| Wireless body area network is mainly used in the field of health care,which consists of a large number of sensors worn on and around patients to collect dynamic medical health data of patients.In addition,the data is aggregated and stored in mobile devices,which is convenient for medical staff to view in remote terminals and greatly improves the efficiency of patients’ treatment.However,the patient’s medical data has strong privacy and sensitivity,and is prone to various security problems in the process of data collection,transmission and use.In order to solve the above security problems,this thesis mainly has the following aspects:Mutual authentication is the premise to ensure the legitimacy of sensors collecting data and controller storing data,and a secure key distribution mechanism is the basis of ensuring secure communication.In order to ensure the reliability and privacy of the data collected by the sensors in the wireless body area network and the security during transmission,a group authentication and key distribution(GA-KD)scheme based on Schnorr signature is constructed.It enables effectively mutual authentication between controller and sensors,supports all signatures of sensors in the group to be checked by the controller through aggregation verification to achieve efficient authentication,and allows key distribution during authentication to improve the computation efficiency.Security analysis indicates that the proposed scheme enjoys existentially unforgeability,and theoretical and experimental comparison demonstrates its practicality in terms of computation and communication cost.We also propose a secure multi-keyword search and access control(SMKS-AC)scheme,which implements encrypted data access control under the ciphertext-policy attribute-based encryption(CP-ABE).SMKS-AC provides multi-keyword search for accurate data retrieval and supports the validation of decrypted data,so as to ensure the accuracy of data and the privacy of the data in the access phase.In addition,if a data user’s private key is leaked,the identity of the user can be traced and the access and decryption rights of the user can be revoked.Security analysis shows that SMKS-AC is secure against chosen keyword and chosen plaintext attacks.Through theoretical and experimental analysis,the proposed SMKS-AC scheme requires less storage resources and computational costs on mobile devices than existing schemes. |