An End-to-End Authentication Scheme for Healthcare IoT Systems Using WMSN

被引:17
|
作者
Nashwan, Shadi [1 ]
机构
[1] Jouf Univ, Coll Comp & Informat Sci, Dept Comp Sci, Sakaka 42421, Saudi Arabia
来源
CMC-COMPUTERS MATERIALS & CONTINUA | 2021年 / 68卷 / 01期
关键词
Healthcare IoT systems; wireless medical sensor networks; mutual authentication service; anonymity service; perfect forward secrecy service; COVID-19; PROTOCOL; KEY;
D O I
10.32604/cmc.2021.015597
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The healthcare internet of things (IoT) system has dramatically reshaped this important industry sector. This system employs the latest technology of IoT and wireless medical sensor networks to support the reliable connection of patients and healthcare providers. The goal is the remote monitoring of a patient's physiological data by physicians. Moreover, this system can reduce the number and expenses of healthcare centers, make up for the shortage of healthcare centers in remote areas, enable consultation with expert physicians around the world, and increase the health awareness of communities. The major challenges that affect the rapid deployment and widespread acceptance of such a system are the weaknesses in the authentication process, which should maintain the privacy of patients, and the integrity of remote medical instructions. Current research results indicate the need of a flexible authentication scheme. This study proposes a scheme with enhanced security for healthcare IoT systems, called an end-to-end authentication scheme for healthcare IoT systems, that is, an E2EA. The proposed scheme supports security services such as a strong and flexible authentication process, simultaneous anonymity of the patient and physician, and perfect forward secrecy services. A security analysis based on formal and informal methods demonstrates that the proposed scheme can resist numerous security-related attacks. A comparison with related authentication schemes shows that the proposed scheme is efficient in terms of communication, computation, and storage, and therefore cannot only offer attractive security services but can reasonably be applied to healthcare IoT systems.
引用
收藏
页码:607 / 642
页数:36
相关论文
共 50 条
  • [1] End-to-end privacy preserving scheme for IoT-based healthcare systems
    Nasr Esfahani, Maryam
    Shahgholi Ghahfarokhi, Behrouz
    Etemadi Borujeni, Shahram
    [J]. WIRELESS NETWORKS, 2021, 27 (06) : 4009 - 4037
  • [2] End-to-end privacy preserving scheme for IoT-based healthcare systems
    Maryam Nasr Esfahani
    Behrouz Shahgholi Ghahfarokhi
    Shahram Etemadi Borujeni
    [J]. Wireless Networks, 2021, 27 : 4009 - 4037
  • [3] End-to-End Message Authentication Using CoAP Over IoT
    Singhal, Prateek
    Sharma, Puneet
    Hazela, Bramah
    [J]. INTERNATIONAL CONFERENCE ON INNOVATIVE COMPUTING AND COMMUNICATIONS, VOL 1, 2019, 55 : 279 - 288
  • [4] Blockchain-based end-to-end privacy-preserving scheme for IoT-based healthcare systems
    Esfahani, Maryam Nasr
    Ghahfarokhi, Behrouz Shahgholi
    Borujeni, Shahram Etemadi
    [J]. JOURNAL OF SUPERCOMPUTING, 2024, 80 (02): : 2067 - 2127
  • [5] Blockchain-based end-to-end privacy-preserving scheme for IoT-based healthcare systems
    Maryam Nasr Esfahani
    Behrouz Shahgholi Ghahfarokhi
    Shahram Etemadi Borujeni
    [J]. The Journal of Supercomputing, 2024, 80 : 2067 - 2127
  • [6] End to end light weight mutual authentication scheme in IoT-based healthcare environment
    Suganthi S.D.
    Anitha R.
    Sureshkumar V.
    Harish S.
    Agalya S.
    [J]. Journal of Reliable Intelligent Environments, 2020, 6 (01) : 3 - 13
  • [7] A lightweight key generation scheme for end-to-end data authentication in Industrial Control Systems
    Genge, Bela
    Haller, Piroska
    Duka, Adrian-Vasile
    Sandor, Hunor
    [J]. AT-AUTOMATISIERUNGSTECHNIK, 2019, 67 (05) : 417 - 428
  • [8] An Analytic Model for Reducing Authentication Signaling Traffic in an End-to-End Authentication Scheme
    Nashwan, Shadi
    Nashwan, Imad I. H.
    [J]. SENSORS, 2021, 21 (15)
  • [9] Performance Analysis of End-to-End Security Schemes in Healthcare IoT
    Moosavi, Sanaz Rahimi
    Nigussie, Ethiopia
    Levorato, Marco
    Virtanen, Seppo
    Isoaho, Jouni
    [J]. 9TH INTERNATIONAL CONFERENCE ON AMBIENT SYSTEMS, NETWORKS AND TECHNOLOGIES (ANT 2018) / THE 8TH INTERNATIONAL CONFERENCE ON SUSTAINABLE ENERGY INFORMATION TECHNOLOGY (SEIT-2018) / AFFILIATED WORKSHOPS, 2018, 130 : 432 - 439
  • [10] Blockchain in IoT Systems: End-to-End Delay Evaluation
    Alaslani, Maha
    Nawab, Faisal
    Shihada, Basem
    [J]. IEEE INTERNET OF THINGS JOURNAL, 2019, 6 (05): : 8332 - 8344