Efficient Certificateless Access Control For Wireless Body Area Networks

Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 9

EFFICIENT CERTIFICATELESS ACCESS CONTROL

FOR WIRELESS BODY AREA NETWORKS


ABSTRACT
Wireless body area networks (WBANs) are expected to act as an important role in
monitoring the health information and creating a highly reliable ubiquitous healthcare
system. Since the data collected by the WBANs are used to diagnose and treat, only
authorized users can access these data. Therefore, it is important to design an access
control scheme that can authorize, authenticate, and revoke a user to access the WBANs.
In this paper, we first give an efficient certificateless signcryption scheme and then
design an access control scheme for the WBANs using the given signcryption. Our
scheme achieves confidentiality, integrity, authentication, non-repudiation, public
verifiability,and ciphertext authenticity. Compared with existing three access control
schemes using signcryption, our scheme has the least computational cost and energy
consumption for the controller. In addition, our scheme has neither key escrow nor public
key certificates, since it is based on certificateless cryptography.
INTRODUCTION

What is Mobile Computing?

Mobile computing is the discipline for creating an information management platform,


which is free from spatial and temporal constraints. The freedom from these constraints
allows its users to access and process desired information from anywhere in the space.
The state of the user, static or mobile, does not affect the information management
capability of the mobile platform. A user can continue to access and manipulate desired
data while traveling on plane, in car, on ship, etc. Thus, the discipline creates an illusion
that the desired data and sufficient processing power are available on the spot, where as
in reality they may be located far away. Otherwise Mobile computing is a generic term
used to refer to a variety of devices that allow people to access data and information from
where ever they are.

Structure of mobile computing

1.1 Different types of devices used for the mobile computing:

 Personal digital assistant/enterprise digital assistant


 Smartphones

 Tablet computers

 Netbooks

 Ultra-mobile PCs

 Wearable computers

 Palmtops/pocket computers

1.2 Applications of Mobile Computing:

 Vehicles:  
                    Tomorrow’s cars will comprise many wireless communication systems and
mobility aware applications.  Music, news, road conditions, weather reports, and other
broadcast information are received via digital audio broadcasting (DAB) with 1.5 M-
bits/s.  For personal communication, a global system for mobile communications (GSM)
phone might be available offering voice and data connectivity with 384 k-bits/s.  For
remote areas satellite communication can be used, while the current position of the car is
determined via global positioning system (GPS).  Additionally, cars driving in the same
area build a local ad-hoc network for fast information exchange in emergency situations
or to help each other keeping a safe distance.   In case of an accident, not only will the
airbag be triggered, but also an emergency call to a service provider informing ambulance
and police.  Cars with this technology are already available.  Future cars will also inform
other cars about accidents via the ad hoc network to help them slow down in time, even
before a driver can recognize the accident.  Buses, trucks, and train are already
transmitting maintenance and logistic information to their home base, which helps o
improve organization (fleet management), and thus save time and money.

 Emergency:  
                    Just imagine the possibilities of an ambulance with a high quality wireless
connection to a hospital.  After an accident, vital information about injured persons can
be sent to the hospital immediately.  There, all necessary steps for this particular type of
accident can be prepared or further specialists can be consulted for an early diagnosis. 
Furthermore,           wireless networks are the only means of communication in the case
of natural disasters such as hurricanes or earthquakes.
 Business:
                   Today’s typical traveling salesman needs instant access to the company’s
database: to ensure that the files on his or her laptop reflect the actual state, to enable the
company to keep track of all activities of their traveling employees, to keep databases
consistent etc., with wireless access, the laptop can be turned into a true mobile office.
1.3 Benefits of Mobile Computing:

 Improve business productivity by streamlining interaction and taking advantage of


immediate access

 Reduce business operations costs by increasing supply chain visibility, optimizing


logistics and accelerating processes

 Strengthen customer relationships by creating more opportunities to connect,


providing information at their fingertips when they need it most

 Gain competitive advantage by creating brand differentiation and expanding


customer experience

 Increase work force effectiveness and capability by providing on-the-go access

 Improve business cycle processes by redesigning work flow to utilize mobile


devices that interface with legacy applications
Advantages of Mobile Computing:

Mobile computing has changed the complete landscape of human being life. Following
are the clear advantages of Mobile Computing:

 Location flexibility:

This has enabled user to work from anywhere as long as there is a connection established.
A user can work without being in a fixed position. Their mobility ensures that they are
able to carry out numerous tasks at the same time perform their stated jobs.

 Saves Time:

The time consumed or wasted by travelling from different locations or to the office and
back, have been slashed. One can now access all the important documents and files over
a secure channel or portal and work as if they were on their computer. It has enhanced
telecommuting in many companies. This also reduces unnecessary expenses that might be
incurred.

 Enhanced Productivity:

Productive nature has been boosted by the fact that a worker can simply work efficiently
and effectively from which ever location they see comfortable and suitable. Users are
able to work with comfortable environments.

 Ease of research:

Research has been made easier, since users will go to the field and search for facts and
feed them back to the system. It has also made it easier for field officer and researchers to
collect and feed data from wherever they without making unnecessary trip to and from
the office to the field.

 Entertainment:
Video and audio recordings can now be streamed on the go using mobile computing. It's
easy to access a wide variety of movies, educational and informative material. With the
improvement and availability of high speed data connections at considerable costs, one is
able to get all the entertainment they want as they browser the internet for streamed data.
One can be able to watch news, movies, and documentaries among other entertainment
offers over the internet. This was not such before mobile computing dawned on the
computing world.

 Streamlining of Business Processes:

Business processes are now easily available through secured connections. Basing on the
factor of security, adequate measures have been put in place to ensure authentication and
authorization of the user accessing those services.

Some business functions can be run over secure links and also the sharing of information
between business partners. Also it's worth noting that lengthy travelling has been
reduced, since there is the use of voice and video conferencing.

Meetings, seminars and other informative services can be conducted using the video and
voice conferencing. This cuts down on travel time and expenditure.

1.3 OBJECTIVE OF THE PROJECT


We give a CLSC scheme with public verifiability and ciphertext authenticity. We design
an access control scheme for the WBANs using the CLSC with public verifiability and
ciphertext authenticity.

Our scheme achieves confidentiality, integrity, authentication, non-repudiation, public


verifiability and ciphertext authenticity. In addition, the proposed scheme has neither key
escrow problem nor public key certificates.
The controller can verify the validity of a ciphertext without decryption. Compared with
existing three access control schemes using signcryption, our scheme has the least
computational cost and energy consumption for the controller.
CHAPTER 2

SYSTEM ANALYSIS

In this phase a detailed appraisal of the existing system is explained. This


appraisalincludes how the system works and what it does. It also includes findingout in
more detail- what are the problems with the system and what userrequires from the new
system or any new change in system.The output of this phase results in the detail model
of the system.The model describes the system functions and data and system
informationflow. The phase also contains the detail set of user requirements and
theserequirements are used to set objectives for the new system.

2.1 CURRENT SYSTEM:

Security issues in the WBANs must be solved before real development . Some secure
schemes for the WBANs have been proposed for different security goals. In 2013,
discussed how to protect the communication between external users and the WBANs.
Their solution is attribute-based encryption (ABE) . However, the ABE may not be a
good choice since it requires some costly cryptographic operations. These costly
operations are a heavy burden for resource-limited sensor nodes . proposed a privacy
preserving opportunistic method for the WBANs. This method can obtain reliable data
process and transmission with minimal privacy disclosurediscussed the key management
problem of the WBANs. In order to reduce the energy consumption, they used energy-
based multihop-routechoice method and biometrics synchronization mechanism.
discussed how to provide a secure communication channel in the WBANs. They used the
lightweight one-way hash chain to establish session keys. designed an efficient identity-
based encryption (IBE) scheme named IBE-Lite for the WBANs.

3.2 SHORTCOMINGS OF THE CURRENT SYSTEM:


The WBANs creating a highly reliable ubiquitous healthcare system.
Security issue Occur.

3.3 PROPOSED SYSTEM:

We give a CLSC scheme with public verifiability and ciphertext authenticity.


We design an access control scheme for the WBANs using the CLSC with public
verifiability and ciphertext authenticity. Our scheme achieves confidentiality,
integrity, authentication, non-repudiation, public verifiability and ciphertext authenticity.
In addition, the proposed scheme has neither key escrow problem nor public key
certificates. The controller can verify the validity of a ciphertext without decryption.
Compared with existing three access control schemes using signcryption, our
scheme has the least computational cost and energy consumption for the controller.

3.4 ADVANTAGE OF PROPOSED SYSTEM:

 Our scheme achieves confidentiality, integrity, authentication, non-repudiation,


public verifiability and ciphertext authenticity.
 The proposed scheme has neither key escrow problem nor public key certificates.
 Our scheme has the least computational time and energy consumption.

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy