Abstract
The advancement of Internet of Things (IoT) technology has made medical equipment smaller and smarter, while computing environment has shifted from server-client wire/wireless communication networks toward diverse portable laptops, smartphones, tablet PCs, and PDAs. The communication between smaller IoT devices has added to the accuracy and convenience of distance healthcare services. However, security issues in communication sessions resulting from the leakage of personal medical information, infringements of privacy and improper management of medical information are looming large. Since personal medical information is transmitted between wire/wireless devices, the threats to secure distance medical service could be detrimental to further advancement of IoT in healthcare. Hence, this paper proposed a method of addressing the vulnerabilities to a range of attacks in the communication between medical devices. The proposed IoT-based communication protocol used random numbers and session keys to transmit hashed and encrypted data, and underwent a formal verification, where the transmitted data remained intact against data extraction and other attacks.
Similar content being viewed by others
References
Ashraf, Q.M., Habaebi, M.H.: Autonomic schemes for threat mitigation in Internet of Things. J. Netw. Comput. Appl. 49, 112–127 (2015)
Aljawarneh, S., Yassein, M.B.: A resource-efficient encryption algorithm for multimedia big data. Multimed. Tools Appl., pp. 1–22 (2017)
Rehiman, K.R., Veni, S.: A secure authentication infrastructure for IoT Enabled smart mobile devices: an initial prototype. Indian J. Sci. Technol. 9(9) (2016)
Mahmoud, R., et al.: Internet of things (IoT) security: current status, challenges and prospective measures. Internet Technology and Secured Transactions (ICITST). In: 10th International Conference for IEEE, pp. 336–341 (2015)
Kang, A.N., Barolli, L., Park, J.H., Jeong, Y.S.: A strengthening plan for enterprise information security based on cloud computing. Clust. Comput. 17(3), 703–710 (2014)
Bae, W.S.: Function-based connection protocol development and verification for secure communication in vehicle environment. Clust. Comput. 18(2), 761–769 (2015)
Sicari, S.: Security, privacy and trust in Internet of Things: the road ahead. Comput. Netw. 76, 146–164 (2015)
Bamasag, O.O., Youcef-Toumi, K.: Towards continuous authentication in internet of things based on secret sharing scheme. In: Proceedings of the WESS’15: Workshop on Embedded Systems Security, ACM (2015)
Park, R.C., Jung, H., Shin, D.K., Kim, G.J., Yoon, Kun-Ho: M2M-based smart health service for human UI/UX using motion recognition. Clust. Comput. 18(1), 221–232 (2015)
Lowe, G.: Casper: a compiler for the analysis of security protocols. User Manual and Tutorial. Version 1.12 (2009)
Formal Systems (Europe) Ltd and Oxford University Computing Laboratory: failures-divergence renement—FDR2 User Manual (2010)
Gao, Y., Liu, W.: BeTrust: a dynamic trust model based on bayesian inference and tsallis entropy for medical sensor networks. J. Sens. 2014, 1–10 (2014)
Kritika, E., et al.: Multivariate authentication and encryption scheme for data privacy in IoT healthcare monitoring. Imp. J. Interdiscip. Res. 2(8), 543–550 (2016)
Han, K.H., Bae, W.S.: Proposing and verifying a security-enhanced protocol for IoT-based communication for medical devices. Clust. Comput. 19(4), 2335–2341 (2016)
Jung, E.Y., Kim, J., Chung, K.Y., Dong, K.P.: Mobile healthcare application with EMR interoperability for diabetes patients. Clust. Comput. 17(3), 871–880 (2014)
Park, R.C., Jung, H., Shin, D.K., Kim, G.J., Yoon, Kun-Ho: M2M-based smart health service for human UI/UX using motion recognition. Clust. Comput. 18(1), 221–232 (2015)
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Bae, WS. Verifying a secure authentication protocol for IoT medical devices. Cluster Comput 22 (Suppl 1), 1985–1990 (2019). https://doi.org/10.1007/s10586-017-1107-x
Received:
Revised:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s10586-017-1107-x