Secure and efficient anonymous authentication scheme for three-tier mobile healthcare systems with wearable sensors View Full Text


Ontology type: schema:ScholarlyArticle     


Article Info

DATE

2018-02

AUTHORS

Xiong Li, Maged Hamada Ibrahim, Saru Kumari, Rahul Kumar

ABSTRACT

The mobility and openness of wireless communication technologies make Mobile Healthcare Systems (mHealth) potentially exposed to a number of potential attacks, which significantly undermines their utility and impedes their widespread deployment. Attackers and criminals, even without knowing the context of the transmitted data, with simple eavesdropping on the wireless links, may benefit a lot from linking activities to the identities of patient’s sensors and medical staff members. These vulnerabilities apply to all tiers of the mHealth system. A new anonymous mutual authentication scheme for three-tier mobile healthcare systems with wearable sensors is proposed in this paper. Our scheme consists of three protocols: Protocol-1 allows the anonymous authentication nodes (mobile users and controller nodes) and the HSP medical server in the third tier, while Protocol-2 realizes the anonymous authentication between mobile users and controller nodes in the second tier, and Protocol-3 achieves the anonymous authentication between controller nodes and the wearable body sensors in the first tier. In the design of our protocols, the variation in the resource constraints of the different nodes in the mHealth system are taken into consideration so that our protocols make a better trade-off among security, efficiency and practicality. The security of our protocols are analyzed through rigorous formal proofs using BAN logic tool and informal discussions of security features, possible attacks and countermeasures. Besides, the efficiency of our protocols are concretely evaluated and compared with related schemes. The comparisons show that our scheme outperforms the previous schemes and provides more complete and integrated anonymous authentication services. Finally, the security of our protocols are evaluated by using the Automated Validation of Internet Security Protocols and Applications and the SPAN animator software. The simulation results show that our scheme is secure and satisfy all the specified privacy and authentication goals. More... »

PAGES

323-348

References to SciGraph publications

  • 2016-10. A privacy preserving three-factor authentication protocol for e-Health clouds in THE JOURNAL OF SUPERCOMPUTING
  • 2013-08. An Authentication Scheme for Secure Access to Healthcare Services in JOURNAL OF MEDICAL SYSTEMS
  • 2015-12. Efficient authenticated key exchange protocols for wireless body area networks in EURASIP JOURNAL ON WIRELESS COMMUNICATIONS AND NETWORKING
  • 2012. Efficient Java Implementation of Elliptic Curve Cryptography for J2ME-Enabled Mobile Devices in INFORMATION SECURITY THEORY AND PRACTICE. SECURITY, PRIVACY AND TRUST IN COMPUTING SYSTEMS AND AMBIENT INTELLIGENT ECOSYSTEMS
  • 2015-12. Heterogeneous spectrum sensing: challenges and methodologies in EURASIP JOURNAL ON WIRELESS COMMUNICATIONS AND NETWORKING
  • 2001-09. Selecting Cryptographic Key Sizes in JOURNAL OF CRYPTOLOGY
  • 2002-03-28. Faster Attacks on Elliptic Curve Cryptosystems in SELECTED AREAS IN CRYPTOGRAPHY
  • 2014-10. Cryptanalysis and Improvement of Authentication and Key Agreement Protocols for Telecare Medicine Information Systems in JOURNAL OF MEDICAL SYSTEMS
  • 2005. The AVISPA Tool for the Automated Validation of Internet Security Protocols and Applications in COMPUTER AIDED VERIFICATION
  • 2001-08-02. Faster Point Multiplication on Elliptic Curves with Efficient Endomorphisms in ADVANCES IN CRYPTOLOGY — CRYPTO 2001
  • 2014-01. Smart Environment as a Service: Three Factor Cloud Based User Authentication for Telecare Medical Information System in JOURNAL OF MEDICAL SYSTEMS
  • 2014-02. An Efficient Anonymous Authentication Scheme for Wireless Body Area Networks Using Elliptic Curve Cryptosystem in JOURNAL OF MEDICAL SYSTEMS
  • Identifiers

    URI

    http://scigraph.springernature.com/pub.10.1007/s11235-017-0340-1

    DOI

    http://dx.doi.org/10.1007/s11235-017-0340-1

    DIMENSIONS

    https://app.dimensions.ai/details/publication/pub.1085886568


    Indexing Status Check whether this publication has been indexed by Scopus and Web Of Science using the SN Indexing Status Tool
    Incoming Citations Browse incoming citations for this publication using opencitations.net

    JSON-LD is the canonical representation for SciGraph data.

    TIP: You can open this SciGraph record using an external JSON-LD service: JSON-LD Playground Google SDTT

    [
      {
        "@context": "https://springernature.github.io/scigraph/jsonld/sgcontext.json", 
        "about": [
          {
            "id": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/0804", 
            "inDefinedTermSet": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/", 
            "name": "Data Format", 
            "type": "DefinedTerm"
          }, 
          {
            "id": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/08", 
            "inDefinedTermSet": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/", 
            "name": "Information and Computing Sciences", 
            "type": "DefinedTerm"
          }
        ], 
        "author": [
          {
            "affiliation": {
              "alternateName": "Hunan University of Science and Technology", 
              "id": "https://www.grid.ac/institutes/grid.411429.b", 
              "name": [
                "School of Computer Science and Engineering, Hunan University of Science and Technology, 411201, Xiangtan, China"
              ], 
              "type": "Organization"
            }, 
            "familyName": "Li", 
            "givenName": "Xiong", 
            "id": "sg:person.010543064577.83", 
            "sameAs": [
              "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.010543064577.83"
            ], 
            "type": "Person"
          }, 
          {
            "affiliation": {
              "alternateName": "Helwan University", 
              "id": "https://www.grid.ac/institutes/grid.412093.d", 
              "name": [
                "Department of Electronics, Communications and Computers Engineering, Faculty of Engineering, Helwan University, 1, Sherif St, 11792, Helwan, Cairo, Egypt"
              ], 
              "type": "Organization"
            }, 
            "familyName": "Ibrahim", 
            "givenName": "Maged Hamada", 
            "id": "sg:person.07623206555.65", 
            "sameAs": [
              "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.07623206555.65"
            ], 
            "type": "Person"
          }, 
          {
            "affiliation": {
              "alternateName": "Chaudhary Charan Singh University", 
              "id": "https://www.grid.ac/institutes/grid.411141.0", 
              "name": [
                "Department of Mathematics, Ch. Charan Singh University, 250005, Meerut, Uttar Pradesh, India"
              ], 
              "type": "Organization"
            }, 
            "familyName": "Kumari", 
            "givenName": "Saru", 
            "id": "sg:person.015217161023.85", 
            "sameAs": [
              "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.015217161023.85"
            ], 
            "type": "Person"
          }, 
          {
            "affiliation": {
              "name": [
                "S.S.V. (P.G.) College, Hapur, Uttar Pradesh, India"
              ], 
              "type": "Organization"
            }, 
            "familyName": "Kumar", 
            "givenName": "Rahul", 
            "id": "sg:person.01327716233.09", 
            "sameAs": [
              "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.01327716233.09"
            ], 
            "type": "Person"
          }
        ], 
        "citation": [
          {
            "id": "https://doi.org/10.1016/j.jnca.2010.09.003", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1005008799"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1186/s13638-015-0406-2", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1007659646", 
              "https://doi.org/10.1186/s13638-015-0406-2"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1186/s13638-015-0406-2", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1007659646", 
              "https://doi.org/10.1186/s13638-015-0406-2"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/s10916-013-9997-5", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1009969416", 
              "https://doi.org/10.1007/s10916-013-9997-5"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/s10916-014-0135-9", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1011604573", 
              "https://doi.org/10.1007/s10916-014-0135-9"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "https://doi.org/10.3390/s120912606", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1015004606"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "https://doi.org/10.1016/j.adhoc.2014.03.003", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1020477183"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/s00145-001-0009-4", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1021562387", 
              "https://doi.org/10.1007/s00145-001-0009-4"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "https://doi.org/10.1016/j.jnca.2016.10.001", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1024433223"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/978-3-642-30955-7_17", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1024473396", 
