A Secure Remote User Authentication Protocol for Healthcare Monitoring Using Wireless Medical Sensor Networks

被引:24
作者
Chandrakar, Preeti [1 ]
机构
[1] NIT, Raipur, Chhattisgarh, India
关键词
Authentication; AVISPA Tool; BAN Logic; Remote Patient Monitoring; Security Analysis; WMSN; SCHEME;
D O I
10.4018/IJACI.2019010106
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
The wireless medical sensor networks WMSN play a crucial role in healthcare monitoring remotely. In remote healthcare monitoring, the sensor nodes are deployed in patient's body for collecting physiological data and transmit these data over an insecure channel. The patient's health information is highly sensitive and important. Any malicious modification in physiological data will make wrong diagnoses and harm the patient health. Therefore, privacy, data security, and user authentication are extremely important for accessing patient's real-time heath information over an insecure channel. In this regard, this article proposes a secure and robust two-factor based remote user authentication protocol for healthcare monitoring. The authentication proof has done with the help of BAN logic, which ensures that the proposed scheme provides mutual authentication and session key agreement securely. The informal security verification proves that the developed protocol is secure from various security attacks. The simulation of the proposed scheme has been done using AVISPA tool, whose simulation results confirm that the proposed scheme is secure from active and passive attacks. Performance evaluation shows that the proposed protocol is efficient in terms of security features, computation cost, communication cost, and execution time.
引用
收藏
页码:96 / 116
页数:21
相关论文
共 33 条
[1]   A secure user authentication and key-agreement scheme using wireless sensor networks for agriculture monitoring [J].
Ali, Rifaqat ;
Pal, Arup Kumar ;
Kumari, Saru ;
Karuppiah, Marimuthu ;
Conti, Mauro .
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2018, 84 :200-215
[2]   An efficient three factor-based authentication scheme in multiserver environment using ECC [J].
Ali, Rifaqat ;
Pal, Arup Kumar .
INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2018, 31 (04)
[3]   Three-Factor-Based Confidentiality-Preserving Remote User Authentication Scheme in Multi-server Environment [J].
Ali, Rifaqat ;
Pal, Arup Kumar .
ARABIAN JOURNAL FOR SCIENCE AND ENGINEERING, 2017, 42 (08) :3655-3672
[4]   A secure and robust three-factor based authentication scheme using RSA cryptosystem [J].
Ali, Rifaqat ;
Pal, Arup Kumar .
International Journal of Business Data Communications and Networking, 2017, 13 (01) :74-84
[5]   A robust and anonymous patient monitoring system using wireless medical sensor networks [J].
Amin, Ruhul ;
Islam, S. K. Hafizul ;
Biswas, G. P. ;
Khan, Muhammad Khurram ;
Kumar, Neeraj .
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2018, 80 :483-495
[6]  
[Anonymous], ARABIAN J SCI ENG
[7]  
AVISPA, AV WEB TOO
[8]  
BURROWS M, 1990, ACM T COMPUT SYST, V8, P18, DOI [10.1145/77648.77649, 10.1145/74851.74852]
[9]  
Chandrakar P., 2017, INT C COMP INT COMM, P537, DOI DOI 10.1007/978-981-10-6427-2_43
[10]   An Efficient Two-Factor Remote User Authentication and Session Key Agreement Scheme Using Rabin Cryptosystem [J].
Chandrakar, Preeti ;
Om, Hari .
ARABIAN JOURNAL FOR SCIENCE AND ENGINEERING, 2018, 43 (02) :661-673