medical sensor networks
Recently Published Documents


TOTAL DOCUMENTS

93
(FIVE YEARS 30)

H-INDEX

18
(FIVE YEARS 5)

2021 ◽  
Vol 15 (1) ◽  
pp. 149-162
Author(s):  
Kalaivani Karunakaran ◽  
Sivakumar Rajagopal

Objective: Preservation of patient’s medical information in health care industries under Medical Sensor Networks (MSN). Methods: This paper proposes a novel key management technique known as k- secure with FBKM, which generates a robust key to allow communication between sensors present in the Body Sensor Units (BSU) and Body Central Unit (BCU). This proposed work strengthens the FBKM technique which is placed between BCU and the point accessible to medical experts at a remote place in the overall health care monitoring environment. Results: The FBKM technique has proved its success in authentication and security by improving genuine acceptance rate, false rejection rate, and declining false acceptance rate. Conclusion: The k- secure with FBKM scheme enhances the performance of the existing FBKM scheme in Medical Sensor Networks.


Sensors ◽  
2021 ◽  
Vol 21 (18) ◽  
pp. 6039
Author(s):  
DeokKyu Kwon ◽  
YoHan Park ◽  
YoungHo Park

Wireless medical sensor networks (WMSNs) are used in remote medical service environments to provide patients with convenient healthcare services. In a WMSN environment, patients wear a device that collects their health information and transmits the information via a gateway. Then, doctors make a diagnosis regarding the patient, utilizing the health information. However, this information can be vulnerable to various security attacks because the information is exchanged via an insecure channel. Therefore, a secure authentication scheme is necessary for WMSNs. In 2021, Masud et al. proposed a lightweight and anonymity-preserving user authentication scheme for healthcare environments. We discover that Masud et al.’s scheme is insecure against offline password guessing, user impersonation, and privileged insider attacks. Furthermore, we find that Masud et al.’s scheme cannot ensure user anonymity. To address the security vulnerabilities of Masud et al.’s scheme, we propose a three-factor-based mutual authentication scheme with a physical unclonable function (PUF). The proposed scheme is secure against various security attacks and provides anonymity, perfect forward secrecy, and mutual authentication utilizing biometrics and PUF. To prove the security features of our scheme, we analyze the scheme using informal analysis, Burrows–Abadi–Needham (BAN) logic, the Real-or-Random (RoR) model, and Automated Verification of Internet Security Protocols and Applications (AVISPA) simulation. Furthermore, we estimate our scheme’s security features, computation costs, communication costs, and energy consumption compared with the other related schemes. Consequently, we demonstrate that our scheme is suitable for WMSNs.


Author(s):  
Weizheng Wang ◽  
Chen Qiu ◽  
Zhimeng Yin ◽  
Gautam Srivastava ◽  
Thippa Reddy Gadekallu ◽  
...  

Author(s):  
El Miloud Ar-Reyouchi ◽  
Kamal Ghoumid ◽  
Doha Ar-Reyouchi ◽  
Salma Rattal ◽  
Reda Yahiaoui ◽  
...  

Author(s):  
Fei Zhu ◽  
Xun Yi ◽  
Alsharif Abuadbba ◽  
Ibrahim Khalil ◽  
Surya Nepal ◽  
...  

Sign in / Sign up

Export Citation Format

Share Document