SecHealth: An Efficient Fog Based Sender Initiated Secure Data Transmission of Healthcare Sensors for e-Medical System

Security on sensitive data of the patients is essential in e-medical system where, sensors and the servers use the insecure channels like ZigBee and Internet to exchange their information. An adversary may hamper the communications by mounting various attacks as well as he/she may try to get the sensitive data. Therefore, security system is needed so that it can protect the security attacks. This paper provides a new security protocol, referred as SecHealth when the healthcare sensors transmit their data to a local server known as fog server. In this case, after verifying each other (i.e., sensor and fog server), then only the sensors are able to transmit their data to the local fog server. However, security analysis of the proposed protocol states that it can overcome all the possible known attacks.

[1]  Sarbani Roy,et al.  SecPMS: An efficient and secure communication protocol for continuous patient monitoring system using body sensors , 2017, 2017 9th International Conference on Communication Systems and Networks (COMSNETS).

[2]  Sherali Zeadally,et al.  Anonymous Authentication for Wireless Body Area Networks With Provable Security , 2017, IEEE Systems Journal.

[3]  Cheng-Chi Lee,et al.  Robust anonymous authentication protocol for health-care applications using wireless medical sensor networks , 2013, Multimedia Systems.

[4]  Sarbani Roy,et al.  A comparative study on popular MAC protocols for mixed Wireless Sensor Networks: From implementation viewpoint , 2016, Comput. Sci. Rev..

[5]  Srivaths Ravi,et al.  A study of the energy consumption characteristics of cryptographic algorithms and security protocols , 2006, IEEE Transactions on Mobile Computing.

[6]  Fagen Li,et al.  An Efficient Remote Authentication Scheme for Wireless Body Area Network , 2017, Journal of Medical Systems.

[7]  Tanmoy Maitra,et al.  An Efficient and Robust RSA-Based Remote User Authentication for Telecare Medical Information Systems , 2014, Journal of Medical Systems.

[8]  Ivan Stojmenovic,et al.  The Fog computing paradigm: Scenarios and security issues , 2014, 2014 Federated Conference on Computer Science and Information Systems.

[9]  Tanmoy Maitra,et al.  An Efficient Biometric and Password-Based Remote User Authentication using Smart Card for Telecare Medical Information Systems in Multi-Server Environment , 2014, Journal of Medical Systems.

[10]  Robert Simon Sherratt,et al.  A novel and efficient session spanning biometric and password based three-factor authentication protocol for consumer USB Mass Storage Devices , 2016, IEEE Transactions on Consumer Electronics.

[11]  Mohammad S. Obaidat,et al.  Security analysis and design of an efficient ECC-based two-factor password authentication scheme , 2016, Secur. Commun. Networks.

[12]  Kuo-Hui Yeh,et al.  Novel Authentication Schemes for IoT Based Healthcare Systems , 2015, Int. J. Distributed Sens. Networks.

[13]  Xinglong Zhang,et al.  ICASME: An Improved Cloud-Based Authentication Scheme for Medical Environment , 2017, Journal of Medical Systems.