skip to main content
research-article

A Signature-Based Mutual Authentication Protocol for Remote Health Monitoring

Published: 05 July 2019 Publication History

Abstract

Remote health monitoring can offer a lot of advantage to all the players in healthcare industry and it can contribute to reduced healthcare expenses. Wireless medical sensor networks capable of accumulating and transferring vital parameters of patients play a crucial role in remote health monitoring. Security and privacy are major concerns preventing the patients from adopting this technology with an open mind. This paper presents a signature-based authentication protocol for remote health monitoring. The work also discusses an authentication protocol for the mutual authentication of users and medical server. The protocol does not require the server to maintain a password table. The proposed algorithms are resistant to various attacks such as replay attack, stolen verifier attack, and privileged insider attack. The work includes the informal and formal security analysis of the proposed protocols. Scyther tool is used for formal security analysis and the results show that the protocol is resistant to various common and automated attacks.

References

[1]
Suparna D. India’s most remote villages are getting better health care with this cloud based solution. 2016. https://www.forbes.com/sites/suparnadutt/2016/11/21/indias-most-remote-villages-are-getting-better-healthcare-with-this-cloud-based-solution/#73ad1f1d593b. Accessed 3 July 2019.
[2]
The Associated Press. India census says 70 percent live in villages, most are poor. 2015. https://www.seattletimes.com/nation-world/world/india-census-says-70-percent-live-in-villages-most-are-poor/. Accessed 3 July 2019.
[3]
Das ML Two-factor user authentication in wireless sensor networks IEEE Trans Wirel Commun 2009 8 1086-1090
[4]
Khan MK and Alghathbar K Cryptanalysis and security improvements of two-factor user authentication in wireless sensor networks Sensors 2010 10 245-2459
[5]
Vaidya B, Makrakis D, and Mouftah H Two-factor mutual authentication with key agreement in wireless sensor networks Secur Comm Netw 2016 9 171-183
[6]
Kalid E, Dasun W, Rajarajan M, Veselin R, Sanowar K. Timestamp authentication protocol for remote health monitoring in eHealth. In: Proceedings of the 2nd international conference on pervasive computing technologies for healthcare 2008 pervasive health. 2008. pp. 73–76.
[7]
Pardeep K, Sang-Gon L, and Hoon-Jae L E-SAP: efficient-strong authentication protocol for healthcare applications using wireless medical sensor networks Sensors. 2012 12 2 1625-1647
[8]
Jaewook J, Jongho M, Donghoon L, and Dongho W Efficient and security enhanced anonymous authentication with key agreement scheme in wireless sensor networks Sensors 2017 17 644 (pp. 1–21)
[9]
Peter FE, Micelle JH. Health Insurance Portability and Accountability Act (HIPAA). NCBI. 2018. https://www.ncbi.nlm.nih.gov/books/NBK500019/. Accessed 3 July 2019.
[10]
Digital Information Security in Healthcare Act (DISHA). 2017. https://www.nhp.gov.in/NHPfiles/R_4179_1521627488625_0.pdf.
[11]
Yeh HL, Chen TH, Liu PC, Kim TH, and Wei HW A secured authentication protocol for wireless sensor networks using elliptic curves cryptography Sensors 2011 11 5 4767-4779
[12]
Han W. Weaknesses of a secured authentication protocol for wireless sensor networks using elliptic curves cryptography. 2011. http://eprint.iacr.org/2011/293. Accessed 3 July 2019.
[13]
Shi W and Gong P A new user authentication protocol for wireless sensor networks using elliptic curves cryptography Int J Distrib Sens Netw. 2013
[14]
He D, Kumar N, Chen J, Lee C-C, Chilamkurti N, and Yeo S-S Robust anonymous authentication protocol for health-care application using wireless medical sensor networks Multimed Syst 2015 21 1 49-60
[15]
Kumar P, Lee SG, and Lee HJ E-SAP: efficient-strong authentication protocol for healthcare applications using wireless medical sensor networks Sensors 2012 12 2 1625-1647
[16]
Li X, Niu J, Kumari S, Liao J, Liang W, and Khan MK A new authentication protocol for healthcare applications using wireless medical sensor networks with user anonymity Secur Commun Netw. 2015
[17]
Das AK, Sutrala AK, Odelu V, and Goswami A A secure smartcard-based anonymous user authentication scheme for healthcare applications using wireless medical sensor networks Wirel Pers Commun. 2017 94 3 1899
[18]
Stallings W. Schnorr digital signature scheme. In: Cryptography and network security. vol. 13. New Delhi: Pearson Education; 2011. p. 426.
[19]
Cremers C. The Scyther tool: verification, falsification, analysis of security protocols? In: Proceedings of the 20th international conference on computer aided verification (CAV 2008), Department of Computer Science, ETH Zurich, Switzerland, Princeton, USA; 2008.
[20]
Dolev D and Yao AC On the security of public key protocols IEEE Trans Inf Theory 1983 29 12 198-208

Recommendations

Comments

Information & Contributors

Information

Published In

cover image SN Computer Science
SN Computer Science  Volume 1, Issue 1
Jan 2020
823 pages

Publisher

Springer-Verlag

Berlin, Heidelberg

Publication History

Published: 05 July 2019
Accepted: 28 June 2019
Received: 27 March 2019

Author Tags

  1. Remote-health-monitoring
  2. Wireless-sensor-networks
  3. Mutual authentication
  4. Two-factor authentication
  5. Scyther

Qualifiers

  • Research-article

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • 0
    Total Citations
  • 0
    Total Downloads
  • Downloads (Last 12 months)0
  • Downloads (Last 6 weeks)0
Reflects downloads up to 18 Aug 2024

Other Metrics

Citations

View Options

View options

Get Access

Login options

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media

-