收录:
摘要:
Since communication in a wearable network may not always be conducted over direct but multihop connections, intermediate nodes that make up the connections for communication could become potential sources of security threats. Therefore, access authentication is very crucial for preventing illegitimate, unauthorized or insecure devices from making access to the network. In this paper, we propose a new mutual authentication protocol in wireless wearable networks based on several technologies such as ad hoc network model, ECC, (t, n) threshold cryptographic method, EAP and TPM so that both the user and the terminal device can be authenticated before access to the network is allowed. Thus, only a trusted terminal with a legitimate user can be allowed to access a wearable network. We also show the effectiveness of our authentication protocol through mathematical analysis and simulation and compare our protocol with a generic protocol without TPM to demonstrate the advantages of our protocol not only in terms of security but also in terms of computation overhead.
关键词:
通讯作者信息:
电子邮件地址: