Open Access Open Access  Restricted Access Subscription or Fee Access

A New Efficient Authentication Protocol for Wireless Healthcare Sensor Networks

(*) Corresponding author

Authors' affiliations



Electronic health (E-Health) has become one of the most important research fields over the last decades, which is considered the best solution for many problems in the medical area. E-Health is based on Wireless Healthcare Sensor Network (WHSN). The field of wireless communication has many security challenges. For this prospect, an authentication and session key agreement protocol for WHSN has been proposed in order to secure the transferred information over the wireless channels by WHSN. The proposed protocol has preserved privacy for the shared entities and has withstand the expected different types of electronic attacks (e.g. stolen smart card attack, replay attack, privileged insider attack and denial of service attack, etc.). The formal security analysis using BAN logic has claimed that the protocol is secure. Moreover, the proposed protocol has managed to achieve a noticeable improvement in the computation efficiency compared to its peers.
Copyright © 2021 Praise Worthy Prize - All rights reserved.


E-Health; Authentication; Wireless Sensor Network; WBAN

Full Text:



Z. Ali, A. Ghani, I. Khan, S. A. Chaudhry, S. H. Islam, and D. Giri, A robust authentication and access control protocol for securing wireless healthcare sensor networks, J. Inf. Secur. Appl., vol. 52, p. 102502, Jun. 2020.

M. Hussain, A. Mehmood, S. Khan, M. A. Khan, and Z. Iqbal, Authentication Techniques and Methodologies used in Wireless Body Area Networks, J. Syst. Archit., vol. 101, p. 101655, Dec. 2019.

Kumar P, Lee SG, Lee HJ. E-SAP: efficient-strong authentication protocol for healthcare applications using wireless medical sensor networks. Sensors 2012; 12(2): 1625-1647.

C.-H. Liu and Y.-F. Chung, Secure user authentication scheme for wireless healthcare sensor networks, Comput. Electr. Eng., vol. 59, pp. 250-261, Apr. 2017.

Qi Jiang a, Jianfeng Ma, Chao Yang, Xindi Ma, Jian Shen, Shehzad Ashraf Chaudhry, Efficient end-to-end authentication protocol for wearable health monitoring systems, Comput. Electr. Eng., vol. 63, pp. 182-195, Oct. 2017.

F. Wu, X. Li, L. Xu, S. Kumari, and A. K. Sangaiah, A novel mutual authentication scheme with formal proof for smart healthcare systems under global mobility networks notion, Comput. Electr. Eng., vol. 68, pp. 107-118, May 2018.

Q. Jiang , X. Lian , C. Yang , J. Ma , Y. Tian , Y. Yang , A bilinear pairing based anonymous authentication scheme in wireless body area networks for mHealth, J. Med. Syst. 40 (231) (2016) 1-10 November .

N.H. Kamarudin , Y.M. Yussoff, Authentication scheme interface for mobile e-health monitoring using unique and lightweight identity-based authentication, in: Proceedings of the International Conference on Advanced Science, Engineering and Technology (ICASET), Penang, Malaysia, 2015 December .

M.H. Salama , S. Taha , H.N. Elmahdy , PMAS: a proposed mutual authentication scheme for wireless body area networks, in: Proceedings of the International Conference on Information and Communication Technology Convergence (ICTC), Jeju, South Korea, October 2015, pp. 636-641.

Filippou, A., Karras, D., An efficient Multi-Agent Modelling Scheme of Wireless Sensor Networks (WSN) Towards Improved Performance Evaluation, (2020) International Review on Modelling and Simulations (IREMOS), 13 (6), pp. 383-393.

Alrabea, A., Alzubi, O., Alzubi, J., An Enhanced Mac Protocol Design Prolong Sensor Network Lifetime, (2020) International Journal on Communications Antenna and Propagation (IRECAP), 10 (1), pp. 37-43.

Zayoud, M., Oueida, S., Kadry, S., Wireless Networks and Security Algorithms for Efficient Data Encryption in Smart Healthcare, (2018) International Journal on Communications Antenna and Propagation (IRECAP), 8 (4), pp. 324-332.

Ezzedine, T., Miladi, M., Bouallegue, R., A Performance Comparison of Energy Efficient MAC Protocols for Wireless Sensor Networks, (2018) International Journal on Engineering Applications (IREA), 6 (1), pp. 9-20.

Saifan, R., Qaisi, T., Sweidan, A., Alnabelsi, S., Darabkh, K., A Novel Reduced Sensing Time Routing Protocol in Cognitive Radio Networks, (2019) International Journal on Communications Antenna and Propagation (IRECAP), 9 (5), pp. 371-381.

Vahabi, M., Ghazvini, M., Rasid, M., Abdullah, R., Traffic Aware Data Collection MAC Protocol for Wireless Sensor Networks, (2018) International Journal on Engineering Applications (IREA), 6 (1), pp. 21-28.

He, D., Kumar, N., Chen, J. et al. Robust anonymous authentication protocol for health-care applications using wireless medical sensor networks. Multimedia Systems 21, 49-60 (2015).

X. Li, J. Niu, S. Kumari, J. Liao, W. Liang, and M. K. Khan, A new authentication protocol for healthcare applications using wireless medical sensor networks with user anonymity, Secur. Commun. Netw., vol. 9, no. 15, pp. 2643-2655, 2016.

Preeti Chandrakar, Sonam Sinha, Rifaqat Ali, Cloud‑based authenticated protocol for healthcare monitoring system, Journal of Ambient Intelligence and Humanized Computing, 11, 2020, pp. 3431-3447

Ibrahim Albarkia,b, Mohamed Rasslanb, Ayman M. Bahaa-Eldina,c, Mohamed Sobha, Robust Hybrid- Security Protocol for HealthCare systems, Procedia Computer Science, 160, 2019, pp. 843-848

Chen, C.; He, D.; Chan, S.; Bu, J.; Gao, Y.; Fan, R. Lightweight and provably secure user authentication with anonymity for the global mobility network. Int. J. Commun. Syst. 2010.

Ping, Z.L.; Yi, W. An ID-based authenticated key agreement protocol for wireless sensor networks. J. Commun. 2010, 5, 620-626.

Kocher P, Jaffe J, Jun B. Differential power analysis. In Advances in Cryptology-CRYPTO'99. Springer: Berlin Heidelberg, 1999; 388-397.

Messerges TS, Dabbish EA, Sloan RH. Examining smart-card security under the threat of power analysis attacks. IEEE Transactions on Computers 2002; 51(5): 541-552.

M. Burrows, M. Abadi and R. Needham, A Logic of Authentication, ACM Transactions on Computer Systems, Vol. 8, No. 1, pp.18-36, 1990.

Long M. Energy-efficient and intrusion resilient authentication for ubiquitous access to factory floor information. IEEE Trans Industr Inform 2006:40-7.


  • There are currently no refbacks.

Please send any question about this web site to
Copyright © 2005-2023 Praise Worthy Prize