An End-to-End Authentication Scheme for Healthcare IoT Systems Using WMSN

被引:17
|
作者
Nashwan, Shadi [1 ]
机构
[1] Jouf Univ, Coll Comp & Informat Sci, Dept Comp Sci, Sakaka 42421, Saudi Arabia
来源
CMC-COMPUTERS MATERIALS & CONTINUA | 2021年 / 68卷 / 01期
关键词
Healthcare IoT systems; wireless medical sensor networks; mutual authentication service; anonymity service; perfect forward secrecy service; COVID-19; PROTOCOL; KEY;
D O I
10.32604/cmc.2021.015597
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The healthcare internet of things (IoT) system has dramatically reshaped this important industry sector. This system employs the latest technology of IoT and wireless medical sensor networks to support the reliable connection of patients and healthcare providers. The goal is the remote monitoring of a patient's physiological data by physicians. Moreover, this system can reduce the number and expenses of healthcare centers, make up for the shortage of healthcare centers in remote areas, enable consultation with expert physicians around the world, and increase the health awareness of communities. The major challenges that affect the rapid deployment and widespread acceptance of such a system are the weaknesses in the authentication process, which should maintain the privacy of patients, and the integrity of remote medical instructions. Current research results indicate the need of a flexible authentication scheme. This study proposes a scheme with enhanced security for healthcare IoT systems, called an end-to-end authentication scheme for healthcare IoT systems, that is, an E2EA. The proposed scheme supports security services such as a strong and flexible authentication process, simultaneous anonymity of the patient and physician, and perfect forward secrecy services. A security analysis based on formal and informal methods demonstrates that the proposed scheme can resist numerous security-related attacks. A comparison with related authentication schemes shows that the proposed scheme is efficient in terms of communication, computation, and storage, and therefore cannot only offer attractive security services but can reasonably be applied to healthcare IoT systems.
引用
收藏
页码:607 / 642
页数:36
相关论文
共 50 条
  • [41] Lightweight End-to-End Blockchain for IoT Applications
    Lee, Seungcheol
    Lee, Jaehyun
    Hong, Sengphil
    Kim, Jae-Hoon
    [J]. KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2020, 14 (08) : 3224 - 3242
  • [42] End-to-end security validation of IoT systems based on digital twins of end-devices
    Maillet-Contoz, Laurent
    Michel, Emmanuel
    Nava, Mario Diaz
    Brun, Paul-Emmanuel
    Lepretre, Kevin
    Massot, Guillemette
    [J]. 2020 GLOBAL INTERNET OF THINGS SUMMIT (GIOTS), 2020,
  • [43] Holistic Explainability Requirements for End-to-End Machine Learning in IoT Cloud Systems
    My-Linh Nguyen
    Thao Phung
    Duong-Hai Ly
    Hong-Linh Truong
    [J]. 29TH IEEE INTERNATIONAL REQUIREMENTS ENGINEERING CONFERENCE WORKSHOPS (REW 2021), 2021, : 188 - 194
  • [44] ECCbAS: An ECC based authentication scheme for healthcare IoT systems
    Servati, Mohammad Reza
    Safkhani, Masoumeh
    [J]. PERVASIVE AND MOBILE COMPUTING, 2023, 90
  • [45] Federated End-to-End Authentication for the Constrained Internet of Things Using IBC and ECC
    Markmann, Tobias
    Schmidt, Thomas C.
    Waehlisch, Matthias
    [J]. ACM SIGCOMM COMPUTER COMMUNICATION REVIEW, 2015, 45 (04) : 603 - 604
  • [46] Federated End-to-End Authentication for the Constrained Internet of Things Using IBC and ECC
    Markmann, Tobias
    Schmidt, Thomas C.
    Waehlisch, Matthias
    [J]. SIGCOMM'15: PROCEEDINGS OF THE 2015 ACM CONFERENCE ON SPECIAL INTEREST GROUP ON DATA COMMUNICATION, 2015, : 603 - 604
  • [47] An end-to-end authentication protocol in wireless application protocol
    Yang, JP
    Shin, W
    Rhee, KH
    [J]. INFORMATION SECURITY AND PRIVACY, PROCEEDINGS, 2001, 2119 : 247 - 259
  • [48] Efficient end-to-end authentication protocols for mobile networks
    Chang, CH
    Tu, K
    Chen, KC
    [J]. PIMRC'96 - THE SEVENTH IEEE INTERNATIONAL SYMPOSIUM ON PERSONAL, INDOOR AND MOBILE RADIO COMMUNICATIONS, PROCEEDINGS, VOLS 1-3, 1996, : 1252 - 1256
  • [49] A system for end-to-end authentication of adaptive multimedia content
    Suzuki, T
    Ramzan, Z
    Fujimoto, H
    Gentry, C
    Nakayama, T
    Jain, R
    [J]. COMMUNICATIONS AND MULTIMEDIA SECURITY, 2005, 175 : 237 - 249
  • [50] An End-to-End Mobile Platform for Pervasive Healthcare
    Gangopadhyay, Ranjan
    [J]. 2012 5TH INTERNATIONAL CONFERENCE ON COMPUTERS AND DEVICES FOR COMMUNICATION (CODEC), 2012,