Skip to main content
Erschienen in: Peer-to-Peer Networking and Applications 1/2017

15.09.2015

Efficient anonymous authentication with key agreement protocol for wireless medical sensor networks

verfasst von: Omid Mir, Jorge Munilla, Saru Kumari

Erschienen in: Peer-to-Peer Networking and Applications | Ausgabe 1/2017

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

The use of wireless medical sensor networks (WMSN) in healthcare has led to a significant progress in this area. WMSN can sense patients’ vital signs and transmit sensed signals to health monitoring devices. Health professionals can monitor the status of patients. Confidentiality and patient privacy are the main concern for the WMSN in health care. Recently, He et al. proposed an authentication protocol for the healthcare applications using WMSN. In this paper, we show that He et al.’s scheme is insecure against various attacks. We also present an improved scheme. In the security analysis, we demonstrate that our scheme is secured against various attacks. We use the BAN logic to prove the correctness of the proposed scheme. As a result, the proposed protocol is practical for healthcare applications.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Halteren AV, Bults R, Wac K, Konstantas D, Widya I, Dokovsky N, Koprinkon G, Jones V, Jerzog R (2004) Mobile patient monitoring: the mobihealth system. J Inform Tech Healthc 2:365–373 Halteren AV, Bults R, Wac K, Konstantas D, Widya I, Dokovsky N, Koprinkon G, Jones V, Jerzog R (2004) Mobile patient monitoring: the mobihealth system. J Inform Tech Healthc 2:365–373
2.
Zurück zum Zitat Chen BR, Peterson G, Mainland G, Welsh M (2008) Using passive monitoring to reconstruct sensor network dynamics. In Proceedings of the 4th IEEE International Conference on Distributed Computing in Sensor System (DCOSS’08), Santorini Island, Greece, 11–14 June. 10.1007/978-3-540-69170-9_6 Chen BR, Peterson G, Mainland G, Welsh M (2008) Using passive monitoring to reconstruct sensor network dynamics. In Proceedings of the 4th IEEE International Conference on Distributed Computing in Sensor System (DCOSS’08), Santorini Island, Greece, 11–14 June. 10.​1007/​978-3-540-69170-9_​6
3.
Zurück zum Zitat Dimitriou T, Loannis K (2008) Security issues in biomedical wireless sensor networks. In Proceedings of the 1st International Symposium on Applied Sciences on Biomedical and Communication Technologies (ISABEL’08), Aalborg, Denmark, 978-1-4244-2647-8. 10.1109/ISABEL.2008.4712577 Dimitriou T, Loannis K (2008) Security issues in biomedical wireless sensor networks. In Proceedings of the 1st International Symposium on Applied Sciences on Biomedical and Communication Technologies (ISABEL’08), Aalborg, Denmark, 978-1-4244-2647-8. 10.​1109/​ISABEL.​2008.​4712577
4.
Zurück zum Zitat Kumar P, Lee HJ (2012) Security issues in healthcare applications using wireless medical sensor networks: a survey. Sensors 12:55–91CrossRef Kumar P, Lee HJ (2012) Security issues in healthcare applications using wireless medical sensor networks: a survey. Sensors 12:55–91CrossRef
5.
Zurück zum Zitat Malasri K, Wang L (2009) Design and implementation of a secure wireless mote-based medical sensor network. Sensors 9:6273–6297CrossRef Malasri K, Wang L (2009) Design and implementation of a secure wireless mote-based medical sensor network. Sensors 9:6273–6297CrossRef
6.
Zurück zum Zitat Benenson Z, Gedicke N, Raivio O, Realizing robust user authentication in sensor networks. In Proceedings of the Workshop on Real-World Wireless Sensor Network (REALWSN’05), (2005) Stockholm, Sweden Benenson Z, Gedicke N, Raivio O, Realizing robust user authentication in sensor networks. In Proceedings of the Workshop on Real-World Wireless Sensor Network (REALWSN’05), (2005) Stockholm, Sweden
7.
Zurück zum Zitat Arshad H, Nikooghadam M (2015) Security analysis and improvement of two authentication and key agreement schemes for session initiation protocol. J Supercomput. doi:10.1007/s11227-015-1434-8 Arshad H, Nikooghadam M (2015) Security analysis and improvement of two authentication and key agreement schemes for session initiation protocol. J Supercomput. doi:10.​1007/​s11227-015-1434-8
8.
Zurück zum Zitat Le XH, Khalid M, Sankar R, Lee S (2011) An efficient mutual authentication and access control scheme for wireless sensor networks in healthcare. J Netw 6:355–364 Le XH, Khalid M, Sankar R, Lee S (2011) An efficient mutual authentication and access control scheme for wireless sensor networks in healthcare. J Netw 6:355–364
9.
Zurück zum Zitat Das ML (2009) Two-factor user authentication in wireless sensor networks. IEEE Trans Wirel Commun 8:1086–1090CrossRef Das ML (2009) Two-factor user authentication in wireless sensor networks. IEEE Trans Wirel Commun 8:1086–1090CrossRef
10.
Zurück zum Zitat Nyang D, Lee M (2009) Improvement of Das’s two-factor authentication protocol in wireless sensor networks. Cryptol ePrint Arch 2009:631 Nyang D, Lee M (2009) Improvement of Das’s two-factor authentication protocol in wireless sensor networks. Cryptol ePrint Arch 2009:631
11.
Zurück zum Zitat Huang H, Chang Y, Liu C (2010) Enhancement of two-factor user authentication in wireless sensor networks. In Proceedings of the 6th international conference on intelligent information hiding and multimedia signal processing (IIHMSP’10). 27–30, 10.1109/IIHMSP.2010.14. Huang H, Chang Y, Liu C (2010) Enhancement of two-factor user authentication in wireless sensor networks. In Proceedings of the 6th international conference on intelligent information hiding and multimedia signal processing (IIHMSP’10). 27–30, 10.​1109/​IIHMSP.​2010.​14.
12.
Zurück zum Zitat Chen H, Shih W (2010) A robust mutual authentication protocol for wireless sensor networks. ETRI J 32:704–712CrossRef Chen H, Shih W (2010) A robust mutual authentication protocol for wireless sensor networks. ETRI J 32:704–712CrossRef
13.
Zurück zum Zitat Khan MK, Alghathbar K (2010) Cryptanalysis and security improvement of ‘two-factor user authentication in wireless sensor networks’. Sensors 10:2450–2459CrossRef Khan MK, Alghathbar K (2010) Cryptanalysis and security improvement of ‘two-factor user authentication in wireless sensor networks’. Sensors 10:2450–2459CrossRef
14.
Zurück zum Zitat He D, Zhang Y, Chen J (2014) Cryptanalysis and improvement of an anonymous authentication protocol for wireless access networks. Wirel Pers Commun 74(2):229–243CrossRef He D, Zhang Y, Chen J (2014) Cryptanalysis and improvement of an anonymous authentication protocol for wireless access networks. Wirel Pers Commun 74(2):229–243CrossRef
16.
Zurück zum Zitat Arshad H, Teymoori V, Nikooghadam M, Abbassi H (2015) On the security of a two-factor authentication and key agreement scheme for telecare medicine information systems. J Med Syst. doi:10.1007/s10916-015-0259-6 Arshad H, Teymoori V, Nikooghadam M, Abbassi H (2015) On the security of a two-factor authentication and key agreement scheme for telecare medicine information systems. J Med Syst. doi:10.​1007/​s10916-015-0259-6
17.
Zurück zum Zitat Kumar P, Lee SG, Lee HJ (2012) E-SAP: efficient-strong authentication protocol for healthcare applications using wireless medical sensor networks. Sensors 12:1625–1647. doi:10.3390/s120201625 CrossRef Kumar P, Lee SG, Lee HJ (2012) E-SAP: efficient-strong authentication protocol for healthcare applications using wireless medical sensor networks. Sensors 12:1625–1647. doi:10.​3390/​s120201625 CrossRef
18.
Zurück zum Zitat He D, Kumar N, Chen J, Lee CC, Chilamkurti N, Yeo SS (2013) Robust anonymous authentication protocol for health-care applications using wireless medical sensor networks. Multimedia Systems. doi:10.1007/s00530-013-0346-9 He D, Kumar N, Chen J, Lee CC, Chilamkurti N, Yeo SS (2013) Robust anonymous authentication protocol for health-care applications using wireless medical sensor networks. Multimedia Systems. doi:10.​1007/​s00530-013-0346-9
19.
Zurück zum Zitat Ping ZL, Yi W (2010) An ID-based authenticated key agreement protocol for wireless sensor networks. J Commun 5:620–626 Ping ZL, Yi W (2010) An ID-based authenticated key agreement protocol for wireless sensor networks. J Commun 5:620–626
20.
Zurück zum Zitat Chen C, He D, Chan S, Bu J, Gao Y, Fan R (2010) Lightweight and provably secure user authentication with anonymity for the global mobility network. Int J Commun Syst. doi:10.1002/dac.1158 Chen C, He D, Chan S, Bu J, Gao Y, Fan R (2010) Lightweight and provably secure user authentication with anonymity for the global mobility network. Int J Commun Syst. doi:10.​1002/​dac.​1158
21.
Zurück zum Zitat Witteman M (2002) Advances in smartcard security. Inf Secur Bull 11–22:2002 Witteman M (2002) Advances in smartcard security. Inf Secur Bull 11–22:2002
22.
Zurück zum Zitat Messerges TS, Dabbish EA, Sloan RH (2002) Examining smart-card security under the threat of power analysis attacks. IEEE Trans Comput 51(5):541–552CrossRefMathSciNet Messerges TS, Dabbish EA, Sloan RH (2002) Examining smart-card security under the threat of power analysis attacks. IEEE Trans Comput 51(5):541–552CrossRefMathSciNet
23.
Zurück zum Zitat Wang B, Li ZQ (2006) A forward-secure user authentication scheme with smart cards. Int J Netw Secur 3(2):116–119 Wang B, Li ZQ (2006) A forward-secure user authentication scheme with smart cards. Int J Netw Secur 3(2):116–119
24.
Zurück zum Zitat Mir O, Van der Weide T, Lee CC (2015) A secure user anonymity and authentication scheme using AVISPA for telecare medical information systems. J Med Syst. doi:10.1007/s10916-015-0265-8 Mir O, Van der Weide T, Lee CC (2015) A secure user anonymity and authentication scheme using AVISPA for telecare medical information systems. J Med Syst. doi:10.​1007/​s10916-015-0265-8
25.
Zurück zum Zitat Mir O, Nikooghadam M (2015) A secure biometrics based authentication with key agreement scheme in telemedicine networks for e-health services. Wirel Pers Commun. doi:10.1007/s11277-015-2538-4 Mir O, Nikooghadam M (2015) A secure biometrics based authentication with key agreement scheme in telemedicine networks for e-health services. Wirel Pers Commun. doi:10.​1007/​s11277-015-2538-4
26.
Zurück zum Zitat Das AK (2015) A secure and robust temporal credential-based three-factor user authentication scheme for wireless sensor networks. Peer-to-Peer Netw Appl. doi:10.1007/s12083-014-0324-9 Das AK (2015) A secure and robust temporal credential-based three-factor user authentication scheme for wireless sensor networks. Peer-to-Peer Netw Appl. doi:10.​1007/​s12083-014-0324-9
27.
Zurück zum Zitat Arshad H, Nikooghadam M (2014) An efficient and secure authentication and key agreement scheme for session initiation protocol using ECC. Multimedia Tools Appl. doi:10.1007/s11042-014-2282-x Arshad H, Nikooghadam M (2014) An efficient and secure authentication and key agreement scheme for session initiation protocol using ECC. Multimedia Tools Appl. doi:10.​1007/​s11042-014-2282-x
28.
Zurück zum Zitat Sarkar P (2010) A simple and generic construction of authenticated encryption with associated data. ACM Trans Inf Syst Secur 13(4):33CrossRef Sarkar P (2010) A simple and generic construction of authenticated encryption with associated data. ACM Trans Inf Syst Secur 13(4):33CrossRef
29.
Zurück zum Zitat Wu S, Chen K (2012) An efficient key-management scheme for hierarchical access control in e-medicine system. J Med Syst 36(4):2325–2337CrossRef Wu S, Chen K (2012) An efficient key-management scheme for hierarchical access control in e-medicine system. J Med Syst 36(4):2325–2337CrossRef
30.
Zurück zum Zitat Burrows M, Abadi M, Needham R (1990) A logic of authentication. ACM Trans Comput Syst 8:18–36CrossRefMATH Burrows M, Abadi M, Needham R (1990) A logic of authentication. ACM Trans Comput Syst 8:18–36CrossRefMATH
31.
Zurück zum Zitat Kumar P, Lee HJ (2011) Cryptanalysis on two user authentication protocols using smart card or wireless sensor networks. In Proceedings of the IEEE Wireless Advanced (WiAd), London, UK, 20–22 June pp. 241–245 Kumar P, Lee HJ (2011) Cryptanalysis on two user authentication protocols using smart card or wireless sensor networks. In Proceedings of the IEEE Wireless Advanced (WiAd), London, UK, 20–22 June pp. 241–245
32.
Zurück zum Zitat Li CT, Weng CY, Lee CC (2013) An advanced temporal credential-based security scheme with mutual authentication and key agreement for wireless sensor networks. Sensors 13(8):9589–9603CrossRef Li CT, Weng CY, Lee CC (2013) An advanced temporal credential-based security scheme with mutual authentication and key agreement for wireless sensor networks. Sensors 13(8):9589–9603CrossRef
33.
Zurück zum Zitat Li CT, Lee CC, Weng CY, Fan CI (2013) An extended multi-server-based user authentication and key agreement scheme with user anonymity. KSII Trans Internet Inf Syst 7:119–131CrossRef Li CT, Lee CC, Weng CY, Fan CI (2013) An extended multi-server-based user authentication and key agreement scheme with user anonymity. KSII Trans Internet Inf Syst 7:119–131CrossRef
34.
Zurück zum Zitat Li CT (2013) A new password authentication and user anonymity scheme based on elliptic curve cryptography and smart card. IET Inf Secur 7:3–10CrossRefMathSciNet Li CT (2013) A new password authentication and user anonymity scheme based on elliptic curve cryptography and smart card. IET Inf Secur 7:3–10CrossRefMathSciNet
35.
Zurück zum Zitat Xue K, Ma C, Hong P, Ding R (2013) A temporal-credential based mutual authentication and key agreement scheme for wireless sensor networks. J Netw Comput Appl 36(1):316–323CrossRef Xue K, Ma C, Hong P, Ding R (2013) A temporal-credential based mutual authentication and key agreement scheme for wireless sensor networks. J Netw Comput Appl 36(1):316–323CrossRef
36.
Zurück zum Zitat He D, Gao Y, Chan S, Chen C, Bu J (2010) An enhanced two-factor user authentication scheme in wireless sensor networks. Ad Hoc Sens Wirel Netw 10:1–11 He D, Gao Y, Chan S, Chen C, Bu J (2010) An enhanced two-factor user authentication scheme in wireless sensor networks. Ad Hoc Sens Wirel Netw 10:1–11
37.
Zurück zum Zitat Li C, Hwang M, Chung Y (2008) A secure and efficient communication scheme with authenticated key establishment and privacy preserving for vehicular ad hoc networks. Comput Commun 31 Li C, Hwang M, Chung Y (2008) A secure and efficient communication scheme with authenticated key establishment and privacy preserving for vehicular ad hoc networks. Comput Commun 31
38.
Zurück zum Zitat He D, Kumar N, Chilamkurti N (2015) A secure temporal-credential-based mutual authentication and key agreement scheme with pseudo identity for wireless sensor networks. Inf Sci. doi:10.1016/j.ins.2015.02.010 He D, Kumar N, Chilamkurti N (2015) A secure temporal-credential-based mutual authentication and key agreement scheme with pseudo identity for wireless sensor networks. Inf Sci. doi:10.​1016/​j.​ins.​2015.​02.​010
39.
Zurück zum Zitat Schwartz M (1988) Telecommunication networks: protocols, modeling and analysis, Reading, Massachusetts. Addison-Wesley, Wokingham Schwartz M (1988) Telecommunication networks: protocols, modeling and analysis, Reading, Massachusetts. Addison-Wesley, Wokingham
Metadaten
Titel
Efficient anonymous authentication with key agreement protocol for wireless medical sensor networks
verfasst von
Omid Mir
Jorge Munilla
Saru Kumari
Publikationsdatum
15.09.2015
Verlag
Springer US
Erschienen in
Peer-to-Peer Networking and Applications / Ausgabe 1/2017
Print ISSN: 1936-6442
Elektronische ISSN: 1936-6450
DOI
https://doi.org/10.1007/s12083-015-0408-1

Weitere Artikel der Ausgabe 1/2017

Peer-to-Peer Networking and Applications 1/2017 Zur Ausgabe