An End-to-End Authentication Scheme for Healthcare IoT Systems Using WMSN

被引:17
|
作者
Nashwan, Shadi [1 ]
机构
[1] Jouf Univ, Coll Comp & Informat Sci, Dept Comp Sci, Sakaka 42421, Saudi Arabia
来源
CMC-COMPUTERS MATERIALS & CONTINUA | 2021年 / 68卷 / 01期
关键词
Healthcare IoT systems; wireless medical sensor networks; mutual authentication service; anonymity service; perfect forward secrecy service; COVID-19; PROTOCOL; KEY;
D O I
10.32604/cmc.2021.015597
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The healthcare internet of things (IoT) system has dramatically reshaped this important industry sector. This system employs the latest technology of IoT and wireless medical sensor networks to support the reliable connection of patients and healthcare providers. The goal is the remote monitoring of a patient's physiological data by physicians. Moreover, this system can reduce the number and expenses of healthcare centers, make up for the shortage of healthcare centers in remote areas, enable consultation with expert physicians around the world, and increase the health awareness of communities. The major challenges that affect the rapid deployment and widespread acceptance of such a system are the weaknesses in the authentication process, which should maintain the privacy of patients, and the integrity of remote medical instructions. Current research results indicate the need of a flexible authentication scheme. This study proposes a scheme with enhanced security for healthcare IoT systems, called an end-to-end authentication scheme for healthcare IoT systems, that is, an E2EA. The proposed scheme supports security services such as a strong and flexible authentication process, simultaneous anonymity of the patient and physician, and perfect forward secrecy services. A security analysis based on formal and informal methods demonstrates that the proposed scheme can resist numerous security-related attacks. A comparison with related authentication schemes shows that the proposed scheme is efficient in terms of communication, computation, and storage, and therefore cannot only offer attractive security services but can reasonably be applied to healthcare IoT systems.
引用
收藏
页码:607 / 642
页数:36
相关论文
共 50 条
  • [21] Efficient end-to-end authentication protocol for wearable health monitoring systems
    Jiang, Qi
    Ma, Jianfeng
    Yang, Chao
    Ma, Xindi
    Shen, Jian
    Chaudhry, Shehzad Ashraf
    COMPUTERS & ELECTRICAL ENGINEERING, 2017, 63 : 182 - 195
  • [22] A secure end-to-end IoT solution
    Mathur, Avijit
    Newe, Thomas
    Elgenaidi, Walid
    Rao, Muzaffar
    Dooly, Gerard
    Toal, Daniel
    SENSORS AND ACTUATORS A-PHYSICAL, 2017, 263 : 291 - 299
  • [23] End-to-End Management of IoT Applications
    Khazaei, Hamzeh
    Bannazadeh, Hadi
    Leon-Garcia, Alberto
    2017 IEEE CONFERENCE ON NETWORK SOFTWARIZATION (IEEE NETSOFT), 2017,
  • [24] A Novel Secure End-to-End IoT Communication Scheme Using Lightweight Cryptography Based on Block Cipher
    Winarno, Agus
    Sari, Riri Fitri
    APPLIED SCIENCES-BASEL, 2022, 12 (17):
  • [25] A seamless vertical handover scheme for end-to-end reconfigurability systems
    Feng, Zhiyong
    Le, Vanbien
    Zhang, Ping
    2008 IEEE 67TH VEHICULAR TECHNOLOGY CONFERENCE-SPRING, VOLS 1-7, 2008, : 2152 - 2156
  • [26] An Efficient End-to-End Mutual Authentication Scheme for 2G-GSM System
    Ramadan, Mohammed
    Li, Fagen
    Xu, Chun Xiang
    Abdalla, Ahmed
    Abdalla, Hisham
    PROCEEDINGS OF 2016 IEEE INTERNATIONAL CONFERENCE ON BIG DATA ANALYSIS (ICBDA), 2016, : 319 - 324
  • [27] End-to-end security scheme for Machine Type Communication based on Generic Authentication Architecture
    Wujun Zhang
    Yueyu Zhang
    Jie Chen
    Hui Li
    Yumin Wang
    Cluster Computing, 2013, 16 : 861 - 871
  • [28] End-to-end security scheme for Machine Type Communication based on Generic Authentication Architecture
    Zhang, Wujun
    Zhang, Yueyu
    Chen, Jie
    Li, Hui
    Wang, Yumin
    CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2013, 16 (04): : 861 - 871
  • [29] A provably secure and practical end-to-end authentication scheme for tactile Industrial Internet of Things
    Guo, Yimin
    Guo, Yajun
    Xiong, Ping
    Yang, Fan
    Zhang, Chengde
    PERVASIVE AND MOBILE COMPUTING, 2024, 98
  • [30] Towards an Improved Energy Efficient and End-to-End Secure Protocol for IoT Healthcare Applications
    Ahmad, Arshad
    Ullah, Ayaz
    Feng, Chong
    Khan, Muzammil
    Ashraf, Shahzad
    Adnan, Muhammad
    Nazir, Shah
    Khan, Habib Ullah
    SECURITY AND COMMUNICATION NETWORKS, 2020, 2020