Online citations, reference lists, and bibliographies.
Please confirm you are human
(Sign Up for free to never see this)
← Back to Search

Robust Anonymous Authentication Protocol For Health-care Applications Using Wireless Medical Sensor Networks

D. He, N. Kumar, J. Chen, C. Lee, N. Chilamkurti, Seng-Soo Yeo
Published 2013 · Computer Science

Save to my Library
Download PDF
Analyze on Scholarcy
With the fast development of wireless communication technologies and semiconductor technologies, the wireless sensor network (WSN) has been widely used in many applications. As an application of the WSN, the wireless medical sensor network (WMSN) could improve health-care quality and has become important in the modern medical system. In the WMSN, physiological data are collected by sensors deployed in the patient’s body and sent to health professionals’ mobile devices through wireless communication. Then health professionals could get the status of the patient anywhere and anytime. The data collected by sensors are very sensitive and important. The leakage of them could compromise the patient’s privacy and their malicious modification could harm the patient’s health. Therefore, both security and privacy are two important issues in WMSNs. Recently, Kumar et al. proposed an efficient authentication protocol for health-care applications using WMSNs and claimed that it could withstand various attacks. However, we find that their protocol is vulnerable to the off-line password guessing attack and the privileged insider attack. We also point out that their protocol cannot provide user anonymity. In this paper, we will propose a robust anonymous authentication protocol for health-care applications using WMSNs. Compared with Kumar et al.’s protocol, the proposed protocol has strong security and computational efficiency. Therefore, it is more suitable for health-care applications using WMSNs.
This paper references
Cryptanalysis of a Dynamic ID-Based Remote User Authentication Scheme with Access Control for Multi-Server Environments
D. He (2013)
Improvement of Das's Two-Factor Authentication Protocol in Wireless Sensor Networks
DaeHun Nyang (2009)
Cryptanalysis and Security Improvements of ‘Two-Factor User Authentication in Wireless Sensor Networks’
M. Khan (2010)
A secure mobile healthcare system using trust-based multicast scheme
A. Boukerche (2009)
Cryptanalysis and improvement of an extended chaotic maps-based key agreement protocol
D. He (2012)
Design and Implementation of a Secure Wireless Mote-Based Medical Sensor Network
K. Malasri (2009)
An Efficient Mutual Authentication and Access Control Scheme for Wireless Sensor Networks in Healthcare
L. Hung (2011)
A logic of authentication
M. Burrows (1990)
Cryptanalysis and Improvement of a Password-Based Remote User Authentication Scheme without Smart Cards
D. He (2013)
Privacy-Preserving Telecardiology Sensor Networks: Toward a Low-Cost Portable Wireless Hardware/Software Codesign
Fei Hu (2007)
A Security-Performance-Balanced User Authentication Scheme for Wireless Sensor Networks
S. Yoo (2012)
Consistency Analysis of the Duration Parameter Within a Syllable for Mandarin Speech
C. Yeh (2013)
Secure health monitoring using medical wireless sensor networks
P. Kumar (2010)
A New User Authentication Protocol for Wireless Sensor Networks Using Elliptic Curves Cryptography
Wenbo Shi (2013)
Two-factor user authentication in wireless sensor networks
M. Das (2009)
A More Secure Authentication Scheme for Telecare Medicine Information Systems
He Debiao (2012)
Pervasive, secure access to a hierarchical sensor-based healthcare monitoring architecture in wireless heterogeneous networks
Y. Huang (2009)
E-SAP: Efficient-Strong Authentication Protocol for Healthcare Applications Using Wireless Medical Sensor Networks
P. Kumar (2012)
Sage: a strong privacy-preserving scheme against global eavesdropping for ehealth systems
X. Lin (2009)
Real-Time and Secure Wireless Health Monitoring
S. Dagtas (2008)
A Robust Mutual Authentication Protocol for Wireless Sensor Networks
Tien-Ho Chen (2010)
Securing U-Healthcare Sensor Networks using Public Key Based Scheme
M. M. Haque (2008)
Note on 'Design of improved password authentication and update scheme based on elliptic curve cryptography'
D. He (2012)
Examining Smart-Card Security under the Threat of Power Analysis Attacks
Thomas S. Messerges (2002)
A Secured Authentication Protocol for Wireless Sensor Networks Using Elliptic Curves Cryptography
Hsiu-lien Yeh (2011)
Weakness of a Secured Authentication Protocol for Wireless Sensor Networks Using Elliptic Curves Cryptography
W. Han (2011)
Differential Power Analysis
Paul C. Kocher (1999)
Enhancement of Two-Factor User Authentication in Wireless Sensor Networks
Hui-Feng Huang (2010)

This paper is referenced by
An Energy Efficient Cluster-Heads Re-Usability Mechanism for Wireless Sensor Networks
S. K. Haider (2019)
Cryptanalysis and Enhancement of Anonymity Preserving Remote User Mutual Authentication and Session Key Agreement Scheme for E-Health Care Systems
R. Amin (2015)
Secure anonymous mutual authentication for star two-tier wireless body area networks
M. Ibrahim (2016)
Secure-Anonymous User Authentication Scheme for e-Healthcare Application Using Wireless Medical Sensor Networks
Yoney Kirsal Ever (2019)
Design of authentication protocol for wireless sensor network-based smart vehicular system
P. Mohit (2017)
(a,k)-Anonymous Scheme for Privacy-Preserving Data Collection in IoT-based Healthcare Services Systems
H. Li (2018)
Security Analysis and Improvement of ‘a More Secure Anonymous User Authentication Scheme for the Integrated EPR Information System’
S. H. Islam (2015)
Reliability and End-to-End Delay Evaluation of Outdoor and Indoor Environments for Wireless Multimedia Sensor Networks
Nasim Abbas (2018)
A Multi-Party Secret Handshake Scheme Based on Chaotic Maps
W. Wang (2017)
Analysis of handover authentication protocols for mobile wireless networks using identity-based public key cryptography
D. He (2017)
A Privacy Preserving Secure and Efficient Authentication Scheme for Telecare Medical Information Systems
Raghavendra Mishra (2015)
Secure and Privacy preserving Biometric based User Authentication with Data Access Control System in the Healthcare Environment
Sonam Devgan Kaul (2020)
A New Ticket-Based Authentication Mechanism for Fast Handover in Mesh Network
Y. Lai (2016)
An Efficient and Secure Authentication Scheme using Markov Chain for Wireless Sensor Networks
D. Singh (2018)
Cryptanalysis and improvement of a chaotic maps-based anonymous authenticated key agreement protocol for multiserver architecture
Y. Lu (2016)
Achieve Efficient and Privacy-Preserving Medical Primary Diagnosis Based on kNN
D. Zhu (2018)
BASIS: A Practical Multi-User Broadcast Authentication Scheme in Wireless Sensor Networks
Kyung-Ah Shim (2017)
Cloud-Assisted Privacy Preserving Authentication Scheme for Telecare Medical Information Systems
Shreeya Swagatika Sahoo (2018)
Cryptanalysis and Security Improvement of Two Authentication Schemes for Healthcare Systems Using Wireless Medical Sensor Networks
Jiaqing Mo (2020)
A secure temporal-credential-based mutual authentication and key agreement scheme with pseudo identity for wireless sensor networks
D. He (2015)
Performance analysis of end-to-end delay and reliability for linear wireless multimedia sensor networks
Nasim Abbas (2017)
Authentication Protocols for Implantable Medical Devices: Taxonomy, Analysis and Future Directions
S. Challa (2018)
An efficient multi-gateway-based three-factor user authentication and key agreement scheme in hierarchical wireless sensor networks
A. K. Das (2016)
Provably Secure Threshold-Based ABE Scheme Without Bilinear Map
Arijit Karati (2016)
An IoT-Based Body Area Network in Medical Care System : Related Challenges and Issues
Shaik Jhani Bhasha (2019)
A lightweight and secure two-factor authentication scheme for wireless body area networks in health-care IoT
Mahdi Fotouhi (2020)
A privacy-preserving and provable user authentication scheme for wireless sensor networks based on Internet of Things security
F. Wu (2017)
Efficient Integrity Verification Scheme for Medical Data Records in Cloud-Assisted Wireless Medical Sensor Networks
X. Zhang (2017)
A Secure Cloud-Assisted Wireless Body Area Network in Mobile Emergency Medical Care System
C. Li (2016)
An energy efficient remote user authentication scheme preserving user anonymity
Surekha Bapana (2014)
E-Health and Privacy: Risks, Opportunities and Solutions
Çiğdem Çoban (2019)
Secure Authentication and Prescription Safety Protocol for Telecare Health Services Using Ubiquitous IoT
Z. Mahmood (2017)
See more
Semantic Scholar Logo Some data provided by SemanticScholar