| Literature DB >> 27023540 |
Thaier Hayajneh1, Bassam J Mohd2, Muhammad Imran3, Ghada Almashaqbeh4, Athanasios V Vasilakos5.
Abstract
There is broad consensus that remote health monitoring will benefit all stakeholders in the healthcare system and that it has the potential to save billions of dollars. Among the major concerns that are preventing the patients from widely adopting this technology are data privacy and security. Wireless Medical Sensor Networks (MSNs) are the building blocks for remote health monitoring systems. This paper helps to identify the most challenging security issues in the existing authentication protocols for remote patient monitoring and presents a lightweight public-key-based authentication protocol for MSNs. In MSNs, the nodes are classified into sensors that report measurements about the human body and actuators that receive commands from the medical staff and perform actions. Authenticating these commands is a critical security issue, as any alteration may lead to serious consequences. The proposed protocol is based on the Rabin authentication algorithm, which is modified in this paper to improve its signature signing process, making it suitable for delay-sensitive MSN applications. To prove the efficiency of the Rabin algorithm, we implemented the algorithm with different hardware settings using Tmote Sky motes and also programmed the algorithm on an FPGA to evaluate its design and performance. Furthermore, the proposed protocol is implemented and tested using the MIRACL (Multiprecision Integer and Rational Arithmetic C/C++) library. The results show that secure, direct, instant and authenticated commands can be delivered from the medical staff to the MSN nodes.Entities:
Keywords: FPGA implementation; MSN; Rabin algorithm; authentication; remote patient monitoring; security issues
Mesh:
Year: 2016 PMID: 27023540 PMCID: PMC4850938 DOI: 10.3390/s16040424
Source DB: PubMed Journal: Sensors (Basel) ISSN: 1424-8220 Impact factor: 3.576
Figure 1Remote patient monitoring through the MSN system.
Figure 2Security protocol details.
Power and energy results.
| Algorithm | Time Per Message (μS) | Power (mW) | Energy Per Message (nJ) |
|---|---|---|---|
| Rabin verification | 0.033 | 31.800 | 1.0 |
| Rabin signature | 11.377 | 36.368 | 413.7 |
| Parallel Rabin signature | 7.998 | 122.923 | 983.1 |
Computation speed results.
| Mode | Signature Generation (ms) | Signature Verification (ms) |
|---|---|---|
| Rabin | 16.686 | 0.186 |
| RSA-32 | 17.214 | 0.422 |
| RSA-128 | 17.370 | 1.110 |
| RSA-256 | 17.552 | 2.100 |
| RSA-512 | 17.512 | 3.670 |
| RSA-1024 | 17.490 | 7.040 |
Figure 3MSN security model.
Figure 4FPGA design flow.
Figure 5Design block diagram.
Figure 6Rabin verification finite state machine (FSM).
Figure 7Rabin signature FSM.
Figure 8Parallel Rabin signature FSM.
Figure 9Modelsim wave diagram at the sender.
Resource utilization. LE, Logical Elements.
| LE Type | ||||
|---|---|---|---|---|
| Algorithm | LEs | Combinational | Register | Both |
| Rabin verification | 8025 | 7915 | 67 | 43 |
| Rabin signature | 12,053 | 11,580 | 46 | 427 |
| Parallel Rabin signature | 19,781 | 18,877 | 47 | 857 |
Timing analysis (in ns).
| Algorithm | Clk-Clk | ||
|---|---|---|---|
| Rabin verification | 1.5 | 14.1 | 5 |
| Rabin signature | 10.5 | 297.5 | 372.4 |
| Parallel Rabin signature | 8.7 | 376.8 | 371.2 |
Modified packet format.
| 1 | 1 | 1 | 4 | 20 |
|---|---|---|---|---|
| src | pID | offset | message | signature |
Figure 10First testbed scenario.
Figure 11Second testbed scenario.
Signature generation and verification time comparison. ECC, Elliptic Curve Cryptography.
| Algorithm | Verification | Generation |
|---|---|---|
| Rabin | <1 s | 22 s |
| RSA | 10 s | 90 s |
| ECC | 40 s | 20 s |
| Parallel Rabin | <1 s | 5 s |
Adversary model analysis.
| Potential Attacks | Protocol Defense |
|---|---|
| Impersonation | The protocol can prevent an adversary from impersonating a sensor and sending fake data by requiring the sensors to encrypt the data with a secret key |
| Commands tampering | The protocol uses digital signatures, which prevent this attack |
| Commands replay attack | The medical staff adds a nonce, which is a combination of a timestamp and random number, to each command, which prevents replay attacks |
| Patient’s privacy violation attack | This attack is prevented as the commands and the reported data are required to be encrypted with a secret key |
| DoS attack | The protocol relies on lightweight cryptography, which helps to prevent an attacker from sending a large number of fake commands to cause a DoS attack |
| Operation delay attack | The timing results show that the protocol provides a fast response and prevents delay attacks |