A Secure Remote User Authentication Protocol for Healthcare Monitoring Using Wireless Medical Sensor Networks

A Secure Remote User Authentication Protocol for Healthcare Monitoring Using Wireless Medical Sensor Networks

Preeti Chandrakar
Copyright: © 2019 |Pages: 21
DOI: 10.4018/IJACI.2019010106
OnDemand:
(Individual Articles)
Available
$37.50
No Current Special Offers
TOTAL SAVINGS: $37.50

Abstract

The wireless medical sensor networks WMSN play a crucial role in healthcare monitoring remotely. In remote healthcare monitoring, the sensor nodes are deployed in patient's body for collecting physiological data and transmit these data over an insecure channel. The patient's health information is highly sensitive and important. Any malicious modification in physiological data will make wrong diagnoses and harm the patient health. Therefore, privacy, data security, and user authentication are extremely important for accessing patient's real-time heath information over an insecure channel. In this regard, this article proposes a secure and robust two-factor based remote user authentication protocol for healthcare monitoring. The authentication proof has done with the help of BAN logic, which ensures that the proposed scheme provides mutual authentication and session key agreement securely. The informal security verification proves that the developed protocol is secure from various security attacks. The simulation of the proposed scheme has been done using AVISPA tool, whose simulation results confirm that the proposed scheme is secure from active and passive attacks. Performance evaluation shows that the proposed protocol is efficient in terms of security features, computation cost, communication cost, and execution time.
Article Preview
Top

1. Introduction

Authentication Remote patient monitoring provides an efficient and convenient connection between patient at home and doctor at the clinic center. The doctor can get the status of the patient any place and any moment and the patient receives a proper treatment from the doctor over an insecure channel. If anyone acquires the patient’s information illegally then the privacy of patient will be disclosed. User authentication is one of the most important security mechanism to protect the real time data from the unauthorized users; it provides both session key agreement and mutual authentication securely between participant entities (Wu, Xu, Kumari, & Li, 2017; Ibrahim, Kumari, Das, Wazid, & Odelu, 2016; Chandrakar & Om, 2015; Chandrakar & Om, 2016; Chandrakar & Om, 2017; Chandrakar & Om, 2017; Ali & Pal, 2017; Ali & Pal, 2017). In recent time only very few number of remote user authentication schemes developed by researchers for healthcare monitoring (Ali & Pal, 2017; Kumar, Lee, & Lee, 2012; Khan & Kumari, 2014; Wu, Xu, Kumari, & Li, 2015; He et al., 2015; Wu et al., 2017; Lu, Li, Peng, & Yang, 2016).

Complete Article List

Search this Journal:
Reset
Volume 15: 1 Issue (2024)
Volume 14: 1 Issue (2023)
Volume 13: 6 Issues (2022): 1 Released, 5 Forthcoming
Volume 12: 4 Issues (2021)
Volume 11: 4 Issues (2020)
Volume 10: 4 Issues (2019)
Volume 9: 4 Issues (2018)
Volume 8: 4 Issues (2017)
Volume 7: 2 Issues (2016)
Volume 6: 2 Issues (2014)
Volume 5: 4 Issues (2013)
Volume 4: 4 Issues (2012)
Volume 3: 4 Issues (2011)
Volume 2: 4 Issues (2010)
Volume 1: 4 Issues (2009)
View Complete Journal Contents Listing