              "https://doi.org/10.1007/978-3-642-30955-7_17"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "https://doi.org/10.3390/s16050728", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1024641741"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "https://doi.org/10.1016/j.jnca.2013.02.034", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1026081715"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/s10916-013-9954-3", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1029190165", 
              "https://doi.org/10.1007/s10916-013-9954-3"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "https://doi.org/10.1016/j.mcm.2012.06.033", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1035512438"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "https://doi.org/10.1016/j.adhoc.2003.09.010", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1035647585"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "https://doi.org/10.1016/j.jnca.2011.11.009", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1037108216"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "https://doi.org/10.3390/s16040424", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1038887545"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/3-540-48892-8_15", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1042673193", 
              "https://doi.org/10.1007/3-540-48892-8_15"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/3-540-48892-8_15", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1042673193", 
              "https://doi.org/10.1007/3-540-48892-8_15"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1186/s13638-015-0291-8", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1042892247", 
              "https://doi.org/10.1186/s13638-015-0291-8"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1186/s13638-015-0291-8", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1042892247", 
              "https://doi.org/10.1186/s13638-015-0291-8"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/3-540-44647-8_11", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1044250953", 
              "https://doi.org/10.1007/3-540-44647-8_11"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/3-540-44647-8_11", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1044250953", 
              "https://doi.org/10.1007/3-540-44647-8_11"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "https://doi.org/10.3923/itj.2011.1092.1105", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1046392906"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/11513988_27", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1048385661", 
              "https://doi.org/10.1007/11513988_27"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/11513988_27", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1048385661", 
              "https://doi.org/10.1007/11513988_27"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/s11227-015-1610-x", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1049802310", 
              "https://doi.org/10.1007/s11227-015-1610-x"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/s10916-014-0013-5", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1053454667", 
              "https://doi.org/10.1007/s10916-014-0013-5"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "https://doi.org/10.1109/jbhi.2012.2234129", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1061276589"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "https://doi.org/10.1109/jcn.2015.000083", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1061278306"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "https://doi.org/10.1109/jsyst.2016.2544805", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1061339807"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "https://doi.org/10.1109/mcom.2015.7010518", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1061396237"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "https://doi.org/10.1109/mwc.2004.1368893", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1061431949"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "https://doi.org/10.1109/tc.2016.2623609", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1061536300"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "https://doi.org/10.1109/tifs.2015.2414399", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1061630522"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "https://doi.org/10.1109/tifs.2015.2491261", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1061630681"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "https://doi.org/10.1109/tifs.2016.2590944", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1061630945"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "https://doi.org/10.1109/tpds.2013.145", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1061754245"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "https://doi.org/10.1109/tpds.2013.230", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1061754366"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "https://doi.org/10.1587/transcom.e98.b.190", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1068087239"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "https://doi.org/10.1016/j.comnet.2017.03.013", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1084067240"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "https://doi.org/10.1109/aiccsa.2005.1387152", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1093322672"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "https://doi.org/10.1109/infocom.2016.7524606", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1093979169"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "https://doi.org/10.1109/iwcmc.2012.6314287", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1094434450"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "https://doi.org/10.1109/iccchina.2014.7008269", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1095330930"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "https://doi.org/10.1201/9781420034981", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1109725478"
