A Lightweight Authentication Scheme for Wearable Medical Sensors

作者: Yashendra Shiv , Rohit Kumar , Vimal Kumar , Manoj Wairiya

DOI: 10.1109/CONFLUENCE.2018.8442960

关键词:

摘要: Development in wireless communication technology is paving the way for sensors. By 2022, sensors' market expected to reach estimation of about USD 15.05. Application sensors can improve health a patient by continuously monitoring patient's and sending data hospitals. Data are communicated through public network which has no security open everyone. Before two tasks, i.e., ensuring authentication party given, must be done. Also, resource constraint devices. So mechanism should use lightweight cryptography algorithms. In this paper, protocol based on elliptic curve (ECC) proposed us wearable Our scheme provides against many practical attacks such as man-in-the-middle attack, secret guessing, replay etc. It also takes less computation cost than other existing schemes.

参考文章(26)
Dimitri Konstantas, An Overview of Wearable and Implantable Medical Sensors Yearbook of medical informatics. ,vol. 07, pp. 66- 69 ,(2007)
William Stallings, Cryptography and network security ,(1998)
Prosanta Gope, Tzonelih Hwang, A realistic lightweight authentication protocol preserving strong anonymity for securing RFID system Computers & Security. ,vol. 55, pp. 271- 280 ,(2015) , 10.1016/J.COSE.2015.05.004
R. Canetti, H. Krawczyk, M. Bellare, HMAC: Keyed-Hashing for Message Authentication RFC. ,vol. 2104, pp. 1- 11 ,(1997)
Kevin Ashton, That ‘Internet of Things’ Thing RFID Journal. ,(1999)
Jia-Li Hou, Kuo-Hui Yeh, Novel authentication schemes for iot based healthcare systems International Journal of Distributed Sensor Networks. ,vol. 2015, pp. 5- ,(2015) , 10.1155/2015/183659
Wenbo Shi, Peng Gong, A New User Authentication Protocol for Wireless Sensor Networks Using Elliptic Curves Cryptography International Journal of Distributed Sensor Networks. ,vol. 9, pp. 730831- ,(2013) , 10.1155/2013/730831
R. L. Rivest, A. Shamir, L. Adleman, A method for obtaining digital signatures and public-key cryptosystems Communications of the ACM. ,vol. 26, pp. 96- 99 ,(1983) , 10.1145/357980.358017
Vivek Kapoor, Vivek Sonny Abraham, Ramesh Singh, Elliptic curve cryptography Ubiquity. ,vol. 2008, pp. 7- ,(2008) , 10.1145/1378355.1378356