Skip to main content
Erschienen in: Wireless Personal Communications 4/2021

19.02.2021

Efficient Certificateless Signcryption Scheme for Wireless Sensor Networks in Ubiquitous Healthcare Systems

verfasst von: Philemon Nthenge Kasyoka, Michael Kimwele, Shem Angolo Mbandu

Erschienen in: Wireless Personal Communications | Ausgabe 4/2021

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

With the current developments in wireless networks, the use of Wireless sensor networks (WSNs) in the medical field has attracted a lot of attention. WSNs are being used to collect and transmit patient physiological information in ubiquitous healthcare systems. One of the major challenges in healthcare systems is security and privacy of patients’ vital data. By its very nature, a wireless sensor network provides a resource constrained environment and sensor nodes used in WSNs are limited in terms resource usage. Keeping data secure in a resource constraint environment is an important and challenging task. Hence, the need for secure and more efficient cryptosystems. In this paper, we are proposing a secure pairing-free certificateless signcryption scheme for use in ubiquitous healthcare systems. We compare the efficiency of our proposed scheme with other related signcryption schemes. A formal security proof for indistinguishability against adaptive chosen ciphertext attack and unforgeability against adaptive chosen message attack for our scheme is presented in random oracle model.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Virone, G., Wood, A., Selavo, L., Cao, Q., Fang,L., Doan,T., He, Z. & Stankovic, J. A. (2006). An Advanced Wireless Sensor Network for Health. in Transdisciplinary Conference on Distributed Diagnosis and Home Healthcare (D2H2). Virone, G., Wood, A., Selavo, L., Cao, Q., Fang,L., Doan,T., He, Z. & Stankovic, J. A. (2006). An Advanced Wireless Sensor Network for Health. in Transdisciplinary Conference on Distributed Diagnosis and Home Healthcare (D2H2).
2.
Zurück zum Zitat Chipara, O., Lu, C., Bailey, T. C., & Roman, G. C. (2009). Reliable patient monitoring: A clinical study in a step-down hospital unit. Technical Report. (WUCSE-2009-82). Chipara, O., Lu, C., Bailey, T. C., & Roman, G. C. (2009). Reliable patient monitoring: A clinical study in a step-down hospital unit. Technical Report. (WUCSE-2009-82).
3.
Zurück zum Zitat Winkler, T., & Rinner, B. (2014). Security and privacy protection in visual sensor networks. ACM Computer Survey, 47, 97–116.CrossRef Winkler, T., & Rinner, B. (2014). Security and privacy protection in visual sensor networks. ACM Computer Survey, 47, 97–116.CrossRef
5.
Zurück zum Zitat Miller, V. (1985). Uses of elliptic curves in cryptography-Lecture Notes in Computer Science. Advances in Cryptology-Crypto ’85. Miller, V. (1985). Uses of elliptic curves in cryptography-Lecture Notes in Computer Science. Advances in Cryptology-Crypto ’85.
6.
Zurück zum Zitat Ashraf, S., Uddin, N., Sher, M., Ghani, A., & Naqvi, H. (2014). An efficient signcryption scheme with forward secrecy and public verifiability based on hyper elliptic curve cryptography. Berlin: Springer. Ashraf, S., Uddin, N., Sher, M., Ghani, A., & Naqvi, H. (2014). An efficient signcryption scheme with forward secrecy and public verifiability based on hyper elliptic curve cryptography. Berlin: Springer.
7.
Zurück zum Zitat Zheng,Y. (1997). Digital signcryption or how to achieve cost(signature and encryption In: Advances in Cryptology CRYPTO’97. Springer-Verlag, vol. 1294 of Lecture Note in Computer Science, pp. 165-179. Zheng,Y. (1997). Digital signcryption or how to achieve cost(signature and encryption In: Advances in Cryptology CRYPTO’97. Springer-Verlag, vol. 1294 of Lecture Note in Computer Science, pp. 165-179.
