Open Access Open Access  Restricted Access Subscription or Fee Access

A New Efficient Authentication Protocol for Wireless Healthcare Sensor Networks


(*) Corresponding author


Authors' affiliations


DOI: https://doi.org/10.15866/irea.v9i5.20305

Abstract


Electronic health (E-Health) has become one of the most important research fields over the last decades, which is considered the best solution for many problems in the medical area. E-Health is based on Wireless Healthcare Sensor Network (WHSN). The field of wireless communication has many security challenges. For this prospect, an authentication and session key agreement protocol for WHSN has been proposed in order to secure the transferred information over the wireless channels by WHSN. The proposed protocol has preserved privacy for the shared entities and has withstand the expected different types of electronic attacks (e.g. stolen smart card attack, replay attack, privileged insider attack and denial of service attack, etc.). The formal security analysis using BAN logic has claimed that the protocol is secure. Moreover, the proposed protocol has managed to achieve a noticeable improvement in the computation efficiency compared to its peers.
Copyright © 2021 Praise Worthy Prize - All rights reserved.

Keywords


E-Health; Authentication; Wireless Sensor Network; WBAN

Full Text:

PDF


References


Z. Ali, A. Ghani, I. Khan, S. A. Chaudhry, S. H. Islam, and D. Giri, A robust authentication and access control protocol for securing wireless healthcare sensor networks, J. Inf. Secur. Appl., vol. 52, p. 102502, Jun. 2020.
https://doi.org/10.1016/j.jisa.2020.102502

M. Hussain, A. Mehmood, S. Khan, M. A. Khan, and Z. Iqbal, Authentication Techniques and Methodologies used in Wireless Body Area Networks, J. Syst. Archit., vol. 101, p. 101655, Dec. 2019.
https://doi.org/10.1016/j.sysarc.2019.101655

Kumar P, Lee SG, Lee HJ. E-SAP: efficient-strong authentication protocol for healthcare applications using wireless medical sensor networks. Sensors 2012; 12(2): 1625-1647.
https://doi.org/10.3390/s120201625

C.-H. Liu and Y.-F. Chung, Secure user authentication scheme for wireless healthcare sensor networks, Comput. Electr. Eng., vol. 59, pp. 250-261, Apr. 2017.
https://doi.org/10.1016/j.compeleceng.2016.01.002

Qi Jiang a, Jianfeng Ma, Chao Yang, Xindi Ma, Jian Shen, Shehzad Ashraf Chaudhry, Efficient end-to-end authentication protocol for wearable health monitoring systems, Comput. Electr. Eng., vol. 63, pp. 182-195, Oct. 2017.
https://doi.org/10.1016/j.compeleceng.2017.03.016

F. Wu, X. Li, L. Xu, S. Kumari, and A. K. Sangaiah, A novel mutual authentication scheme with formal proof for smart healthcare systems under global mobility networks notion, Comput. Electr. Eng., vol. 68, pp. 107-118, May 2018.
https://doi.org/10.1016/j.compeleceng.2018.03.030

Q. Jiang , X. Lian , C. Yang , J. Ma , Y. Tian , Y. Yang , A bilinear pairing based anonymous authentication scheme in wireless body area networks for mHealth, J. Med. Syst. 40 (231) (2016) 1-10 November .
https://doi.org/10.1007/s10916-016-0587-1

N.H. Kamarudin , Y.M. Yussoff, Authentication scheme interface for mobile e-health monitoring using unique and lightweight identity-based authentication, in: Proceedings of the International Conference on Advanced Science, Engineering and Technology (ICASET), Penang, Malaysia, 2015 December .
https://doi.org/10.1063/1.4965103

M.H. Salama , S. Taha , H.N. Elmahdy , PMAS: a proposed mutual authentication scheme for wireless body area networks, in: Proceedings of the International Conference on Information and Communication Technology Convergence (ICTC), Jeju, South Korea, October 2015, pp. 636-641.
https://doi.org/10.1109/ICTC.2015.7354628

Filippou, A., Karras, D., An efficient Multi-Agent Modelling Scheme of Wireless Sensor Networks (WSN) Towards Improved Performance Evaluation, (2020) International Review on Modelling and Simulations (IREMOS), 13 (6), pp. 383-393.
https://doi.org/10.15866/iremos.v13i6.18260

