Low-Cost Authentication Protocol for D2D Communication in m-Health with Trust Evaluation
Relay-assisted device-to-device (D2D) communication serves users at the edge of system coverage of 5G networks, enabling communication among sensors and patients’ mobile devices, and improving spectral and power efficiency. The security of D2D-based m-health applications requires attention due to th...
Gespeichert in:
Veröffentlicht in: | Wireless communications and mobile computing 2020, Vol.2020 (2020), p.1-16 |
---|---|
Hauptverfasser: | , |
Format: | Artikel |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
container_end_page | 16 |
---|---|
container_issue | 2020 |
container_start_page | 1 |
container_title | Wireless communications and mobile computing |
container_volume | 2020 |
creator | Lopes, Ana Paula G. Gondim, Paulo R. L. |
description | Relay-assisted device-to-device (D2D) communication serves users at the edge of system coverage of 5G networks, enabling communication among sensors and patients’ mobile devices, and improving spectral and power efficiency. The security of D2D-based m-health applications requires attention due to the delicacy of the data treated in the collection, transmission, and storage of information on patients, whose devices must be adequately authenticated. However, traditional authentication and key agreement schemes are not suitable for D2D scenarios, since they might expose patients to security vulnerabilities and lead to an excessive use of resources. This article proposes a secure and lightweight scheme based on Shamir secret sharing for the mutual authentication of m-health devices in relay-assisted D2D communications, which provides security robustness and reduces resources (energy, processing) consumption. The manuscript also addresses the trustworthiness of devices involved in data relay and device discovery procedures. |
doi_str_mv | 10.1155/2020/8876807 |
format | Article |
fullrecord | <record><control><sourceid>proquest_cross</sourceid><recordid>TN_cdi_proquest_journals_2458476922</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>2458476922</sourcerecordid><originalsourceid>FETCH-LOGICAL-c360t-71435f0afa93714e7d58660630acbbe555198b613520593226b32dfc54c0e7ec3</originalsourceid><addsrcrecordid>eNqF0M9LwzAUB_AgCs7pzbMUPGrdS9Ik7XF08wcM9DDBW0mzlGW0zUxTh_-9mZ169PLyIB_ee3wRusRwhzFjEwIEJmkqeAriCI0woxCnXIjj355np-is6zYAQIHgEXpb2F2c285H096vdeuNkt7YNnpx1ltl66iyLpqRWZTbpunbn2_TRk38qGXt19HOhLJ0fRgy_5B1_y3O0Ukl605fHN4xer2fL_PHePH88JRPF7GiHHwscEJZBbKSGQ29FisWrgROQaqy1IwxnKUlx5QRYBklhJeUrCrFEgVaaEXH6HqYu3X2vdedLza2d21YWZCEpYngGSFB3Q5KOdt1TlfF1plGus8CQ7HPrthnVxyyC_xm4GvTruTO_KevBq2D0ZX80wQnKWX0C2_UdrA</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>2458476922</pqid></control><display><type>article</type><title>Low-Cost Authentication Protocol for D2D Communication in m-Health with Trust Evaluation</title><source>EZB-FREE-00999 freely available EZB journals</source><source>Wiley Online Library (Open Access Collection)</source><source>Alma/SFX Local Collection</source><creator>Lopes, Ana Paula G. ; Gondim, Paulo R. L.</creator><contributor>Lim, Yujin ; Yujin Lim</contributor><creatorcontrib>Lopes, Ana Paula G. ; Gondim, Paulo R. L. ; Lim, Yujin ; Yujin Lim</creatorcontrib><description>Relay-assisted device-to-device (D2D) communication serves users at the edge of system coverage of 5G networks, enabling communication among sensors and patients’ mobile devices, and improving spectral and power efficiency. The security of D2D-based m-health applications requires attention due to the delicacy of the data treated in the collection, transmission, and storage of information on patients, whose devices must be adequately authenticated. However, traditional authentication and key agreement schemes are not suitable for D2D scenarios, since they might expose patients to security vulnerabilities and lead to an excessive use of resources. This article proposes a secure and lightweight scheme based on Shamir secret sharing for the mutual authentication of m-health devices in relay-assisted D2D communications, which provides security robustness and reduces resources (energy, processing) consumption. The manuscript also addresses the trustworthiness of devices involved in data relay and device discovery procedures.