Abstract
Remote health monitoring can benefit a large number of stake holders in healthcare industry, and it has the potential to make healthcare facilities available to a large number of masses at a reduced cost. Wireless Body Area networks (WBAN) comprising of sensors, capable of capturing and transferring physiological parameters of patients, provide an efficient and cost-effective solution for remote health monitoring. Data security is one among the major concerns preventing the widespread adoption of this technology by patients and healthcare sector. This chapter on remote health monitoring, presents a biometric-based authentication protocol. The work also proposes a multiparty mutual authentication protocol for authenticating the entities, such as users, sensors, personal devices, and medical gateway, participating in a WBAN. In the proposed protocol, a verifier table is not required to store the password of users. Formal security analysis and verification of the discussed protocols are performed using Scyther tool, and the results reveal that the protocols are resistant to privileged-administrator resilience attack, man-in-the-middle attack, replay attack, and impersonation attack.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Are you Ready? What you Need to Know About Ageing. Word Health Organization. Retrieved October 28, 2020, from https://www.who.int/world-health-day/2012/toolkit/background/en/
Disability and Health. Word Health Organization. Retrieved October 28, 2020, from https://www.who.int/news-room/fact-sheets/detail/disability-and-health
Senior Citizens—Status in India. Vikapedia. Retrieved October 28, 2020, from https://vikaspedia.in/social-welfare/senior-citizens-welfare/senior-citizens-status-in-india
Anderson, G., Knickman, J. R., & Aff Health. (2001, November–December). Changing the chronic care system to meet people’s needs. 20(6), 146–160. Retrieved from https://pubmed.ncbi.nlm.nih.gov/11816653/
Weighing the Pros and Cons of Nursing Homes. Retrieved October 28, 2020, from https://www.ameriglide.com/advantages-disadvantages-nursing-homes.htm
Ullah, S., Higgins, H., Braem, B., Latre, B., Blondia, C., Moerman, I., Saleem, S., Rahman, Z., & Kwak, K. S. (2012). A comprehensive survey of wireless body area networks. Journal of Medical Systems, 36, 1065–1094.
Wan, J., Zou, C., Ullah, S., Lai, C. F., Zhou, M., & Wang, X. (2013). Cloud-enabled wireless body area networks for pervasive healthcare. IEEE Network, 27, 56–61.
Jacob, N. A., Pillai, V., Nair, S., Harrell, D. T., Delhommer, R., Chen, B., Sanchez, I., Almstrum, V., & Gopalan, S. (2011). Low-cost remote patient monitoring system based on reduced platform computer technology. Telemedicine and e-Health Journal, 17, 536–545.
Ahnn, J. H., & Potkonjak, M. (2013). mHealthMon: Toward energy-efficient and distributed mobile health monitoring using parallel offloading. Journal of Medical Systems, 37, 1–11.
Fortino, G., di Fatta, D., Pathan, M., & Vasilakos, A. (2014). Cloud-assisted body area networks: State-of-the-art and future challenges. Wireless Networks, 20, 1925–1938.
Latré, B., Braem, B., Moerman, I., Blondia, C., & Demester, P. (2011). A survey on wireless body area networks. Wireless Networks, 17, 1–18.
Camara, C., Peris-Lopez, P., & Tapiador, J. E. (2015). Security and privacy issues in implantable medical devices. Journal of Biomedical Informatics, 55, 272–289.
Mohd, B. J., Hayajneh, T., & Vasilakos, A. V. (2015). A survey on lightweight block ciphers for low-resource devices: Comparative study and open issues. Journal of Network and Computer Applications, 58, 73–93.
Postema, T., Peeters, J., & Friele, R. (2012). Key factors influencing the implementation success of a home telecare application. International Journal of Medical Informatics, 81, 415–423.
Yeh, H. L., Chen, T. H., Liu, P. C., Kim, T. H., & Wei, H. W. (2011). A secured authentication Protocol for wireless sensor networks using elliptic curves cryptography. Sensors, 11(5), 4767–4779.
Han, W. (2011). Weaknesses of a secured authentication protocol for wireless sensor networks using elliptic curves cryptography. Retrieved from http://eprint.iacr.org/2011/293
Shi, W., & Gong, P. (2013). A new user authentication protocol for wireless sensor networks using elliptic curves cryptography. International Journal of Distributed Sensor Networks, 730831, 1–7. https://doi.org/10.1155/2013/3730831.
He, D., Kumar, N., Chen, J., Lee, C.-C., Chilamkurti, N., & Yeo, S.-S. (2015). Robust anonymous authentication protocol for health-care application using wireless medical sensor networks. Multimedia Systems, 21(1), 49–10.
Kumar, P., Lee, S. G., & Lee, H. J. (2012). E-SAP: Efficient-strong authentication protocol for healthcare applications using wireless medical sensor networks. Sensors, 12(2), 1625–1647.
Li, X., Niu, J., Kumari, S., Liao, J., Liang, W., & Khan, M. K. (2015). A new authentication protocol for healthcare applications using wireless medical sensor networks with user anonymity. Security and Communication Networks. https://doi.org/10.1002/sec.1214.
Das, A. K., Sutrala, A. K., Odelu, V., & Goswami, A. (2017). A secure smartcard-based anonymous user authentication scheme for healthcare applications using wireless medical sensor networks. Wireless Personal Communications, 94, 1899.
Jung, J., Moon, J., Lee, D., & Won, D. Efficient and security enhanced anonymous authentication with key agreement scheme in wireless sensor networks. Sensors, 17, 644. [CrossRef] [PubMed].
Yu, S., Lee, J. Y., Lee, K. K., Park, K. S., & Park, Y. H. (2018). Secure authentication protocol for wireless sensor networks in vehicular communications. Sensors, 18(10), 3191. [CrossRef][PubMed].
Shin, S., & Kwoon, T. (2019, September). A lightweight three-factor authentication and key agreement scheme in wireless sensor networks for smart homes. Sensors, 19(9), 2012. [CrossRef][PubMed].
Cremers, C. (2008). The Scyther tool: Verification, falsification, analysis of security protocols? In Proceedings of the 20 th International Conference on Computer Aided Verification (CAV 2008). Department of Computer Science, ETH Zurich, Switzerland, Princeton, USA.
Dolev, D., & Yao, A. C. (1983). On the security of public key protocols. IEEE Transactions on Information Theory, 29(12), 198–208.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2021 The Author(s), under exclusive license to Springer Nature Switzerland AG
About this chapter
Cite this chapter
Binu, S. (2021). A Secure Bio-Hash–Based Multiparty Mutual Authentication Protocol for Remote Health Monitoring Applications. In: Daimi, K., Peoples, C. (eds) Advances in Cybersecurity Management. Springer, Cham. https://doi.org/10.1007/978-3-030-71381-2_2
Download citation
DOI: https://doi.org/10.1007/978-3-030-71381-2_2
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-71380-5
Online ISBN: 978-3-030-71381-2
eBook Packages: Computer ScienceComputer Science (R0)