Robust secure communication protocol for smart healthcare system with FPGA implementation

被引:82
作者
Sureshkumar, Venkatasamy [1 ]
Amin, Ruhul [2 ]
Vijaykumar, V. R. [3 ]
Sekar, S. Raja [4 ]
机构
[1] PSG Coll Technol, Dept Appl Math & Computat Sci, Coimbatore, Tamil Nadu, India
[2] Dr Shyama Prasad Mukherjee Int Inst Informat Tech, Dept Comp Sci & Engn, Naya Raipur, India
[3] Anna Univ, Dept Elect & Commun Engn, Reg Campus, Coimbatore, Tamil Nadu, India
[4] Bannari Amman Inst Technol, Dept Elect & Commun Engn, Sathyamangalam, Tamil Nadu, India
来源
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE | 2019年 / 100卷
关键词
Mutual authentication; MWSN; BAN logic; Gateway node; Sensor node; 2-FACTOR USER AUTHENTICATION; KEY AGREEMENT; WIRELESS; SCHEME; LIGHTWEIGHT; PROCESSOR; INTERNET;
D O I
10.1016/j.future.2019.05.058
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Vast development of wireless technology and cloud computing has given lots of benefit to the society in a variety of ways. One such application using this technology is telemedicine or mobile healthcare and in this, security is one of the most important concern. In recent times, multimedia applications include mobile networks, integrated sensors and Internet-of-Things (IoT) services. In the landscape of IoT systems, the problem of privacy, security and trust has remained a challenge since several years. There are only few works proposed to support secure communication in the IoT-enabled Medical Wireless Sensor Networks (MWSNs). However, the existing protocols have some design flaws and are vulnerable to several security attacks including sensor and user impersonation attacks. In this paper, a novel architecture in the MWSNs is proposed and a suitable authenticated key establishment protocol using the light weight Elliptic Curve Cryptography (ECC) for the architecture is designed. The proposed authentication protocol solves the security issues found in existing protocols. The formal method Burrows-Abadi-Needham (BAN) logic is enforced to prove the correctness of the protocol. Further investigation has led to the claim that the protocol is safe from known security attacks. In addition, the proposed protocol is described in Verilog Hardware Description Language (HDL) and its functionalities are checked using Altera Quartus II simulation tool for Field-Programmable Gate Array (FPGA) implementation. The analysis of our protocol and comparison of it with similar protocols show that the proposed protocol is more efficient and robust than the existing protocols. (C) 2019 Elsevier B.V. All rights reserved.
引用
收藏
页码:938 / 951
页数:14
相关论文
共 48 条
[1]   Wireless Sensor Networks in Biomedical: Wireless Body Area Networks [J].
Abidi, Bahae ;
Jilbab, Abdelillah ;
Haziti, Mohamed E. L. .
EUROPE AND MENA COOPERATION ADVANCES IN INFORMATION AND COMMUNICATION TECHNOLOGIES, 2017, 520 :321-329
[2]   Vulnerability Analysis for the Authentication Protocols in Trusted Computing Platforms and a Proposed Enhancement of the OffPAD Protocol [J].
Alhaidary, Mada ;
Rahman, S. K. Md Mizanur ;
Zakariah, Mohammed ;
Hossain, M. Shamim ;
Alamri, Atif ;
Haque, Md Sarwar M. ;
Gupta, B. B. .
IEEE ACCESS, 2018, 6 :6071-6081
[3]   A robust and anonymous patient monitoring system using wireless medical sensor networks [J].
Amin, Ruhul ;
Islam, S. K. Hafizul ;
Biswas, G. P. ;
Khan, Muhammad Khurram ;
Kumar, Neeraj .
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2018, 80 :483-495
[4]   A secure light weight scheme for user authentication and key agreement in multi-gateway based wireless sensor networks [J].
Amin, Ruhul ;
Biswas, G. P. .
AD HOC NETWORKS, 2016, 36 :58-80
[5]   IoT Enabled RFID Authentication and Secure Object Tracking System for Smart Logistics [J].
Anandhi, S. ;
Anitha, R. ;
Sureshkumar, Venkatasamy .
WIRELESS PERSONAL COMMUNICATIONS, 2019, 104 (02) :543-560
[6]  
[Anonymous], 2013, P INT S WIR PERV COM
[7]  
[Anonymous], 2018, J AMBIENT INTELL HUM
[8]  
BURROWS M, 1990, ACM T COMPUT SYST, V8, P18, DOI [10.1145/77648.77649, 10.1145/74851.74852]
[9]   An efficient ECC-based provably secure three-factor user authentication and key agreement protocol for wireless healthcare sensor networks [J].
Challa, Sravani ;
Das, Ashok Kumar ;
Odelu, Vanga ;
Kumar, Neeraj ;
Kumari, Saru ;
Khan, Muhammad Khurram ;
Vasilakos, Athanasios V. .
COMPUTERS & ELECTRICAL ENGINEERING, 2018, 69 :534-554
[10]   Two-Factor User Authentication in Wireless Sensor Networks [J].
Das, Manik Lal .
IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 2009, 8 (03) :1086-1090