Alrabea, A., Alzubi, O., Alzubi, J., An Enhanced Mac Protocol Design Prolong Sensor Network Lifetime, (2020) International Journal on Communications Antenna and Propagation (IRECAP), 10 (1), pp. 37-43.
https://doi.org/10.15866/irecap.v10i1.17467

Zayoud, M., Oueida, S., Kadry, S., Wireless Networks and Security Algorithms for Efficient Data Encryption in Smart Healthcare, (2018) International Journal on Communications Antenna and Propagation (IRECAP), 8 (4), pp. 324-332.
https://doi.org/10.15866/irecap.v8i4.14386

Ezzedine, T., Miladi, M., Bouallegue, R., A Performance Comparison of Energy Efficient MAC Protocols for Wireless Sensor Networks, (2018) International Journal on Engineering Applications (IREA), 6 (1), pp. 9-20.
https://doi.org/10.15866/irea.v6i1.15141

Saifan, R., Qaisi, T., Sweidan, A., Alnabelsi, S., Darabkh, K., A Novel Reduced Sensing Time Routing Protocol in Cognitive Radio Networks, (2019) International Journal on Communications Antenna and Propagation (IRECAP), 9 (5), pp. 371-381.
https://doi.org/10.15866/irecap.v9i5.16961

Vahabi, M., Ghazvini, M., Rasid, M., Abdullah, R., Traffic Aware Data Collection MAC Protocol for Wireless Sensor Networks, (2018) International Journal on Engineering Applications (IREA), 6 (1), pp. 21-28.
https://doi.org/10.15866/irea.v6i1.15142

He, D., Kumar, N., Chen, J. et al. Robust anonymous authentication protocol for health-care applications using wireless medical sensor networks. Multimedia Systems 21, 49-60 (2015).
https://doi.org/10.1007/s00530-013-0346-9

X. Li, J. Niu, S. Kumari, J. Liao, W. Liang, and M. K. Khan, A new authentication protocol for healthcare applications using wireless medical sensor networks with user anonymity, Secur. Commun. Netw., vol. 9, no. 15, pp. 2643-2655, 2016.
https://doi.org/10.1002/sec.1214

Preeti Chandrakar, Sonam Sinha, Rifaqat Ali, Cloud‑based authenticated protocol for healthcare monitoring system, Journal of Ambient Intelligence and Humanized Computing, 11, 2020, pp. 3431-3447
https://doi.org/10.1007/s12652-019-01537-2

Ibrahim Albarkia,b, Mohamed Rasslanb, Ayman M. Bahaa-Eldina,c, Mohamed Sobha, Robust Hybrid- Security Protocol for HealthCare systems, Procedia Computer Science, 160, 2019, pp. 843-848
https://doi.org/10.1016/j.procs.2019.11.001

Chen, C.; He, D.; Chan, S.; Bu, J.; Gao, Y.; Fan, R. Lightweight and provably secure user authentication with anonymity for the global mobility network. Int. J. Commun. Syst. 2010.
https://doi.org/10.1109/NBiS.2010.34

Ping, Z.L.; Yi, W. An ID-based authenticated key agreement protocol for wireless sensor networks. J. Commun. 2010, 5, 620-626.
https://doi.org/10.4304/jcm.5.8.620-626

Kocher P, Jaffe J, Jun B. Differential power analysis. In Advances in Cryptology-CRYPTO'99. Springer: Berlin Heidelberg, 1999; 388-397.
https://doi.org/10.1007/3-540-48405-1_25

Messerges TS, Dabbish EA, Sloan RH. Examining smart-card security under the threat of power analysis attacks. IEEE Transactions on Computers 2002; 51(5): 541-552.
https://doi.org/10.1109/TC.2002.1004593

M. Burrows, M. Abadi and R. Needham, A Logic of Authentication, ACM Transactions on Computer Systems, Vol. 8, No. 1, pp.18-36, 1990.
https://doi.org/10.1145/77648.77649

Long M. Energy-efficient and intrusion resilient authentication for ubiquitous access to factory floor information. IEEE Trans Industr Inform 2006:40-7.
https://doi.org/10.1109/TII.2005.864144


Refbacks

  • There are currently no refbacks.



Please send any question about this web site to info@praiseworthyprize.com
Copyright © 2005-2024 Praise Worthy Prize