scholarly journals Efficient Authentication Protocol for Continuous Monitoring in Medical Sensor Networks

Author(s):  
Bidi Ying ◽  
Nada Radwan Mohsen ◽  
Amiya A. Nayak
Author(s):  
Weizheng Wang ◽  
Chen Qiu ◽  
Zhimeng Yin ◽  
Gautam Srivastava ◽  
Thippa Reddy Gadekallu ◽  
...  

2019 ◽  
Vol 10 (1) ◽  
pp. 96-116 ◽  
Author(s):  
Preeti Chandrakar

The wireless medical sensor networks WMSN play a crucial role in healthcare monitoring remotely. In remote healthcare monitoring, the sensor nodes are deployed in patient's body for collecting physiological data and transmit these data over an insecure channel. The patient's health information is highly sensitive and important. Any malicious modification in physiological data will make wrong diagnoses and harm the patient health. Therefore, privacy, data security, and user authentication are extremely important for accessing patient's real-time heath information over an insecure channel. In this regard, this article proposes a secure and robust two-factor based remote user authentication protocol for healthcare monitoring. The authentication proof has done with the help of BAN logic, which ensures that the proposed scheme provides mutual authentication and session key agreement securely. The informal security verification proves that the developed protocol is secure from various security attacks. The simulation of the proposed scheme has been done using AVISPA tool, whose simulation results confirm that the proposed scheme is secure from active and passive attacks. Performance evaluation shows that the proposed protocol is efficient in terms of security features, computation cost, communication cost, and execution time.


2015 ◽  
Vol 9 (15) ◽  
pp. 2643-2655 ◽  
Author(s):  
Xiong Li ◽  
Jianwei Niu ◽  
Saru Kumari ◽  
Junguo Liao ◽  
Wei Liang ◽  
...  

2013 ◽  
Vol 2013 ◽  
pp. 1-7 ◽  
Author(s):  
Rui Guo ◽  
Qiaoyan Wen ◽  
Zhengping Jin ◽  
Hua Zhang

Sensor networks have opened up new opportunities in healthcare systems, which can transmit patient’s condition to health professional’s hand-held devices in time. The patient’s physiological signals are very sensitive and the networks are extremely vulnerable to many attacks. It must be ensured that patient’s privacy is not exposed to unauthorized entities. Therefore, the control of access to healthcare systems has become a crucial challenge. An efficient and secure authentication protocol will thus be needed in wireless medical sensor networks. In this paper, we propose a certificateless authentication scheme without bilinear pairing while providing patient anonymity. Compared with other related protocols, the proposed scheme needs less computation and communication cost and preserves stronger security. Our performance evaluations show that this protocol is more practical for healthcare system in wireless medical sensor networks.


Author(s):  
Preeti Chandrakar

The wireless medical sensor networks WMSN play a crucial role in healthcare monitoring remotely. In remote healthcare monitoring, the sensor nodes are deployed in patient's body for collecting physiological data and transmit these data over an insecure channel. The patient's health information is highly sensitive and important. Any malicious modification in physiological data will make wrong diagnoses and harm the patient health. Therefore, privacy, data security, and user authentication are extremely important for accessing patient's real-time heath information over an insecure channel. In this regard, this article proposes a secure and robust two-factor based remote user authentication protocol for healthcare monitoring. The authentication proof has done with the help of BAN logic, which ensures that the proposed scheme provides mutual authentication and session key agreement securely. The informal security verification proves that the developed protocol is secure from various security attacks. The simulation of the proposed scheme has been done using AVISPA tool, whose simulation results confirm that the proposed scheme is secure from active and passive attacks. Performance evaluation shows that the proposed protocol is efficient in terms of security features, computation cost, communication cost, and execution time.


Sign in / Sign up

Export Citation Format

Share Document