A Lightweight Three-Factor Anonymous Authentication Scheme With Privacy Protection for Personalized Healthcare Applications

A Lightweight Three-Factor Anonymous Authentication Scheme With Privacy Protection for Personalized Healthcare Applications

Mengxia Shuai, Nenghai Yu, Hongxia Wang, Ling Xiong, Yue Li
Copyright: © 2021 |Pages: 18
DOI: 10.4018/JOEUC.20210501.oa1
Article PDF Download
Open access articles are freely available for download

Abstract

Security and privacy issues in wireless medical sensor networks (WMSNs) have attracted lots of attention in both academia and industry due to the sensitiveness of medical system. In the past decade, extensive research has been carried out on these security issues, but no single study exists that addresses them adequately, especially for some important security properties, such as user anonymity and forward secrecy. As a step towards this direction, in this paper, the authors propose a lightweight three-factor anonymous authentication scheme with forward secrecy for personalized healthcare applications using only the lightweight cryptographic primitives. The proposed scheme adopts pseudonym identity technique to protect users' real identities and employs one-way hash chain technique to ensure forward secrecy. Analysis and comparison results demonstrate that the proposed scheme can not only reduce execution time by 34% as compared with the most effective related schemes, but also achieve more security and functional features.
Article Preview
Top

Introduction

The Internet of Things (IoT) is an emerging mode of modern wireless telecommunications, which allows objects to be sensed or controlled remotely over existing network infrastructure. By combining with cloud computing and fog computing (Qi, Zhang, Dou, & Ni, 2017; Gill, Chana, & Buyya, 2017; Qi, Yu, & Zhou, 2017; Gong, Qi, & Xu, 2018; Qi et al., 2018a), IoT devices can be used to build many service-based applications, such as smart devices (Cui, Zhang, Cai, Liu, & Li, 2018; Cheng, Xu, Tang, Sheng, & Cai, 2018), smart home (Liu, et al., 2018) and security-related applications (Wang, Li, Shi, Lian, & Ye, 2016; Qi, Zhou, Yu, & Liu, 2017; Ma, Luo, Li, Bao, & Zhang, 2018; Zhang, Qin, Zhang, Liu, & Luo, 2018; Qi et al., 2018b). IoT devices can also be used to enable remote health monitoring, which is a new field known as wireless medical sensor networks (WMSNs). WMSNs have attracted lots of attention in both academia and industry because of the potential in improving the quality of medical services (Walczak & Mann, 2010; Lee, Ghapanchi, Talaei-Khoei, & Ray, 2015). Through WMSNs, healthcare professionals are able to access the patients’ sensitive data collected from the medical sensor nodes which are placed on/in patients’ bodies, and provide remote medical treatment, emergency medical assistance or give some constructive advice on the patients’ further treatment.

Figure 1.

A typical structure of WMSNs

JOEUC.20210501.oa1.f01

A typical structure of WMSNs for personalized healthcare applications is demonstrated in Figure 1. Although WMSNs bring a lot of convenience to people’s life (Siddesh et al., 2017), security and privacy issues in WMSNs are becoming great challenges due to the sensitiveness of medical system (Ameen, Liu, & Kwak, 2012; Xu, Qi, Dou, & Yu, 2017). The medical data collected from the medical sensor nodes is sensitive, and the privacy of these data is protected legally. Due to the open feature of wireless communication, an adversary can intercept and alter the transmitted messages easily. Once obtaining these sensitive data, an adversary may acquaint the disease what the patient has and profit financially by selling sensitive data, it is a serious violation of the patient’s privacy. Further, the adversary can even misreport or distort the patient’s physiological data to cause physical harm, it may result in improper diagnosis and treatment. Therefore, it is very important to design an effective authentication scheme to guarantee secure communication and protect patients’ privacy in WMSNs.

Complete Article List

Search this Journal:
Reset
Volume 36: 1 Issue (2024)
Volume 35: 3 Issues (2023)
Volume 34: 10 Issues (2022)
Volume 33: 6 Issues (2021)
Volume 32: 4 Issues (2020)
Volume 31: 4 Issues (2019)
Volume 30: 4 Issues (2018)
Volume 29: 4 Issues (2017)
Volume 28: 4 Issues (2016)
Volume 27: 4 Issues (2015)
Volume 26: 4 Issues (2014)
Volume 25: 4 Issues (2013)
Volume 24: 4 Issues (2012)
Volume 23: 4 Issues (2011)
Volume 22: 4 Issues (2010)
Volume 21: 4 Issues (2009)
Volume 20: 4 Issues (2008)
Volume 19: 4 Issues (2007)
Volume 18: 4 Issues (2006)
Volume 17: 4 Issues (2005)
Volume 16: 4 Issues (2004)
Volume 15: 4 Issues (2003)
Volume 14: 4 Issues (2002)
Volume 13: 4 Issues (2001)
Volume 12: 4 Issues (2000)
Volume 11: 4 Issues (1999)
Volume 10: 4 Issues (1998)
Volume 9: 4 Issues (1997)
Volume 8: 4 Issues (1996)
Volume 7: 4 Issues (1995)
Volume 6: 4 Issues (1994)
Volume 5: 4 Issues (1993)
Volume 4: 4 Issues (1992)
Volume 3: 4 Issues (1991)
Volume 2: 4 Issues (1990)
Volume 1: 3 Issues (1989)
View Complete Journal Contents Listing