Skip to main content

A Secure Bio-Hash–Based Multiparty Mutual Authentication Protocol for Remote Health Monitoring Applications

  • Chapter
  • First Online:
Advances in Cybersecurity Management

Abstract

Remote health monitoring can benefit a large number of stake holders in healthcare industry, and it has the potential to make healthcare facilities available to a large number of masses at a reduced cost. Wireless Body Area networks (WBAN) comprising of sensors, capable of capturing and transferring physiological parameters of patients, provide an efficient and cost-effective solution for remote health monitoring. Data security is one among the major concerns preventing the widespread adoption of this technology by patients and healthcare sector. This chapter on remote health monitoring, presents a biometric-based authentication protocol. The work also proposes a multiparty mutual authentication protocol for authenticating the entities, such as users, sensors, personal devices, and medical gateway, participating in a WBAN. In the proposed protocol, a verifier table is not required to store the password of users. Formal security analysis and verification of the discussed protocols are performed using Scyther tool, and the results reveal that the protocols are resistant to privileged-administrator resilience attack, man-in-the-middle attack, replay attack, and impersonation attack.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

eBook
USD 16.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 69.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 99.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Are you Ready? What you Need to Know About Ageing. Word Health Organization. Retrieved October 28, 2020, from https://www.who.int/world-health-day/2012/toolkit/background/en/

  2. Disability and Health. Word Health Organization. Retrieved October 28, 2020, from https://www.who.int/news-room/fact-sheets/detail/disability-and-health

  3. Senior Citizens—Status in India. Vikapedia. Retrieved October 28, 2020, from https://vikaspedia.in/social-welfare/senior-citizens-welfare/senior-citizens-status-in-india

  4. Anderson, G., Knickman, J. R., & Aff Health. (2001, November–December). Changing the chronic care system to meet people’s needs. 20(6), 146–160. Retrieved from https://pubmed.ncbi.nlm.nih.gov/11816653/

  5. Weighing the Pros and Cons of Nursing Homes. Retrieved October 28, 2020, from https://www.ameriglide.com/advantages-disadvantages-nursing-homes.htm

  6. Ullah, S., Higgins, H., Braem, B., Latre, B., Blondia, C., Moerman, I., Saleem, S., Rahman, Z., & Kwak, K. S. (2012). A comprehensive survey of wireless body area networks. Journal of Medical Systems, 36, 1065–1094.

    Article  Google Scholar 

  7. Wan, J., Zou, C., Ullah, S., Lai, C. F., Zhou, M., & Wang, X. (2013). Cloud-enabled wireless body area networks for pervasive healthcare. IEEE Network, 27, 56–61.

    Article  Google Scholar 

  8. Jacob, N. A., Pillai, V., Nair, S., Harrell, D. T., Delhommer, R., Chen, B., Sanchez, I., Almstrum, V., & Gopalan, S. (2011). Low-cost remote patient monitoring system based on reduced platform computer technology. Telemedicine and e-Health Journal, 17, 536–545.

    Article  Google Scholar 

  9. Ahnn, J. H., & Potkonjak, M. (2013). mHealthMon: Toward energy-efficient and distributed mobile health monitoring using parallel offloading. Journal of Medical Systems, 37, 1–11.

    Article  Google Scholar 

  10. Fortino, G., di Fatta, D., Pathan, M., & Vasilakos, A. (2014). Cloud-assisted body area networks: State-of-the-art and future challenges. Wireless Networks, 20, 1925–1938.

    Article  Google Scholar 

  11. Latré, B., Braem, B., Moerman, I., Blondia, C., & Demester, P. (2011). A survey on wireless body area networks. Wireless Networks, 17, 1–18.

    Article  Google Scholar 

  12. Camara, C., Peris-Lopez, P., & Tapiador, J. E. (2015). Security and privacy issues in implantable medical devices. Journal of Biomedical Informatics, 55, 272–289.

    Article  Google Scholar 

  13. Mohd, B. J., Hayajneh, T., & Vasilakos, A. V. (2015). A survey on lightweight block ciphers for low-resource devices: Comparative study and open issues. Journal of Network and Computer Applications, 58, 73–93.

    Article  Google Scholar 

  14. Postema, T., Peeters, J., & Friele, R. (2012). Key factors influencing the implementation success of a home telecare application. International Journal of Medical Informatics, 81, 415–423.

    Article  Google Scholar 

  15. Yeh, H. L., Chen, T. H., Liu, P. C., Kim, T. H., & Wei, H. W. (2011). A secured authentication Protocol for wireless sensor networks using elliptic curves cryptography. Sensors, 11(5), 4767–4779.

    Article  Google Scholar 

  16. Han, W. (2011). Weaknesses of a secured authentication protocol for wireless sensor networks using elliptic curves cryptography. Retrieved from http://eprint.iacr.org/2011/293

  17. Shi, W., & Gong, P. (2013). A new user authentication protocol for wireless sensor networks using elliptic curves cryptography. International Journal of Distributed Sensor Networks, 730831, 1–7. https://doi.org/10.1155/2013/3730831.

    Article  Google Scholar 

  18. He, D., Kumar, N., Chen, J., Lee, C.-C., Chilamkurti, N., & Yeo, S.-S. (2015). Robust anonymous authentication protocol for health-care application using wireless medical sensor networks. Multimedia Systems, 21(1), 49–10.

    Article  Google Scholar 

  19. Kumar, P., Lee, S. G., & Lee, H. J. (2012). E-SAP: Efficient-strong authentication protocol for healthcare applications using wireless medical sensor networks. Sensors, 12(2), 1625–1647.

    Article  Google Scholar 

  20. Li, X., Niu, J., Kumari, S., Liao, J., Liang, W., & Khan, M. K. (2015). A new authentication protocol for healthcare applications using wireless medical sensor networks with user anonymity. Security and Communication Networks. https://doi.org/10.1002/sec.1214.

  21. Das, A. K., Sutrala, A. K., Odelu, V., & Goswami, A. (2017). A secure smartcard-based anonymous user authentication scheme for healthcare applications using wireless medical sensor networks. Wireless Personal Communications, 94, 1899.

    Article  Google Scholar 

  22. Jung, J., Moon, J., Lee, D., & Won, D. Efficient and security enhanced anonymous authentication with key agreement scheme in wireless sensor networks. Sensors, 17, 644. [CrossRef] [PubMed].

    Google Scholar 

  23. Yu, S., Lee, J. Y., Lee, K. K., Park, K. S., & Park, Y. H. (2018). Secure authentication protocol for wireless sensor networks in vehicular communications. Sensors, 18(10), 3191. [CrossRef][PubMed].

    Article  Google Scholar 

  24. Shin, S., & Kwoon, T. (2019, September). A lightweight three-factor authentication and key agreement scheme in wireless sensor networks for smart homes. Sensors, 19(9), 2012. [CrossRef][PubMed].

    Google Scholar 

  25. Cremers, C. (2008). The Scyther tool: Verification, falsification, analysis of security protocols? In Proceedings of the 20 th International Conference on Computer Aided Verification (CAV 2008). Department of Computer Science, ETH Zurich, Switzerland, Princeton, USA.

    Google Scholar 

  26. Dolev, D., & Yao, A. C. (1983). On the security of public key protocols. IEEE Transactions on Information Theory, 29(12), 198–208.

    Article  MathSciNet  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Sumitra Binu .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2021 The Author(s), under exclusive license to Springer Nature Switzerland AG

About this chapter

Check for updates. Verify currency and authenticity via CrossMark

Cite this chapter

Binu, S. (2021). A Secure Bio-Hash–Based Multiparty Mutual Authentication Protocol for Remote Health Monitoring Applications. In: Daimi, K., Peoples, C. (eds) Advances in Cybersecurity Management. Springer, Cham. https://doi.org/10.1007/978-3-030-71381-2_2

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-71381-2_2

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-71380-5

  • Online ISBN: 978-3-030-71381-2

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics