An Efficient Lightweight Provably Secure Authentication Protocol for Patient Monitoring Using Wireless Medical Sensor Networks

被引:9
|
作者
Thakur, Garima [1 ]
Prajapat, Sunil [1 ]
Kumar, Pankaj [1 ]
Das, Ashok Kumar [2 ]
Shetty, Sachin [3 ]
机构
[1] Cent Univ Himachal Pradesh, Srinivasa Ramanujan Dept Math, Dharamshala 176206, India
[2] Int Inst Informat & Technol, Ctr Secur Theory & Algorithm Res, Hyderabad 500032, India
[3] Old Dominion Univ, Virginia Modeling Anal & Simulat Ctr, Dept Comp Modeling & Simulat Engn, Suffolk, VA 23435 USA
关键词
Wireless communication; Sensors; Wireless medical sensor network; authentication; key agreement; security; ROR model; scyther tool; DEVICE ACCESS-CONTROL; CONTROL SCHEME; KEY EXCHANGE; INTERNET; SYSTEMS; DESIGN;
D O I
10.1109/ACCESS.2023.3325130
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The refurbishing of conventional medical network with the wireless medical sensor network has not only amplified the efficiency of the network but concurrently posed different security threats. Previously, Servati and Safkhani had suggested an Internet of Things (IoT) based authentication scheme for the healthcare environment promulgating a secure protocol in resistance to several attacks. However, the analysis demonstrates that the protocol could not withstand user, server, and gateway node impersonation attacks. Further, the protocol fails to resist offline password guessing, ephemeral secret leakage, and gateway-by-passing attacks. To address the security weaknesses, we furnish a lightweight three-factor authentication framework employing the fuzzy extractor technique to safeguard the user's biometric information. The Burrows-Abadi-Needham (BAN) logic, Real-or-Random (ROR) model, and Scyther simulation tool have been imposed as formal approaches for establishing the validity of the proposed work. The heuristic analysis stipulates that the proposed work is impenetrable to possible threats and offers several security peculiarities like forward secrecy and three-factor security. A thorough analysis of the preexisting works with the proposed ones corroborates the intensified security and efficiency with the reduced computational, communication, and security overheads.
引用
收藏
页码:114662 / 114679
页数:18
相关论文
共 50 条
  • [31] Efficient and Secure Routing Protocol Based on Encryption and Authentication for Wireless Sensor Networks
    Zhou, Jiliang
    INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS, 2013,
  • [32] SAPWSN: A Secure Authentication Protocol for Wireless Sensor Networks
    Darbandeh, Foroozan Ghosairi
    Safkhani, Masoumeh
    COMPUTER NETWORKS, 2023, 220
  • [33] A Secure and Efficient Handover Authentication Protocol for Wireless Networks
    Wang, Weijia
    Hu, Lei
    SENSORS, 2014, 14 (07) : 11379 - 11394
  • [34] Provably secure user authentication and key agreement scheme for wireless sensor networks
    Das, Ashok Kumar
    Kumari, Saru
    Odelu, Vanga
    Li, Xiong
    Wu, Fan
    Huang, Xinyi
    SECURITY AND COMMUNICATION NETWORKS, 2016, 9 (16) : 3670 - 3687
  • [35] Blockchain and PUF-Based Lightweight Authentication Protocol for Wireless Medical Sensor Networks
    Wang, Weizheng
    Chen, Qiu
    Yin, Zhimeng
    Srivastava, Gautam
    Gadekallu, Thippa Reddy
    Alsolami, Fawaz
    Su, Chunhua
    IEEE INTERNET OF THINGS JOURNAL, 2022, 9 (11) : 8883 - 8891
  • [36] Secure and Efficient Broadcast Authentication in Wireless Sensor Networks
    Kwon, Taekyoung
    Hong, Jin
    IEEE TRANSACTIONS ON COMPUTERS, 2010, 59 (08) : 1120 - 1133
  • [37] PSAP-WSN: A Provably Secure Authentication Protocol for 5G-Based Wireless Sensor Networks
    Li, Xuanang
    Liu, Shuangshuang
    Kumari, Saru
    Chen, Chien -Ming
    CMES-COMPUTER MODELING IN ENGINEERING & SCIENCES, 2023, 135 (01): : 711 - 732
  • [38] Provably Secure and Efficient Authentication Protocol for Roaming Service in Global Mobility Networks
    Park, Kisung
    Park, Youngho
    Park, Yohan
    Reddy, Alavalapati Goutham
    Das, Ashok Kumar
    IEEE ACCESS, 2017, 5 : 25110 - 25125
  • [39] An efficient provably secure authentication and key agreement protocol for satellite communication networks
    Thakur, Garima
    Obaidat, Mohammad S.
    Sharma, Piyush
    Prajapat, Sunil
    Kumar, Pankaj
    SECURITY AND PRIVACY, 2024, 7 (05)
  • [40] A secure and efficient user authentication protocol for wireless sensor network
    Devender Kumar
    Multimedia Tools and Applications, 2021, 80 : 27131 - 27154