9.
Zurück zum Zitat Saeed, M. E., Liu, Q., Tian, G., Gao, B., & Li, F. (2017). HOOSC: Heterogeneous online/offline signcryption for the internet of things. Wireless Networks. Saeed, M. E., Liu, Q., Tian, G., Gao, B., & Li, F. (2017). HOOSC: Heterogeneous online/offline signcryption for the internet of things. Wireless Networks.
10.
Zurück zum Zitat Chen, L., & Malone-Lee, J. (2005). Improved identity-based signcryption. Public key cryptography-PKC (pp. 362–379). Berlin: Springer. Chen, L., & Malone-Lee, J. (2005). Improved identity-based signcryption. Public key cryptography-PKC (pp. 362–379). Berlin: Springer.
11.
Zurück zum Zitat Sun, D., Huang, D., & Mu, X. (2008). Identity-based on-line,off-line signcryption. In IFIP international conference on network and parallel computing. Sun, D., Huang, D., & Mu, X. (2008). Identity-based on-line,off-line signcryption. In IFIP international conference on network and parallel computing.
12.
Zurück zum Zitat Sharma, G., Bala, S., & Verma, A. K. (2012). An identity-based ring signcryption scheme. In IT convergence and security. Sharma, G., Bala, S., & Verma, A. K. (2012). An identity-based ring signcryption scheme. In IT convergence and security.
13.
Zurück zum Zitat Li, F., Shirase, M., & Takagi, T. (2013). Certificateless hybrid signcryption. Mathematical and Computer Modelling, 57, 324–343.MathSciNetCrossRef Li, F., Shirase, M., & Takagi, T. (2013). Certificateless hybrid signcryption. Mathematical and Computer Modelling, 57, 324–343.MathSciNetCrossRef
14.
Zurück zum Zitat Al-Riyami, S. S., & Paterson, K. G. (2003). Certificateless public key cryptography. Advances in Cryptology, 2003, 452–473.MathSciNetMATH Al-Riyami, S. S., & Paterson, K. G. (2003). Certificateless public key cryptography. Advances in Cryptology, 2003, 452–473.MathSciNetMATH
15.
Zurück zum Zitat Barbosa, M., & Farshim, P. (2008). Certificateless Signcryption, in ACM Symposium on Information Computer and Communication Security (ASIACCS 08). Barbosa, M., & Farshim, P. (2008). Certificateless Signcryption, in ACM Symposium on Information Computer and Communication Security (ASIACCS 08).
16.
Zurück zum Zitat Barreto, P. L., Lynn, B., & Scott, M. (2004). Efficient implementation of pairing based crypto systems. Journal of Cryptology, 17(14), 321–334.MathSciNetCrossRef Barreto, P. L., Lynn, B., & Scott, M. (2004). Efficient implementation of pairing based crypto systems. Journal of Cryptology, 17(14), 321–334.MathSciNetCrossRef
17.
Zurück zum Zitat Freeman, D., Scott, M., & Teske, E. (April 2010). A taxonomy of pairing-friendly elliptic curves. Journal of Cryptology, 23(2), 224–280.MathSciNetCrossRef Freeman, D., Scott, M., & Teske, E. (April 2010). A taxonomy of pairing-friendly elliptic curves. Journal of Cryptology, 23(2), 224–280.MathSciNetCrossRef
19.
Zurück zum Zitat Hwang, R., Lai, C., & Su, F. (2005). An efficient signcryption scheme with forward secrecy based on elliptic curve. Journal of Applied Mathematics and Computation, 167(2), 870–881.MathSciNetCrossRef Hwang, R., Lai, C., & Su, F. (2005). An efficient signcryption scheme with forward secrecy based on elliptic curve. Journal of Applied Mathematics and Computation, 167(2), 870–881.MathSciNetCrossRef
21.
