JOURNAL OF CHINA UNIVERSITIES OF POSTS AND TELECOM ›› 2018, Vol. 25 ›› Issue (2): 28-38.doi: 10. 19682/ j. cnki. 1005-8885. 2018. 1004

• Security • Previous Articles     Next Articles

Bilinear pair based authentication protocol for wireless medical sensor network

Zhang Junsong, Jiang Yongcong, Gan Yong, Zhang Qikun   

  1. 1. School of Computer and Communication Engineering, Zhengzhou University of Light Industry, Zhengzhou 450002, China
    2. Henan Forestry Vocational College, Department of Information and Art Design, Luoyang 471002, China
  • Received:2017-11-13 Revised:2018-03-26 Online:2018-04-30 Published:2018-07-02
  • Contact: Zhang Junsong, E-mail: zhangjs2002@ foxmail. com
  • About author:Zhang Junsong, E-mail: zhangjs2002@ foxmail. com
  • Supported by:
    This work was supported by the National Natural Science Foundation of China ( 61772477 ), Henan Scientific and Technological Research Projects ( 162102210217 ), Key Scientific Research Projects of Colleges and Universities in Henan Province (16A520075).

Abstract: With the development of wireless network and electronic technologies, the wireless sensor network (WSN) has been widely used in many applications. One of the most important applications is wireless medical sensor network (WMSN), which makes modern health-care more popular. However, most of the sensor data transmitted in the WMSN is patient-related information. The sensor data are important and should be confidential. In addition, the attackers may also maliciously modify these sensor data. Therefore, both security and privacy are two very important issues in WMSN. A user authentication protocol and data security transmission mechanism based on bilinear pairing is proposed to protect data security and privacy. The proposed protocol enables the medical staff to monitor the health status of health care workers and provide timely and comprehensive health care information to the patient. Finally, through security and performance analysis, it can be found that the proposed authentication and key agreement protocol can resist common attacks such as impersonation attack, replay attack, online or offline password guessing attack, and stolen verifier attack. At the same time, this agreement is also in line with the performance of WMSN application environment.

Key words: WSN, medical system, authentication protocol, privacy preservation

CLC Number: