| Literature DB >> 22438729 |
Pardeep Kumar1, Sang-Gon Lee, Hoon-Jae Lee.
Abstract
A wireless medical sensor network (WMSN) can sense humans' physiological signs without sacrificing patient comfort and transmit patient vital signs to health professionals' hand-held devices. The patient physiological data are highly sensitive and WMSNs are extremely vulnerable to many attacks. Therefore, it must be ensured that patients' medical signs are not exposed to unauthorized users. Consequently, strong user authentication is the main concern for the success and large scale deployment of WMSNs. In this regard, this paper presents an efficient, strong authentication protocol, named E-SAP, for healthcare application using WMSNs. The proposed E-SAP includes: (1) a two-factor (i.e., password and smartcard) professional authentication; (2) mutual authentication between the professional and the medical sensor; (3) symmetric encryption/decryption for providing message confidentiality; (4) establishment of a secure session key at the end of authentication; and (5) professionals can change their password. Further, the proposed protocol requires three message exchanges between the professional, medical sensor node and gateway node, and achieves efficiency (i.e., low computation and communication cost). Through the formal analysis, security analysis and performance analysis, we demonstrate that E-SAP is more secure against many practical attacks, and allows a tradeoff between the security and the performance cost for healthcare application using WMSNs.Entities:
Keywords: medical sensor network; mutual authentication; secure healthcare; session key establishment; smart card; user authentication
Mesh:
Year: 2012 PMID: 22438729 PMCID: PMC3304131 DOI: 10.3390/s120201625
Source DB: PubMed Journal: Sensors (Basel) ISSN: 1424-8220 Impact factor: 3.576
Figure 1.Patient monitoring using a wireless medical sensor network in a hospital environment.
Figure 2.Healthcare architecture for patient monitoring.
Notation and Description.
| User | |
| Password of user | |
| Gateway node | |
| Gateway | |
| Sensor node | |
| Gateway secrets | |
| Symmetric encryption using shared key. | |
| Symmetric decryption using shared key. | |
| User’s generated nonce | |
| One-way cryptographic hash function | |
| XOR operation | |
| Concatenation operation |
Figure 3.Flow of the Login and Authentication phases.
E-SAP messages transform into the idealized form.
Message 1: Message 2: Message 3: |
Message 1: Message 2: Message 3: |
Formal verification of E-SAP using BAN logic model.
| Message 1: |
| Message 2: |
| Message 3: |
Comparison of E-SAP functionality with related schemes.
| Strong user authentication | No | Yes | No | Yes | |
| Mutual authentication between | Yes | No | Yes | No | |
| Session key establishment | No | No | No | No | |
| Secure password change | NA | No | Yes | Yes | |
| Message confidentiality | No | No | No | No | |
| Protection to replay message | Yes | Yes | Yes | Yes | |
| Secure against | Yes | No | No | No | |
| Secure against user masquerading attack | Yes | No | No | No | |
| Secure against gateway masquerading attack | No | No | No | No | |
| Secure against Information-leakage attack | No | No | No | No | |
| Protocol formal verification | No | No | No | No |
NA: Not applicable.
Performance comparison of E-SAP with existing schemes.
| Le | Tpu+Tpr | Tpr | 1H+1S+2M | 2H+2S+2M | 1H+1S+2M |
| Das’s [ | − | 3H | 4H | 4H | 1H |
| Vaidya | 2H | 2H | 3H | 3H | 3H |
| He | 1H | 5H | 5H | 5H | 1H |