Abstract

As wireless communication technology and semiconductor technology developed fast, the wireless medical sensor networks (WMSNs) have been applied to the modern health-care area at large. The physiological data can be obtained by medical sensor nodes deployed in the patient’s body and sent to the special devices of the health professionals through wireless communication. Thus, the status of a patient is monitored by the health professional in that way. However, there are still two important issues that how to guarantee secure communication and protect the privacy of the patient for the reason of the open feature of wireless communication. In this paper, initially, an improved three-factor user authentication scheme is proposed to overcome those flaws utilizing password, smart card, and biometric feature. Furthermore, formal security analysis shows that the proposed scheme defends against various security pitfalls. Finally, the comparison results with other surviving relevant schemes show that our scheme is more efficient in terms of computational cost, communication cost, and estimated time. Therefore, the proposed scheme is suitable for practical application in WMSN.

Highlights

  • As the Internet of Things (IOT) technology developed, great success that [1] wireless communication technology has become more and more mature has been achieved by chip and sensor

  • After the login request message {M1} is received by GW, the user Ui and medical sensor node Sn conduct the mutual authentication and key agreement by the following steps: 1) Upon receiving the request message {M1}, the IDi through the parameter {IDi ⊕ h(XGWN rg)} stored in its own database is obtained and the following parameters according to the equations (14-15) are calculated by GW: (14)

  • In this paper, to overcome the existing security flaws, the biometric feature is introduced as the third authentication factor

Read more

Summary

INTRODUCTION

As the Internet of Things (IOT) technology developed, great success that [1] wireless communication technology has become more and more mature has been achieved by chip and sensor. That Yeh et al [5] scheme cannot provide mutual authentication was pointed by Hsiu et al [5] in the same year later To solve these problems which were indicated by Hsiu et al [5], ECC is still utilized by Shi et al [6] to construct a new user authentication protocol for WSN in 2013, since ECC increases computational complexity, in addition extra storage for nodes and users’ public keys is required. Year, [17] An sensor-Based mHealth Authentication for Real-Time Remote Healthcare Monitoring System is proposed by Alrufaye M et al. For Reference [16], [17], they all have patient privacy information security risks.

FUZZY EXTRACTOR
RELATED ASSUMPTIONS
HEALTH PROFESSIONAL REGISTRATION PHASE
AUTHENTICATION AND KEY AGREEMENT PHASE
PASSWORD UPDATE PHASE
SECURITY ANALYSIS OF THE PROPOSED SCHEME
SECURE FUNCTIONALITY AND PERFORMANCE COMPARISONS
CONCLUSION
Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.