Skip to main content

A Secured Biometric-Based Authentication Scheme in IoT-Based Patient Monitoring System

  • Conference paper
  • First Online:
Emerging Technology in Modelling and Graphics

Part of the book series: Advances in Intelligent Systems and Computing ((AISC,volume 937))

Abstract

In this research work, the biometric-based authentication scheme for IoT-based patient monitoring system has been studied. IoT-based patient monitoring system helps the patients to enjoy the healthcare-related services sitting at remote location in their homes. Patient’s privacy, safety, and security in this case are very much essential. Authentication technique in this regard is the unique selling point for establishing the safe and secure communication between the patient and the medical server. Jiang et al. have proposed and analyzed a biometric-based authentication scheme in 2017. It was seen that Jiang et al.’s scheme fails to protect the communication system against some of the vulnerable attacks like denial-of-service attack, replay attack, man-in-the-middle attack, offline password guessing attack, smart card stolen attack, forward secrecy attack, user anonymity attack, mutual authentication attack, etc. In order to prevent these security attacks, an enhanced biometric-based authentication scheme using biometric hash function and time stamping in the proposed cryptographic algorithm has been proposed. An informal security analysis of the proposed scheme is also done here. The authentication proof using BAN (Burrows-Abadi-Needham) logic is also done in this paper. For hospitals, a close and prompt monitoring might be required for the critical patients who are admitted in respective critical care units. In order to monitor and diagnose the health of the ailing patients more effectively and efficiently, the smart health application using IoT-based infrastructure with biometric-based authentication system would be required. Considering the poor physiological condition of the patients, some wearable wireless sensor devices would be a better option. The system would monitor patient’s condition throughout the day and would send the different health-related parameters of the patients to the relevant doctors through sensors and human interfacing system like mobile app. The doctors sitting at the remote location would see and monitor every data of the patients through their app and can suggest relevant medicines to the patients immediately. The inherent nature of the system would reduce the lead time for the doctors to come and visit physically to the patients and diagnose. The whole architecture of IoT in this case would be requiring some biometric-based authentication scheme in order to maximize the security and safety features of the system. This also in turn will reduce any kind of vulnerabilities or risks in the system. As the patient monitoring system deals with the life and death of a patient and which is very critical and sensitive for the patient, hence a robust and secured system is very much required for this architecture to work. In this thesis, a secured and robust biometric-based authentication system for IoT-based patient monitoring system has been discussed. This scheme is suitable, secure, and effective for healthcare applications.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. L. Yanrong, L. Li, H. Peng, Y. Yang, An enhanced biometric based authentication scheme for telecare medical information systems using elliptic curve cryptosystem. J. Med. Syst. 39, 32 (2015)

    Article  Google Scholar 

  2. R. Amin, S.K.H. Islam, G.P. Biswas, Design and analysis of an enhanced patient-server mutual authentication protocol for telecare medical information system. J. Med. Syst. 39:137 (2015)

    Google Scholar 

  3. Q. Jiang, Z. Chen, B. Li, J. Shen, L. Yang, J. Ma, Security analysis and improvement of bio-hashing based three-factor authentication scheme for telecare medical information systems. J. Ambient. Intell. Hum. Compute (2017)

    Google Scholar 

  4. Q. Xie, Z. Tang, K. Chen, Cryptanalysis and improvement on anonymous three-factor authentication scheme for mobile networks. Comput. Electr. Eng. (2016)

    Google Scholar 

  5. A.K. Sutrala, A.K. Das, V. Odelu, M. Wazid, S. Kumari, Secure anonymity-preserving password-based user authentication and session key agreement scheme for telecare medical information systems

    Google Scholar 

  6. T. Limbasiya, N. Doshi, An analytical study of biometric based remote user authentication schemes using smart cards. Comput. Electr. Eng. 59, 305–321 (2017)

    Article  Google Scholar 

  7. H. Rallapalli, P. Bethelli, IoT based patient monitoring system. Int. J. Comput. Commun. Instrum. Engg (2017)

    Google Scholar 

  8. D. He, S. Zeadally, An analysis of RFID authentication schemes for internet of things in healthcare environment using elliptic curve cryptography. IEEE Internet Things J. (2015)

    Google Scholar 

  9. M. Saadeh, A. Sleit, M. Qatawneh, W. Almobaideen, Authentication techniques for the internet of things: a survey. cybersecurity and cyberfornsics conference (2016)

    Google Scholar 

  10. A. Ouaddah, H. Mousannif, A.A. Elkalam, A.A. Ouahman, Access control in the internet of things: big challenges and new opportunities. Comput. Netw. (2016)

    Google Scholar 

  11. J. Quian, H. Xu, A novel secure architecture for the internet of things. Int. Conf. Intell. Netw. Collab. Syst. (2016)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Sushanta Sengupta .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2020 Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Sengupta, S. (2020). A Secured Biometric-Based Authentication Scheme in IoT-Based Patient Monitoring System. In: Mandal, J., Bhattacharya, D. (eds) Emerging Technology in Modelling and Graphics. Advances in Intelligent Systems and Computing, vol 937. Springer, Singapore. https://doi.org/10.1007/978-981-13-7403-6_44

Download citation

  • DOI: https://doi.org/10.1007/978-981-13-7403-6_44

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-13-7402-9

  • Online ISBN: 978-981-13-7403-6

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics