A Lightweight & Secure Authentication Scheme for IoT Based E-Health Applications (Preprint)

2018 ◽  
Author(s):  
AHMED ALMULHIM

BACKGROUND During last few years, IoT (IoT) is rapidly gaining ground in the field of networking wireless and communications. The basic idea is the connection between heterogeneous objects such as Mobile phones, Sensors, Radio-Frequency Identification (RFID) tags, etc. Therefore, everything becomes virtual, which means that everything is readable, addressable, and locatable on the Internet. The development of IoT in healthcare field led to several projects, health solutions and publications towards the modernization of healthcare industries worldwide. An E-health system utilizes wireless sensor networking (WSN) technology which consist of wearable and contextual sensors that connect to a Base Station, which in turn communicates with health care facility. There were around three million of patients who are utilizing connected home medical monitoring devices all over the world in 2013. Now, patients can be monitored 24/7 by using sensors in mobile devices such as cell phones or wearable devices. This has led to considerable cost savings through lowered hospital costs, health care provider costs, transportation costs and insurance costs. There is an added advantage of improved quality of care and time saving for patients and hospital staff. However, the increasing use of IoT services has led to increased concerns of security and privacy, especially in healthcare domain. There has been 100 percent increase in cyber security attacks on health care information systems since 2010. The cost of possible attacks on healthcare applications could be as much as 5.6 billion dollars annually. In fact, healthcare applications are prone to data breaches and widening issues in security aspects owing to increasing number of access points to sensitive data through electronic medical records, as well as the rising popularity of wearable technology. OBJECTIVE We aim to discern (1) Design light weight authentication scheme using mainly ECC principles for IoT based E-health applications. (2) Develop an authentication scheme with small key size providing comparable level of security. (3) Introduces group-based authentication scheme\model for secure data transmission from IoT nodes to the base station for IoT based E-health application. (4) Provide efficient, lightweight and secure authentication scheme for IoT based E-health applications. METHODS Our Research activities are relying on the following steps: begin from in depth literature review, problem formation, designing and simulation setup, testing, verification and publishing. RESULTS We intended to propose a lightweight authentication scheme for E-health applications, which authenticates each IoT device and builds secure channels among the sensor nodes and Base Station. So that the scheme will provide authentication of individual nodes and facilitate session key agreement among Base Station and sensor nodes. The proposed scheme will be evaluated against multiple attack scenarios for IoT domain. In order to save energy cost, we plan to apply group- based authentication model which allows all nodes to forward respective data to group head that in turn communicates with the base station. This node may be selected on the basis of the distance to the base station to reduce the communication cost. CONCLUSIONS : In this paper, proposing an efficient secured group-based lightweight authentication scheme for IoT based E-health applications. This scheme authenticates and established secure channels through sensor nodes and Base Station for E-health applications. We had analyzed power consumption of E-health applications by comparing our proposed group-based scheme with other existence lightweight authentication schemes for two different cases of patient. 1) With no mobility where patient lying on the bed and 2) with mobility when patient is on the wheel chair to test the power consumptions for each ultra-sensor node. Our scheme had been evaluated on Contiki simulator. The achieved results showed a significant difference of energy consumption and enhances the chances of security while receiving the authentication key. This all achieved by reducing the distance among the nodes and base station and as well as reducing the chances of external attacks by reducing the number of iterations by n for registering the authentication. Group-based node reduces distance and consume less energy and as will as led to reduce communication cost. Also, it will be resistant against several types of attacks by use elliptic curve cryptography (ECC) techniques on group-based node to increase level of security in IoT based E-health applications

2021 ◽  
Author(s):  
Anna Palagan C ◽  
Sanjai Gupta ◽  
Anand J Dhas ◽  
Shrikant Taware ◽  
Ravi Chakravarthi R ◽  
...  

Abstract Between the collections of applications allowed by the IoT, smart and linked health care may be mainly vital one. Networked sensors, either damaged on body or entrenched in atmospheres, alter the assembly of wealthy info symptomatic of our physical and psychological health. For example, heart patient parameter such as BP, heart rate and activities of fetal to regulate their health state. In this paper, a coordinator node has devoted on patient’s body to gather all the signals from the wireless sensors and directs them to base station. The involved sensors on patient’s body form a WBAN and they are talented to sense the heart rate, BP and so on. This scheme can notice the irregular conditions, problem an alarm to the patient and direct a message to the clinician, ambulance and family. The focal benefit of this scheme in assessment to earlier systems is to decrease the energy consumption to extend the network period, speed up and encompass the statement coverage to upsurge the choice for enhance patient superiority of lifetime. Here, we focus the chances and tasks for WSN in understanding this idea of longer term of health care.


Author(s):  
José A. Afonso ◽  
Pedro Macedo ◽  
Luis A. Rocha ◽  
José H. Correia

Conventional wired body sensor networks have been used in hospitals over the last decade; however, the tethered operation restricts the mobility of the patients. In the scenario considered in this chapter, the signals collected from the patients’ bodies are wirelessly transmitted to a base station, and then delivered to a remote diagnosis centre through a communication infrastructure, enabling full mobility of the patient in the coverage area of the wireless network. Healthcare applications require the network to satisfy demanding requirements in terms of quality of service (QoS) and, at the same time, minimize the energy consumption of the sensor nodes. The traffic generated by data-intensive healthcare applications may lead to frequent collisions between sensor nodes and the consequent loss of data, if conventional MAC protocols for wireless sensor networks are used. Therefore, this chapter presents LPRT and CCMAC, two MAC protocols that intend to satisfy the QoS requirements of these applications, but differ in the wireless topology used. Experimental results for an implementation of the LPRT using an IEEE 802.15.4 compliant wireless sensor platform are presented, as well as simulation results comparing the performance of direct communication (between wireless body sensor nodes and the base station) with two other approaches relying on a cluster-based topology (similar to the one proposed by the authors of LEACH), which demonstrate the benefits of using a cluster-based topology on wireless healthcare applications.


2021 ◽  
Vol 7 ◽  
pp. e714
Author(s):  
Haqi Khalid ◽  
Shaiful Jahari Hashim ◽  
Sharifah Mumtazah Syed Ahmad ◽  
Fazirulhisyam Hashim ◽  
Muhammad Akmal Chaudhary

In heterogeneous wireless networks, the industrial Internet of Things (IIoT) is an essential contributor to increasing productivity and effectiveness. However, in various domains, such as industrial wireless scenarios, small cell domains, and vehicular ad hoc networks, an efficient and stable authentication algorithm is required (VANET). Specifically, IoT vehicles deal with vast amounts of data transmitted between VANET entities in different domains in such a large-scale environment. Also, crossing from one territory to another may have the connectivity services down for a while, leading to service interruption because it is pervasive in remote areas and places with multipath obstructions. Hence, it is vulnerable to specific attacks (e.g., replay attacks, modification attacks, man-in-the-middle attacks, and insider attacks), making the system inefficient. Also, high processing data increases the computation and communication cost, leading to an increased workload in the system. Thus, to solve the above issues, we propose an online/offline lightweight authentication scheme for the VANET cross-domain system in IIoT to improve the security and efficiency of the VANET. The proposed scheme utilizes an efficient AES-RSA algorithm to achieve integrity and confidentiality of the message. The offline joining is added to avoid remote network intrusions and the risk of network service interruptions. The proposed work includes two different significant goals to achieve first, then secure message on which the data is transmitted and efficiency in a cryptographic manner. The Burrows Abdi Needham (BAN logic) logic is used to prove that this scheme is mutually authenticated. The system’s security has been tested using the well-known AVISPA tool to evaluate and verify its security formally. The results show that the proposed scheme outperforms the ID-CPPA, AAAS, and HCDA schemes by 53%, 55%, and 47% respectively in terms of computation cost, and 65%, 83%, and 40% respectively in terms of communication cost.


2012 ◽  
Vol 24 (02) ◽  
pp. 139-145 ◽  
Author(s):  
Wan-Young Chung ◽  
Su-Lin Koay ◽  
Sang-Joong Jung ◽  
Tae-Ha Kwon

Recent advances in wireless sensor network (WSN) envisaging ubiquitous healthcare system that simplifies the monitoring and treatment of patients. WSN also pose several challenges to ubiquitous healthcare applications. As healthcare application commonly handle two different types of data such as wave-like data of ECG and linear waveform-independent data of body temperature, blood pressure and oxygen content. As wave-like data requires a higher sampling rate than waveform-independent data, the transmission of wave-like data in WSN causes traffic congestion and, consequently, loss of vital signal in transmission. With the increasing number of sensor nodes involved in the WSN field, network congestion issue is rapidly coming known as a tangible issue in healthcare system that must be addressed in order to maintain data reliability. Sensor nodes have very limited computational resources due to its energy consumption. To reduce traffics in WSN communication, the biomedical data are sent when they had very serious problems. The collaboration among sensors through task mapping based in-network processing is adapted to achieve higher processing power and reduce traffics in WSN. System analysis shows that the data packet loss in the ubiquitous healthcare system is dramatically reduced after the implementation of this process. By adapting fall detection, not only the numbers of packets received by the base station are greatly reduced but also the traffic overload problems in WSN are also resolved.


2017 ◽  
Vol 2017 ◽  
pp. 1-10 ◽  
Author(s):  
Rabia Riaz ◽  
Tae-Sun Chung ◽  
Sanam Shahla Rizvi ◽  
Nazish Yaqub

The development of wireless sensor networks can be considered as the beginning of a new generation of applications. Authenticity of communicating entities is essential for the success of wireless sensor networks. Authentication in wireless sensor networks is always a challenging task due to broadcast nature of the transmission medium. Sensor nodes are usually resource constrained with respect to energy, memory, and computation and communication capabilities. It is not possible for each node to authenticate all incoming request messages, whether these request messages are from authorized or unauthorized nodes. Any malicious node can flood the network by sending messages repeatedly for creating denial of service attack, which will eventually bring down the whole network. In this paper, a lightweight authentication scheme named as Biphase Authentication Scheme (BAS) is presented for wireless sensor networks. This scheme provides initial small scale authentication for the request messages entering wireless sensor networks and resistance against denial of service attacks.


Author(s):  
Yugashree Bhadane ◽  
Pooja Kadam

Now days, wireless technology is one of the center of attention for users and researchers. Wireless network is a network having large number of sensor nodes and hence called as “Wireless Sensor Network (WSN)”. WSN monitors and senses the environment of targeted area. The sensor nodes in WSN transmit data to the base station depending on the application. These sensor nodes communicate with each other and routing is selected on the basis of routing protocols which are application specific. Based on network structure, routing protocols in WSN can be divided into two categories: flat routing, hierarchical or cluster based routing, location based routing. Out of these, hierarchical or cluster based routing is becoming an active branch of routing technology in WSN. To allow base station to receive unaltered or original data, routing protocol should be energy-efficient and secure. To fulfill this, Hierarchical or Cluster base routing protocol for WSN is the most energy-efficient among other routing protocols. Hence, in this paper, we present a survey on different hierarchical clustered routing techniques for WSN. We also present the key management schemes to provide security in WSN. Further we study and compare secure hierarchical routing protocols based on various criteria.


Sign in / Sign up

Export Citation Format

Share Document