DOI QR코드

DOI QR Code

An Adaptive Authentication Protocol for Ambient Assisted Living Systems

전천 후 생활보조 시스템을 위한 적응형 인증 프로토콜

  • 이명규 (가천대학교 IT대학 컴퓨터공학과) ;
  • 최현철 (가천대학교 공과대학 건축학과) ;
  • 황보택근 (가천대학교 IT대학 컴퓨터공학과)
  • Received : 2018.07.20
  • Accepted : 2018.08.10
  • Published : 2018.08.31

Abstract

In recent years, the substantial increase in the population's average age leads to an exceeded number of older persons comparing with the number of any other age group. As a result, both industry and academia are focused on the development of several solutions aimed to guarantee a healthy and safe lifestyle to the elderly. Ambient Assisted Living (AAL) approach is the way to guarantee better life conditions for the aged and for monitoring their health conditions by the development of innovative technologies and services. AAL technologies can also provide more safety for the elderly, offering emergency response mechanisms, fall detection solutions, and video surveillance systems. Unfortunately, due to the sensitive nature of AAL data, AAL systems should satisfy security requirements such as integrity, confidentiality, availability, anonymity, and others. In this paper, we propose an adaptive authentication protocol for the AAL systems. The proposed authentication protocol not only supports several important security requirements needed by the AAL systems, but can also withstand various types of attacks. In addition, the security analysis results show that the proposed authentication protocol is more efficient and secure than the existing authentication protocols.

최근 몇 년 동안, 인구 평균 연령의 급격히 증가하면서 다른 연령대의 사람들과 비교할 때 고령자가 더 많아지고 있다. 그 결과 산업계와 학계 모두 노인에게 건강하고 안전한 생활 방식을 제공하기 위한 여러 가지 해결 방법개발에 집중하고 있다. 전천후 생활보조 접근법은 혁신적인 기술과 서비스를 개발함으로써 노인들의 삶의 질을 향상시키고 건강 상태를 모니터링 하는 방법이다. 전천후 생활보조 기술은 또한 노인을 위한 더 많은 안전을 제공하고 응급대응 메커니즘, 추락 탐지 솔루션 및 비디오 감시 시스템을 제공할 수 있다. 불행히도 전천후 생활보조 데이터의 민감한 특성으로 인해, 전천후 생활보조 시스템은 무결성, 기밀성, 가용성, 익명 성 등과 같은 보안 요구 사항을 충족해야한다. 본 논문에서는 전천후 생활보조 시스템을 위한 적응형 인증 프로토콜을 제안한다. 제안된 인증 프로토콜은 전천후 생활보조 시스템에 필수적인 몇 가지 중요한 보안 요구 사항을 지원할 뿐만 아니라 다양한 유형의 공격으로부터 안전하다. 또한 보안 분석 결과를 통해 제안된 인증 프로토콜이 기존 프로토콜보다 더 효율적이고 안전하다는 것을 보여준다.

Keywords

References

  1. Personal Health Records and the HIPAA Privacy Rule.
  2. Myung-Kyu Yi, Hee-Joung Hwang, "A Study on Security Weakness and Threats in Personal Health Record Services", The Journal of The Institute of Internet, Broadcasting and Communication, Vol.15, No. 6, pp.163-171, Dec. 31, 2015. DOI : https://dx.doi.org/10.7236/JIIBC.2015.15.6.163
  3. C. Yeh, H. Chen, and J. Lo, "An Authentication Protocol for Ubiquitous Health Monitoring Systems," J. Medical and Biological Engineering, vol. 33, no. 4, 2013 DOI : 10.5405/jmbe.1478
  4. J. Liu et al., "Certificateless Remote Anonymous Authentication Schemes for WirelessBody Area Networks," IEEE Transactions on Parallel and Distributed Systems, Vol. 25, No. 2, pp. 332-342, 2014. DOI: https://doi.org/10.1109/TPDS.2013.145
  5. Z. Zhao, "An Efficient Anonymous Authentication Scheme for Wireless Body Area Networks Using Elliptic Curve Cryptosystem," J. Medical Systems, vol. 38, no. 2, 2014. DOI 10.1007/s10916-014-0013-5
  6. Debiao He, Sherali Zeadally, "Authentication protocol for an ambient assisted living system", IEEE Communications Magazine, Vol. 53, No 1, pp. 71-77, Jan. 16, 2015 DOI: 10.1109/MCOM.2015.7010518
  7. Myung-Kyu Yi, Taeg-Keun Whangbo, "A Lightweight Authentication Protocol for Ambient Assisted Living Systems", The Journal of The Institute of Internet, Broadcasting and Communication, Vol.17, No. 5, pp.9-16, Oct. 31, 2017. DOI : https://dx.doi.org/10.7236/JIIBC.2017.17.5.9
  8. C. Yeh, H. Chen, and J. Lo, "An Authentication Protocol for Ubiquitous Health Monitoring Systems," J. Medical and Biological Engineering, Vol. 33, No. 4, pp. 415-419, 2013 https://doi.org/10.5405/jmbe.1478
  9. X. Cao and W. Kou, "A Pairing-Free Identity-Based Authenticated Key Agreement Scheme with Minimal Message Exchanges," Information Sciences, Vol. 180, pp. 2895-2903, 2010 https://doi.org/10.1016/j.ins.2010.04.002
  10. J. Huang et al., "Robust and Privacy Protection Authentication in Cloud Computing," Int'l. J. InnovativeComputing, Information and Control International, Vol. 9, No. 11, pp. 4247-61, 2013