</description><identifier>ISSN: 1530-8669</identifier><identifier>EISSN: 1530-8677</identifier><identifier>DOI: 10.1155/2020/8876807</identifier><language>eng</language><publisher>Cairo, Egypt: Hindawi Publishing Corporation</publisher><subject>Communication ; Confidentiality ; Costs ; Cryptography ; Electronic devices ; Emergency medical care ; Energy consumption ; Information storage ; Internet of Things ; Patients ; Power efficiency ; Relay ; Security ; Trust ; Wireless networks</subject><ispartof>Wireless communications and mobile computing, 2020, Vol.2020 (2020), p.1-16</ispartof><rights>Copyright © 2020 Ana Paula G. Lopes and Paulo R. L. Gondim.</rights><rights>Copyright © 2020 Ana Paula G. Lopes and Paulo R. L. Gondim. This work is licensed under http://creativecommons.org/licenses/by/4.0/ (the “License”). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License.</rights><lds50>peer_reviewed</lds50><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c360t-71435f0afa93714e7d58660630acbbe555198b613520593226b32dfc54c0e7ec3</citedby><cites>FETCH-LOGICAL-c360t-71435f0afa93714e7d58660630acbbe555198b613520593226b32dfc54c0e7ec3</cites><orcidid>0000-0002-7007-1969</orcidid></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><link.rule.ids>315,781,785,4025,27925,27926,27927</link.rule.ids></links><search><contributor>Lim, Yujin</contributor><contributor>Yujin Lim</contributor><creatorcontrib>Lopes, Ana Paula G.</creatorcontrib><creatorcontrib>Gondim, Paulo R. L.</creatorcontrib><title>Low-Cost Authentication Protocol for D2D Communication in m-Health with Trust Evaluation</title><title>Wireless communications and mobile computing</title><description>Relay-assisted device-to-device (D2D) communication serves users at the edge of system coverage of 5G networks, enabling communication among sensors and patients’ mobile devices, and improving spectral and power efficiency. The security of D2D-based m-health applications requires attention due to the delicacy of the data treated in the collection, transmission, and storage of information on patients, whose devices must be adequately authenticated. However, traditional authentication and key agreement schemes are not suitable for D2D scenarios, since they might expose patients to security vulnerabilities and lead to an excessive use of resources. This article proposes a secure and lightweight scheme based on Shamir secret sharing for the mutual authentication of m-health devices in relay-assisted D2D communications, which provides security robustness and reduces resources (energy, processing) consumption. The manuscript also addresses the trustworthiness of devices involved in data relay and device discovery procedures.</description><subject>Communication</subject><subject>Confidentiality</subject><subject>Costs</subject><subject>Cryptography</subject><subject>Electronic devices</subject><subject>Emergency medical care</subject><subject>Energy consumption</subject><subject>Information storage</subject><subject>Internet of Things</subject><subject>Patients</subject><subject>Power efficiency</subject><subject>Relay</subject><subject>Security</subject><subject>Trust</subject><subject>Wireless networks</subject><issn>1530-8669</issn><issn>1530-8677</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2020</creationdate><recordtype>article</recordtype><sourceid>RHX</sourceid><sourceid>ABUWG</sourceid><sourceid>AFKRA</sourceid><sourceid>AZQEC</sourceid><sourceid>BENPR</sourceid><sourceid>CCPQU</sourceid><sourceid>DWQXO</sourceid><sourceid>GNUQQ</sourceid><recordid>eNqF0M9LwzAUB_AgCs7pzbMUPGrdS9Ik7XF08wcM9DDBW0mzlGW0zUxTh_-9mZ169PLyIB_ee3wRusRwhzFjEwIEJmkqeAriCI0woxCnXIjj355np-is6zYAQIHgEXpb2F2c285H096vdeuNkt7YNnpx1ltl66iyLpqRWZTbpunbn2_TRk38qGXt19HOhLJ0fRgy_5B1_y3O0Ukl605fHN4xer2fL_PHePH88JRPF7GiHHwscEJZBbKSGQ29FisWrgROQaqy1IwxnKUlx5QRYBklhJeUrCrFEgVaaEXH6HqYu3X2vdedLza2d21YWZCEpYngGSFB3Q5KOdt1TlfF1plGus8CQ7HPrthnVxyyC_xm4GvTruTO_KevBq2D0ZX80wQnKWX0C2_UdrA</recordid><startdate>2020</startdate><enddate>2020</enddate><creator>Lopes, Ana Paula G.</creator><creator>Gondim, Paulo R. L.</creator><general>Hindawi Publishing Corporation</general><general>Hindawi</general><general>Hindawi Limited</general><scope>ADJCN</scope><scope>AHFXO</scope><scope>RHU</scope><scope>RHW</scope><scope>RHX</scope><scope>AAYXX</scope><scope>CITATION</scope><scope>7SC</scope><scope>7SP</scope><scope>7XB</scope><scope>8FD</scope><scope>8FE</scope><scope>8FG</scope><scope>ABUWG</scope><scope>AFKRA</scope><scope>ARAPS</scope><scope>AZQEC</scope><scope>BENPR</scope><scope>BGLVJ</scope><scope>CCPQU</scope><scope>DWQXO</scope><scope>GNUQQ</scope><scope>HCIFZ</scope><scope>JQ2</scope><scope>K7-</scope><scope>L7M</scope><scope>L~C</scope><scope>L~D</scope><scope>M0N</scope><scope>P5Z</scope><scope>P62</scope><scope>PIMPY</scope><scope>PQEST</scope><scope>PQQKQ</scope><scope>PQUKI</scope><scope>PRINS</scope><scope>Q9U</scope><orcidid>https://orcid.org/0000-0002-7007-1969</orcidid></search><sort><creationdate>2020</creationdate><title>Low-Cost Authentication Protocol for D2D Communication in m-Health with Trust Evaluation</title><author>Lopes, Ana Paula G. ; Gondim, Paulo R. L.</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c360t-71435f0afa93714e7d58660630acbbe555198b613520593226b32dfc54c0e7ec3</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2020</creationdate><topic>Communication</topic><topic>Confidentiality</topic><topic>Costs</topic><topic>Cryptography</topic><topic>Electronic devices</topic><topic>Emergency medical care</topic><topic>Energy consumption</topic><topic>Information storage</topic><topic>Internet of Things</topic><topic>Patients</topic><topic>Power efficiency</topic><topic>Relay</topic><topic>Security</topic><topic>Trust</topic><topic>Wireless networks</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Lopes, Ana Paula G.</creatorcontrib><creatorcontrib>Gondim, Paulo R. L.</creatorcontrib><collection>الدوريات العلمية والإحصائية - e-Marefa Academic and Statistical Periodicals</collection><collection>معرفة - المحتوى العربي الأكاديمي المتكامل - e-Marefa Academic Complete</collection><collection>Hindawi Publishing Complete</collection><collection>Hindawi Publishing Subscription Journals</collection><collection>Hindawi Publishing Open Access</collection><collection>CrossRef</collection><collection>Computer and Information Systems Abstracts</collection><collection>Electronics & Communications Abstracts</collection><collection>ProQuest Central (purchase pre-March 2016)</collection><collection>Technology Research Database</collection><collection>ProQuest SciTech Collection</collection><collection>ProQuest Technology Collection</collection><collection>ProQuest Central (Alumni Edition)</collection><collection>ProQuest Central UK/Ireland</collection><collection>Advanced Technologies & Aerospace Collection</collection><collection>ProQuest Central Essentials</collection><collection>ProQuest Central</collection><collection>Technology Collection</collection><collection>ProQuest One Community College</collection><collection>ProQuest Central Korea</collection><collection>ProQuest Central Student</collection><collection>SciTech Premium Collection</collection><collection>ProQuest Computer Science Collection</collection><collection>Computer Science Database</collection><collection>Advanced Technologies Database with Aerospace</collection><collection>Computer and