A Security-Enhanced Certificateless Designated Verifier Aggregate Signature Scheme for HWMSNs in the YOSO Model

Due to the advent of healthcare wireless medical sensor networks (HWMSNs) technology, the traditional model of medical treatment has been transformed. In HWMSNs environments, sensor nodes (e.g., wearable devices) collect medical data from patients and transmit them to doctors for diagnosis. Several...

Full description

Saved in:
Bibliographic Details
Published in:IEEE internet of things journal Vol. 11; no. 6; pp. 10865 - 10879
Main Authors: Li, Xincheng, Zhou, Lifeng, Yin, Xinchun, Ning, Jianting
Format: Journal Article
Language:English
Published: Piscataway IEEE 15-03-2024
The Institute of Electrical and Electronics Engineers, Inc. (IEEE)
Subjects:
Online Access:Get full text
Tags: Add Tag
No Tags, Be the first to tag this record!
Description
Summary:Due to the advent of healthcare wireless medical sensor networks (HWMSNs) technology, the traditional model of medical treatment has been transformed. In HWMSNs environments, sensor nodes (e.g., wearable devices) collect medical data from patients and transmit them to doctors for diagnosis. Several certificateless aggregate signature (CLAS) schemes have been put forward to guarantee secure transmission of medical data and privacy of patients in HWMSNs. However, the utilization of a centralized key generation center (KGC) implies elevated risk of insecurity and privacy disclosure. Practical and destructive coalition attacks resulting from the collusion of an insider signer with a malicious KGC are difficult to resist. Therefore, a security-enhanced certificateless designated verifier anonymous aggregate signature (CL-DVAAS) scheme is devised to solve these problems. As introduced in the you only speak once (YOSO) model, an ever-changing, unpredictable committee replaces the role of the KGC for system initialization and key distribution. The serverless computing paradigm empowers the proposed scheme with excellent attack prevention and privacy protection capabilities. The proposed scheme is provably secure against various types of attacks in the random oracle model. Moreover, the performance evaluation and comparison illustrate that our scheme outperforms the state-of-the-art solutions.
ISSN:2327-4662
2327-4662
DOI:10.1109/JIOT.2023.3327505