Zurück zum Zitat Singh, A. K., & Vaisla, K. S. (2014). A lightweight Signcryption Scheme based on Elliptic Curve Cryptography. In First International Conference on Advances in computing and Communication Engineering (ICACCE). Singh, A. K., & Vaisla, K. S. (2014). A lightweight Signcryption Scheme based on Elliptic Curve Cryptography. In First International Conference on Advances in computing and Communication Engineering (ICACCE).
22.
Zurück zum Zitat Cagalaban, G., & Kim, S. (2011). Towards a secure patient information access control in ubiquitous healthcare systems using identity-based signcryption. In 13Th international conference on advanced communication technology (ICACT2011). Cagalaban, G., & Kim, S. (2011). Towards a secure patient information access control in ubiquitous healthcare systems using identity-based signcryption. In 13Th international conference on advanced communication technology (ICACT2011).
23.
Zurück zum Zitat Won, J., Seo, S. H., & Bertino, E. (2015) A Secure Communication Protocol for Drones and Smart Objects. in ASIA CCS’15. Won, J., Seo, S. H., & Bertino, E. (2015) A Secure Communication Protocol for Drones and Smart Objects. in ASIA CCS’15.
24.
Zurück zum Zitat Wahid, A., & Mambo, M. (2016). Implementation of Certificateless Signcryption based on Elliptic Curve Using Javascript. International Journal of Computing and Informatics (IJCANDI), 1(13), 90–100. Wahid, A., & Mambo, M. (2016). Implementation of Certificateless Signcryption based on Elliptic Curve Using Javascript. International Journal of Computing and Informatics (IJCANDI), 1(13), 90–100.
25.
Zurück zum Zitat Blake, I., Murty, V., & Xu, G. (2006). Refinements of miller’s algorithm for computing the weil/tate pairing. J. Algorithms, 58, 134–149.MathSciNetCrossRef Blake, I., Murty, V., & Xu, G. (2006). Refinements of miller’s algorithm for computing the weil/tate pairing. J. Algorithms, 58, 134–149.MathSciNetCrossRef
26.
Zurück zum Zitat Yeh, C. K., Chem, M. H., & Lo, J. W. (2013). An Authentication Protocol for Ubiquitous Health Monitoring Systems. Journal of Medical and Biological Engineering, 33(4), 415–419.CrossRef Yeh, C. K., Chem, M. H., & Lo, J. W. (2013). An Authentication Protocol for Ubiquitous Health Monitoring Systems. Journal of Medical and Biological Engineering, 33(4), 415–419.CrossRef
27.
Zurück zum Zitat Robles,R.J. and Kim,K.J. (2011) Securing Child Information Access Control in Ubiquitous Healthcare Systems. Journal of Security Engineering . Robles,R.J. and Kim,K.J. (2011) Securing Child Information Access Control in Ubiquitous Healthcare Systems. Journal of Security Engineering .
28.
Zurück zum Zitat Omala,A.A.,Mbandu,A.S.,Muturi,K.D. and Jin,C. (2018) Provably Secure Heterogeneous Access Control Scheme for Wireless Body Area Network. J. Med. Syst, vol. 41, no. 108. Omala,A.A.,Mbandu,A.S.,Muturi,K.D. and Jin,C. (2018) Provably Secure Heterogeneous Access Control Scheme for Wireless Body Area Network. J. Med. Syst, vol. 41, no. 108.
29.
Zurück zum Zitat Bellare,M. and Rogaway,P. 91996) The exact security of digital signatures-how to sign with RSA and Rabin. in Advances in Cryptology-EUROCRYPT’96, LNCS 0950, Ireland. Bellare,M. and Rogaway,P. 91996) The exact security of digital signatures-how to sign with RSA and Rabin. in Advances in Cryptology-EUROCRYPT’96, LNCS 0950, Ireland.
30.
Zurück zum Zitat Yu, H. F., & Yang, B. (2017). Low-computation certificateless hybrid signcryption scheme. Front Inform Technol Electron Eng, 928–94. Yu, H. F., & Yang, B. (2017). Low-computation certificateless hybrid signcryption scheme. Front Inform Technol Electron Eng, 928–94.
31.
