Secure and efficient anonymous authentication scheme for three-tier mobile healthcare systems with wearable sensors

被引:32
|
作者
Li, Xiong [1 ]
Ibrahim, Maged Hamada [2 ]
Kumari, Saru [3 ]
Kumar, Rahul [4 ]
机构
[1] Hunan Univ Sci & Technol, Sch Comp Sci & Engn, Xiangtan 411201, Peoples R China
[2] Helwan Univ, Fac Engn, Dept Elect Commun & Comp Engn, 1 Sherif St, Cairo 11792, Egypt
[3] Ch Charan Singh Univ, Dept Math, Meerut 250005, Uttar Pradesh, India
[4] SSV PG Coll, Hapur, Uttar Pradesh, India
基金
中国国家自然科学基金;
关键词
WBAN; mHealth; Wearable sensors; Authentication; Anonymity; Key exchange; AVISPA; SMART-CARD; ACHIEVING EFFICIENT; KEY AGREEMENT; PROTOCOLS;
D O I
10.1007/s11235-017-0340-1
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
The mobility and openness of wireless communication technologies make Mobile Healthcare Systems (mHealth) potentially exposed to a number of potential attacks, which significantly undermines their utility and impedes their widespread deployment. Attackers and criminals, even without knowing the context of the transmitted data, with simple eavesdropping on the wireless links, may benefit a lot from linking activities to the identities of patient's sensors and medical staff members. These vulnerabilities apply to all tiers of the mHealth system. A new anonymous mutual authentication scheme for three-tier mobile healthcare systems with wearable sensors is proposed in this paper. Our scheme consists of three protocols: Protocol-1 allows the anonymous authentication nodes (mobile users and controller nodes) and the HSP medical server in the third tier, while Protocol-2 realizes the anonymous authentication between mobile users and controller nodes in the second tier, and Protocol-3 achieves the anonymous authentication between controller nodes and the wearable body sensors in the first tier. In the design of our protocols, the variation in the resource constraints of the different nodes in the mHealth system are taken into consideration so that our protocols make a better trade-off among security, efficiency and practicality. The security of our protocols are analyzed through rigorous formal proofs using BAN logic tool and informal discussions of security features, possible attacks and countermeasures. Besides, the efficiency of our protocols are concretely evaluated and compared with related schemes. The comparisons show that our scheme outperforms the previous schemes and provides more complete and integrated anonymous authentication services. Finally, the security of our protocols are evaluated by using the Automated Validation of Internet Security Protocols and Applications and the SPAN animator software. The simulation results show that our scheme is secure and satisfy all the specified privacy and authentication goals.
引用
收藏
页码:323 / 348
页数:26
相关论文
共 50 条
  • [11] An Efficient Anonymous Authentication Scheme for Mobile Pay-TV Systems
    Li, Yuting
    Cheng, Qingfeng
    Cao, Jinzheng
    [J]. WIRELESS COMMUNICATIONS & MOBILE COMPUTING, 2020, 2020
  • [12] Computationally efficient and secure anonymous authentication scheme for IoT-based mobile pay-TV systems
    Kumaravelu, Ramesh
    Sadaiyandi, Rajakumar
    Selvaraj, Anandamurugan
    Selvaraj, Jeeva
    Karthick, Gayathiri
    [J]. COMPUTATIONAL INTELLIGENCE, 2020, 36 (03) : 994 - 1009
  • [13] Secure and Anonymous Authentication Scheme for Mobile Edge Computing Environments
    Lee, Hakjun
    Ryu, Jihyeon
    Won, Dongho
    [J]. IEEE INTERNET OF THINGS JOURNAL, 2024, 11 (04): : 5798 - 5815
  • [14] Secure anonymous authentication scheme without verification table for mobile satellite communication systems
    Tsai, Jia-Lun
    Lo, Nai-Wei
    Wu, Tzong-Chen
    [J]. INTERNATIONAL JOURNAL OF SATELLITE COMMUNICATIONS AND NETWORKING, 2014, 32 (05) : 443 - 452
  • [15] A secure and efficient authentication scheme for mobile users
    Department of Computer Science and Information Engineering, National Chung Cheng University, Chiayi, 621, Taiwan
    不详
    不详
    不详
    不详
    [J]. Int. J. Mobile Commun, 2006, 5 (581-594):
  • [16] Computationally efficient and secure anonymous authentication scheme for cloud users
    Arasan, Anakath
    Sadaiyandi, Rajakumar
    Al-Turjman, Fadi
    Rajasekaran, Arun Sekar
    Selvi Karuppuswamy, Kalai
    [J]. Personal and Ubiquitous Computing, 2024, 28 (01) : 111 - 121
  • [17] A Provably Secure and Efficient Identity-Based Anonymous Authentication Scheme for Mobile Edge Computing
    Jia, Xiaoying
    He, Debiao
    Kumar, Neeraj
    Choo, Kim-Kwang Raymond
    [J]. IEEE SYSTEMS JOURNAL, 2020, 14 (01): : 560 - 571
  • [18] Computationally efficient and secure anonymous authentication scheme for cloud users
    Arasan A.
    Sadaiyandi R.
    Al-Turjman F.
    Rajasekaran A.S.
    Selvi Karuppuswamy K.
    [J]. Personal and Ubiquitous Computing, 2024, 28 (1) : 111 - 121
  • [19] An Anonymous Mutual Authentication Scheme for Healthcare RFID Systems
    Moniem, Sarah A.
    Taha, Sanaa
    Hamza, Haithem S.
    [J]. 2017 IEEE SMARTWORLD, UBIQUITOUS INTELLIGENCE & COMPUTING, ADVANCED & TRUSTED COMPUTED, SCALABLE COMPUTING & COMMUNICATIONS, CLOUD & BIG DATA COMPUTING, INTERNET OF PEOPLE AND SMART CITY INNOVATION (SMARTWORLD/SCALCOM/UIC/ATC/CBDCOM/IOP/SCI), 2017,
  • [20] An Anonymous Blockchain-Based Authentication Scheme for Secure Healthcare Applications
    Rajasekaran, Arun Sekar
    Azees, M.
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2022, 2022