Skip to main content
Log in

The yoking-proof-based authentication protocol for cloud-assisted wearable devices

  • Original Article
  • Published:
Personal and Ubiquitous Computing Aims and scope Submit manuscript

Abstract

Along with the development of IoT applications, wearable devices are becoming popular for monitoring user data to provide intelligent service support. The wearable devices confront severe security issues compared with traditional short-range communications. Due to the limitations of computation capabilities and communication resources, it brings more challenges to design security solutions for the resource-constrained wearable devices in IoT applications. In this work, a yoking-proof-based authentication protocol (YPAP) is proposed for cloud-assisted wearable devices. In the YPAP, a physical unclonable function and lightweight cryptographic operators are jointly applied to realize mutual authentication between a smart phone and two wearable devices, and yoking-proofs are established for the cloud server to perform simultaneous verification. Meanwhile, Rubin logic-based security formal analysis is performed to prove that the YPAP has theoretical design correctness. It indicates that the proposed YPAP is flexible for lightweight wearable devices in IoT applications.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2

Similar content being viewed by others

References

  1. Sun Y, Bie R, Thomas P, Cheng X (2014) Advances on data, information, and knowledge in the internet of things. Pers Ubiquit Comput 18(8):1793–1795

    Article  Google Scholar 

  2. Lin Y, Lin Y, Chih C et al (2015) EasyConnect: a management system for IoT devices and its applications for interactive design and art. IEEE Internet Things J 2(6):551–561

    Article  Google Scholar 

  3. Gravenhorst F, Muaremi A, Bardram J et al (2015) Mobile phones as medical devices in mental disorder treatment: an overview. Pers Ubiquit Comput 19(2):335–353

    Article  Google Scholar 

  4. Avila L, Bailey M (2015) The wearable revolution. IEEE Comput Graph Appl 35(2):104–104

    Article  Google Scholar 

  5. Carretero J, Daniel García J (2014) The internet of things: connecting the world. Pers Ubiquit Comput 18(2):445–447

    Article  Google Scholar 

  6. Chen M, Zhang Y, Li Y, Hassan M, Alamri A (2015) AIWAC: affective interaction through wearable computing and cloud technology. IEEE Wirel Commun 22(1):20–27

    Article  Google Scholar 

  7. Mehmood R, Shaikh MU, Bie R, Dawood H, Dawood H (2015) IoT-enabled web warehouse architecture: a secure approach. Pers Ubiquit Comput 19(7):1157–1167

    Article  Google Scholar 

  8. Zhang M, Raghunathan A, Jha NK (2013) MedMon: securing medical devices through wireless monitoring and anomaly detection. IEEE Trans Biomed Circuits Syst 7(6):871–881

    Article  Google Scholar 

  9. He D, Chan S, Guizani M (2015) User privacy and data trustworthiness in mobile crowd sensing. IEEE Wirel Commun 22(1):28–34

    Article  Google Scholar 

  10. Kirkham R, Greenhalgh C (2015) Social access vs. privacy in wearable computing: a case study of autism. IEEE Pervasive Comput 14(1):26–33

    Article  Google Scholar 

  11. Khan R, Hasan R, Xu J (2015) SEPIA: secure-PIN-authentication-as-a-service for ATM using mobile and wearable devices. In: The 3rd IEEE international conference on mobile cloud computing, services, and engineering (MobileCloud), pp 41–50

  12. Kim SD, Lee SM, Lee SE (2015) Secure communication system for wearable devices wireless intra body communication. In: The 2015 IEEE international conference on consumer electronics (ICCE), pp 381–382

  13. Diez FP, Touceda DS, Camara JMS, Zeadally S (2015) Toward self-authenticable wearable devices. IEEE Wirel Commun 22(1):36–43

    Article  Google Scholar 

  14. Zhou J, Cao Z, Dong X, Lin X (2015) PPDM: privacy-preserving protocol for dynamic medical text mining and image feature extraction from secure data aggregation in cloud-assisted e-healthcare systems. IEEE J Sel Top Signal Process 9(7):1332–1344

    Article  Google Scholar 

  15. Liu H, Yu R, Wan Y (2015) YPAP: the yoking-proofs based authentication protocol for wearable devices in wireless communications. In: UIC-ATC-ScalCom-CBDCom-IoP, pp 1639–1643

  16. Li C, Raghunathan A, Jha NK (2013) Improving the trustworthiness of medical device software with formal verification methods. IEEE Embed Syst Lett 5(3):50–53

    Article  Google Scholar 

  17. Zhou J, Cao Z, Dong X, Lin X (2015) Security and privacy in cloud-assisted wireless wearable communications: challenges, solutions, and future directions. IEEE Wirel Commun 22(2):136–144

    Article  Google Scholar 

  18. Ning H, Liu H, Yang LT (2014) Aggregated-proof based hierarchical authentication scheme for the internet of things. IEEE Trans Parallel Distrib Syst 26(3):657–667

    Article  Google Scholar 

  19. Juels A (2004) “Yoking-proofs” for RFID tags. In: The second IEEE annual conference on pervasive computing and communications workshops, pp 138–143

  20. Cho JS, Yeo SS, Hwang S, Rhee SY, Kim SK (2008) Enhanced yoking proof protocols for RFID tags and tag groups. In: The 22nd international conference on advanced information networking and applications workshops (AINAW ’08), pp 1591–1596

  21. Chien HY, Liu SB (2009) Tree-based RFID yoking proof. In: Proceedings of the international conference on networks security, wireless communications and trusted computing (NSWCTC 2009), pp 550–553

  22. Liu H, Ning H, Zhang Y, He D, Xiong Q, Yang LT (2013) Grouping-proofs based authentication protocol for distributed RFID systems. IEEE Trans Parallel Distrib Syst 24(7):1321–1330

    Article  Google Scholar 

  23. Wang C, Wang Q, Ren K, Cao N, Lou W (2012) Toward secure and dependable storage services in cloud computing. IEEE Trans Serv Comput 5(2):220–232

    Article  Google Scholar 

  24. Liu H, Ning H, Xiong Q, Yang LT (2015) Shared authority based privacy-preserving authentication protocol in cloud computing. IEEE Trans Parallel Distrib Syst 26(1):241–251

    Article  Google Scholar 

  25. Suh GE, Devadas S (2007) Physical unclonable functions for device authentication and secret key generation. In: The 44th design automation conference (DAC 2007), pp 9–14

  26. Rubin AD, Honeyman P (1994) Nonmonotonic cryptographic protocols. In: Computer security foundations workshop VII, pp 100–116

  27. http://www.heliontech.com/core.htm. Accessed Jan 2016

Download references

Acknowledgments

This work was funded by National Natural Science Foundation of China (61471035, 61402117), Fundamental Research Funds for Central Universities (06105031), Beijing Municipal Organization Department Talents Project (201500002685XG245), and Science and Technology Foundation of Beijing (Z141100002714003, Z151100002115041). Related conference paper has been published in the 1st International Workshop on Privacy Threats in Ubiquitous Computing, The 12th IEEE International Conference on Ubiquitous Intelligence and Computing (UIC2015), August 10–14, 2015, Beijing, China.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Huansheng Ning.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Liu, W., Liu, H., Wan, Y. et al. The yoking-proof-based authentication protocol for cloud-assisted wearable devices. Pers Ubiquit Comput 20, 469–479 (2016). https://doi.org/10.1007/s00779-016-0926-8

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s00779-016-0926-8

Keywords

Navigation