scholarly journals A Provably Secure Authentication and Key Agreement Protocol in Cloud-Based Smart Healthcare Environments

2021 ◽  
Vol 2021 ◽  
pp. 1-15
Author(s):  
Tsu-Yang Wu ◽  
Lei Yang ◽  
Jia-Ning Luo ◽  
Jimmy Ming-Tai Wu

The wide applications of the Internet of Things and cloud computing technologies have driven the development of many industries. With the improvement of living standards, health has become the top priority of people’s attention. The emergence of the wireless body area network (WBAN) enables people to master their physical condition all the time and make it more convenient for patients and doctors to communicate with each other. Doctors can provide real-time online treatment with cloud-based smart healthcare environments for patients. In this process, patients, health records, and doctors need to maintain security and privacy. Recently, Kumari et al. proposed a secure framework for the smart medical system. However, we found that their framework cannot provide the anonymity of patients and doctors, data confidentiality, and patient unlinkability and also is subject to impersonation attacks and desynchronization attacks. In order to ensure the security and privacy of patients and doctors, we propose an authentication and key exchange protocol in cloud-based smart healthcare environments. Formal and informal security analyses, as well as performance analysis, demonstrated that our protocol is suitable for these environments.

2021 ◽  
Vol 9 (1) ◽  
pp. 71-79
Author(s):  
Jacqualine Cristhy Ujil

The recent advancements in technologies have allowed us to come so far and resulted in many breakthroughs. One of the various examples is internet of things, wireless communication, and cloud computing which can be useful if utilize in many fields. In the field of medical, these advancements allowed any medical centres to improve patient’s health remotely simply by using wearable devices on patients that then will amalgamate with the wireless body area network (WBAN). However, WBAN has limited resources which limits its services. To solve this problem, cloud computing is used to provide storage and computation. Unfortunately, these methods allow the system to be vulnerable to various malicious attacks. Attackers can easily gain access to the medical records of patients hence the integrity of security and privacy of confidential data have been compromised. In this paper, we presented a secure protocol for cloud-assisted database using multi-factor authentication and blockchain as an added measure to ensure security. Accordingly, we prove that the presented scheme offers more security and privacy. Therefore, it is the most practical method to be applied in the medical field.


Symmetry ◽  
2020 ◽  
Vol 12 (4) ◽  
pp. 579 ◽  
Author(s):  
Georgios Kambourakis ◽  
Constantinos Kolias ◽  
Dimitrios Geneiatakis ◽  
Georgios Karopoulos ◽  
Georgios Michail Makrakis ◽  
...  

Protocol stacks specifically designed for the Internet of Things (IoT) have become commonplace. At the same time, security and privacy concerns regarding IoT technologies are also attracting significant attention given the risks that are inherently associated with the respective devices and their numerous applications, ranging from healthcare, smart homes, and cities, to intelligent transportation systems and industrial automation. Considering the still heterogeneous nature of the majority of IoT protocols, a major concern is to find common references for investigating and analyzing their security and privacy threats. To this end, and on top of the current literature, this work provides a comprehensive, vis-à-vis comparison of the security aspects of the thus far most widespread IoT Wireless Personal Area Network (WPAN) protocols, namely BLE, Z-Wave, ZigBee, Thread, and EnOcean. A succinct but exhaustive review of the relevant literature from 2013 up to now is offered as a side contribution.


Author(s):  
Muhammad Sheraz Arshad Malik ◽  
Muhammad Ahmed ◽  
Tahir Abdullah ◽  
Naila Kousar ◽  
Mehak Nigar ◽  
...  

2020 ◽  
pp. 004051752093223 ◽  
Author(s):  
Bahaa Almohammed ◽  
Alyani Ismail ◽  
Aduwati Sali

The latest progress in the emerging wireless technology has resulted in the development of wearable antennas made of various fabrics. This unique antenna is an integral part of the wireless body area network (WBAN). A wide range of applications are made by the wearable antennas in the fields of the Internet of Things, sport, defense, public safety, telemedicine, navigation, and tracking. The focus point of the current review is the recent progress of electro-textiles research with special attention on the materials properties, criteria, and manufacturing techniques. Existing as well as upcoming materials specifically and potentially used for electro-textile fabrication are discussed. Various manufacturing techniques are discussed to match the importance of material selection. The current work highlights the performance when the antennas tagging are applied in WBAN objects and illustrates how the human body affects the performance of the wearable antenna and vice versa. The findings of this review by introducing the best materials, techniques, and designs could be used in future to provide high-performance materials for body-centric applications.


2018 ◽  
Vol 31 (1) ◽  
pp. 260 ◽  
Author(s):  
Hasan Falah Hasan

  E-Health care system is one of the great technology enhancements via using medical devices through sensors worn or implanted in the patient's body. Wireless Body Area Network (WBAN) offers astonishing help through wireless transmission of patient's data using agreed distance in which it keeps patient's status always controlled by regular transmitting of vital data indications to the receiver. Security and privacy is a major concern in terms of data sent from WBAN and biological sensors. Several algorithms have been proposed through many hypotheses in order to find optimum solutions. In this paper, an encrypting algorithm has been proposed via using hyper-chaotic Zhou system where it provides high security, privacy, efficiency and capacity in terms of long key space that ensures high resistance possibly obtained by any threat attack, key sensitivity is too high to any slight of change could be made in the encryption key and finally good statistical characteristic's analysis where the software has been used is microsoft visual studio version 10


Electronics ◽  
2018 ◽  
Vol 7 (12) ◽  
pp. 436 ◽  
Author(s):  
Abdullah Alhayajneh ◽  
Alessandro Baccarini ◽  
Gary Weiss ◽  
Thaier Hayajneh ◽  
Aydin Farajidavar

A Wireless Body Area Network (WBAN) is a network of wirelessly connected sensing and actuating devices. WBANs used for recording biometric information and administering medication are classified as part of a Cyber Physical System (CPS). Preserving user security and privacy is a fundamental concern of WBANs, which introduces the notion of using biometric readings as a mechanism for authentication. Extensive research has been conducted regarding the various methodologies (e.g., ECG, EEG, gait, head/arm motion, skin impedance). This paper seeks to analyze and evaluate the most prominent biometric authentication techniques based on accuracy, cost, and feasibility of implementation. We suggest several authentication schemes which incorporate multiple biometric properties.


2019 ◽  
Vol 5 (11) ◽  
pp. 22-28
Author(s):  
Vineeta Shrivastava ◽  
Mayank Namdev

Wireless Body Area Network (WBAN) is a new trend in the technology that provides remote mechanism to monitor and collect patient’s health record data using wearable sensors. It is widely recognized that a high level of system security and privacy play a key role in protecting these data when being used by the healthcare professionals and during storage to ensure that patient’s records are kept safe from intruder’s danger. It is therefore of great interest to discuss security and privacy issues in WBANs. In this paper, we reviewed WBAN communication architecture, security and privacy requirements and security threats and the primary challenges in WBANs to these systems based on the latest standards and publications. This paper also covers the state-of-art security measures and research in WBAN.


2021 ◽  
Author(s):  
Anupam Pattanayak ◽  
Mou Dutta ◽  
Subhasish Dhal

Abstract Continuous health status monitoring of the persons equipped with Wireless Body Area Network (WBAN) is one of the key emerging technologies in the area of e-healthcare. In this technology, WBANs and Medical Service Providers (MSPs) are connected via a cloud infrastructure, where WBAN continuously uploads the present readings of physiological parameters via base station such as smart phone, smart watch, etc. Cloud analyzes the physiological parameters and whenever any medical emergency of the user is detected, it checks the infrastructural parameters including the location information of all MSPs connected to it and finds the most appropriate MSP to handle the medical emergency. This MSP selection task has to be performed efficiently so that the medical treatment of the user can start as early as possible. In the existing works, a trusted third party, namely, trusted authority (TA) actively participates in the MSP selection process, which may take undue advantages. The aim of the work in this paper is to remove the role of TA during MSP selection process. However, TA will participate in the system setup phase such that it cannot obtain any advantage in compromising the MSP selection task. The proposed scheme has been scrutinized through an adversary model and simulated using ProVerif tool to verify the security and privacy.


Author(s):  
ABDULLAH Saleh HAYAJNEH ◽  
Alessandro Baccarini ◽  
Gary Weiss ◽  
Thaier Hayajneh ◽  
Aydin Farajidavar

A Wireless Body Area Network (WBAN) is a network of wirelessly connected sensing and actuating devices. WBANs used for recording biometric information and administering medication are classified as part of a Cyber Physical System (CPS). Preserving user security and privacy is a fundamental concern of WBANs, which introduces the notion of using biometric readings as a mechanism for authentication. Extensive research has been conducted regarding the various methodologies (e.g. ECG, EEG, gait, head/arm motion, skin impedance). This paper seeks to analyze and evaluate the most prominent biometric authentication techniques based on accuracy, cost, and feasibility of implementation. We suggest several authentication schemes which incorporate multiple biometric properties.


Sign in / Sign up

Export Citation Format

Share Document