Zurück zum Zitat Tso, R., Okamoto, T., & Okamoto, E. (2007). Ecdsa-verifiable signcryption scheme with signature verification on the signcrypted message. In InInternational Conference on Information Security and Cryptology. Berlin, Heidelberg. Tso, R., Okamoto, T., & Okamoto, E. (2007). Ecdsa-verifiable signcryption scheme with signature verification on the signcrypted message. In InInternational Conference on Information Security and Cryptology. Berlin, Heidelberg.
32.
Zurück zum Zitat Yu, G., Yang, H., Fan, S., Shen, Y., & Han, W. (September 2011). Efficient certificateless signcryption scheme from Weil pairing. Journal of Networks, 6:9. Yu, G., Yang, H., Fan, S., Shen, Y., & Han, W. (September 2011). Efficient certificateless signcryption scheme from Weil pairing. Journal of Networks, 6:9.
33.
Zurück zum Zitat SEC2, Recommended Elliptic Curve Domain Parameters. Standards for Efcient Cryptography Group, September 2000 SEC2, Recommended Elliptic Curve Domain Parameters. Standards for Efcient Cryptography Group, September 2000
34.
Zurück zum Zitat ElGamal,T. (1984) A public key cryptosystem and a signature scheme based on discrete logarithms. Crypto 84, vol. 196, no. LNCS, p. 1018. ElGamal,T. (1984) A public key cryptosystem and a signature scheme based on discrete logarithms. Crypto 84, vol. 196, no. LNCS, p. 1018.
35.
Zurück zum Zitat Eriksson, J., Österlind, F., Finne, N., Tsiftes, N., Dunkels, A., Voigt, T., Sauter, R., & Marrón, P. J. (2009) COOJA/MSPSim: Interoperability testing for wireless sensor networks. In Proceedings of the 2nd international conference on simulation tools and techniques. Eriksson, J., Österlind, F., Finne, N., Tsiftes, N., Dunkels, A., Voigt, T., Sauter, R., & Marrón, P. J. (2009) COOJA/MSPSim: Interoperability testing for wireless sensor networks. In Proceedings of the 2nd international conference on simulation tools and techniques.
36.
Zurück zum Zitat Dunkels, A., Osterlind, F., Tsiftes, N., & He, Z. (2007). Software-based on-line energy estimation for sensor nodes. ACM. Dunkels, A., Osterlind, F., Tsiftes, N., & He, Z. (2007). Software-based on-line energy estimation for sensor nodes. ACM.
37.
Zurück zum Zitat Barreto, P. L., Libert, B., & McCullagh, N. (2005). Efficient and provably-secure identity-based signatures and signcryption from bilinear maps. Adv. Cryptol.-ASIACRYPT 2005, pp. 515-532. Barreto, P. L., Libert, B., & McCullagh, N. (2005). Efficient and provably-secure identity-based signatures and signcryption from bilinear maps. Adv. Cryptol.-ASIACRYPT 2005, pp. 515-532.
38.
Zurück zum Zitat Ogunduyile, O. O., Zuva, K., Randle, O. A & Zuva, T. (2013) Ubiquitous healthcare monitoring system using integrated triaxial accelerometer, spo2 and location sensors. arXiv preprint arXiv:1309.1542. Ogunduyile, O. O., Zuva, K., Randle, O. A & Zuva, T. (2013) Ubiquitous healthcare monitoring system using integrated triaxial accelerometer, spo2 and location sensors. arXiv preprint arXiv:​1309.​1542.
39.
Zurück zum Zitat Boneh, D., & Franklin, M. (2001). Identity-based encryption from the Weil pairing. Annual international cryptology conference (pp. 213–229). Berlin, Heidelberg: Springer. Boneh, D., & Franklin, M. (2001). Identity-based encryption from the Weil pairing. Annual international cryptology conference (pp. 213–229). Berlin, Heidelberg: Springer.
40.
Zurück zum Zitat Li, F., Shirase, M., & Takagi, T. (2013). Certificateless hybrid signcryption. Mathematical and Computer Modelling, 57(3–4), 324–343.MathSciNetCrossRef Li, F., Shirase, M., & Takagi, T. (2013). Certificateless hybrid signcryption. Mathematical and Computer Modelling, 57(3–4), 324–343.MathSciNetCrossRef
41.
