Abstract

Remote health monitoring can offer a lot of advantage to all the players in healthcare industry and it can contribute to reduced healthcare expenses. Wireless medical sensor networks capable of accumulating and transferring vital parameters of patients play a crucial role in remote health monitoring. Security and privacy are major concerns preventing the patients from adopting this technology with an open mind. This paper presents a signature-based authentication protocol for remote health monitoring. The work also discusses an authentication protocol for the mutual authentication of users and medical server. The protocol does not require the server to maintain a password table. The proposed algorithms are resistant to various attacks such as replay attack, stolen verifier attack, and privileged insider attack. The work includes the informal and formal security analysis of the proposed protocols. Scyther tool is used for formal security analysis and the results show that the protocol is resistant to various common and automated attacks.

Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.