A lightweight and robust two-factor authentication scheme for personalized healthcare systems using wireless medical sensor networks

被引:207
作者
Wu, Fan [1 ]
Li, Xiong [2 ]
Sangaiah, Arun Kumar [3 ]
Xu, Lili [4 ]
Kumari, Saru [5 ]
Wu, Liuxi [1 ]
Shen, Jian [6 ]
机构
[1] Xiamen Inst Technol, Dept Comp Sci & Engn, Xiamen 361021, Peoples R China
[2] Hunan Univ Sci & Technol, Sch Comp Sci & Engn, Xiangtan 411201, Peoples R China
[3] VIT Univ, Sch Comp Sci & Engn, Vellore 632014, Tamil Nadu, India
[4] Xiamen Univ, Sch Informat Sci & Technol, Xiamen 361005, Peoples R China
[5] Chaudhary Charan Singh Univ, Dept Math, Meerut 250005, Uttar Pradesh, India
[6] Nanjing Univ Informat Sci & Technol, Sch Comp & Software, Nanjing 210044, Jiangsu, Peoples R China
来源
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE | 2018年 / 82卷
基金
中国国家自然科学基金;
关键词
Wireless medical sensor network; Mutual authentication; Proverif tool; User anonymity; Personalized healthcare system; KEY AGREEMENT SCHEME; USER AUTHENTICATION; MUTUAL AUTHENTICATION; SMART-CARD; PROTOCOL; SECURE; ANONYMITY; INTERNET;
D O I
10.1016/j.future.2017.08.042
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Wireless Sensor Network (WSN) is a very important part of Internet of Things (IoT), especially in e-healthcare applications. Among them, wireless medical sensor networks (WMSNs) have been used in the personalized healthcare systems (PHSs). In recent years, professionals use their mobile devices to access the data collected from sensors which are placed in or on patients' bodies. Due to the danger of wireless transmission circumstance, the security of the data which are collected by the sensors and also transmitted to the doctors faces challenges. In the past decade, many authentication schemes for WMSNs are proposed. However, security disadvantages have been found in such schemes. To overcome the historical security problems, we propose a robust and lightweight authentication scheme for WMSNs, which meets the common security requirements, and keeps away user tracking from attackers. The popular tool Proverif is employed to express that our scheme resists the simulated attacks. Also, the informal security analysis is demonstrated. With the comparison to several very recent schemes and simulation by NS-3, the proposed scheme is suitable for PHSs. (C) 2017 Elsevier B.V. All rights reserved.
引用
收藏
页码:727 / 737
页数:11
相关论文
共 49 条
[1]   Design of an anonymity-preserving three-factor authenticated key exchange protocol for wireless sensor networks [J].
Amin, Ruhul ;
Islam, S. K. Hafizul ;
Biswas, G. P. ;
Khan, Muhammad Khurram ;
Leng, Lu ;
Kumar, Neeraj .
COMPUTER NETWORKS, 2016, 101 :42-62
[2]   A secure light weight scheme for user authentication and key agreement in multi-gateway based wireless sensor networks [J].
Amin, Ruhul ;
Biswas, G. P. .
AD HOC NETWORKS, 2016, 36 :58-80
[3]  
[Anonymous], PROVERIF 1 90 AUTOMA
[4]  
[Anonymous], FUTURE GENER COMPUT
[5]  
[Anonymous], 2014, CRYPTOGRAPHY NETWORK
[6]   A Robust Mutual Authentication Protocol for Wireless Sensor Networks [J].
Chen, Tien-Ho ;
Shih, Wei-Kuan .
ETRI JOURNAL, 2010, 32 (05) :704-712
[8]   Two-Factor User Authentication in Wireless Sensor Networks [J].
Das, Manik Lal .
IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 2009, 8 (03) :1086-1090
[9]   An efficient user authentication and key agreement scheme for heterogeneous wireless sensor network tailored for the Internet of Things environment [J].
Farash, Mohammad Sabzinejad ;
Turkanovic, Muhamed ;
Kumari, Saru ;
Hoelbi, Marko .
AD HOC NETWORKS, 2016, 36 :152-176
[10]   Enabling Personalized Search over Encrypted Outsourced Data with Efficiency Improvement [J].
Fu, Zhangjie ;
Ren, Kui ;
Shu, Jiangang ;
Sun, Xingming ;
Huang, Fengxiao .
IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, 2016, 27 (09) :2546-2559