A secure lightweight mutual authentication and key agreement protocol for healthcare systems

Sahu, Amiya Kumar, Sharma, Suraj and Nanda, Ashish 2020, A secure lightweight mutual authentication and key agreement protocol for healthcare systems. In Kumar Singh, Amit and Elhoseny, Mohamed (ed), Intelligent Data Security Solutions for e-Health Applications, Elsevier, Amsterdam, The Netherlands, pp.293-308, doi: 10.1016/b978-0-12-819511-6.00016-9.

Attached Files
Name Description MIMEType Size Downloads

Title A secure lightweight mutual authentication and key agreement protocol for healthcare systems
Author(s) Sahu, Amiya Kumar
Sharma, Suraj
Nanda, AshishORCID iD for Nanda, Ashish orcid.org/0000-0002-6837-7272
Title of book Intelligent Data Security Solutions for e-Health Applications
Editor(s) Kumar Singh, Amit
Elhoseny, Mohamed
Publication date 2020
Series Intelligent Data-Centric Systems
Chapter number 16
Total chapters 16
Start page 293
End page 308
Total pages 16
Publisher Elsevier
Place of Publication Amsterdam, The Netherlands
Summary The current era of technology is flooded with hundreds of Internet of Things (IoT) applications with billions of IoT objects. One of the primary applications is healthcare systems, where body area network (BAN)-sensing healthcare devices (such as leg movement sensor, heart-rate sensing, etc.) collect the user's real-time data (such as heart rate, step counts, and many more). These real-time users’ data are vulnerable to various attacks related to authentication. It may also create scope for further attacks exploiting authentication. Therefore it requires a proper authentication mechanism and should be transmitted securely without compromising the privacy of the user's healthcare information. Moreover, these devices are very much computationally resource constrained. This chapter emphasizes the afore-mentioned threats and constraints, and proposes a secure, lightweight authentication protocol between a healthcare wearable device and its user. The scheme uses a cryptographic hash function and X-OR functionalities only. It is tested by a well-known formal security verification tool, AVISPA, to show its robustness against various attacks related to authentications. The secure establishment of a shared secret key is also shown by the well-known BAN authentication logic. Furthermore, the computational cost of the scheme is also computed and compared with other work to prove its efficiency.
ISBN 9780128195116
Language eng
DOI 10.1016/b978-0-12-819511-6.00016-9
Indigenous content off
Field of Research 08 Information and Computing Sciences
HERDC Research category B1.1 Book chapter
Copyright notice ©2020, Elsevier
Persistent URL http://hdl.handle.net/10536/DRO/DU:30144536

Connect to link resolver
Unless expressly stated otherwise, the copyright for items in DRO is owned by the author, with all rights reserved.

Version Filter Type
Citation counts: TR Web of Science Citation Count  Cited 0 times in TR Web of Science
Scopus Citation Count Cited 0 times in Scopus
Google Scholar Search Google Scholar
Access Statistics: 41 Abstract Views, 1 File Downloads  -  Detailed Statistics
Created: Tue, 03 Nov 2020, 06:56:04 EST

Every reasonable effort has been made to ensure that permission has been obtained for items included in DRO. If you believe that your rights have been infringed by this repository, please contact drosupport@deakin.edu.au.