An Efficient Lightweight Provably Secure Authentication Protocol for Patient Monitoring Using Wireless Medical Sensor Networks

被引:9
|
作者
Thakur, Garima [1 ]
Prajapat, Sunil [1 ]
Kumar, Pankaj [1 ]
Das, Ashok Kumar [2 ]
Shetty, Sachin [3 ]
机构
[1] Cent Univ Himachal Pradesh, Srinivasa Ramanujan Dept Math, Dharamshala 176206, India
[2] Int Inst Informat & Technol, Ctr Secur Theory & Algorithm Res, Hyderabad 500032, India
[3] Old Dominion Univ, Virginia Modeling Anal & Simulat Ctr, Dept Comp Modeling & Simulat Engn, Suffolk, VA 23435 USA
关键词
Wireless communication; Sensors; Wireless medical sensor network; authentication; key agreement; security; ROR model; scyther tool; DEVICE ACCESS-CONTROL; CONTROL SCHEME; KEY EXCHANGE; INTERNET; SYSTEMS; DESIGN;
D O I
10.1109/ACCESS.2023.3325130
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The refurbishing of conventional medical network with the wireless medical sensor network has not only amplified the efficiency of the network but concurrently posed different security threats. Previously, Servati and Safkhani had suggested an Internet of Things (IoT) based authentication scheme for the healthcare environment promulgating a secure protocol in resistance to several attacks. However, the analysis demonstrates that the protocol could not withstand user, server, and gateway node impersonation attacks. Further, the protocol fails to resist offline password guessing, ephemeral secret leakage, and gateway-by-passing attacks. To address the security weaknesses, we furnish a lightweight three-factor authentication framework employing the fuzzy extractor technique to safeguard the user's biometric information. The Burrows-Abadi-Needham (BAN) logic, Real-or-Random (ROR) model, and Scyther simulation tool have been imposed as formal approaches for establishing the validity of the proposed work. The heuristic analysis stipulates that the proposed work is impenetrable to possible threats and offers several security peculiarities like forward secrecy and three-factor security. A thorough analysis of the preexisting works with the proposed ones corroborates the intensified security and efficiency with the reduced computational, communication, and security overheads.
引用
收藏
页码:114662 / 114679
页数:18
相关论文
共 50 条
  • [41] Efficient anonymous authentication with key agreement protocol for wireless medical sensor networks
    Omid Mir
    Jorge Munilla
    Saru Kumari
    Peer-to-Peer Networking and Applications, 2017, 10 : 79 - 91
  • [42] Efficient anonymous authentication with key agreement protocol for wireless medical sensor networks
    Mir, Omid
    Munilla, Jorge
    Kumari, Saru
    PEER-TO-PEER NETWORKING AND APPLICATIONS, 2017, 10 (01) : 79 - 91
  • [43] A secure and efficient user authentication protocol for wireless sensor network
    Kumar, Devender
    MULTIMEDIA TOOLS AND APPLICATIONS, 2021, 80 (18) : 27131 - 27154
  • [44] Efficient and Provably Secure Aggregation of Encrypted Data in Wireless Sensor Networks
    Castelluccia, Claude
    Chan, Aldar C-F
    Mykletun, Einar
    Tsudik, Gene
    ACM TRANSACTIONS ON SENSOR NETWORKS, 2009, 5 (03) : 1 - 36
  • [45] Secure Authentication Protocol for Wireless Sensor Networks in Vehicular Communications
    Yu, SungJin
    Lee, JoonYoung
    Lee, KyungKeun
    Park, KiSung
    Park, YoungHo
    SENSORS, 2018, 18 (10)
  • [46] Provable Secure Node Authentication Protocol for Wireless Sensor Networks
    Zhimeng, Liu
    Yanli, Zhao
    Proceedings - 13th Web Information Systems and Applications Conference, WISA 2016 - In conjunction with 1st Symposium on Big Data Processing and Analysis, BDPA 2016 and 1st Workshop on Information System Security, ISS 2016, 2017, : 221 - 224
  • [47] Provably Secure Three-Factor-Based Mutual Authentication Scheme with PUF for Wireless Medical Sensor Networks
    Kwon, DeokKyu
    Park, YoHan
    Park, YoungHo
    SENSORS, 2021, 21 (18)
  • [48] A LIGHTWEIGHT SECURE DATA AGGREGATION PROTOCOL FOR WIRELESS SENSOR NETWORKS
    Sun, Hung-Min
    Chen, Chiung-Hsun
    Li, Po-Chi
    INTERNATIONAL JOURNAL OF INNOVATIVE COMPUTING INFORMATION AND CONTROL, 2012, 8 (10A): : 6503 - 6514
  • [49] A Lightweight and Provably Secure Authentication Protocol for Internet of Vehicles Using Physical Unclonable Function
    Xia, Zhuoqun
    Su, Chao
    Xu, Zisang
    Long, Kejun
    Dianzi Yu Xinxi Xuebao/Journal of Electronics and Information Technology, 2024, 46 (09): : 3788 - 3796
  • [50] Secure and Lightweight Authentication Protocol Using PUF for the IoT-based Wireless Sensor Network
    Roy, Sourav
    Das, Dipnarayan
    Sen, Bibhash
    ACM JOURNAL ON EMERGING TECHNOLOGIES IN COMPUTING SYSTEMS, 2024, 20 (01)