Skip to main content
Log in

Verifying a secure authentication protocol for IoT medical devices

  • Published:
Cluster Computing Aims and scope Submit manuscript

Abstract

The advancement of Internet of Things (IoT) technology has made medical equipment smaller and smarter, while computing environment has shifted from server-client wire/wireless communication networks toward diverse portable laptops, smartphones, tablet PCs, and PDAs. The communication between smaller IoT devices has added to the accuracy and convenience of distance healthcare services. However, security issues in communication sessions resulting from the leakage of personal medical information, infringements of privacy and improper management of medical information are looming large. Since personal medical information is transmitted between wire/wireless devices, the threats to secure distance medical service could be detrimental to further advancement of IoT in healthcare. Hence, this paper proposed a method of addressing the vulnerabilities to a range of attacks in the communication between medical devices. The proposed IoT-based communication protocol used random numbers and session keys to transmit hashed and encrypted data, and underwent a formal verification, where the transmitted data remained intact against data extraction and other attacks.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3

Similar content being viewed by others

References

  1. Ashraf, Q.M., Habaebi, M.H.: Autonomic schemes for threat mitigation in Internet of Things. J. Netw. Comput. Appl. 49, 112–127 (2015)

    Article  Google Scholar 

  2. Aljawarneh, S., Yassein, M.B.: A resource-efficient encryption algorithm for multimedia big data. Multimed. Tools Appl., pp. 1–22 (2017)

  3. Rehiman, K.R., Veni, S.: A secure authentication infrastructure for IoT Enabled smart mobile devices: an initial prototype. Indian J. Sci. Technol. 9(9) (2016)

  4. Mahmoud, R., et al.: Internet of things (IoT) security: current status, challenges and prospective measures. Internet Technology and Secured Transactions (ICITST). In: 10th International Conference for IEEE, pp. 336–341 (2015)

  5. Kang, A.N., Barolli, L., Park, J.H., Jeong, Y.S.: A strengthening plan for enterprise information security based on cloud computing. Clust. Comput. 17(3), 703–710 (2014)

    Article  Google Scholar 

  6. Bae, W.S.: Function-based connection protocol development and verification for secure communication in vehicle environment. Clust. Comput. 18(2), 761–769 (2015)

  7. Sicari, S.: Security, privacy and trust in Internet of Things: the road ahead. Comput. Netw. 76, 146–164 (2015)

    Article  Google Scholar 

  8. Bamasag, O.O., Youcef-Toumi, K.: Towards continuous authentication in internet of things based on secret sharing scheme. In: Proceedings of the WESS’15: Workshop on Embedded Systems Security, ACM (2015)

  9. Park, R.C., Jung, H., Shin, D.K., Kim, G.J., Yoon, Kun-Ho: M2M-based smart health service for human UI/UX using motion recognition. Clust. Comput. 18(1), 221–232 (2015)

  10. Lowe, G.: Casper: a compiler for the analysis of security protocols. User Manual and Tutorial. Version 1.12 (2009)

  11. Formal Systems (Europe) Ltd and Oxford University Computing Laboratory: failures-divergence renement—FDR2 User Manual (2010)

  12. Gao, Y., Liu, W.: BeTrust: a dynamic trust model based on bayesian inference and tsallis entropy for medical sensor networks. J. Sens. 2014, 1–10 (2014)

    Article  Google Scholar 

  13. Kritika, E., et al.: Multivariate authentication and encryption scheme for data privacy in IoT healthcare monitoring. Imp. J. Interdiscip. Res. 2(8), 543–550 (2016)

    Google Scholar 

  14. Han, K.H., Bae, W.S.: Proposing and verifying a security-enhanced protocol for IoT-based communication for medical devices. Clust. Comput. 19(4), 2335–2341 (2016)

    Article  Google Scholar 

  15. Jung, E.Y., Kim, J., Chung, K.Y., Dong, K.P.: Mobile healthcare application with EMR interoperability for diabetes patients. Clust. Comput. 17(3), 871–880 (2014)

    Article  Google Scholar 

  16. Park, R.C., Jung, H., Shin, D.K., Kim, G.J., Yoon, Kun-Ho: M2M-based smart health service for human UI/UX using motion recognition. Clust. Comput. 18(1), 221–232 (2015)

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Woo-Sik Bae.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Bae, WS. Verifying a secure authentication protocol for IoT medical devices. Cluster Comput 22 (Suppl 1), 1985–1990 (2019). https://doi.org/10.1007/s10586-017-1107-x

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s10586-017-1107-x

Keywords

Navigation