Two-factor wearable device authentication protocol based on PUF and IPI

Wearable device is pushing the rapid development of mobile health,however,the open architecture of wireless body area network has brought challenges for the security of user data.In order to protect the security of user data,a two-factor authentication protocol between device note and data hub was p...

Full description

Saved in:
Bibliographic Details
Main Authors: Jun WANG, Shu-bo LIU, Cai LIANG, Yong-kai LI
Format: Article
Language:zho
Published: Editorial Department of Journal on Communications 2017-06-01
Series:Tongxin xuebao
Subjects:
Online Access:http://www.joconline.com.cn/zh/article/doi/10.11959/j.issn.1000-436x.2017125/
Tags: Add Tag
No Tags, Be the first to tag this record!
_version_ 1841539545180405760
author Jun WANG
Shu-bo LIU
Cai LIANG
Yong-kai LI
author_facet Jun WANG
Shu-bo LIU
Cai LIANG
Yong-kai LI
author_sort Jun WANG
collection DOAJ
description Wearable device is pushing the rapid development of mobile health,however,the open architecture of wireless body area network has brought challenges for the security of user data.In order to protect the security of user data,a two-factor authentication protocol between device note and data hub was proposed based on physically unclonable function and interpulse interval.Using dual uniqueness of device physical characteristic and user biometric trait,the protocol can resist compromise and impersonation attacks and was specially suitable for resource constrained wearable devices under body area network.Compared with the existing authentication schemes,the security of the proposed protocol was enhanced.The practicability and effectiveness of the protocol are confirmed by hardware implementation on FPGA.
format Article
id doaj-art-ec162e85e8424a8e8193a75a737a92dc
institution Kabale University
issn 1000-436X
language zho
publishDate 2017-06-01
publisher Editorial Department of Journal on Communications
record_format Article
series Tongxin xuebao
spelling doaj-art-ec162e85e8424a8e8193a75a737a92dc2025-01-14T07:12:14ZzhoEditorial Department of Journal on CommunicationsTongxin xuebao1000-436X2017-06-013812713559709803Two-factor wearable device authentication protocol based on PUF and IPIJun WANGShu-bo LIUCai LIANGYong-kai LIWearable device is pushing the rapid development of mobile health,however,the open architecture of wireless body area network has brought challenges for the security of user data.In order to protect the security of user data,a two-factor authentication protocol between device note and data hub was proposed based on physically unclonable function and interpulse interval.Using dual uniqueness of device physical characteristic and user biometric trait,the protocol can resist compromise and impersonation attacks and was specially suitable for resource constrained wearable devices under body area network.Compared with the existing authentication schemes,the security of the proposed protocol was enhanced.The practicability and effectiveness of the protocol are confirmed by hardware implementation on FPGA.http://www.joconline.com.cn/zh/article/doi/10.11959/j.issn.1000-436x.2017125/authentication protocoltwo-factorphysically unclonable functioninterpulse interval
spellingShingle Jun WANG
Shu-bo LIU
Cai LIANG
Yong-kai LI
Two-factor wearable device authentication protocol based on PUF and IPI
Tongxin xuebao
authentication protocol
two-factor
physically unclonable function
interpulse interval
title Two-factor wearable device authentication protocol based on PUF and IPI
title_full Two-factor wearable device authentication protocol based on PUF and IPI
title_fullStr Two-factor wearable device authentication protocol based on PUF and IPI
title_full_unstemmed Two-factor wearable device authentication protocol based on PUF and IPI
title_short Two-factor wearable device authentication protocol based on PUF and IPI
title_sort two factor wearable device authentication protocol based on puf and ipi
topic authentication protocol
two-factor
physically unclonable function
interpulse interval
url http://www.joconline.com.cn/zh/article/doi/10.11959/j.issn.1000-436x.2017125/
work_keys_str_mv AT junwang twofactorwearabledeviceauthenticationprotocolbasedonpufandipi
AT shuboliu twofactorwearabledeviceauthenticationprotocolbasedonpufandipi
AT cailiang twofactorwearabledeviceauthenticationprotocolbasedonpufandipi
AT yongkaili twofactorwearabledeviceauthenticationprotocolbasedonpufandipi