IDEAS home Printed from https://ideas.repec.org/a/spr/telsys/v67y2018i2d10.1007_s11235-017-0340-1.html
   My bibliography  Save this article

Secure and efficient anonymous authentication scheme for three-tier mobile healthcare systems with wearable sensors

Author

Listed:
  • Xiong Li

    (Hunan University of Science and Technology)

  • Maged Hamada Ibrahim

    (Helwan University)

  • Saru Kumari

    (Ch. Charan Singh University)

  • Rahul Kumar

    (S.S.V. (P.G.) College)

Abstract

The mobility and openness of wireless communication technologies make Mobile Healthcare Systems (mHealth) potentially exposed to a number of potential attacks, which significantly undermines their utility and impedes their widespread deployment. Attackers and criminals, even without knowing the context of the transmitted data, with simple eavesdropping on the wireless links, may benefit a lot from linking activities to the identities of patient’s sensors and medical staff members. These vulnerabilities apply to all tiers of the mHealth system. A new anonymous mutual authentication scheme for three-tier mobile healthcare systems with wearable sensors is proposed in this paper. Our scheme consists of three protocols: Protocol-1 allows the anonymous authentication nodes (mobile users and controller nodes) and the HSP medical server in the third tier, while Protocol-2 realizes the anonymous authentication between mobile users and controller nodes in the second tier, and Protocol-3 achieves the anonymous authentication between controller nodes and the wearable body sensors in the first tier. In the design of our protocols, the variation in the resource constraints of the different nodes in the mHealth system are taken into consideration so that our protocols make a better trade-off among security, efficiency and practicality. The security of our protocols are analyzed through rigorous formal proofs using BAN logic tool and informal discussions of security features, possible attacks and countermeasures. Besides, the efficiency of our protocols are concretely evaluated and compared with related schemes. The comparisons show that our scheme outperforms the previous schemes and provides more complete and integrated anonymous authentication services. Finally, the security of our protocols are evaluated by using the Automated Validation of Internet Security Protocols and Applications and the SPAN animator software. The simulation results show that our scheme is secure and satisfy all the specified privacy and authentication goals.

Suggested Citation

  • Xiong Li & Maged Hamada Ibrahim & Saru Kumari & Rahul Kumar, 2018. "Secure and efficient anonymous authentication scheme for three-tier mobile healthcare systems with wearable sensors," Telecommunication Systems: Modelling, Analysis, Design and Management, Springer, vol. 67(2), pages 323-348, February.
  • Handle: RePEc:spr:telsys:v:67:y:2018:i:2:d:10.1007_s11235-017-0340-1
    DOI: 10.1007/s11235-017-0340-1
    as

    Download full text from publisher

    File URL: http://link.springer.com/10.1007/s11235-017-0340-1
    File Function: Abstract
    Download Restriction: Access to the full text of the articles in this series is restricted.

    File URL: https://libkey.io/10.1007/s11235-017-0340-1?utm_source=ideas
    LibKey link: if access is restricted and if your library uses this service, LibKey will redirect you to where you can use your library subscription to access this item
    ---><---

    As the access to this document is restricted, you may want to search for a different version of it.

    Citations

    Citations are extracted by the CitEc Project, subscribe to its RSS feed for this item.
    as


    Cited by:

    1. Nur Nabila Mohamed & Yusnani Mohd Yussoff & Mohd Anuar Mat Isa & Habibah Hashim, 2019. "Extending hybrid approach to secure Trivial File Transfer Protocol in M2M communication: a comparative analysis," Telecommunication Systems: Modelling, Analysis, Design and Management, Springer, vol. 70(4), pages 511-523, April.

    Corrections

    All material on this site has been provided by the respective publishers and authors. You can help correct errors and omissions. When requesting a correction, please mention this item's handle: RePEc:spr:telsys:v:67:y:2018:i:2:d:10.1007_s11235-017-0340-1. See general information about how to correct material in RePEc.

    If you have authored this item and are not yet registered with RePEc, we encourage you to do it here. This allows to link your profile to this item. It also allows you to accept potential citations to this item that we are uncertain about.

    We have no bibliographic references for this item. You can help adding them by using this form .

    If you know of missing items citing this one, you can help us creating those links by adding the relevant references in the same way as above, for each refering item. If you are a registered author of this item, you may also want to check the "citations" tab in your RePEc Author Service profile, as there may be some citations waiting for confirmation.

    For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: Sonal Shukla or Springer Nature Abstracting and Indexing (email available below). General contact details of provider: http://www.springer.com .

    Please note that corrections may take a couple of weeks to filter through the various RePEc services.

    IDEAS is a RePEc service. RePEc uses bibliographic data supplied by the respective publishers.