Survey of Authentication Schemes for Health Monitoring: A Subset of Cyber Physical System

Cyber Physical System (CPS) is an emerging field and further considerable research topic in multiple domains. Health monitoring is one of sub-fields in Cyber Physical System and relies heavily on wireless environment for connectivity. Due to prevailing interest in this field, security of the data is key concern when it is accessed from remote location. As it is being utilized by medical practitioner to make health related decisions risk of intrusion is always present. Any breach can cause adverse effects to patient’s health. Therefore, importance of data authenticity, freshness and encumbrance free access becomes vital in this perspective. The multiple security solutions have been found in literature. However, security solutions depend severely on authentication schemes. An adequate authentication scheme can ensure protection against cyber adversaries. The main objective of this paper is to present state-of-the-art review on security challenges, security requirements and current authentication schemes available in literature pertaining to health monitoring. These authentication schemes are analyzed on predefined parameter/features in order to testify efficacy of schemes.

[1]  Jian Shen,et al.  A lightweight multi-layer authentication protocol for wireless body area networks , 2018, Future Gener. Comput. Syst..

[2]  Ming Li,et al.  Authenticated secret key extraction using channel characteristics for body area networks , 2012, CCS '12.

[3]  Hesham A. El Zouka An authentication scheme for wireless healthcare monitoring sensor network , 2017, 2017 14th International Conference on Smart Cities: Improving Quality of Life Using ICT & IoT (HONET-ICT).

[4]  Ming Li,et al.  BANA: Body Area Network Authentication Exploiting Channel Characteristics , 2012, IEEE Journal on Selected Areas in Communications.

[5]  Feng Xia,et al.  A Secured Health Care Application Architecture for Cyber-Physical Systems , 2011, ArXiv.

[6]  Ming Li,et al.  MASK-BAN: Movement-Aided Authenticated Secret Key Extraction Utilizing Channel Characteristics in Body Area Networks , 2015, IEEE Internet of Things Journal.

[7]  Farrukh Aslam Khan,et al.  Key Agreement Schemes in Wireless Body Area Networks: Taxonomy and State-of-the-Art , 2015, Journal of Medical Systems.

[8]  Young-Sil Lee,et al.  Secure key management scheme based on ECC algorithm for patient's medical information in healthcare system , 2014, The International Conference on Information Networking 2014 (ICOIN2014).

[9]  Pardeep Kumar,et al.  E-SAP: Efficient-Strong Authentication Protocol for Healthcare Applications Using Wireless Medical Sensor Networks , 2012, Sensors.

[10]  Dong Hoon Lee,et al.  A Privacy-Strengthened Scheme for E-Healthcare Monitoring System , 2012, Journal of Medical Systems.

[11]  Wade Trappe,et al.  ProxiMate: proximity-based secure pairing using ambient wireless signals , 2011, MobiSys '11.

[12]  Soummya Kar,et al.  Cyber physical attacks with control objectives and detection constraints , 2016, 2016 IEEE 55th Conference on Decision and Control (CDC).

[13]  John R. Douceur,et al.  The Sybil Attack , 2002, IPTPS.

[14]  Samaher Al-Janabi,et al.  Survey of main challenges (security and privacy) in wireless body area networks for healthcare applications , 2017 .

[15]  Kyung Sup Kwak,et al.  Certificateless Remote Anonymous Authentication Schemes for WirelessBody Area Networks , 2014, IEEE Transactions on Parallel and Distributed Systems.

[16]  Zhiguang Qin,et al.  Revocable and Scalable Certificateless Remote Authentication Protocol With Anonymity for Wireless Body Area Networks , 2015, IEEE Transactions on Information Forensics and Security.

[17]  Marko Hölbl,et al.  Survey on security in intra-body area network communication , 2018, Ad Hoc Networks.

[18]  Syed Taha Ali,et al.  Decorrelating secret bit extraction via channel hopping in body area networks , 2012, 2012 IEEE 23rd International Symposium on Personal, Indoor and Mobile Radio Communications - (PIMRC).

[19]  Nizamuddin,et al.  An authenticated key agreement with rekeying for secured body sensor networks based on hybrid cryptosystem , 2012, Proceedings of 2012 9th IEEE International Conference on Networking, Sensing and Control.

[20]  Susmita Sur-Kolay,et al.  CABA: Continuous Authentication Based on BioAura , 2017, IEEE Transactions on Computers.

[21]  Sanjay Jha,et al.  SeAK: Secure Authentication and Key Generation Protocol Based on Dual Antennas for Wireless Body Area Networks , 2014, RFIDSec.

[22]  Gerhard P. Hancke,et al.  Wearable security: Key derivation for Body Area sensor Networks based on host movement , 2016, 2016 IEEE 25th International Symposium on Industrial Electronics (ISIE).

[23]  Fan Zhang,et al.  OPFKA: Secure and efficient Ordered-Physiological-Feature-based key agreement for wireless Body Area Networks , 2013, 2013 Proceedings IEEE INFOCOM.

[24]  Amr M. Youssef,et al.  Security Tradeoffs in Cyber Physical Systems: A Case Study Survey on Implantable Medical Devices , 2016, IEEE Access.

[25]  Himanshu Neema,et al.  Evaluating the effects of cyber-attacks on cyber physical systems using a hardware-in-the-loop simulation testbed , 2017, 2017 Resilience Week (RWS).

[26]  Neil W. Bergmann,et al.  Walkie-Talkie: Motion-Assisted Automatic Key Generation for Secure On-Body Device Communication , 2016, 2016 15th ACM/IEEE International Conference on Information Processing in Sensor Networks (IPSN).

[27]  Yuesheng Zhu,et al.  TinyZKP: A Lightweight Authentication Scheme Based on Zero-Knowledge Proof for Wireless Body Area Networks , 2014, Wirel. Pers. Commun..

[28]  Sheng Zhong,et al.  IBE-Lite: A Lightweight Identity-Based Cryptography for Body Sensor Networks , 2009, IEEE Transactions on Information Technology in Biomedicine.

[29]  Ayan Banerjee,et al.  PSKA: Usable and Secure Key Agreement Scheme for Body Area Networks , 2010, IEEE Transactions on Information Technology in Biomedicine.

[30]  Gill R. Tsouri,et al.  Securing While Sampling in Wireless Body Area Networks With Application to Electrocardiography , 2016, IEEE Journal of Biomedical and Health Informatics.

[31]  Srdjan Capkun,et al.  Proximity-based access control for implantable medical devices , 2009, CCS.

[32]  Kyung Sup Kwak,et al.  Security and Privacy Issues in Wireless Sensor Networks for Healthcare Applications , 2010, Journal of Medical Systems.

[33]  Sanjay Jha,et al.  DLINK: Dual link based radio frequency fingerprinting for wearable devices , 2015, 2015 IEEE 40th Conference on Local Computer Networks (LCN).

[34]  Ming Li,et al.  Group Device Pairing based Secure Sensor Association and Key Management for Body Area Networks , 2010, 2010 Proceedings IEEE INFOCOM.

[35]  Xiong Li,et al.  Anonymous mutual authentication and key agreement scheme for wearable sensors in wireless body area networks , 2017, Comput. Networks.

[36]  Qaisar Shafi,et al.  Cyber Physical Systems Security: A Brief Survey , 2012, 2012 12th International Conference on Computational Science and Its Applications.

[37]  Sanjay Jha,et al.  iARC: Secret Key Generation for Resource Constrained Devices by Inducing Artificial Randomness in the Channel , 2015, AsiaCCS.

[38]  Qian Li,et al.  Efficient authenticated key exchange protocols for wireless body area networks , 2015, EURASIP Journal on Wireless Communications and Networking.

[39]  Bin Liu,et al.  A Novel Authentication Scheme Based on Acceleration Data in WBAN , 2017, 2017 IEEE/ACM International Conference on Connected Health: Applications, Systems and Engineering Technologies (CHASE).

[40]  Yang Xiang,et al.  A survey on security control and attack detection for industrial cyber-physical systems , 2018, Neurocomputing.

[41]  Soummya Kar,et al.  Optimal Attack Strategies Subject to Detection Constraints Against Cyber-Physical Systems , 2016, IEEE Transactions on Control of Network Systems.

[42]  Sandeep K. S. Gupta,et al.  Biosec: a biometric based approach for securing communication in wireless networks of biosensors implanted in the human body , 2003, 2003 International Conference on Parallel Processing Workshops, 2003. Proceedings..

[43]  Eyal de Lara,et al.  Amigo: Proximity-Based Authentication of Mobile Devices , 2007, UbiComp.

[44]  Fengjun Li,et al.  Cyber-Physical Systems Security—A Survey , 2017, IEEE Internet of Things Journal.