Online citations, reference lists, and bibliographies.
Please confirm you are human
(Sign Up for free to never see this)
← Back to Search

Robust Anonymous Authentication Protocol For Health-care Applications Using Wireless Medical Sensor Networks

D. He, N. Kumar, J. Chen, C. Lee, N. Chilamkurti, Seng-Soo Yeo
Published 2013 · Computer Science

Save to my Library
Download PDF
Analyze on Scholarcy
Share
With the fast development of wireless communication technologies and semiconductor technologies, the wireless sensor network (WSN) has been widely used in many applications. As an application of the WSN, the wireless medical sensor network (WMSN) could improve health-care quality and has become important in the modern medical system. In the WMSN, physiological data are collected by sensors deployed in the patient’s body and sent to health professionals’ mobile devices through wireless communication. Then health professionals could get the status of the patient anywhere and anytime. The data collected by sensors are very sensitive and important. The leakage of them could compromise the patient’s privacy and their malicious modification could harm the patient’s health. Therefore, both security and privacy are two important issues in WMSNs. Recently, Kumar et al. proposed an efficient authentication protocol for health-care applications using WMSNs and claimed that it could withstand various attacks. However, we find that their protocol is vulnerable to the off-line password guessing attack and the privileged insider attack. We also point out that their protocol cannot provide user anonymity. In this paper, we will propose a robust anonymous authentication protocol for health-care applications using WMSNs. Compared with Kumar et al.’s protocol, the proposed protocol has strong security and computational efficiency. Therefore, it is more suitable for health-care applications using WMSNs.
This paper references
10.1587/TRANSINF.E96.D.138
Cryptanalysis of a Dynamic ID-Based Remote User Authentication Scheme with Access Control for Multi-Server Environments
D. He (2013)
Improvement of Das's Two-Factor Authentication Protocol in Wireless Sensor Networks
DaeHun Nyang (2009)
10.3390/s100302450
Cryptanalysis and Security Improvements of ‘Two-Factor User Authentication in Wireless Sensor Networks’
M. Khan (2010)
10.1109/JSAC.2009.090504
A secure mobile healthcare system using trust-based multicast scheme
A. Boukerche (2009)
10.1007/S11071-012-0335-0
Cryptanalysis and improvement of an extended chaotic maps-based key agreement protocol
D. He (2012)
10.3390/s90806273
Design and Implementation of a Secure Wireless Mote-Based Medical Sensor Network
K. Malasri (2009)
10.4304/jnw.6.3.355-364
An Efficient Mutual Authentication and Access Control Scheme for Wireless Sensor Networks in Healthcare
L. Hung (2011)
10.1145/77648.77649
A logic of authentication
M. Burrows (1990)
10.5755/J01.ITC.42.2.2554
Cryptanalysis and Improvement of a Password-Based Remote User Authentication Scheme without Smart Cards
D. He (2013)
10.1109/TITB.2007.894818
Privacy-Preserving Telecardiology Sensor Networks: Toward a Low-Cost Portable Wireless Hardware/Software Codesign
Fei Hu (2007)
10.1155/2012/382810
A Security-Performance-Balanced User Authentication Scheme for Wireless Sensor Networks
S. Yoo (2012)
10.5755/j01.itc.42.2.1745
Consistency Analysis of the Duration Parameter Within a Syllable for Mandarin Speech
C. Yeh (2013)
Secure health monitoring using medical wireless sensor networks
P. Kumar (2010)
10.1155/2013/730831
A New User Authentication Protocol for Wireless Sensor Networks Using Elliptic Curves Cryptography
Wenbo Shi (2013)
10.1109/TWC.2008.080128
Two-factor user authentication in wireless sensor networks
M. Das (2009)
10.1007/s10916-011-9658-5
A More Secure Authentication Scheme for Telecare Medicine Information Systems
He Debiao (2012)
10.1109/JSAC.2009.090505
Pervasive, secure access to a hierarchical sensor-based healthcare monitoring architecture in wireless heterogeneous networks
Y. Huang (2009)
10.3390/s120201625
E-SAP: Efficient-Strong Authentication Protocol for Healthcare Applications Using Wireless Medical Sensor Networks
P. Kumar (2012)
10.1109/JSAC.2009.090502
Sage: a strong privacy-preserving scheme against global eavesdropping for ehealth systems
X. Lin (2009)
10.1155/2008/135808
Real-Time and Secure Wireless Health Monitoring
S. Dagtas (2008)
10.4218/ETRIJ.10.1510.0134
A Robust Mutual Authentication Protocol for Wireless Sensor Networks
Tien-Ho Chen (2010)
10.1109/ICACT.2008.4493960
Securing U-Healthcare Sensor Networks using Public Key Based Scheme
M. M. Haque (2008)
10.1016/j.mcm.2011.10.079
Note on 'Design of improved password authentication and update scheme based on elliptic curve cryptography'
D. He (2012)
10.1109/TC.2002.1004593
Examining Smart-Card Security under the Threat of Power Analysis Attacks
Thomas S. Messerges (2002)
10.3390/s110504767
A Secured Authentication Protocol for Wireless Sensor Networks Using Elliptic Curves Cryptography
Hsiu-lien Yeh (2011)
Weakness of a Secured Authentication Protocol for Wireless Sensor Networks Using Elliptic Curves Cryptography
W. Han (2011)
10.1007/3-540-48405-1_25
Differential Power Analysis
Paul C. Kocher (1999)
10.1109/IIHMSP.2010.14
Enhancement of Two-Factor User Authentication in Wireless Sensor Networks
Hui-Feng Huang (2010)



