Low-Cost Authentication Protocol for D2D Communication in m-Health with Trust Evaluation

Relay-assisted device-to-device (D2D) communication serves users at the edge of system coverage of 5G networks, enabling communication among sensors and patients’ mobile devices, and improving spectral and power efficiency. The security of D2D-based m-health applications requires attention due to th...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:Wireless communications and mobile computing 2020, Vol.2020 (2020), p.1-16
Hauptverfasser: Lopes, Ana Paula G., Gondim, Paulo R. L.
Format: Artikel
Sprache:eng
Schlagworte:
Online-Zugang:Volltext
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page 16
container_issue 2020
container_start_page 1
container_title Wireless communications and mobile computing
container_volume 2020
creator Lopes, Ana Paula G.
Gondim, Paulo R. L.
description Relay-assisted device-to-device (D2D) communication serves users at the edge of system coverage of 5G networks, enabling communication among sensors and patients’ mobile devices, and improving spectral and power efficiency. The security of D2D-based m-health applications requires attention due to the delicacy of the data treated in the collection, transmission, and storage of information on patients, whose devices must be adequately authenticated. However, traditional authentication and key agreement schemes are not suitable for D2D scenarios, since they might expose patients to security vulnerabilities and lead to an excessive use of resources. This article proposes a secure and lightweight scheme based on Shamir secret sharing for the mutual authentication of m-health devices in relay-assisted D2D communications, which provides security robustness and reduces resources (energy, processing) consumption. The manuscript also addresses the trustworthiness of devices involved in data relay and device discovery procedures.
doi_str_mv 10.1155/2020/8876807
format Article
fullrecord <record><control><sourceid>proquest_cross</sourceid><recordid>TN_cdi_proquest_journals_2458476922</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>2458476922</sourcerecordid><originalsourceid>FETCH-LOGICAL-c360t-71435f0afa93714e7d58660630acbbe555198b613520593226b32dfc54c0e7ec3</originalsourceid><addsrcrecordid>eNqF0M9LwzAUB_AgCs7pzbMUPGrdS9Ik7XF08wcM9DDBW0mzlGW0zUxTh_-9mZ169PLyIB_ee3wRusRwhzFjEwIEJmkqeAriCI0woxCnXIjj355np-is6zYAQIHgEXpb2F2c285H096vdeuNkt7YNnpx1ltl66iyLpqRWZTbpunbn2_TRk38qGXt19HOhLJ0fRgy_5B1_y3O0Ukl605fHN4xer2fL_PHePH88JRPF7GiHHwscEJZBbKSGQ29FisWrgROQaqy1IwxnKUlx5QRYBklhJeUrCrFEgVaaEXH6HqYu3X2vdedLza2d21YWZCEpYngGSFB3Q5KOdt1TlfF1plGus8CQ7HPrthnVxyyC_xm4GvTruTO_KevBq2D0ZX80wQnKWX0C2_UdrA</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>2458476922</pqid></control><display><type>article</type><title>Low-Cost Authentication Protocol for D2D Communication in m-Health with Trust Evaluation</title><source>EZB-FREE-00999 freely available EZB journals</source><source>Wiley Online Library (Open Access Collection)</source><source>Alma/SFX Local Collection</source><creator>Lopes, Ana Paula G. ; Gondim, Paulo R. L.</creator><contributor>Lim, Yujin ; Yujin Lim</contributor><creatorcontrib>Lopes, Ana Paula G. ; Gondim, Paulo R. L. ; Lim, Yujin ; Yujin Lim</creatorcontrib><description>Relay-assisted device-to-device (D2D) communication serves users at the edge of system coverage of 5G networks, enabling communication among sensors and patients’ mobile devices, and improving spectral and power efficiency. The security of D2D-based m-health applications requires attention due to the delicacy of the data treated in the collection, transmission, and storage of information on patients, whose devices must be adequately authenticated. However, traditional authentication and key agreement schemes are not suitable for D2D scenarios, since they might expose patients to security vulnerabilities and lead to an excessive use of resources. This article proposes a secure and lightweight scheme based on Shamir secret sharing for the mutual authentication of m-health devices in relay-assisted D2D communications, which provides security robustness and reduces resources (energy, processing) consumption. The manuscript also addresses the trustworthiness of devices involved in data relay and device discovery procedures.</description><identifier>ISSN: 1530-8669</identifier><identifier>EISSN: 1530-8677</identifier><identifier>DOI: 10.1155/2020/8876807</identifier><language>eng</language><publisher>Cairo, Egypt: Hindawi Publishing Corporation</publisher><subject>Communication ; Confidentiality ; Costs ; Cryptography ; Electronic devices ; Emergency medical care ; Energy consumption ; Information storage ; Internet of Things ; Patients ; Power efficiency ; Relay ; Security ; Trust ; Wireless networks</subject><ispartof>Wireless communications and mobile computing, 2020, Vol.2020 (2020), p.1-16</ispartof><rights>Copyright © 2020 Ana Paula G. Lopes and Paulo R. L. Gondim.</rights><rights>Copyright © 2020 Ana Paula G. Lopes and Paulo R. L. Gondim. This work is licensed under http://creativecommons.org/licenses/by/4.0/ (the “License”). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License.</rights><lds50>peer_reviewed</lds50><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c360t-71435f0afa93714e7d58660630acbbe555198b613520593226b32dfc54c0e7ec3</citedby><cites>FETCH-LOGICAL-c360t-71435f0afa93714e7d58660630acbbe555198b613520593226b32dfc54c0e7ec3</cites><orcidid>0000-0002-7007-1969</orcidid></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><link.rule.ids>315,781,785,4025,27925,27926,27927</link.rule.ids></links><search><contributor>Lim, Yujin</contributor><contributor>Yujin Lim</contributor><creatorcontrib>Lopes, Ana Paula G.</creatorcontrib><creatorcontrib>Gondim, Paulo R. L.</creatorcontrib><title>Low-Cost Authentication Protocol for D2D Communication in m-Health with Trust Evaluation</title><title>Wireless communications and mobile computing</title><description>Relay-assisted device-to-device (D2D) communication serves users at the edge of system coverage of 5G networks, enabling communication among sensors and patients’ mobile devices, and improving spectral and power efficiency. The security of D2D-based m-health applications requires attention due to the delicacy of the data treated in the collection, transmission, and storage of information on patients, whose devices must be adequately authenticated. However, traditional authentication and key agreement schemes are not suitable for D2D scenarios, since they might expose patients to security vulnerabilities and lead to an excessive use of resources. This article proposes a secure and lightweight scheme based on Shamir secret sharing for the mutual authentication of m-health devices in relay-assisted D2D communications, which provides security robustness and reduces resources (energy, processing) consumption. The manuscript also addresses the trustworthiness of devices involved in data relay and device discovery procedures.</description><subject>Communication</subject><subject>Confidentiality</subject><subject>Costs</subject><subject>Cryptography</subject><subject>Electronic devices</subject><subject>Emergency medical care</subject><subject>Energy consumption</subject><subject>Information storage</subject><subject>Internet of Things</subject><subject>Patients</subject><subject>Power efficiency</subject><subject>Relay</subject><subject>Security</subject><subject>Trust</subject><subject>Wireless networks</subject><issn>1530-8669</issn><issn>1530-8677</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2020</creationdate><recordtype>article</recordtype><sourceid>RHX</sourceid><sourceid>ABUWG</sourceid><sourceid>AFKRA</sourceid><sourceid>AZQEC</sourceid><sourceid>BENPR</sourceid><sourceid>CCPQU</sourceid><sourceid>DWQXO</sourceid><sourceid>GNUQQ</sourceid><recordid>eNqF0M9LwzAUB_AgCs7pzbMUPGrdS9Ik7XF08wcM9DDBW0mzlGW0zUxTh_-9mZ169PLyIB_ee3wRusRwhzFjEwIEJmkqeAriCI0woxCnXIjj355np-is6zYAQIHgEXpb2F2c285H096vdeuNkt7YNnpx1ltl66iyLpqRWZTbpunbn2_TRk38qGXt19HOhLJ0fRgy_5B1_y3O0Ukl605fHN4xer2fL_PHePH88JRPF7GiHHwscEJZBbKSGQ29FisWrgROQaqy1IwxnKUlx5QRYBklhJeUrCrFEgVaaEXH6HqYu3X2vdedLza2d21YWZCEpYngGSFB3Q5KOdt1TlfF1plGus8CQ7HPrthnVxyyC_xm4GvTruTO_KevBq2D0ZX80wQnKWX0C2_UdrA</recordid><startdate>2020</startdate><enddate>2020</enddate><creator>Lopes, Ana Paula G.