A robust authentication and access control protocol for securing wireless healthcare sensor networks

dc.authorscopusid56801374100
dc.authorscopusid55366311900
dc.authorscopusid58592356700
dc.authorscopusid55270209500
dc.authorscopusid43561144600
dc.authorscopusid23396481600
dc.contributor.authorAli, Zeeshan
dc.contributor.authorGhani, Anwar
dc.contributor.authorKhan, Imran
dc.contributor.authorChaudhry, Shehzad Ashraf
dc.contributor.authorIslam, SK Hafizul
dc.contributor.authorGiri, Debasis
dc.date.accessioned2024-09-11T19:58:25Z
dc.date.available2024-09-11T19:58:25Z
dc.date.issued2020
dc.departmentİstanbul Gelişim Üniversitesien_US
dc.description.abstractWireless Healthcare Sensor Network (WHSN) has become one of the major research fields over the past decades that play a very prominent role in the medical field. Due to the rapid growth of technology in wireless communication, different security challenges have been raised in WHSN. Authentication protocols are used to secure the information transferred over the public channels by WHSN. For this prospect recently, Liu & Chung proposed an authentication and data transmission mechanism for WHSN. However, Challa et al. identified that Liu-Chung's scheme is vulnerable to stolen smart-card, offline password guessing, privileged insider, and user impersonation attacks. Challa et al. then proposed an enhanced scheme to overcome beforehand stated flaws. This paper denotes out that in accession to before mentioned attacks, Liu-Chung's scheme is also prone to users’ private key leakage and user impersonation attacks towards sensors. Moreover, Challa et al.’s scheme suffers from incorrectness, broadcasting problem, lack of authentication between Trusted Authority (TA) and sensor nodes, replay attack, Denial of Service (DoS) attack, forgery attack and delay in communication due to the involvement of the TA. Using the elliptic curve cryptography and bilinear paring, an improved scheme is proposed in this paper, to mitigate the weaknesses of Challah et al. and Liu-Chang schemes. The formal security analysis using simulation tool AVISPA and BAN logic demonstrate that the proposed scheme is secure. The rigorous informal security analysis also attests that our scheme is safe against well-known attacks. © 2020 Elsevier Ltden_US
dc.identifier.doi10.1016/j.jisa.2020.102502
dc.identifier.issn2214-2134en_US
dc.identifier.scopus2-s2.0-85082841101en_US
dc.identifier.scopusqualityQ1en_US
dc.identifier.urihttps://doi.org/10.1016/j.jisa.2020.102502
dc.identifier.urihttps://hdl.handle.net/11363/8474
dc.identifier.volume52en_US
dc.indekslendigikaynakScopusen_US
dc.language.isoenen_US
dc.publisherElsevier Ltden_US
dc.relation.ispartofJournal of Information Security and Applicationsen_US
dc.relation.publicationcategoryMakale - Uluslararası Hakemli Dergi - Kurum Öğretim Elemanıen_US
dc.rightsinfo:eu-repo/semantics/closedAccessen_US
dc.snmz20240903_Gen_US
dc.subjectAccess and control; Authentication; AVISPA; BAN Logic; Elliptic curve cryptography; Formal security; Healthcare system; Wireless sensor networken_US
dc.titleA robust authentication and access control protocol for securing wireless healthcare sensor networksen_US
dc.typeArticleen_US

Dosyalar