Netinfo Security ›› 2015, Vol. 15 ›› Issue (9): 135-138.doi: 10.3969/j.issn.1671-1122.2015.09.031

• Orginal Article • Previous Articles     Next Articles

The Yoking-proofs Based Authentication Protocol for Wearable Devices in the Cloud Computing

Zhan-bin LIU1(), Hong LIU2, Xiao-fei CAO2   

  1. 1. The Third Research Institute of the Ministry of Public Security, Shanghai 310000, China
    2. Run Technologies Co., Ltd. Beijing, Beijing 100192, China
  • Received:2015-07-15 Online:2015-09-01 Published:2015-11-13

Abstract:

Along with the development of cloud computing and wireless communications, wearable devices become emerging terminals for providing intelligent service support. Due to the openness of cloud environments and limitations of communication channels, it makes that the wearable devices confront severe security issues during the user data monitoring. In this work, a yoking-proofs based authentication protocol is proposed for the wearable devices to realize that a user’s smart phone simultaneously identifies and verifies two wearable devices. The proposed protocol establishes yoking-proofs to integrate two wearable devices’ main parameters, and achieve security properties of data confidentiality and integrity, forward security, and dual authentication. It indicates that the proposed protocol is flexible for resource-constrained interactive applications.

Key words: wearable devices, security, authentication, yoking-proof, cloud computing

CLC Number: