We found a match
Your institution may have access to this item. Find your institution then sign in to continue.
- Title
A new authentication protocol for healthcare applications using wireless medical sensor networks with user anonymity.
- Authors
Li, Xiong; Niu, Jianwei; Kumari, Saru; Liao, Junguo; Liang, Wei; Khan, Muhammad Khurram
- Abstract
ABSTRACT With the development and maturation of the wireless communication technologies, the wireless sensor networks have been widely applied in different environments to acquire specific information. The wireless medical sensor networks (WMSNs), as a professional application of the wireless sensor networks in medicine, have attracted more and more attention because of its potential in improving the quality of healthcare services. Through the WMSNs, the parameters of patients' vital signs can be gathered from the sensor nodes equipped on the body of the patients and then can be accessed by the healthcare professionals by using a mobile device. By reason of the open feature of wireless communication, how to guarantee secure communication becomes an important issue. On the other hand, because the vital signs parameters are sensitive to the patients' health status and no one wants to reveal it to the others except the healthcare professionals, the protection of patients' privacy becomes another key issue for WMSNs applications. User authentication protocol with anonymity is the most basic and commonly used method to resolve the security and privacy issues of WMSNs. Recently, He et al. proposed an enhanced authentication protocol for healthcare applications using WMSNs to protect the security and privacy problems. However, we find that their scheme is incorrect in authentication and session key agreement phase. Besides, their scheme has no wrong password detection mechanism, which will not only waste the unnecessary computation and communication costs, but also may deduce the denial of service problem. In this paper, the biometric is introduced as the third authentication factor, and a new user anonymous authentication protocol based on WMSNs is designed so as to remove the drawbacks of the protocol of He et al. Compared with previous protocols, the new presented protocol enhances the security and also keeps the computation efficiency. Copyright © 2015 John Wiley & Sons, Ltd.
- Subjects
COMPUTER access control; COMPUTER network protocols; HEALTH information exchanges; WIRELESS sensor networks; WIRELESS communications security
- Publication
Security & Communication Networks, 2016, Vol 9, Issue 15, p2643
- ISSN
1939-0114
- Publication type
Article
- DOI
10.1002/sec.1214