A Lightweight Mutual Authentication with Wearable Device in Location-Based Mobile Edge Computing

@article{Chen2020ALM,
  title={A Lightweight Mutual Authentication with Wearable Device in Location-Based Mobile Edge Computing},
  author={Chin-ling Chen and M. L. Chiang and Hui-Ching Hsieh and Ching-Cheng Liu and Yong-Yuan Deng},
  journal={Wireless Personal Communications},
  year={2020},
  volume={113},
  pages={575-598}
}
In recent years, the proportion of elderly population in various countries has gradually increased. Increasing with age, it can entail illness. When these diseases are sudden, the elderly often die because there is no immediate treatment. Elderly care has become an important issue. According to this issue, we want to monitor the physiological data of the elderly, such as heartbeat, blood pressure, etc., through wearable devices. Once an abnormal condition is detected, the wearable device can be… Expand
On the Security of "Secure and Lightweight Authentication with Key Agreement for Smart Wearable Systems"
The advent of smart and pervasive devices have paved the way for the development of Internet of Things in which, various smart devices collect information about the daily life of people and share itExpand
A Robust Anonymous Remote User Authentication Protocol for IoT Services
TLDR
The proposed protocol fulfils mutual authentication using BAN logic, as a broadly accepted formal method in security analysis, and its security, communication overhead, and time complexity have been compared with similar protocols that show its efficiency for IoT applications. Expand
Survey on Multi-Access Edge Computing Security and Privacy
TLDR
A thorough investigation of the identification and the analysis of threat vectors in the ETSI standardized MEC architecture is introduced and the vulnerabilities leading to the identified threat vectors are analyzed and potential security solutions to overcome these vulnerabilities are proposed. Expand

References

SHOWING 1-10 OF 26 REFERENCES
A lightweight multi-layer authentication protocol for wireless body area networks
TLDR
A one-to-many group authentication protocol and a group key establishment algorithm between personal digital assistance (PDA) and each of sensor nodes with energy efficiency and low computational cost and the validation of the proposed protocol can be proved. Expand
Internet of Things (IoT) Based Design of a Secure and Lightweight Body Area Network (BAN) Healthcare System
TLDR
The proposed authentication mechanism is applied to a medical reader to provide a more comprehensive architecture while also providing mutual authentication, and guaranteeing data integrity, user untraceability, and forward and backward secrecy, in addition to being resistant to replay attack. Expand
An Intelligent and Secure Health Monitoring Scheme Using IoT Sensor Based on Cloud Computing
TLDR
An intelligent and secure health monitoring scheme using IoT sensor based on cloud computing and cryptography is proposed that achieves authentication and provides essential security requirements. Expand
An Efficient Anonymous Authentication Scheme for Wireless Body Area Networks Using Elliptic Curve Cryptosystem
  • Zhenguo Zhao
  • Computer Science, Medicine
  • Journal of Medical Systems
  • 2014
TLDR
An identity (ID)-based efficient anonymous authentication scheme for WBANs using elliptic curve cryptosystem (ECC) is proposed, which provides mutual authentication between the client and the application provider but also provides client anonymity. Expand
A lightweight biometrics based remote user authentication scheme for IoT services
TLDR
A lightweight biometric based remote user authentication and key agreement scheme for secure access to IoT services has been proposed, which makes use of lightweight hash operations and XOR operation. Expand
Anonymous mutual authentication and key agreement scheme for wearable sensors in wireless body area networks
TLDR
A lightweight anonymous mutual authentication and key agreement scheme for centralized two-hop WBANs is proposed, which allows sensor nodes attached to the patient’s body to authenticate with the local server/hub node and establish a session key in an anonymous and unlinkable manner. Expand
End-to-end security scheme for mobility enabled healthcare Internet of Things
TLDR
The proposed scheme consists of a secure and efficient end-user authentication and authorization architecture based on the certificate based DTLS handshake, secure end-to-end communication based on session resumption, and robust mobility based on interconnected smart gateways. Expand
Mobile Edge Computing, Fog et al.: A Survey and Analysis of Security Threats and Challenges
TLDR
The main goal of this study is to holistically analyze the security threats, challenges, and mechanisms inherent in all edge paradigms, while highlighting potential synergies and venues of collaboration. Expand
Wearable medical devices for tele-home healthcare
  • K. Hung, Y.T. Zhang, B. Tai
  • Medicine, Computer Science
  • The 26th Annual International Conference of the IEEE Engineering in Medicine and Biology Society
  • 2004
TLDR
A cuffless BP meter has been developed and tested on 30 subjects in a total of 71 trials over a period of five months, and preliminary results show a mean error and standard deviation of error are high. Expand
Design and analysis of a secure and effective emergency system for mountaineering events
TLDR
A cloud-computing-based architecture to respond rapidly to an SOS emergency event requiring first aid, which constructs an aid platform based on cloud computing and, on the basis of the features of mobile devices, the injured party/patient can quickly send an SOS and summon aid. Expand
...
1
2
3
...