This paper is referenced by
10.1109/ICCW.2019.8757015
An Energy Efficient Cluster-Heads Re-Usability Mechanism for Wireless Sensor Networks
S. K. Haider (2019)
10.1007/s10916-015-0318-z
Cryptanalysis and Enhancement of Anonymity Preserving Remote User Mutual Authentication and Session Key Agreement Scheme for E-Health Care Systems
R. Amin (2015)
10.1016/j.cmpb.2016.07.022
Secure anonymous mutual authentication for star two-tier wireless body area networks
M. Ibrahim (2016)
Secure-Anonymous User Authentication Scheme for e-Healthcare Application Using Wireless Medical Sensor Networks
Yoney Kirsal Ever (2019)
10.1016/j.vehcom.2017.02.006
Design of authentication protocol for wireless sensor network-based smart vehicular system
P. Mohit (2017)
10.1007/s10916-018-0896-7
(a,k)-Anonymous Scheme for Privacy-Preserving Data Collection in IoT-based Healthcare Services Systems
H. Li (2018)
10.1371/journal.pone.0131368
Security Analysis and Improvement of ‘a More Secure Anonymous User Authentication Scheme for the Integrated EPR Information System’
S. H. Islam (2015)
10.1109/IMCEC.2018.8469440
Reliability and End-to-End Delay Evaluation of Outdoor and Indoor Environments for Wireless Multimedia Sensor Networks
Nasim Abbas (2018)
10.5755/j01.itc.46.1.13845
A Multi-Party Secret Handshake Scheme Based on Chaotic Maps
W. Wang (2017)
10.1016/j.comnet.2016.12.013
Analysis of handover authentication protocols for mobile wireless networks using identity-based public key cryptography
D. He (2017)
10.1007/s10916-015-0215-5
A Privacy Preserving Secure and Efficient Authentication Scheme for Telecare Medical Information Systems
Raghavendra Mishra (2015)
10.1109/CW49994.2020.00047
Secure and Privacy preserving Biometric based User Authentication with Data Access Control System in the Healthcare Environment
Sonam Devgan Kaul (2020)
10.1371/journal.pone.0155064
A New Ticket-Based Authentication Mechanism for Fast Handover in Mesh Network
Y. Lai (2016)
10.1109/IADCC.2018.8692098
An Efficient and Secure Authentication Scheme using Markov Chain for Wireless Sensor Networks
D. Singh (2018)
10.1002/SEC.1417
Cryptanalysis and improvement of a chaotic maps-based anonymous authenticated key agreement protocol for multiserver architecture
Y. Lu (2016)
10.1109/ICCCN.2018.8487422
Achieve Efficient and Privacy-Preserving Medical Primary Diagnosis Based on kNN
D. Zhu (2018)
10.1109/TIFS.2017.2668062
BASIS: A Practical Multi-User Broadcast Authentication Scheme in Wireless Sensor Networks
Kyung-Ah Shim (2017)
10.1109/ANTS.2018.8710128
Cloud-Assisted Privacy Preserving Authentication Scheme for Telecare Medical Information Systems
Shreeya Swagatika Sahoo (2018)
10.1155/2020/5047379
Cryptanalysis and Security Improvement of Two Authentication Schemes for Healthcare Systems Using Wireless Medical Sensor Networks
Jiaqing Mo (2020)
10.1016/j.ins.2015.02.010
A secure temporal-credential-based mutual authentication and key agreement scheme with pseudo identity for wireless sensor networks
D. He (2015)
10.1109/ITOEC.2017.8122358
Performance analysis of end-to-end delay and reliability for linear wireless multimedia sensor networks
Nasim Abbas (2017)
10.1109/MCE.2017.2720193
Authentication Protocols for Implantable Medical Devices: Taxonomy, Analysis and Future Directions
S. Challa (2018)
10.1002/sec.1464
An efficient multi-gateway-based three-factor user authentication and key agreement scheme in hierarchical wireless sensor networks
A. K. Das (2016)
10.1007/S13369-016-2156-9
Provably Secure Threshold-Based ABE Scheme Without Bilinear Map
Arijit Karati (2016)
10.35940/ijitee.l2545.119119
An IoT-Based Body Area Network in Medical Care System : Related Challenges and Issues
Shaik Jhani Bhasha (2019)
10.1016/j.comnet.2020.107333
A lightweight and secure two-factor authentication scheme for wireless body area networks in health-care IoT
Mahdi Fotouhi (2020)
10.1007/s12652-016-0345-8
A privacy-preserving and provable user authentication scheme for wireless sensor networks based on Internet of Things security
F. Wu (2017)
10.1007/s11277-017-4270-8
Efficient Integrity Verification Scheme for Medical Data Records in Cloud-Assisted Wireless Medical Sensor Networks
X. Zhang (2017)
10.1007/s10916-016-0474-9
A Secure Cloud-Assisted Wireless Body Area Network in Mobile Emergency Medical Care System
C. Li (2016)
10.1109/IC3I.2014.7019600
An energy efficient remote user authentication scheme preserving user anonymity
Surekha Bapana (2014)
10.1109/UBMK.2019.8907079
E-Health and Privacy: Risks, Opportunities and Solutions
Çiğdem Çoban (2019)
10.3390/APP7101069
Secure Authentication and Prescription Safety Protocol for Telecare Health Services Using Ubiquitous IoT
Z. Mahmood (2017)
See more
Semantic Scholar Logo Some data provided by SemanticScholar