Reference Hub15
A Secure IoT-Based Mutual Authentication for Healthcare Applications in Wireless Sensor Networks Using ECC

A Secure IoT-Based Mutual Authentication for Healthcare Applications in Wireless Sensor Networks Using ECC

Deepti Singh, Bijendra Kumar, Samayveer Singh, Satish Chand
Copyright: © 2021 |Volume: 16 |Issue: 2 |Pages: 28
ISSN: 1555-3396|EISSN: 1555-340X|EISBN13: 9781799859796|DOI: 10.4018/IJHISI.20210401.oa2
Cite Article Cite Article

MLA

Singh, Deepti, et al. "A Secure IoT-Based Mutual Authentication for Healthcare Applications in Wireless Sensor Networks Using ECC." IJHISI vol.16, no.2 2021: pp.21-48. http://doi.org/10.4018/IJHISI.20210401.oa2

APA

Singh, D., Kumar, B., Singh, S., & Chand, S. (2021). A Secure IoT-Based Mutual Authentication for Healthcare Applications in Wireless Sensor Networks Using ECC. International Journal of Healthcare Information Systems and Informatics (IJHISI), 16(2), 21-48. http://doi.org/10.4018/IJHISI.20210401.oa2

Chicago

Singh, Deepti, et al. "A Secure IoT-Based Mutual Authentication for Healthcare Applications in Wireless Sensor Networks Using ECC," International Journal of Healthcare Information Systems and Informatics (IJHISI) 16, no.2: 21-48. http://doi.org/10.4018/IJHISI.20210401.oa2

Export Reference

Mendeley
Favorite Full-Issue Download

Abstract

The role of wireless medical sensor networks (WMSNs) is very significant in healthcare applications of IoT. Online report generation and sharing the reports reduce the time and make the treatment of patients very fast. Here, the safety of patient data plays a crucial role. As there is a restriction of resources in sensor nodes, the design of authentication scheme for WMSNs is not an easy task in healthcare applications. Healthcare professionals are using their mobile to collect data from patients' bodies. To use WMSNs in healthcare applications, cryptanalysis of Li et al. is done and found that it suffers from various attacks. Hence, a new efficient privacy-preserving user authenticated scheme using elliptic curve cryptography (ECC) is proposed. The security analysis of scheme is performed using random oracle model, in addition to BAN logic. AVISPA is used for simulation to prove that the proposed scheme can resist passive and active attacks. Finally, the performance comparison of schemes shows that the proposed scheme performs better.