• Complex
  • Title
  • Keyword
  • Abstract
  • Scholars
  • Journal
  • ISSN
  • Conference
搜索

Author:

Tu, S. (Tu, S..) | Badshah, A. (Badshah, A..) | Alasmary, H. (Alasmary, H..) | Waqas, M. (Waqas, M..)

Indexed by:

EI Scopus SCIE

Abstract:

Wearable computing has shown tremendous potential to revolutionize and uplift the standard of our lives. However, researchers and field experts have often noted several privacy and security vulnerabilities in the field of wearable computing. In order to tackle these problems, various schemes have been proposed in the literature to improve the efficiency of authentication and key establishment procedure. However, the existing schemes have relatively high computation and communication overheads and are not resilient to various potential security attacks, which reduces their significance for applicability in constrained wearable devices. In this work, we propose an efficient and anonymous authenticated key exchange scheme for wearable computing (EAKE-WC), which performs mutual authentication between the user and the wearable device, and between the cloud server and the user. It also establishes secret session keys for each session to secure communication among the communicating entities. Additionally, the proposed EAKE-WC scheme is designed using authenticated encryption with associated data (AEAD) primitives like ASCON, bitwise XOR, and hash functions. Our results from the security analysis depict compliance of the proposed EAKE-WC with wearable computing's security criteria. In addition, we also demonstrate through a comprehensive comparative analysis that the proposed scheme, EAKE-WC, outperforms the existing benchmark schemes in various key performance areas, including lower communication and computational overheads, enhanced security, and added functionality. IEEE

Keyword:

authenticated encryption with associated data Wearable computers Key exchange authentication wearable computing security Security Cloud computing Authentication Cryptography Servers Hash functions

Author Community:

  • [ 1 ] [Tu S.]Faculty of Information Technology, Beijing University of Technology, Beijing, China
  • [ 2 ] [Badshah A.]Department of Software Engineering, University of Malakand, Dir Lower, Pakistan
  • [ 3 ] [Alasmary H.]Department of Computer Science, College of Computer Science, King Khalid University, Abha, Kingdom of Saudi Arabia
  • [ 4 ] [Waqas M.]Computer Engineering Department, College of Information Technology, University of Bahrain, Bahrain

Reprint Author's Address:

Email:

Show more details

Related Keywords:

Related Article:

Source :

IEEE Transactions on Mobile Computing

ISSN: 1536-1233

Year: 2023

Issue: 5

Volume: 23

Page: 1-12

7 . 9 0 0

JCR@2022

ESI Discipline: COMPUTER SCIENCE;

ESI HC Threshold:19

Cited Count:

WoS CC Cited Count: 0

SCOPUS Cited Count: 16

ESI Highly Cited Papers on the List: 0 Unfold All

WanFang Cited Count:

Chinese Cited Count:

30 Days PV: 7

Affiliated Colleges:

Online/Total:566/10712546
Address:BJUT Library(100 Pingleyuan,Chaoyang District,Beijing 100124, China Post Code:100124) Contact Us:010-67392185
Copyright:BJUT Library Technical Support:Beijing Aegean Software Co., Ltd.