Information Systems Abstracts Academic</collection><collection>Computer and Information Systems Abstracts Professional</collection><collection>Computing Database</collection><collection>Advanced Technologies & Aerospace Database</collection><collection>ProQuest Advanced Technologies & Aerospace Collection</collection><collection>Access via ProQuest (Open Access)</collection><collection>ProQuest One Academic Eastern Edition (DO NOT USE)</collection><collection>ProQuest One Academic</collection><collection>ProQuest One Academic UKI Edition</collection><collection>ProQuest Central China</collection><collection>ProQuest Central Basic</collection><jtitle>Wireless communications and mobile computing</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Lopes, Ana Paula G.</au><au>Gondim, Paulo R. L.</au><au>Lim, Yujin</au><au>Yujin Lim</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Low-Cost Authentication Protocol for D2D Communication in m-Health with Trust Evaluation</atitle><jtitle>Wireless communications and mobile computing</jtitle><date>2020</date><risdate>2020</risdate><volume>2020</volume><issue>2020</issue><spage>1</spage><epage>16</epage><pages>1-16</pages><issn>1530-8669</issn><eissn>1530-8677</eissn><abstract>Relay-assisted device-to-device (D2D) communication serves users at the edge of system coverage of 5G networks, enabling communication among sensors and patients’ mobile devices, and improving spectral and power efficiency. The security of D2D-based m-health applications requires attention due to the delicacy of the data treated in the collection, transmission, and storage of information on patients, whose devices must be adequately authenticated. However, traditional authentication and key agreement schemes are not suitable for D2D scenarios, since they might expose patients to security vulnerabilities and lead to an excessive use of resources. This article proposes a secure and lightweight scheme based on Shamir secret sharing for the mutual authentication of m-health devices in relay-assisted D2D communications, which provides security robustness and reduces resources (energy, processing) consumption. The manuscript also addresses the trustworthiness of devices involved in data relay and device discovery procedures.</abstract><cop>Cairo, Egypt</cop><pub>Hindawi Publishing Corporation</pub><doi>10.1155/2020/8876807</doi><tpages>16</tpages><orcidid>https://orcid.org/0000-0002-7007-1969</orcidid><oa>free_for_read</oa></addata></record> |
fulltext | fulltext |
identifier | ISSN: 1530-8669 |
ispartof | Wireless communications and mobile computing, 2020, Vol.2020 (2020), p.1-16 |
issn | 1530-8669 1530-8677 |
language | eng |
recordid | cdi_proquest_journals_2458476922 |
source | EZB-FREE-00999 freely available EZB journals; Wiley Online Library (Open Access Collection); Alma/SFX Local Collection |
subjects | Communication Confidentiality Costs Cryptography Electronic devices Emergency medical care Energy consumption Information storage Internet of Things Patients Power efficiency Relay Security Trust Wireless networks |
title | Low-Cost Authentication Protocol for D2D Communication in m-Health with Trust Evaluation |
url | https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2024-12-18T11%3A26%3A24IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_cross&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Low-Cost%20Authentication%20Protocol%20for%20D2D%20Communication%20in%20m-Health%20with%20Trust%20Evaluation&rft.jtitle=Wireless%20communications%20and%20mobile%20computing&rft.au=Lopes,%20Ana%20Paula%20G.&rft.date=2020&rft.volume=2020&rft.issue=2020&rft.spage=1&rft.epage=16&rft.pages=1-16&rft.issn=1530-8669&rft.eissn=1530-8677&rft_id=info:doi/10.1155/2020/8876807&rft_dat=%3Cproquest_cross%3E2458476922%3C/proquest_cross%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=2458476922&rft_id=info:pmid/&rfr_iscdi=true |