Zurück zum Zitat Dutta, M., Singh, A. K., Kumar, A. . An. ., & efficient signcryption scheme based on ECC with forward secrecy and encrypted message authentication. . (2013). 3rd IEEE International Advance Computing Conference (IACC). Ghaziabad, 2013, 399–403. https://doi.org/10.1109/IAdCC.2013.6514258. Dutta, M., Singh, A. K., Kumar, A. . An. ., & efficient signcryption scheme based on ECC with forward secrecy and encrypted message authentication. . (2013). 3rd IEEE International Advance Computing Conference (IACC). Ghaziabad, 2013, 399–403. https://​doi.​org/​10.​1109/​IAdCC.​2013.​6514258.
42.
Zurück zum Zitat Gao, G. M., Peng, X. G., & Jin, L. Z. (2019). Efficient Access Control Scheme with Certificateless Signcryption for Wireless Body Area Networks. International Journal of Network Security, 21(3), 428–437. Gao, G. M., Peng, X. G., & Jin, L. Z. (2019). Efficient Access Control Scheme with Certificateless Signcryption for Wireless Body Area Networks. International Journal of Network Security, 21(3), 428–437.
43.
Zurück zum Zitat Luo, M., Hu, X., & Luo, Y. (2020). An Efficient Cross-Domain Data Transmission Scheme for Wireless Body Area Networks. Journal of Medical Systems, 44(7), 1–13.CrossRef Luo, M., Hu, X., & Luo, Y. (2020). An Efficient Cross-Domain Data Transmission Scheme for Wireless Body Area Networks. Journal of Medical Systems, 44(7), 1–13.CrossRef
44.
Zurück zum Zitat Liu, X., Wang, Z., Ye, Y., & Li, F. (Oct. 2020). An efficient and practical certificateless signcryption scheme for wireless body area networks. Computer Communications, 162, 169–178.CrossRef Liu, X., Wang, Z., Ye, Y., & Li, F. (Oct. 2020). An efficient and practical certificateless signcryption scheme for wireless body area networks. Computer Communications, 162, 169–178.CrossRef
45.
Zurück zum Zitat Mallouli, F., Hellal, A., Sharief, S.N., & Abdulraheem, A. F. (2019). A Survey on Cryptography: Comparative Study between RSA vs ECC Algorithms, and RSA vs El-Gamal Algorithms. 2019 6th IEEE International Conference on Cyber Security and Cloud Computing (CSCloud)/ 2019 5th IEEE International Conference on Edge Computing and Scalable Cloud (EdgeCom), Paris, France, pp. 173-176, https://doi.org/10.1109/CSCloud/EdgeCom.2019.00022. Mallouli, F., Hellal, A., Sharief, S.N., & Abdulraheem, A. F. (2019). A Survey on Cryptography: Comparative Study between RSA vs ECC Algorithms, and RSA vs El-Gamal Algorithms. 2019 6th IEEE International Conference on Cyber Security and Cloud Computing (CSCloud)/ 2019 5th IEEE International Conference on Edge Computing and Scalable Cloud (EdgeCom), Paris, France, pp. 173-176, https://​doi.​org/​10.​1109/​CSCloud/​EdgeCom.​2019.​00022.​
48.
Zurück zum Zitat Blum, M., & Micali, S. (2019). How to generate cryptographically strong sequences of pseudo random bits. In Providing Sound Foundations for Cryptography: On the Work of Shafi Goldwasser and Silvio Micali (pp. 227-240). Blum, M., & Micali, S. (2019). How to generate cryptographically strong sequences of pseudo random bits. In Providing Sound Foundations for Cryptography: On the Work of Shafi Goldwasser and Silvio Micali (pp. 227-240).
Metadaten
Titel
Efficient Certificateless Signcryption Scheme for Wireless Sensor Networks in Ubiquitous Healthcare Systems
verfasst von
Philemon Nthenge Kasyoka
Michael Kimwele
Shem Angolo Mbandu
Publikationsdatum
19.02.2021
Verlag
Springer US
Erschienen in
Wireless Personal Communications / Ausgabe 4/2021
Print ISSN: 0929-6212
Elektronische ISSN: 1572-834X
DOI
https://doi.org/10.1007/s11277-021-08183-y

Weitere Artikel der Ausgabe 4/2021

Wireless Personal Communications 4/2021 Zur Ausgabe

Neuer Inhalt