Abstract
Along with the development of IoT applications, wearable devices are becoming popular for monitoring user data to provide intelligent service support. The wearable devices confront severe security issues compared with traditional short-range communications. Due to the limitations of computation capabilities and communication resources, it brings more challenges to design security solutions for the resource-constrained wearable devices in IoT applications. In this work, a yoking-proof-based authentication protocol (YPAP) is proposed for cloud-assisted wearable devices. In the YPAP, a physical unclonable function and lightweight cryptographic operators are jointly applied to realize mutual authentication between a smart phone and two wearable devices, and yoking-proofs are established for the cloud server to perform simultaneous verification. Meanwhile, Rubin logic-based security formal analysis is performed to prove that the YPAP has theoretical design correctness. It indicates that the proposed YPAP is flexible for lightweight wearable devices in IoT applications.
Similar content being viewed by others
References
Sun Y, Bie R, Thomas P, Cheng X (2014) Advances on data, information, and knowledge in the internet of things. Pers Ubiquit Comput 18(8):1793–1795
Lin Y, Lin Y, Chih C et al (2015) EasyConnect: a management system for IoT devices and its applications for interactive design and art. IEEE Internet Things J 2(6):551–561
Gravenhorst F, Muaremi A, Bardram J et al (2015) Mobile phones as medical devices in mental disorder treatment: an overview. Pers Ubiquit Comput 19(2):335–353
Avila L, Bailey M (2015) The wearable revolution. IEEE Comput Graph Appl 35(2):104–104
Carretero J, Daniel García J (2014) The internet of things: connecting the world. Pers Ubiquit Comput 18(2):445–447
Chen M, Zhang Y, Li Y, Hassan M, Alamri A (2015) AIWAC: affective interaction through wearable computing and cloud technology. IEEE Wirel Commun 22(1):20–27
Mehmood R, Shaikh MU, Bie R, Dawood H, Dawood H (2015) IoT-enabled web warehouse architecture: a secure approach. Pers Ubiquit Comput 19(7):1157–1167
Zhang M, Raghunathan A, Jha NK (2013) MedMon: securing medical devices through wireless monitoring and anomaly detection. IEEE Trans Biomed Circuits Syst 7(6):871–881
He D, Chan S, Guizani M (2015) User privacy and data trustworthiness in mobile crowd sensing. IEEE Wirel Commun 22(1):28–34
Kirkham R, Greenhalgh C (2015) Social access vs. privacy in wearable computing: a case study of autism. IEEE Pervasive Comput 14(1):26–33
Khan R, Hasan R, Xu J (2015) SEPIA: secure-PIN-authentication-as-a-service for ATM using mobile and wearable devices. In: The 3rd IEEE international conference on mobile cloud computing, services, and engineering (MobileCloud), pp 41–50
Kim SD, Lee SM, Lee SE (2015) Secure communication system for wearable devices wireless intra body communication. In: The 2015 IEEE international conference on consumer electronics (ICCE), pp 381–382
Diez FP, Touceda DS, Camara JMS, Zeadally S (2015) Toward self-authenticable wearable devices. IEEE Wirel Commun 22(1):36–43
Zhou J, Cao Z, Dong X, Lin X (2015) PPDM: privacy-preserving protocol for dynamic medical text mining and image feature extraction from secure data aggregation in cloud-assisted e-healthcare systems. IEEE J Sel Top Signal Process 9(7):1332–1344
Liu H, Yu R, Wan Y (2015) YPAP: the yoking-proofs based authentication protocol for wearable devices in wireless communications. In: UIC-ATC-ScalCom-CBDCom-IoP, pp 1639–1643
Li C, Raghunathan A, Jha NK (2013) Improving the trustworthiness of medical device software with formal verification methods. IEEE Embed Syst Lett 5(3):50–53
Zhou J, Cao Z, Dong X, Lin X (2015) Security and privacy in cloud-assisted wireless wearable communications: challenges, solutions, and future directions. IEEE Wirel Commun 22(2):136–144
Ning H, Liu H, Yang LT (2014) Aggregated-proof based hierarchical authentication scheme for the internet of things. IEEE Trans Parallel Distrib Syst 26(3):657–667
Juels A (2004) “Yoking-proofs” for RFID tags. In: The second IEEE annual conference on pervasive computing and communications workshops, pp 138–143
Cho JS, Yeo SS, Hwang S, Rhee SY, Kim SK (2008) Enhanced yoking proof protocols for RFID tags and tag groups. In: The 22nd international conference on advanced information networking and applications workshops (AINAW ’08), pp 1591–1596
Chien HY, Liu SB (2009) Tree-based RFID yoking proof. In: Proceedings of the international conference on networks security, wireless communications and trusted computing (NSWCTC 2009), pp 550–553
Liu H, Ning H, Zhang Y, He D, Xiong Q, Yang LT (2013) Grouping-proofs based authentication protocol for distributed RFID systems. IEEE Trans Parallel Distrib Syst 24(7):1321–1330
Wang C, Wang Q, Ren K, Cao N, Lou W (2012) Toward secure and dependable storage services in cloud computing. IEEE Trans Serv Comput 5(2):220–232
Liu H, Ning H, Xiong Q, Yang LT (2015) Shared authority based privacy-preserving authentication protocol in cloud computing. IEEE Trans Parallel Distrib Syst 26(1):241–251
Suh GE, Devadas S (2007) Physical unclonable functions for device authentication and secret key generation. In: The 44th design automation conference (DAC 2007), pp 9–14
Rubin AD, Honeyman P (1994) Nonmonotonic cryptographic protocols. In: Computer security foundations workshop VII, pp 100–116
http://www.heliontech.com/core.htm. Accessed Jan 2016
Acknowledgments
This work was funded by National Natural Science Foundation of China (61471035, 61402117), Fundamental Research Funds for Central Universities (06105031), Beijing Municipal Organization Department Talents Project (201500002685XG245), and Science and Technology Foundation of Beijing (Z141100002714003, Z151100002115041). Related conference paper has been published in the 1st International Workshop on Privacy Threats in Ubiquitous Computing, The 12th IEEE International Conference on Ubiquitous Intelligence and Computing (UIC2015), August 10–14, 2015, Beijing, China.
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Liu, W., Liu, H., Wan, Y. et al. The yoking-proof-based authentication protocol for cloud-assisted wearable devices. Pers Ubiquit Comput 20, 469–479 (2016). https://doi.org/10.1007/s00779-016-0926-8
Received:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s00779-016-0926-8