Secure and efficient anonymous authentication scheme for three-tier mobile healthcare systems with wearable sensors

被引:0
|
作者
Xiong Li
Maged Hamada Ibrahim
Saru Kumari
Rahul Kumar
机构
[1] Hunan University of Science and Technology,School of Computer Science and Engineering
[2] Helwan University,Department of Electronics, Communications and Computers Engineering, Faculty of Engineering
[3] Ch. Charan Singh University,Department of Mathematics
[4] S.S.V. (P.G.) College,undefined
来源
Telecommunication Systems | 2018年 / 67卷
关键词
WBAN; mHealth; Wearable sensors; Authentication; Anonymity; Key exchange; AVISPA;
D O I
暂无
中图分类号
学科分类号
摘要
The mobility and openness of wireless communication technologies make Mobile Healthcare Systems (mHealth) potentially exposed to a number of potential attacks, which significantly undermines their utility and impedes their widespread deployment. Attackers and criminals, even without knowing the context of the transmitted data, with simple eavesdropping on the wireless links, may benefit a lot from linking activities to the identities of patient’s sensors and medical staff members. These vulnerabilities apply to all tiers of the mHealth system. A new anonymous mutual authentication scheme for three-tier mobile healthcare systems with wearable sensors is proposed in this paper. Our scheme consists of three protocols: Protocol-1 allows the anonymous authentication nodes (mobile users and controller nodes) and the HSP medical server in the third tier, while Protocol-2 realizes the anonymous authentication between mobile users and controller nodes in the second tier, and Protocol-3 achieves the anonymous authentication between controller nodes and the wearable body sensors in the first tier. In the design of our protocols, the variation in the resource constraints of the different nodes in the mHealth system are taken into consideration so that our protocols make a better trade-off among security, efficiency and practicality. The security of our protocols are analyzed through rigorous formal proofs using BAN logic tool and informal discussions of security features, possible attacks and countermeasures. Besides, the efficiency of our protocols are concretely evaluated and compared with related schemes. The comparisons show that our scheme outperforms the previous schemes and provides more complete and integrated anonymous authentication services. Finally, the security of our protocols are evaluated by using the Automated Validation of Internet Security Protocols and Applications and the SPAN animator software. The simulation results show that our scheme is secure and satisfy all the specified privacy and authentication goals.
引用
收藏
页码:323 / 348
页数:25
相关论文
共 50 条
  • [21] 3TAAV: A Three-Tier Architecture for Pseudonym-Based Anonymous Authentication in VANETs
    Bellikar, Ganesh
    Bhatia, Ashutosh
    Hansdah, R. C.
    Singh, Sudhanshu
    [J]. 2018 32ND INTERNATIONAL CONFERENCE ON INFORMATION NETWORKING (ICOIN), 2018, : 420 - 425
  • [22] An efficient secure authentication scheme for personalized healthcare system
    Chandran, Kamalanathan
    Panda, Sunita
    Sreenivas, Bhaskara
    [J]. JOURNAL OF INTERDISCIPLINARY MATHEMATICS, 2020, 23 (01) : 215 - 227
  • [23] A Secure Anonymous Authentication Scheme for Electronic Medical Records Systems
    Lei, Wenjin
    Li, Yidong
    Sang, Yingpeng
    Shen, Hong
    [J]. 2016 IEEE 13TH INTERNATIONAL CONFERENCE ON E-BUSINESS ENGINEERING (ICEBE), 2016, : 48 - 55
  • [24] Secure and Efficient Anonymous Authentication Key Agreement Scheme for Smart Industry
    Su, Xing
    Xie, Yong
    Wang, Hui
    Liu, Wei
    Shui, Dingyi
    [J]. 2022 IEEE 28TH INTERNATIONAL CONFERENCE ON PARALLEL AND DISTRIBUTED SYSTEMS, ICPADS, 2022, : 250 - 257
  • [25] Optimal power efficient management scheme (OPEM): A new power efficient approach for mobile stations in two-tier and three-tier networks
    Abkenar, Forough Shirin
    Rahbar, Akbar Ghaffarpour
    [J]. MOBILE INFORMATION SYSTEMS, 2014, 10 (04) : 331 - 346
  • [26] Secure and Efficient Authentication Scheme for Remote Systems
    Das, Manik Lal
    [J]. ICIT 2008: PROCEEDINGS OF THE 11TH INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY, 2008, : 226 - 231
  • [27] Anonymous and robust biometric authentication scheme for secure social IoT healthcare applications
    Arpitha T.
    Chouhan D.
    Shreyas J.
    [J]. Journal of Engineering and Applied Science, 2024, 71 (01):
  • [28] A secure and lightweight anonymous mutual authentication scheme for wearable devices in Medical Internet of Things
    Gupta, Ankur
    Tripathi, Meenakshi
    Muhuri, Samya
    Singal, Gaurav
    Kumar, Neeraj
    [J]. JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2022, 68
  • [29] A Secure and Lightweight Three-Factor-Based Authentication Scheme for Smart Healthcare Systems
    Ryu, Jihyeon
    Kang, Dongwoo
    Lee, Hakjun
    Kim, Hyoungshick
    Won, Dongho
    [J]. SENSORS, 2020, 20 (24) : 1 - 25
  • [30] A Secure and Efficient Authentication Scheme for Access Control in Mobile Pay-TV Systems
    Yeh, Lo-Yao
    Tsaur, Woei-Jiunn
    [J]. IEEE TRANSACTIONS ON MULTIMEDIA, 2012, 14 (06) : 1690 - 1693