</creator><creator>Gondim, Paulo R. L.</creator><general>Hindawi Publishing Corporation</general><general>Hindawi</general><general>Hindawi Limited</general><scope>ADJCN</scope><scope>AHFXO</scope><scope>RHU</scope><scope>RHW</scope><scope>RHX</scope><scope>AAYXX</scope><scope>CITATION</scope><scope>7SC</scope><scope>7SP</scope><scope>7XB</scope><scope>8FD</scope><scope>8FE</scope><scope>8FG</scope><scope>ABUWG</scope><scope>AFKRA</scope><scope>ARAPS</scope><scope>AZQEC</scope><scope>BENPR</scope><scope>BGLVJ</scope><scope>CCPQU</scope><scope>DWQXO</scope><scope>GNUQQ</scope><scope>HCIFZ</scope><scope>JQ2</scope><scope>K7-</scope><scope>L7M</scope><scope>L~C</scope><scope>L~D</scope><scope>M0N</scope><scope>P5Z</scope><scope>P62</scope><scope>PIMPY</scope><scope>PQEST</scope><scope>PQQKQ</scope><scope>PQUKI</scope><scope>PRINS</scope><scope>Q9U</scope><orcidid>https://orcid.org/0000-0002-7007-1969</orcidid></search><sort><creationdate>2020</creationdate><title>Low-Cost Authentication Protocol for D2D Communication in m-Health with Trust Evaluation</title><author>Lopes, Ana Paula G. ; Gondim, Paulo R. L.</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c360t-71435f0afa93714e7d58660630acbbe555198b613520593226b32dfc54c0e7ec3</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2020</creationdate><topic>Communication</topic><topic>Confidentiality</topic><topic>Costs</topic><topic>Cryptography</topic><topic>Electronic devices</topic><topic>Emergency medical care</topic><topic>Energy consumption</topic><topic>Information storage</topic><topic>Internet of Things</topic><topic>Patients</topic><topic>Power efficiency</topic><topic>Relay</topic><topic>Security</topic><topic>Trust</topic><topic>Wireless networks</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Lopes, Ana Paula G.</creatorcontrib><creatorcontrib>Gondim, Paulo R. L.</creatorcontrib><collection>الدوريات العلمية والإحصائية - e-Marefa Academic and Statistical Periodicals</collection><collection>معرفة - المحتوى العربي الأكاديمي المتكامل - e-Marefa Academic Complete</collection><collection>Hindawi Publishing Complete</collection><collection>Hindawi Publishing Subscription Journals</collection><collection>Hindawi Publishing Open Access</collection><collection>CrossRef</collection><collection>Computer and Information Systems Abstracts</collection><collection>Electronics &amp; Communications Abstracts</collection><collection>ProQuest Central (purchase pre-March 2016)</collection><collection>Technology Research Database</collection><collection>ProQuest SciTech Collection</collection><collection>ProQuest Technology Collection</collection><collection>ProQuest Central (Alumni Edition)</collection><collection>ProQuest Central UK/Ireland</collection><collection>Advanced Technologies &amp; Aerospace Collection</collection><collection>ProQuest Central Essentials</collection><collection>ProQuest Central</collection><collection>Technology Collection</collection><collection>ProQuest One Community College</collection><collection>ProQuest Central Korea</collection><collection>ProQuest Central Student</collection><collection>SciTech Premium Collection</collection><collection>ProQuest Computer Science Collection</collection><collection>Computer Science Database</collection><collection>Advanced Technologies Database with