An elliptic curve cryptography based enhanced anonymous authentication protocol for wearable health monitoring systems

被引:0
作者
K. Sowjanya
Mou Dasgupta
Sangram Ray
机构
[1] National Institute of Technology Raipur,Department of Computer Applications
[2] National Institute of Technology Sikkim,Department of Computer Science and Engineering
来源
International Journal of Information Security | 2020年 / 19卷
关键词
Elliptic curve cryptography; Anonymous authentication; Wireless body area networks; BAN; AVISPA;
D O I
暂无
中图分类号
学科分类号
摘要
The innovations in the field of wearable medical devices, wireless communication and low cost cloud computing aid the wireless body area network (WBAN) to become a prominent component of future healthcare systems. WBAN consists of medical sensors, which continuously monitor the patients’ vital signs and transfers this data to the remote medical server via the cloud. The continuous monitoring of the patients’ health data improves the quality of the medical service and also provides the source for future medical diagnosis. The medical information collected from WBAN is generally transmitted through wireless channel and therefore vulnerable to various information attacks. In this context, medical data security and privacy are key issues; hence there is a requirement of lightweight end-to-end authentication protocol to ensure secure communication. Recently, Li et al. presented a lightweight end-to-end authentication protocol for WBAN based on elliptic curve cryptography (ECC). However, through cryptanalysis, some security loopholes are found in this protocol. In this paper, an enhanced lightweight ECC based end-to-end authentication protocol is proposed to overcome the security vulnerabilities of Li et al.’s scheme. Further, the formal security analysis of the proposed scheme is done using BAN logic and AVISPA tool. The comparative analysis shows that the proposed scheme not only removes the security loopholes of Li et al.’s scheme but also reduces the overall complexity.
引用
收藏
页码:129 / 146
页数:17
相关论文
共 103 条
[1]  
Jiang Q(2017)Efficient end-to-end authentication protocol for wearable health monitoring systems Comput. Electr. Eng. 63 182-195
[2]  
Ma J(2014)A certificate authority (CA)-based cryptographic solution for hipaa privacy/security regulations J. King Saud Univ. Comput. Inf. Sci. 26 170-180
[3]  
Yang C(2017)An enhanced 1-round authentication protocol for wireless body area networks with user anonymity Comput. Electr. Eng. 61 238-249
[4]  
Ma X(2017)An improved three party authenticated key exchange protocol using hash function and elliptic curve cryptography for mobile-commerce environments J. King Saud Univ. Comput. Inf. Sci. 29 311-324
[5]  
Shen J(2015)Cryptanalysis and enhancement of anonymity preserving remote user mutual authentication and session key agreement scheme for e-health care systems J. Med. Syst. 39 1-21
[6]  
Chaudhr S A(2016)Design of an anonymity-preserving three-factor authenticated key exchange protocol for wireless sensor networks Comput. Netw. Int. J. Comput. Telecommun. Netw. 101 42-62
[7]  
Ray S(1990)A logic of authentication ACM Trans. Comput. Syst. (TOCS) 8 18-36
[8]  
Biswas GP(2018)A provably secure biometrics-based authenticated key agreement scheme for multi-server environments Multimedia Tools Appl. 77 2359-2389
[9]  
Li X(2018)A robust and anonymous patient monitoring system using wireless medical sensor networks Future Gener. Comput. Syst. 80 483-495
[10]  
Peng J(2018)A three-factor anonymous authentication scheme for wireless sensor networks in internet of things environments J. Netw. Comput. Appl. 103 194-204