| Literature DB >> 35816499 |
Lifeng Zhou1, Xinchun Yin1,2.
Abstract
In healthcare wireless medical sensor networks (HWMSNs), the medical sensor nodes are employed to collect medical data which is transmitted to doctors for diagnosis and treatment. In HWMSNs, medical data is vulnerable to various attacks through public channels. In addition, leakage of patients' information happens frequently. Hence, secure communication and privacy preservation are major concerns in HWMSNs. To solve the above issues, Zhan et al. put forward a pairing-free certificateless aggregate signature (PF-CLAS) scheme. However, according to our cryptanalysis, the malicious medical sensor node (MSNi) can generate the forged signature by replacing the public key in the PF-CLAS scheme. Hence, to address this security flaw, we design the improved PF-CLAS scheme that can achieve unforgeability, anonymity, and traceability. Since we have changed the construction of the partial private key, the improved PF-CLAS scheme can resist Type I and Type II attacks under the Elliptic Curve Discrete Logarithm assumption. In terms of the performance evaluation, the proposed scheme outperforms related CLAS schemes, which is more suitable for HWMSNs environments.Entities:
Mesh:
Year: 2022 PMID: 35816499 PMCID: PMC9273098 DOI: 10.1371/journal.pone.0268484
Source DB: PubMed Journal: PLoS One ISSN: 1932-6203 Impact factor: 3.752
Fig 1System model for HWMSNs.
Notations used in PF-CLAS scheme.
| Notation | Description |
|---|---|
|
| A prime number |
|
| A generator of |
|
| Master secret key |
|
| Master public key |
|
| Security parameter |
|
| System parameter |
|
| Real identity of MSN |
|
| Pseudo identity of MSN |
|
| Valid time period of pseudo identity |
|
| Partial private key of MSN |
|
| Secret value of MSN |
| ( | Public and private key pair of MSN |
|
| An aggregate signature |
|
| Current timestamp |
Runtime of cryptographic operations.
| Operations | Abbreviations | Runtime (ms) |
|---|---|---|
| Pairing-based scalar multiplication |
| 2.2560 |
| Pairing-based point addition |
| 0.1732 |
| Bilinear pairing computation |
| 4.6028 |
| Map-to-point hash |
| 5.1240 |
| ECC-based scalar multiplication |
| 0.7648 |
| ECC-based point addition |
| 0.0435 |
Comparison of computational overhead.
| Schemes | Sign (ms) | Verify (ms) | AggregateSign (ms) | AggregateVerify (ms) |
|---|---|---|---|---|
| [ | 14 | 22 | — | — |
| [ | 4 | — | — | |
| [ | 3 | 3 | ( | 3 |
| [ | 2 | 2 | 2 | |
| [ | 2 | 5 | 2 | (2 |
| [ | 2 | 4 | ( | (2 |
| [ | 3 | 3 | ||
| Our scheme | 4 | ( | (2 |
We set the number of signatures participating in the aggregation as n = 50.
Fig 2Computational overhead of the single signing and verification.
Fig 3Computational overhead of the aggregate signing and aggregate verification.
Length of parameters in bilinear pairing and ECC.
| Type of the scheme | Type of the curve | Pairing | Cyclic group | Size of the prime | Size of the group |
|---|---|---|---|---|---|
| Bilinear Pairing | | | ||||
| ECC | — | | |
Fig 4Communication overhead of single signatures.
Fig 5Communication overhead of aggregate signatures.
Comparison of communication overhead and security features.
| Schemes | Single signatures | Aggregate signatures | Type I attacks | Type II attacks | Anonymity | Traceability |
|---|---|---|---|---|---|---|
| [ | | | — | — | — | × | × |
| [ | — | ✔ | ✔ | × | × | |
| [ | 2| | ( | ✔ | × | × | × |
| [ | 2| | 3| | × | × | ✔ | × |
| [ | × | × | ✔ | ✔ | ||
| [ | × | ✔ | × | × | ||
| [ | 2| | ( | ✔ | ✔ | × | × |
| Our scheme | ✔ | ✔ | ✔ | ✔ |