Aerospace</collection><collection>Computer and Information Systems Abstracts – Academic</collection><collection>Computer and Information Systems Abstracts Professional</collection><collection>Computing Database</collection><collection>Advanced Technologies &amp; Aerospace Database</collection><collection>ProQuest Advanced Technologies &amp; Aerospace Collection</collection><collection>Access via ProQuest (Open Access)</collection><collection>ProQuest One Academic Eastern Edition (DO NOT USE)</collection><collection>ProQuest One Academic</collection><collection>ProQuest One Academic UKI Edition</collection><collection>ProQuest Central China</collection><collection>ProQuest Central Basic</collection><jtitle>Wireless communications and mobile computing</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Lopes, Ana Paula G.</au><au>Gondim, Paulo R. L.</au><au>Lim, Yujin</au><au>Yujin Lim</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Low-Cost Authentication Protocol for D2D Communication in m-Health with Trust Evaluation</atitle><jtitle>Wireless communications and mobile computing</jtitle><date>2020</date><risdate>2020</risdate><volume>2020</volume><issue>2020</issue><spage>1</spage><epage>16</epage><pages>1-16</pages><issn>1530-8669</issn><eissn>1530-8677</eissn><abstract>Relay-assisted device-to-device (D2D) communication serves users at the edge of system coverage of 5G networks, enabling communication among sensors and patients’ mobile devices, and improving spectral and power efficiency. The security of D2D-based m-health applications requires attention due to the delicacy of the data treated in the collection, transmission, and storage of information on patients, whose devices must be adequately authenticated. However, traditional authentication and key agreement schemes are not suitable for D2D scenarios, since they might expose patients to security vulnerabilities and lead to an excessive use of resources. This article proposes a secure and lightweight scheme based on Shamir secret sharing for the mutual authentication of m-health devices in relay-assisted D2D communications, which provides security robustness and reduces resources (energy, processing) consumption. The manuscript also addresses the trustworthiness of devices involved in data relay and device discovery procedures.</abstract><cop>Cairo, Egypt</cop><pub>Hindawi Publishing Corporation</pub><doi>10.1155/2020/8876807</doi><tpages>16</tpages><orcidid>https://orcid.org/0000-0002-7007-1969</orcidid><oa>free_for_read</oa></addata></record>
fulltext fulltext
identifier ISSN: 1530-8669
ispartof Wireless communications and mobile computing, 2020, Vol.2020 (2020), p.1-16
issn 1530-8669
1530-8677
language eng
recordid cdi_proquest_journals_2458476922
source EZB-FREE-00999 freely available EZB journals; Wiley Online Library (Open Access Collection); Alma/SFX Local Collection
subjects Communication
Confidentiality
Costs
Cryptography
Electronic devices
Emergency medical care
Energy consumption
Information storage
Internet of Things
Patients
Power efficiency
Relay
Security
Trust
Wireless networks
title Low-Cost Authentication Protocol for D2D Communication in m-Health with Trust Evaluation
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2024-12-18T11%3A26%3A24IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_cross&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Low-Cost%20Authentication%20Protocol%20for%20D2D%20Communication%20in%20m-Health%20with%20Trust%20Evaluation&rft.jtitle=Wireless%20communications%20and%20mobile%20computing&rft.au=Lopes,%20Ana%20Paula%20G.&rft.date=2020&rft.volume=2020&rft.issue=2020&rft.spage=1&rft.epage=16&rft.pages=1-16&rft.issn=1530-8669&rft.eissn=1530-8677&rft_id=info:doi/10.1155/2020/8876807&rft_dat=%3Cproquest_cross%3E2458476922%3C/proquest_cross%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=2458476922&rft_id=info:pmid/&rfr_iscdi=true