首页 | 官方网站   微博 | 高级检索  
     


The yoking-proof-based authentication protocol for cloud-assisted wearable devices
Authors:Wei Liu  Hong Liu  Yueliang Wan  Huafeng Kong  Huansheng Ning
Affiliation:1.School of Computer Science,Beijing University of Posts and Telecommunications,Beijing,China;2.Research Institute, Run Technologies Co., Ltd. Beijing,Beijing,China;3.Key Laboratory of Information Network Security,The Third Research Institute of the Ministry of Public Security,Shanghai,China;4.School of Computer and Communication Engineering,University of Science and Technology Beijing,Beijing,China
Abstract:Along with the development of IoT applications, wearable devices are becoming popular for monitoring user data to provide intelligent service support. The wearable devices confront severe security issues compared with traditional short-range communications. Due to the limitations of computation capabilities and communication resources, it brings more challenges to design security solutions for the resource-constrained wearable devices in IoT applications. In this work, a yoking-proof-based authentication protocol (YPAP) is proposed for cloud-assisted wearable devices. In the YPAP, a physical unclonable function and lightweight cryptographic operators are jointly applied to realize mutual authentication between a smart phone and two wearable devices, and yoking-proofs are established for the cloud server to perform simultaneous verification. Meanwhile, Rubin logic-based security formal analysis is performed to prove that the YPAP has theoretical design correctness. It indicates that the proposed YPAP is flexible for lightweight wearable devices in IoT applications.
Keywords:
本文献已被 SpringerLink 等数据库收录!
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司    京ICP备09084417号-23

京公网安备 11010802026262号