As mentioned above, the pseudorandom value generator is adopted in both HC and sensor side, which could guarantee the resistance to replay attack. In this way, the reusing on the previously acquired information can not pass the current authentication session. On the other hand, each transmitted packet set contain obvious timerelated information (timestamp) revealing precise time sequence.
Cooperative sensor key establishment
In our scheme, the sensors group key is cooperatively generated by all the participating sensors. Note that neither CA nor PC has full control of the group key generation.
Comparison on security properties
In this section, we present the comparison in terms of the crucial security properties for WBANs authentication scenarios. Our WBAN authentication design is compared with the stateoftheart WBAN authentication and key agreement schemes including MLAP (Shen et al. 2018), ATCC (Jiang et al. 2017), and HAKE (Drira et al. 2012) with the aim of demonstrating its superiority on security. The security comparison results are presented in Table 2, showing that the proposed scheme could satisfy all the desired security requirements.
Conclusion
In this paper, an efficient cloudassisted pairingfree grouping authentication scheme in cloudassisted WBANs is presented. In our design, the sensor anonymity is provided during the whole communication. Moreover, the cooperative sensor association mechanism is given, where the sensor group key is generated by the intercommunication between the legitimate participating WBAN sensors. The proposed scheme could satisfy desired security properties and provide resistance to major security attacks.
Availability of data and materials
All data generated or analysed during this study are included in this published article and its supplementary information files.
References
AlRiyami, S, Paterson K (2003) Certificateless public key cryptography In: Proc. of Advances in CryptologyASIACRYPT 2003, 452â€“473.. Springer Berlin Heidelberg, Berlin.
Anjum, M, Wang H, Fang H (2020) Prospects of 60 ghz mmwave wban: A phymac joint approach. IEEE Trans Veh Technol 69(6):6153â€“6164.
Drira, W, Ã‰ric Renault, Zeghlache D (2012) A hybrid authentication and key establishment scheme for wban In: IEEE 11th International Conference on Trust, Security and Privacy in Computing and Communications, 78â€“83.
He, D, Zeadally S, Kumar N, Lee JH (2017) Anonymous authentication for wireless body area networks with provable security. IEEE Syst J 11(4):2590â€“2601.
Horn, G, Preneel B (1998) Authentication and payment in future mobile systems In: European Symposium on Research in Computer Security, 277â€“293.. Springer Berlin Heidelberg, Berlin, Heidelberg.
Hu, C, Li H, Huo Y, Xiang T, Liao X (2016) Secure and efficient data communication protocol for wireless body area networks. IEEE Trans MultiScale Comput Syst 2(2):94â€“107.
Huang, X, Wu Y, Ke F, Liu K, Ding Y (2020) An energyefficient and reliable scheduling strategy for dynamic wbans with channel periodicity exploitation. IEEE Sensors J 20(5):2812â€“2824.
Ji, S, Gui Z, Zhou T, Yan H, Shen J (2018) An efficient and certificateless conditional privacypreserving authentication scheme for wireless body area networks big data services. IEEE Access 6:69603â€“69611.
Jiang, Q, Kumar N, Ma J, Shen J, He D, Chilamkurti N (2017) A privacyaware twofactor authentication protocol based on elliptic curve cryptography for wireless sensor networks. Int J Netw Manag 27(3):1937.
Li, F, Han Y, Jin C (2018) Costeffective and anonymous access control for wireless body area networks. IEEE Syst J 12(1):747â€“758.
Li, F, Hong J (2016) Efficient certificateless access control for wireless body area networks. IEEE Sensors J 16(13):5389â€“5396.
Li, X, Wang L (2012) A Rapid Certification Protocol from Bilinear Pairings for Vehicular Ad Hoc Networks In: Proc. of IEEE 11th International Conference on Trust, Security and Privacy in Computing and Communications, 890â€“895.. IEEE, Liverpool.
Liu, C, Liu H, Cong Y, Li P, Mao Z, Zhang H (2020) Throughput maximization by time switching in multipoint wban with fairness consideration. IEEE Access 8:107661â€“107668.
Liu, J, Zhang Z, Chen X, Kwak K (2014) Certificateless remote anonymous authentication schemes for wirelessbody area networks. IEEE Trans Parallel Distrib Syst 25(2):332â€“342.
Sambandam, P, Kanagasabai M, Natarajan R, Alsath M, Palaniswamy S (2020) Miniaturized buttonlike wban antenna for offbody communication. IEEE Trans Antennas Propag 68(7):5228â€“5235.
Shen, J, Chang S, Shen J, Liu Q, Sun X (2018) A lightweight multilayer authentication protocol for wireless body area networks. Futur Gener Comput Syst 78:956â€“963.
Shen, J, Tan H, Ren Y, Liu Q, Wang B (2016) A practical rfid grouping authentication protocol in multipletag arrangement with adequate security assurance In: 2016 18th International Conference on Advanced Communication Technology (ICACT), 693â€“699.. IEEE, Pyeongchang.
Shen, J, Tan H, Zhang Y, Sun X, Xiang Y (2017) A new lightweight rfid grouping authentication protocol for multiple tags in mobile environment. Multimed Tools Appl 76(21):22761â€“22783.
Wang, H (2015) Identitybased distributed provable data possession in multicloud storage. IEEE Trans Serv Comput 8(2):328â€“340.
Xiong, H (2014) Costeffective scalable and anonymous certificateless remote authentication protocol. IEEE Trans Inf Forensic Secur 9(12):2327â€“2339.
Xiong, H, Qin Z (2015) Revocable and scalable certificateless remote authentication protocol with anonymity for wireless body area networks. IEEE Trans Inf Forensic Secur 10:1442â€“1455.
Yang, JH, Chang CC (2009) An idbased remote mutual authentication with key agreement scheme for mobile devices on elliptic curve cryptosystem. Comput Secur 28(3):138â€“143.
Yuan, X, Tian H, Wang H, Su H, Liu J, Taherkordi A (2020) Edgeenabled wbans for efficient qos provisioning healthcare monitoring: A twostage potential gamebased computation offloading strategy. IEEE Access 8:92718â€“92730.
Zhang, L, Liu J, Sun R (2013) An efficient and lightweight certificateless authentication protocol for wireless body area networks In: 2013 5th International Conference on Intelligent Networking and Collaborative Systems, 637â€“639.. IEEE, Xiâ€™an.
Zhang, X, Huang C, Zhang Y, Zhang J, Gong J (2020) Ldvas: Latticebased designated verifier auditing scheme for electronic medical data in cloudassisted wbans. IEEE Access 8:54402â€“54414.
Zhou, T, Shen J, Li X, Wang C, Tan H (2020) Logarithmic encryption scheme for cyberphysical systems employing fibonacci qmatrix. Futur Gener Comput Syst 108:1307â€“1313.
Acknowledgements
Not applicable
Funding
Not applicable
Author information
Authors and Affiliations
Corresponding author
Additional information
Publisherâ€™s Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
Open Access This article is licensed under a Creative Commons Attribution 4.0 International License, which permits use, sharing, adaptation, distribution and reproduction in any medium or format, as long as you give appropriate credit to the original author(s) and the source, provide a link to the Creative Commons licence, and indicate if changes were made. The images or other third party material in this article are included in the articleâ€™s Creative Commons licence, unless indicated otherwise in a credit line to the material. If material is not included in the articleâ€™s Creative Commons licence and your intended use is not permitted by statutory regulation or exceeds the permitted use, you will need to obtain permission directly from the copyright holder. To view a copy of this licence, visit http://creativecommons.org/licenses/by/4.0/.
About this article
Cite this article
Song, Y., Tan, H. Practical pairingFree sensor cooperation scheme for cloudAssisted wireless body area networks. Cybersecur 3, 21 (2020). https://doi.org/10.1186/s42400020000617
Received:
Accepted:
Published:
DOI: https://doi.org/10.1186/s42400020000617