An Efficient Mutual Authentication and Access Control Scheme for Wireless Sensor Networks in Healthcare

@article{Hung2011AnEM,
  title={An Efficient Mutual Authentication and Access Control Scheme for Wireless Sensor Networks in Healthcare},
  author={Le Xuan Hung and Murad Khalid and Ravi Sankar and Sungyoung Lee},
  journal={J. Networks},
  year={2011},
  volume={6},
  pages={355-364}
}
Wireless sensor networks (WSNs) will play an active role in the 21th Century Healthcare IT to reduce the healthcare cost and improve the quality of care. The protection of data confidentiality and patient privacy are the most critical requirements for the ubiquitous use of WSNs in healthcare environments. This requires a secure and lightweight user authentication and access control. Symmetric key - based access control is not suitable for WSNs in healthcare due to dynamic network topology… 

Figures and Tables from this paper

A Mutual Authentication Framework for Wireless Medical Sensor Networks

TLDR
This work designs a symmetric key based authentication protocol for WMSN environment that uses only computationally efficient operations to achieve lightweight attribute and demonstrates the proposed scheme security against active attacks, namely, man-in-the-middle attack and replay attack.

Efficient anonymous authentication with key agreement protocol for wireless medical sensor networks

The use of wireless medical sensor networks (WMSN) in healthcare has led to a significant progress in this area. WMSN can sense patients’ vital signs and transmit sensed signals to health monitoring

E-SAP: Efficient-Strong Authentication Protocol for Healthcare Applications Using Wireless Medical Sensor Networks

TLDR
It is demonstrated that E-SAP is more secure against many practical attacks, and allows a tradeoff between the security and the performance cost for healthcare application using WMSNs.

Secure-Anonymous User Authentication Scheme for e-Healthcare Application Using Wireless Medical Sensor Networks

TLDR
An anonymous-based user authentication scheme is presented to improve the security features, computation, and communication overhead of the wireless sensor networks and is secure against password guessing attacks and smart card lost/stolen verifier attacks, and also preserves user anonymity.

Secure-Anonymous User Authentication Scheme for e-Healthcare Application Using Wireless Medical Sensor Networks

TLDR
An anonymous-based user authentication scheme is presented to improve the security features, computation, and communication overhead of the wireless sensor networks and is secure against password guessing attacks and smart card lost/stolen verifier attacks, and also preserves user anonymity.

A Novel and Lightweight System to Secure Wireless Medical Sensor Networks

TLDR
This paper proposes a lightweight and secure system for MSNs that employs hash-chain based key updating mechanism and proxy-protected signature technique to achieve efficient secure transmission and fine-grained data access control and extends the system to provide backward secrecy and privacy preservation.

A new authentication protocol for healthcare applications using wireless medical sensor networks with user anonymity

TLDR
A new user anonymous authentication protocol based on WMSNs is designed so as to remove the drawbacks of the protocol of He et al. and enhances the security and also keeps the computation efficiency.

Privacy-Preserving Wireless Medical Sensor Network

TLDR
A practical approach to prevent from the inside attack by using Sharemind system, developed by Cybernetica to perform computations on input data without compromising its privacy, to protect patient data privacy and support medical research is proposed.

Secure Authentication for Remote Patient Monitoring with Wireless Medical Sensor Networks †

TLDR
The results show that secure, direct, instant and authenticated commands can be delivered from the medical staff to the MSN nodes, and the proposed protocol is implemented and tested using the MIRACL library.

A Pairing Based Authentication and Key Establishment Scheme for Remote Patient Monitoring Systems

TLDR
A pairing based authentication and key establishment scheme for remote patient monitoring systems that combines smartcard and password, and achieves various desirable properties such as mutual authentication, strong access control, patient identity privacy, patient un-traceability, replay attack resistance and forward secrecy is proposed.
...

References

SHOWING 1-10 OF 40 REFERENCES

Public key cryptography-based security scheme for wireless sensor networks in healthcare

TLDR
This paper proposes a secure, scalable, and energy-efficient security scheme called Mutual Authentication and Access Control scheme based on Elliptic Curve Cryptography (MAACE), which provides mutual authentication where a healthcare professional can authenticate to an accessed node (a PDA or medical sensor) and vice versa.

An energy-efficient access control scheme for wireless sensor networks based on elliptic curve cryptography

TLDR
Through analysis and simulation based evaluations, it is shown that the proposed scheme overcomes the security problems and has far better energy-efficiency compared to current scheme proposed by Wang et al.

A secure mobile healthcare system using trust-based multicast scheme

TLDR
This paper proposes a secure multicast strategy that employs trust in order to evaluate the behavior of each node, so that only trustworthy nodes are allowed to participate in communications, while the misbehavior of malicious nodes is effectively prevented.

Elliptic curve cryptography-based access control in sensor networks

TLDR
Against the popular belief that a public key scheme is not practical for sensor networks, this paper describes a public-key implementation of access control in a sensor network and details the implementation of Elliptic Curve Cryptography over primary field on TelosB, which is the latest sensor network platform.

Improved robust user authentication scheme for wireless sensor networks

TLDR
This paper proposes improved robust user authentication scheme for WSNs, which is a variation of strong-password based solution and compared with the previous schemes in terms of overhead cost.

Security issues of wireless sensor networks in healthcare applications

TLDR
This paper presents an analysis of various WSN security mechanisms from the demanding perspective of healthcare applications, and considers the importance of security to the successful deployment of pervasive computing solutions in the healthcare industry.

SecSens - Security Architecture for Wireless Sensor Networks

TLDR
To protect the sensor network against routing attacks, SecSens includes a probabilistic multi-path routing protocol, which supports the key management and the authenticated broadcasts, and provides functions to detect forged sensor data by verifying data reports en-route.

An Energy-Efficient Secure Routing and Key Management Scheme for Mobile Sinks in Wireless Sensor Networks Using Deployment Knowledge

TLDR
The security analysis demonstrates that the proposed scheme can defend against common attacks in sensor networks including node compromise attacks, replay attacks, selective forwarding attacks, sinkhole and wormhole, Sybil attacks, HELLO flood attacks.

Physiological Signal Based Entity Authentication for Body Area Sensor Networks and Mobile Healthcare Systems

TLDR
A feasibility study of proposed entity authentication scheme was carried out on 12 healthy individuals, and the results suggest that the beat-to-beat heartbeat interval is a possible biometric feature for the entity authentication of BASN.

Two-factor user authentication in wireless sensor networks

  • M. Das
  • Computer Science
    IEEE Transactions on Wireless Communications
  • 2009
TLDR
This letter presents a two-factor user authentication protocol for WSN, which provides strong authentication, session key establishment, and achieves efficiency.