scholarly journals An Efficient and Secure Certificateless Authentication Protocol for Healthcare System on Wireless Medical Sensor Networks

2013 ◽  
Vol 2013 ◽  
pp. 1-7 ◽  
Author(s):  
Rui Guo ◽  
Qiaoyan Wen ◽  
Zhengping Jin ◽  
Hua Zhang

Sensor networks have opened up new opportunities in healthcare systems, which can transmit patient’s condition to health professional’s hand-held devices in time. The patient’s physiological signals are very sensitive and the networks are extremely vulnerable to many attacks. It must be ensured that patient’s privacy is not exposed to unauthorized entities. Therefore, the control of access to healthcare systems has become a crucial challenge. An efficient and secure authentication protocol will thus be needed in wireless medical sensor networks. In this paper, we propose a certificateless authentication scheme without bilinear pairing while providing patient anonymity. Compared with other related protocols, the proposed scheme needs less computation and communication cost and preserves stronger security. Our performance evaluations show that this protocol is more practical for healthcare system in wireless medical sensor networks.

2020 ◽  
Vol 2020 ◽  
pp. 1-11 ◽  
Author(s):  
Jiaqing Mo ◽  
Zhongwang Hu ◽  
Yuhua Lin

Wireless medical sensor networks (WMSNs) play an important role in collecting healthcare data of the remote patient and transmitting them to the medical professional for proper diagnosis via wireless channel. To protect the patient's healthcare data which is private-related and sensitive, some authentication schemes for healthcare systems using WMSN have been proposed to ensure the secure communication between the medical sensors and the medical professional. Since cryptanalyzing the security defects of authenticated protocols is crucial to put forward solutions and propose truly robust protocols, we scrutinize two state-of-the-art authentication protocols using WMSN for healthcare systems. Firstly, we examine Ali et al.’s enhanced three-factor based authentication protocol and show that although it provides a formal proof and a security verification, it still fails to resist offline dictionary guessing attack, desynchronization attack, and privileged insider attack and contains a serious flaw in the password change phase. Secondly, we investigate Shuai et al.’s lightweight and three-factor based authentication protocol and point out that it cannot achieve high security level as they claimed; it is actually subject to offline dictionary guessing attack and privileged insider attack, and it also has a design flaw in the password change phase. In addition, we suggest several countermeasures to thwart these security weaknesses in these two schemes for WMSN and the similar kinds.


Author(s):  
Javier Espina ◽  
Heribert Baldus ◽  
Thomas Falck ◽  
Oscar Garcia ◽  
Karin Klabunde

Wireless body sensor networks (BSNs) are an indispensable building stone for any pervasive healthcare system. Although suitable wireless technologies are available and standardization dedicated to BSN communication has been initiated, the authors identify key challenges in the areas of easy-of-use, safety, and security that hinder a quick adoption of BSNs. To address the identified issues they propose using body-coupled communication (BCC) for the automatic formation of BSNs and for user identification. They also present a lightweight mechanism that enables a transparent security setup for BSNs used in pervasive healthcare systems.


2014 ◽  
Vol 573 ◽  
pp. 418-423
Author(s):  
S. Asha Latha ◽  
A. Sivabalan

Wireless sensor networks consist of a network of autonomous sensors that can reconfigure themselves so as to sense the environment in the most significant manner. However, a significant challenge in the practical application of these networks exists in credible authentication and network security. This paper proposes a secure authentication protocol which is considered as a pro-active method, where a user is strongly verified before accessing the data, it is the modified Adhoc On-Demand Distance vector (AODV) Routing protocol that provides many security principles to the user such as checking sequence number, IP address and threshold values. The performance of proposed algorithm is compared with the existing alogorithm based on the following parameters such as Throughput, End to End delay and packet delivery ratio. The results shows that the proposed protocol possesses many advantages against the popular black hole attack. This work has been carried out using NS2 software and the result obtained testifies the effectiveness of the proposed protocol. Keyword: Authentication protocol, AES security, AODV routing protocol, Black hole attack, Wireless sensor network (WSN).


Author(s):  
Weizheng Wang ◽  
Chen Qiu ◽  
Zhimeng Yin ◽  
Gautam Srivastava ◽  
Thippa Reddy Gadekallu ◽  
...  

Sign in / Sign up

Export Citation Format

Share Document