Skip to main content
Erschienen in: Multimedia Systems 1/2015

01.02.2015 | Regular Paper

Robust anonymous authentication protocol for health-care applications using wireless medical sensor networks

verfasst von: Debiao He, Neeraj Kumar, Jianhua Chen, Cheng-Chi Lee, Naveen Chilamkurti, Seng-Soo Yeo

Erschienen in: Multimedia Systems | Ausgabe 1/2015

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

With the fast development of wireless communication technologies and semiconductor technologies, the wireless sensor network (WSN) has been widely used in many applications. As an application of the WSN, the wireless medical sensor network (WMSN) could improve health-care quality and has become important in the modern medical system. In the WMSN, physiological data are collected by sensors deployed in the patient’s body and sent to health professionals’ mobile devices through wireless communication. Then health professionals could get the status of the patient anywhere and anytime. The data collected by sensors are very sensitive and important. The leakage of them could compromise the patient’s privacy and their malicious modification could harm the patient’s health. Therefore, both security and privacy are two important issues in WMSNs. Recently, Kumar et al. proposed an efficient authentication protocol for health-care applications using WMSNs and claimed that it could withstand various attacks. However, we find that their protocol is vulnerable to the off-line password guessing attack and the privileged insider attack. We also point out that their protocol cannot provide user anonymity. In this paper, we will propose a robust anonymous authentication protocol for health-care applications using WMSNs. Compared with Kumar et al.’s protocol, the proposed protocol has strong security and computational efficiency. Therefore, it is more suitable for health-care applications using WMSNs.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Kumar, P., Lee, S., Lee, H.: E-SAP: efficient-Strong authentication protocol for healthcare applications using wireless medical sensor networks. Sensors 12, 1625–1647 (2012)CrossRef Kumar, P., Lee, S., Lee, H.: E-SAP: efficient-Strong authentication protocol for healthcare applications using wireless medical sensor networks. Sensors 12, 1625–1647 (2012)CrossRef
2.
Zurück zum Zitat Kumar, P., Lee, Y.D., Lee, H.J.: Secure health monitoring using medical wireless sensor networks. In: Proceedings of the 6th international conference on networked computing and advanced information management (NCM’10), Seoul, Korea, pp. 491–494, 16–18 August 2010 Kumar, P., Lee, Y.D., Lee, H.J.: Secure health monitoring using medical wireless sensor networks. In: Proceedings of the 6th international conference on networked computing and advanced information management (NCM’10), Seoul, Korea, pp. 491–494, 16–18 August 2010
3.
Zurück zum Zitat Haque, M.M., Pathan, A.S.K., Hong, C.S.: Securing U-healthcare sensor networks using public key based scheme. In Proceeding of the 10th international conference of advance communication technology (ICACT), Seoul, Korea, pp. 1108–1111, 19–22 Febr 2008 Haque, M.M., Pathan, A.S.K., Hong, C.S.: Securing U-healthcare sensor networks using public key based scheme. In Proceeding of the 10th international conference of advance communication technology (ICACT), Seoul, Korea, pp. 1108–1111, 19–22 Febr 2008
4.
Zurück zum Zitat Dagtas, S., Pekhteryev, G., Sahinoglu, Z., Cam, H., Challa, N.: Real-time and secure wireless health monitoring. Int. J. Telemed. Appl. (2008). doi:10.1155/2008/135808 Dagtas, S., Pekhteryev, G., Sahinoglu, Z., Cam, H., Challa, N.: Real-time and secure wireless health monitoring. Int. J. Telemed. Appl. (2008). doi:10.​1155/​2008/​135808
5.
Zurück zum Zitat Boukerche, A., Ren, Y.: A secure mobile healthcare system using trust-based multicast scheme. IEEE J. Sel. Areas Commun. 27, 387–399 (2009)CrossRef Boukerche, A., Ren, Y.: A secure mobile healthcare system using trust-based multicast scheme. IEEE J. Sel. Areas Commun. 27, 387–399 (2009)CrossRef
6.
Zurück zum Zitat Lin, X., Lu, R., Shen, X., Nemoto, Y., Kato, N.: SAGE: a strong privacy-preserving scheme against global evesdropping for ehealth systems. IEEE J. Sel. Areas Commun. 27, 365–378 (2009)CrossRef Lin, X., Lu, R., Shen, X., Nemoto, Y., Kato, N.: SAGE: a strong privacy-preserving scheme against global evesdropping for ehealth systems. IEEE J. Sel. Areas Commun. 27, 365–378 (2009)CrossRef
7.
Zurück zum Zitat Malasri, K., Wang, L.: Design and implementation of a secure wireless mote-based medical sensor network. Sensors 9, 6273–6297 (2009)CrossRef Malasri, K., Wang, L.: Design and implementation of a secure wireless mote-based medical sensor network. Sensors 9, 6273–6297 (2009)CrossRef
8.
Zurück zum Zitat Hu, F., Jiang, M., Wagner, M., Dong, D.C.: Privacy-preserving telecardiology sensor networks: toward a low-cost portable wireless hardware/software codesign. IEEE Trans. Inf Technol. Biomed. 11, 619–627 (2007)CrossRef Hu, F., Jiang, M., Wagner, M., Dong, D.C.: Privacy-preserving telecardiology sensor networks: toward a low-cost portable wireless hardware/software codesign. IEEE Trans. Inf Technol. Biomed. 11, 619–627 (2007)CrossRef
9.
Zurück zum Zitat Le, X.H., Khalid, M., Sankar, R., Lee, S.: An efficient mutual authentication and access control scheme for wireless sensor networks in healthcare. J. Netw. 6, 355–364 (2011) Le, X.H., Khalid, M., Sankar, R., Lee, S.: An efficient mutual authentication and access control scheme for wireless sensor networks in healthcare. J. Netw. 6, 355–364 (2011)
10.
Zurück zum Zitat Huang, Y.M., Hsieh, M.Y., Chao, H.C., Hung, S.H., Park, J.H.: Pervasive, secure access to a hierarchical sensor-based healthcare monitoring architecture in wireless heterogeneous networks. IEEE J. Sel. Areas Commun. 27, 400–411 (2009)CrossRef Huang, Y.M., Hsieh, M.Y., Chao, H.C., Hung, S.H., Park, J.H.: Pervasive, secure access to a hierarchical sensor-based healthcare monitoring architecture in wireless heterogeneous networks. IEEE J. Sel. Areas Commun. 27, 400–411 (2009)CrossRef
11.
Zurück zum Zitat Das, M.L.: Two-factor user authentication in wireless sensor networks. IEEE Trans. Wirel. Commun. 8, 1086–1090 (2009)CrossRef Das, M.L.: Two-factor user authentication in wireless sensor networks. IEEE Trans. Wirel. Commun. 8, 1086–1090 (2009)CrossRef
12.
Zurück zum Zitat Nyang, D., Lee, M.: Improvement of Das’s two-factor authentication protocol in wireless sensor networks. Cryptol. ePrint Arch. 2009, 631 (2009) Nyang, D., Lee, M.: Improvement of Das’s two-factor authentication protocol in wireless sensor networks. Cryptol. ePrint Arch. 2009, 631 (2009)
13.
Zurück zum Zitat Huang, H., Chang, Y., Liu, C.: Enhancement of two-factor user authentication in wireless sensor networks. In Proceedings of the 6th international conference on intelligent information hiding and multimedia signal processing (IIHMSP’10). 27–30 (2010) Huang, H., Chang, Y., Liu, C.: Enhancement of two-factor user authentication in wireless sensor networks. In Proceedings of the 6th international conference on intelligent information hiding and multimedia signal processing (IIHMSP’10). 27–30 (2010)
14.
Zurück zum Zitat Chen, H., Shih, W.: A robust mutual authentication protocol for wireless sensor networks. ETRI J. 32, 704–712 (2010)CrossRef Chen, H., Shih, W.: A robust mutual authentication protocol for wireless sensor networks. ETRI J. 32, 704–712 (2010)CrossRef
15.
Zurück zum Zitat Khan, M.K., Alghathbar, K.: Cryptanalysis and security improvement of ‘two-factor user authentication in wireless sensor networks’. Sensors 10, 2450–2459 (2010)CrossRef Khan, M.K., Alghathbar, K.: Cryptanalysis and security improvement of ‘two-factor user authentication in wireless sensor networks’. Sensors 10, 2450–2459 (2010)CrossRef
16.
Zurück zum Zitat Yoo, S., Park, K., Kim, J.: A security-performance balanced user authentication scheme forwireless sensor networks. Int. J. Distrib, Sens. Netw. (2012) (Article ID 382810) Yoo, S., Park, K., Kim, J.: A security-performance balanced user authentication scheme forwireless sensor networks. Int. J. Distrib, Sens. Netw. (2012) (Article ID 382810)
17.
Zurück zum Zitat Yeh, H.L., Chen, T.H., Liu, P.C., Kim, T.H., Wei, H.W.: A secure authentication protocol for wireless sensor networks using elliptic curves cryptography. Sensors 11, 4767–4779 (2011)CrossRef Yeh, H.L., Chen, T.H., Liu, P.C., Kim, T.H., Wei, H.W.: A secure authentication protocol for wireless sensor networks using elliptic curves cryptography. Sensors 11, 4767–4779 (2011)CrossRef
19.
Zurück zum Zitat Shi, W., Gong, P.: A new user authentication protocol for wireless sensor networks using elliptic curves cryptography. Int. J. Distrib. Sens. Netw. (2012) (Article ID 730831) Shi, W., Gong, P.: A new user authentication protocol for wireless sensor networks using elliptic curves cryptography. Int. J. Distrib. Sens. Netw. (2012) (Article ID 730831)
20.
Zurück zum Zitat Kocher, P., Jaffe, J., Jun, B.: Differential power analysis. In Proceedings of the advances in cryptology, Santa Barbara, pp. 388–397, 15–19 Aug 1999 Kocher, P., Jaffe, J., Jun, B.: Differential power analysis. In Proceedings of the advances in cryptology, Santa Barbara, pp. 388–397, 15–19 Aug 1999
21.
Zurück zum Zitat Messerges, T.S., Dabbish, E.A., Sloan, R.H.: Examining smart-card under the threat of power analysis attacks. IEEE Trans. Comput. 51, 540–552 (2002)CrossRefMathSciNet Messerges, T.S., Dabbish, E.A., Sloan, R.H.: Examining smart-card under the threat of power analysis attacks. IEEE Trans. Comput. 51, 540–552 (2002)CrossRefMathSciNet
22.
Zurück zum Zitat He, D., Wu, S., Chen, J.: Note on design of improved password authentication and update scheme based on elliptic curve cryptography. Math. Comput. Model. 55(3–4), 1661–1664 (2012)CrossRefMATHMathSciNet He, D., Wu, S., Chen, J.: Note on design of improved password authentication and update scheme based on elliptic curve cryptography. Math. Comput. Model. 55(3–4), 1661–1664 (2012)CrossRefMATHMathSciNet
23.
Zurück zum Zitat He, D., Hu, H.: Cryptanalysis of a dynamic ID-based remote user authentication scheme with access control for multi-server environment. IEICE Trans. Inf. Syst. E96-D(1), 138–140 (2013)CrossRefMathSciNet He, D., Hu, H.: Cryptanalysis of a dynamic ID-based remote user authentication scheme with access control for multi-server environment. IEICE Trans. Inf. Syst. E96-D(1), 138–140 (2013)CrossRefMathSciNet
24.
Zurück zum Zitat He, D., Chen, J., Zhang, R.: A more secure authentication scheme for telecare medicine information systems. J. Med. Syst. 36(3), 1989–1995 (2012)CrossRef He, D., Chen, J., Zhang, R.: A more secure authentication scheme for telecare medicine information systems. J. Med. Syst. 36(3), 1989–1995 (2012)CrossRef
25.
Zurück zum Zitat He, D., Chen, Y., Chen, J.: Cryptanalysis and improvement of an extended chaotic maps-based key agreement protocol. Nonlinear Dyn. 69(3), 1149–1157 (2012)CrossRefMATHMathSciNet He, D., Chen, Y., Chen, J.: Cryptanalysis and improvement of an extended chaotic maps-based key agreement protocol. Nonlinear Dyn. 69(3), 1149–1157 (2012)CrossRefMATHMathSciNet
26.
Zurück zum Zitat Burrows, M., Abadi, M., Needham, R.: A logic of authentication. ACM Trans. Comput. Syst. 8, 18–36 (1990)CrossRef Burrows, M., Abadi, M., Needham, R.: A logic of authentication. ACM Trans. Comput. Syst. 8, 18–36 (1990)CrossRef
27.
Zurück zum Zitat He, D., Wang, D., Wu, S.: Cryptanalysis and improvement of a password-based remote user authentication scheme without smart cards. Inf. Technol. Control 42(2), 170–177 (2013) He, D., Wang, D., Wu, S.: Cryptanalysis and improvement of a password-based remote user authentication scheme without smart cards. Inf. Technol. Control 42(2), 170–177 (2013)
Metadaten
Titel
Robust anonymous authentication protocol for health-care applications using wireless medical sensor networks
verfasst von
Debiao He
Neeraj Kumar
Jianhua Chen
Cheng-Chi Lee
Naveen Chilamkurti
Seng-Soo Yeo
Publikationsdatum
01.02.2015
Verlag
Springer Berlin Heidelberg
Erschienen in
Multimedia Systems / Ausgabe 1/2015
Print ISSN: 0942-4962
Elektronische ISSN: 1432-1882
DOI
https://doi.org/10.1007/s00530-013-0346-9

Weitere Artikel der Ausgabe 1/2015

Multimedia Systems 1/2015 Zur Ausgabe

Neuer Inhalt