A Security-Enhanced Certificateless Designated Verifier Aggregate Signature Scheme for HWMSNs in the YOSO Model
Due to the advent of healthcare wireless medical sensor networks (HWMSNs) technology, the traditional model of medical treatment has been transformed. In HWMSNs environments, sensor nodes (e.g., wearable devices) collect medical data from patients and transmit them to doctors for diagnosis. Several...
Saved in:
Published in: | IEEE internet of things journal Vol. 11; no. 6; pp. 10865 - 10879 |
---|---|
Main Authors: | , , , |
Format: | Journal Article |
Language: | English |
Published: |
Piscataway
IEEE
15-03-2024
The Institute of Electrical and Electronics Engineers, Inc. (IEEE) |
Subjects: | |
Online Access: | Get full text |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Summary: | Due to the advent of healthcare wireless medical sensor networks (HWMSNs) technology, the traditional model of medical treatment has been transformed. In HWMSNs environments, sensor nodes (e.g., wearable devices) collect medical data from patients and transmit them to doctors for diagnosis. Several certificateless aggregate signature (CLAS) schemes have been put forward to guarantee secure transmission of medical data and privacy of patients in HWMSNs. However, the utilization of a centralized key generation center (KGC) implies elevated risk of insecurity and privacy disclosure. Practical and destructive coalition attacks resulting from the collusion of an insider signer with a malicious KGC are difficult to resist. Therefore, a security-enhanced certificateless designated verifier anonymous aggregate signature (CL-DVAAS) scheme is devised to solve these problems. As introduced in the you only speak once (YOSO) model, an ever-changing, unpredictable committee replaces the role of the KGC for system initialization and key distribution. The serverless computing paradigm empowers the proposed scheme with excellent attack prevention and privacy protection capabilities. The proposed scheme is provably secure against various types of attacks in the random oracle model. Moreover, the performance evaluation and comparison illustrate that our scheme outperforms the state-of-the-art solutions. |
---|---|
ISSN: | 2327-4662 2327-4662 |
DOI: | 10.1109/JIOT.2023.3327505 |