            ], 
            "type": "CreativeWork"
          }
        ], 
        "datePublished": "2018-02", 
        "datePublishedReg": "2018-02-01", 
        "description": "The mobility and openness of wireless communication technologies make Mobile Healthcare Systems (mHealth) potentially exposed to a number of potential attacks, which significantly undermines their utility and impedes their widespread deployment. Attackers and criminals, even without knowing the context of the transmitted data, with simple eavesdropping on the wireless links, may benefit a lot from linking activities to the identities of patient\u2019s sensors and medical staff members. These vulnerabilities apply to all tiers of the mHealth system. A new anonymous mutual authentication scheme for three-tier mobile healthcare systems with wearable sensors is proposed in this paper. Our scheme consists of three protocols: Protocol-1 allows the anonymous authentication nodes (mobile users and controller nodes) and the HSP medical server in the third tier, while Protocol-2 realizes the anonymous authentication between mobile users and controller nodes in the second tier, and Protocol-3 achieves the anonymous authentication between controller nodes and the wearable body sensors in the first tier. In the design of our protocols, the variation in the resource constraints of the different nodes in the mHealth system are taken into consideration so that our protocols make a better trade-off among security, efficiency and practicality. The security of our protocols are analyzed through rigorous formal proofs using BAN logic tool and informal discussions of security features, possible attacks and countermeasures. Besides, the efficiency of our protocols are concretely evaluated and compared with related schemes. The comparisons show that our scheme outperforms the previous schemes and provides more complete and integrated anonymous authentication services. Finally, the security of our protocols are evaluated by using the Automated Validation of Internet Security Protocols and Applications and the SPAN animator software. The simulation results show that our scheme is secure and satisfy all the specified privacy and authentication goals.", 
        "genre": "research_article", 
        "id": "sg:pub.10.1007/s11235-017-0340-1", 
        "inLanguage": [
          "en"
        ], 
        "isAccessibleForFree": false, 
        "isFundedItemOf": [
          {
            "id": "sg:grant.7194174", 
            "type": "MonetaryGrant"
          }
        ], 
        "isPartOf": [
          {
            "id": "sg:journal.1049187", 
            "issn": [
              "1018-4864", 
              "1572-9451"
            ], 
            "name": "Telecommunication Systems", 
            "type": "Periodical"
          }, 
          {
            "issueNumber": "2", 
            "type": "PublicationIssue"
          }, 
          {
            "type": "PublicationVolume", 
            "volumeNumber": "67"
          }
        ], 
        "name": "Secure and efficient anonymous authentication scheme for three-tier mobile healthcare systems with wearable sensors", 
        "pagination": "323-348", 
        "productId": [
          {
            "name": "readcube_id", 
            "type": "PropertyValue", 
            "value": [
              "ae87618814d411c49bb92a12c5818c6ad9cb21aaf41dcc1acb992a8a7d443faa"
            ]
          }, 
          {
            "name": "doi", 
            "type": "PropertyValue", 
            "value": [
              "10.1007/s11235-017-0340-1"
            ]
          }, 
          {
            "name": "dimensions_id", 
            "type": "PropertyValue", 
            "value": [
              "pub.1085886568"
            ]
          }
        ], 
        "sameAs": [
          "https://doi.org/10.1007/s11235-017-0340-1", 
          "https://app.dimensions.ai/details/publication/pub.1085886568"
        ], 
        "sdDataset": "articles", 
        "sdDatePublished": "2019-04-11T10:35", 
        "sdLicense": "https://scigraph.springernature.com/explorer/license/", 
        "sdPublisher": {
          "name": "Springer Nature - SN SciGraph project", 
          "type": "Organization"
        }, 
        "sdSource": "s3://com-uberresearch-data-dimensions-target-20181106-alternative/cleanup/v134/2549eaecd7973599484d7c17b260dba0a4ecb94b/merge/v9/a6c9fde33151104705d4d7ff012ea9563521a3ce/jats-lookup/v90/0000000349_0000000349/records_113667_00000004.jsonl", 
        "type": "ScholarlyArticle", 
        "url": "https://link.springer.com/10.1007%2Fs11235-017-0340-1"
      }
    ]
     

    Download the RDF metadata as:  json-ld nt turtle xml License info

    HOW TO GET THIS DATA PROGRAMMATICALLY:

    JSON-LD is a popular format for linked data which is fully compatible with JSON.

    curl -H 'Accept: application/ld+json' 'https://scigraph.springernature.com/pub.10.1007/s11235-017-0340-1'

    N-Triples is a line-based linked data format ideal for batch operations.

    curl -H 'Accept: application/n-triples' 'https://scigraph.springernature.com/pub.10.1007/s11235-017-0340-1'

    Turtle is a human-readable linked data format.

    curl -H 'Accept: text/turtle' 'https://scigraph.springernature.com/pub.10.1007/s11235-017-0340-1'

    RDF/XML is a standard XML format for linked data.

    curl -H 'Accept: application/rdf+xml' 'https://scigraph.springernature.com/pub.10.1007/s11235-017-0340-1'


     

    This table displays all metadata directly associated to this object as RDF triples.

    227 TRIPLES      21 PREDICATES      68 URIs      19 LITERALS      7 BLANK NODES

    Subject Predicate Object
    1 sg:pub.10.1007/s11235-017-0340-1 schema:about anzsrc-for:08
    2 anzsrc-for:0804
    3 schema:author N0b34d527c20743a6839f698371df7da0
    4 schema:citation sg:pub.10.1007/11513988_27
    5 sg:pub.10.1007/3-540-44647-8_11
    6 sg:pub.10.1007/3-540-48892-8_15
    7 sg:pub.10.1007/978-3-642-30955-7_17
    8 sg:pub.10.1007/s00145-001-0009-4
    9 sg:pub.10.1007/s10916-013-9954-3
    10 sg:pub.10.1007/s10916-013-9997-5
    11 sg:pub.10.1007/s10916-014-0013-5
    12 sg:pub.10.1007/s10916-014-0135-9
    13 sg:pub.10.1007/s11227-015-1610-x
    14 sg:pub.10.1186/s13638-015-0291-8
    15 sg:pub.10.1186/s13638-015-0406-2
    16 https://doi.org/10.1016/j.adhoc.2003.09.010
    17 https://doi.org/10.1016/j.adhoc.2014.03.003
    18 https://doi.org/10.1016/j.comnet.2017.03.013
    19 https://doi.org/10.1016/j.jnca.2010.09.003
    20 https://doi.org/10.1016/j.jnca.2011.11.009
    21 https://doi.org/10.1016/j.jnca.2013.02.034
    22 https://doi.org/10.1016/j.jnca.2016.10.001
    23 https://doi.org/10.1016/j.mcm.2012.06.033
    24 https://doi.org/10.1109/aiccsa.2005.1387152
    25 https://doi.org/10.1109/iccchina.2014.7008269
    26 https://doi.org/10.1109/infocom.2016.7524606
    27 https://doi.org/10.1109/iwcmc.2012.6314287
    28 https://doi.org/10.1109/jbhi.2012.2234129
    29 https://doi.org/10.1109/jcn.2015.000083
    30 https://doi.org/10.1109/jsyst.2016.2544805
    31 https://doi.org/10.1109/mcom.2015.7010518
    32 https://doi.org/10.1109/mwc.2004.1368893
    33 https://doi.org/10.1109/tc.2016.2623609
    34 https://doi.org/10.1109/tifs.2015.2414399
    35 https://doi.org/10.1109/tifs.2015.2491261
    36 https://doi.org/10.1109/tifs.2016.2590944
    37 https://doi.org/10.1109/tpds.2013.145
    38 https://doi.org/10.1109/tpds.2013.230
    39 https://doi.org/10.1201/9781420034981
    40 https://doi.org/10.1587/transcom.e98.b.190
    41 https://doi.org/10.3390/s120912606
    42 https://doi.org/10.3390/s16040424
    43 https://doi.org/10.3390/s16050728
    44 https://doi.org/10.3923/itj.2011.1092.1105
    45 schema:datePublished 2018-02
    46 schema:datePublishedReg 2018-02-01
    47 schema:description The mobility and openness of wireless communication technologies make Mobile Healthcare Systems (mHealth) potentially exposed to a number of potential attacks, which significantly undermines their utility and impedes their widespread deployment. Attackers and criminals, even without knowing the context of the transmitted data, with simple eavesdropping on the wireless links, may benefit a lot from linking activities to the identities of patient’s sensors and medical staff members. These vulnerabilities apply to all tiers of the mHealth system. A new anonymous mutual authentication scheme for three-tier mobile healthcare systems with wearable sensors is proposed in this paper. Our scheme consists of three protocols: Protocol-1 allows the anonymous authentication nodes (mobile users and controller nodes) and the HSP medical server in the third tier, while Protocol-2 realizes the anonymous authentication between mobile users and controller nodes in the second tier, and Protocol-3 achieves the anonymous authentication between controller nodes and the wearable body sensors in the first tier. In the design of our protocols, the variation in the resource constraints of the different nodes in the mHealth system are taken into consideration so that our protocols make a better trade-off among security, efficiency and practicality. The security of our protocols are analyzed through rigorous formal proofs using BAN logic tool and informal discussions of security features, possible attacks and countermeasures. Besides, the efficiency of our protocols are concretely evaluated and compared with related schemes. The comparisons show that our scheme outperforms the previous schemes and provides more complete and integrated anonymous authentication services. Finally, the security of our protocols are evaluated by using the Automated Validation of Internet Security Protocols and Applications and the SPAN animator software. The simulation results show that our scheme is secure and satisfy all the specified privacy and authentication goals.
    48 schema:genre research_article
    49 schema:inLanguage en
    50 schema:isAccessibleForFree false
    51 schema:isPartOf N60c7ca55f70649a79096c4c492214612
    52 N7b928971bc684509b6ee95be064a7bef
    53 sg:journal.1049187
    54 schema:name Secure and efficient anonymous authentication scheme for three-tier mobile healthcare systems with wearable sensors
    55 schema:pagination 323-348
    56 schema:productId Nae052d8e3e044a82a16faf44484ce7e0
    57 Nef313e116e7a4f1e92e16c1b37bc6de5
    58 Nf3972acb280542d3a700f4c19aeb2d72
    59 schema:sameAs https://app.dimensions.ai/details/publication/pub.1085886568
    60 https://doi.org/10.1007/s11235-017-0340-1
    61 schema:sdDatePublished 2019-04-11T10:35
    62 schema:sdLicense https://scigraph.springernature.com/explorer/license/
    63 schema:sdPublisher N46ed62e21f734d219d5c434c607e4c32
    64 schema:url https://link.springer.com/10.1007%2Fs11235-017-0340-1
    65 sgo:license sg:explorer/license/
    66 sgo:sdDataset articles
    67 rdf:type schema:ScholarlyArticle
    68 N0b34d527c20743a6839f698371df7da0 rdf:first sg:person.010543064577.83
    69 rdf:rest N79a969ec6b2d4b6388948c72de495b2e
    70 N217aee78ed354a65b03ab9b67c6f079c rdf:first sg:person.015217161023.85
    71 rdf:rest N2b86b48522b84a36a02e8ab7960fc4b4
    72 N2b86b48522b84a36a02e8ab7960fc4b4 rdf:first sg:person.01327716233.09
    73 rdf:rest rdf:nil
    74 N46ed62e21f734d219d5c434c607e4c32 schema:name Springer Nature - SN SciGraph project
    75 rdf:type schema:Organization
    76 N60c7ca55f70649a79096c4c492214612 schema:volumeNumber 67
    77 rdf:type schema:PublicationVolume
    78 N6cec36a5472f43ba904bbb7046f669ff schema:name S.S.V. (P.G.) College, Hapur, Uttar Pradesh, India
    79 rdf:type schema:Organization
    80 N79a969ec6b2d4b6388948c72de495b2e rdf:first sg:person.07623206555.65
    81 rdf:rest N217aee78ed354a65b03ab9b67c6f079c
    82 N7b928971bc684509b6ee95be064a7bef schema:issueNumber 2
    83 rdf:type schema:PublicationIssue
    84 Nae052d8e3e044a82a16faf44484ce7e0 schema:name dimensions_id
    85 schema:value pub.1085886568
    86 rdf:type schema:PropertyValue
    87 Nef313e116e7a4f1e92e16c1b37bc6de5 schema:name doi
    88 schema:value 10.1007/s11235-017-0340-1
    89 rdf:type schema:PropertyValue
    90 Nf3972acb280542d3a700f4c19aeb2d72 schema:name readcube_id
    91 schema:value ae87618814d411c49bb92a12c5818c6ad9cb21aaf41dcc1acb992a8a7d443faa
    92 rdf:type schema:PropertyValue
    93 anzsrc-for:08 schema:inDefinedTermSet anzsrc-for:
    94 schema:name Information and Computing Sciences
    95 rdf:type schema:DefinedTerm
    96 anzsrc-for:0804 schema:inDefinedTermSet anzsrc-for:
    97 schema:name Data Format
    98 rdf:type schema:DefinedTerm
    99 sg:grant.7194174 http://pending.schema.org/fundedItem sg:pub.10.1007/s11235-017-0340-1
    100 rdf:type schema:MonetaryGrant
    101 sg:journal.1049187 schema:issn 1018-4864
    102 1572-9451
    103 schema:name Telecommunication Systems
    104 rdf:type schema:Periodical
    105 sg:person.010543064577.83 schema:affiliation https://www.grid.ac/institutes/grid.411429.b
    106 schema:familyName Li
    107 schema:givenName Xiong
    108 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.010543064577.83
    109 rdf:type schema:Person
    110 sg:person.01327716233.09 schema:affiliation N6cec36a5472f43ba904bbb7046f669ff
    111 schema:familyName Kumar
    112 schema:givenName Rahul
    113 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.01327716233.09
    114 rdf:type schema:Person
    115 sg:person.015217161023.85 schema:affiliation https://www.grid.ac/institutes/grid.411141.0
    116 schema:familyName Kumari
    117 schema:givenName Saru
    118 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.015217161023.85
    119 rdf:type schema:Person
    120 sg:person.07623206555.65 schema:affiliation https://www.grid.ac/institutes/grid.412093.d
    121 schema:familyName Ibrahim
    122 schema:givenName Maged Hamada
    123 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.07623206555.65
    124 rdf:type schema:Person
    125 sg:pub.10.1007/11513988_27 schema:sameAs https://app.dimensions.ai/details/publication/pub.1048385661
    126 https://doi.org/10.1007/11513988_27
    127 rdf:type schema:CreativeWork
    128 sg:pub.10.1007/3-540-44647-8_11 schema:sameAs https://app.dimensions.ai/details/publication/pub.1044250953
    129 https://doi.org/10.1007/3-540-44647-8_11
    130 rdf:type schema:CreativeWork
    131 sg:pub.10.1007/3-540-48892-8_15 schema:sameAs https://app.dimensions.ai/details/publication/pub.1042673193
    132 https://doi.org/10.1007/3-540-48892-8_15
    133 rdf:type schema:CreativeWork
    134 sg:pub.10.1007/978-3-642-30955-7_17 schema:sameAs https://app.dimensions.ai/details/publication/pub.1024473396
    135 https://doi.org/10.1007/978-3-642-30955-7_17
    136 rdf:type schema:CreativeWork
    137 sg:pub.10.1007/s00145-001-0009-4 schema:sameAs https://app.dimensions.ai/details/publication/pub.1021562387
    138 https://doi.org/10.1007/s00145-001-0009-4
    139 rdf:type schema:CreativeWork
    140 sg:pub.10.1007/s10916-013-9954-3 schema:sameAs https://app.dimensions.ai/details/publication/pub.1029190165
    141 https://doi.org/10.1007/s10916-013-9954-3
    142 rdf:type schema:CreativeWork
    143 sg:pub.10.1007/s10916-013-9997-5 schema:sameAs https://app.dimensions.ai/details/publication/pub.1009969416
    144 https://doi.org/10.1007/s10916-013-9997-5
    145 rdf:type schema:CreativeWork
    146 sg:pub.10.1007/s10916-014-0013-5 schema:sameAs https://app.dimensions.ai/details/publication/pub.1053454667
    147 https://doi.org/10.1007/s10916-014-0013-5
    148 rdf:type schema:CreativeWork
    149 sg:pub.10.1007/s10916-014-0135-9 schema:sameAs https://app.dimensions.ai/details/publication/pub.1011604573
    150 https://doi.org/10.1007/s10916-014-0135-9
    151 rdf:type schema:CreativeWork
    152 sg:pub.10.1007/s11227-015-1610-x schema:sameAs https://app.dimensions.ai/details/publication/pub.1049802310
    153 https://doi.org/10.1007/s11227-015-1610-x
    154 rdf:type schema:CreativeWork
    155 sg:pub.10.1186/s13638-015-0291-8 schema:sameAs https://app.dimensions.ai/details/publication/pub.1042892247
    156 https://doi.org/10.1186/s13638-015-0291-8
    157 rdf:type schema:CreativeWork
    158 sg:pub.10.1186/s13638-015-0406-2 schema:sameAs https://app.dimensions.ai/details/publication/pub.1007659646
    159 https://doi.org/10.1186/s13638-015-0406-2
    160 rdf:type schema:CreativeWork
    161 https://doi.org/10.1016/j.adhoc.2003.09.010 schema:sameAs https://app.dimensions.ai/details/publication/pub.1035647585
    162 rdf:type schema:CreativeWork
    163 https://doi.org/10.1016/j.adhoc.2014.03.003 schema:sameAs https://app.dimensions.ai/details/publication/pub.1020477183
    164 rdf:type schema:CreativeWork
    165 https://doi.org/10.1016/j.comnet.2017.03.013 schema:sameAs https://app.dimensions.ai/details/publication/pub.1084067240
    166 rdf:type schema:CreativeWork
    167 https://doi.org/10.1016/j.jnca.2010.09.003 schema:sameAs https://app.dimensions.ai/details/publication/pub.1005008799
    168 rdf:type schema:CreativeWork
    169 https://doi.org/10.1016/j.jnca.2011.11.009 schema:sameAs https://app.dimensions.ai/details/publication/pub.1037108216
    170 rdf:type schema:CreativeWork
    171 https://doi.org/10.1016/j.jnca.2013.02.034 schema:sameAs https://app.dimensions.ai/details/publication/pub.1026081715
    172 rdf:type schema:CreativeWork
    173 https://doi.org/10.1016/j.jnca.2016.10.001 schema:sameAs https://app.dimensions.ai/details/publication/pub.1024433223
    174 rdf:type schema:CreativeWork
    175 https://doi.org/10.1016/j.mcm.2012.06.033 schema:sameAs https://app.dimensions.ai/details/publication/pub.1035512438
    176 rdf:type schema:CreativeWork
    177 https://doi.org/10.1109/aiccsa.2005.1387152 schema:sameAs https://app.dimensions.ai/details/publication/pub.1093322672
    178 rdf:type schema:CreativeWork
    179 https://doi.org/10.1109/iccchina.2014.7008269 schema:sameAs https://app.dimensions.ai/details/publication/pub.1095330930
    180 rdf:type schema:CreativeWork
    181 https://doi.org/10.1109/infocom.2016.7524606 schema:sameAs https://app.dimensions.ai/details/publication/pub.1093979169
    182 rdf:type schema:CreativeWork
    183 https://doi.org/10.1109/iwcmc.2012.6314287 schema:sameAs https://app.dimensions.ai/details/publication/pub.1094434450
    184 rdf:type schema:CreativeWork
    185 https://doi.org/10.1109/jbhi.2012.2234129 schema:sameAs https://app.dimensions.ai/details/publication/pub.1061276589
    186 rdf:type schema:CreativeWork
    187 https://doi.org/10.1109/jcn.2015.000083 schema:sameAs https://app.dimensions.ai/details/publication/pub.1061278306
    188 rdf:type schema:CreativeWork
    189 https://doi.org/10.1109/jsyst.2016.2544805 schema:sameAs https://app.dimensions.ai/details/publication/pub.1061339807
    190 rdf:type schema:CreativeWork
    191 https://doi.org/10.1109/mcom.2015.7010518 schema:sameAs https://app.dimensions.ai/details/publication/pub.1061396237
    192 rdf:type schema:CreativeWork
    193 https://doi.org/10.1109/mwc.2004.1368893 schema:sameAs https://app.dimensions.ai/details/publication/pub.1061431949
    194 rdf:type schema:CreativeWork
    195 https://doi.org/10.1109/tc.2016.2623609 schema:sameAs https://app.dimensions.ai/details/publication/pub.1061536300
    196 rdf:type schema:CreativeWork
    197 https://doi.org/10.1109/tifs.2015.2414399 schema:sameAs https://app.dimensions.ai/details/publication/pub.1061630522
    198 rdf:type schema:CreativeWork
    199 https://doi.org/10.1109/tifs.2015.2491261 schema:sameAs https://app.dimensions.ai/details/publication/pub.1061630681
    200 rdf:type schema:CreativeWork
    201 https://doi.org/10.1109/tifs.2016.2590944 schema:sameAs https://app.dimensions.ai/details/publication/pub.1061630945
    202 rdf:type schema:CreativeWork
    203 https://doi.org/10.1109/tpds.2013.145 schema:sameAs https://app.dimensions.ai/details/publication/pub.1061754245
    204 rdf:type schema:CreativeWork
    205 https://doi.org/10.1109/tpds.2013.230 schema:sameAs https://app.dimensions.ai/details/publication/pub.1061754366
    206 rdf:type schema:CreativeWork
    207 https://doi.org/10.1201/9781420034981 schema:sameAs https://app.dimensions.ai/details/publication/pub.1109725478
    208 rdf:type schema:CreativeWork
    209 https://doi.org/10.1587/transcom.e98.b.190 schema:sameAs https://app.dimensions.ai/details/publication/pub.1068087239
    210 rdf:type schema:CreativeWork
    211 https://doi.org/10.3390/s120912606 schema:sameAs https://app.dimensions.ai/details/publication/pub.1015004606
    212 rdf:type schema:CreativeWork
    213 https://doi.org/10.3390/s16040424 schema:sameAs https://app.dimensions.ai/details/publication/pub.1038887545
    214 rdf:type schema:CreativeWork
    215 https://doi.org/10.3390/s16050728 schema:sameAs https://app.dimensions.ai/details/publication/pub.1024641741
    216 rdf:type schema:CreativeWork
    217 https://doi.org/10.3923/itj.2011.1092.1105 schema:sameAs https://app.dimensions.ai/details/publication/pub.1046392906
    218 rdf:type schema:CreativeWork
    219 https://www.grid.ac/institutes/grid.411141.0 schema:alternateName Chaudhary Charan Singh University
    220 schema:name Department of Mathematics, Ch. Charan Singh University, 250005, Meerut, Uttar Pradesh, India
    221 rdf:type schema:Organization
    222 https://www.grid.ac/institutes/grid.411429.b schema:alternateName Hunan University of Science and Technology
    223 schema:name School of Computer Science and Engineering, Hunan University of Science and Technology, 411201, Xiangtan, China
    224 rdf:type schema:Organization
    225 https://www.grid.ac/institutes/grid.412093.d schema:alternateName Helwan University
    226 schema:name Department of Electronics, Communications and Computers Engineering, Faculty of Engineering, Helwan University, 1, Sherif St, 11792, Helwan, Cairo, Egypt
    227 rdf:type schema:Organization
     




    Preview window. Press ESC to close (or click here)


    ...