Javascript must be enabled to continue!
REACH: Robust Efficient Authentication for Crowdsensing-based Healthcare
View through CrossRef
Abstract
Crowdsensing systems enlist a group of people to contribute to sensor-based tasks. They involve people, also known as participants, who collect sensor data based on the task requirements specified by the requester, and send it to a server using an application. The sensor data can be either related to the participant and his/her daily activity or collected from the surrounding environment. The crowdsensing-based healthcare system is a sample of a crowdsensing system that provides smart healthcare-related services to patients and elderly people. In such a system, wearable sensors collect sensor data from patients and transmit them to the medical server across a public communication channel. Doctors can then access the data and prepare medical advice, resulting in a drastic reduction in hospital costs. However, patient data generally contain sensitive information that needs to be exchanged securely. Therefore, a significant security challenge is authenticating the sensor device (patient) and generating short-term keys for communicating medical data. Recently, Dharminder et al. and Gupta et al. designed authentication protocols for healthcare systems. In our paper, we show that these schemes are prone to a series of attacks including impersonation and stolen verifier attacks, and cannot provide perfect forward secrecy. We then propose a Robust and Efficient Authentication scheme for Crowdsensing-based Healthcare systems, called REACH. We prove that REACH supports perfect forward secrecy and anonymity and resists well-known attacks. We perform various formal and informal security analyses using the Real-OR-Random (ROR) Model, BAN logic, and the well-known Scyther tool. We also show that REACH outperforms the related methods in incurring the minimum computational overhead and comparable communication overhead.
Title: REACH: Robust Efficient Authentication for Crowdsensing-based Healthcare
Description:
Abstract
Crowdsensing systems enlist a group of people to contribute to sensor-based tasks.
They involve people, also known as participants, who collect sensor data based on the task requirements specified by the requester, and send it to a server using an application.
The sensor data can be either related to the participant and his/her daily activity or collected from the surrounding environment.
The crowdsensing-based healthcare system is a sample of a crowdsensing system that provides smart healthcare-related services to patients and elderly people.
In such a system, wearable sensors collect sensor data from patients and transmit them to the medical server across a public communication channel.
Doctors can then access the data and prepare medical advice, resulting in a drastic reduction in hospital costs.
However, patient data generally contain sensitive information that needs to be exchanged securely.
Therefore, a significant security challenge is authenticating the sensor device (patient) and generating short-term keys for communicating medical data.
Recently, Dharminder et al.
and Gupta et al.
designed authentication protocols for healthcare systems.
In our paper, we show that these schemes are prone to a series of attacks including impersonation and stolen verifier attacks, and cannot provide perfect forward secrecy.
We then propose a Robust and Efficient Authentication scheme for Crowdsensing-based Healthcare systems, called REACH.
We prove that REACH supports perfect forward secrecy and anonymity and resists well-known attacks.
We perform various formal and informal security analyses using the Real-OR-Random (ROR) Model, BAN logic, and the well-known Scyther tool.
We also show that REACH outperforms the related methods in incurring the minimum computational overhead and comparable communication overhead.
Related Results
Perceptions of Telemedicine and Rural Healthcare Access in a Developing Country: A Case Study of Bayelsa State, Nigeria
Perceptions of Telemedicine and Rural Healthcare Access in a Developing Country: A Case Study of Bayelsa State, Nigeria
Abstract
Introduction
Telemedicine is the remote delivery of healthcare services using information and communication technologies and has gained global recognition as a solution to...
An Efficient Blockchain-Based Verification Scheme with Transferable Authentication Authority
An Efficient Blockchain-Based Verification Scheme with Transferable Authentication Authority
Abstract
In some situations, the transfer of authentication authority is necessary for user authentication. In traditional authentication, a trust mechanism based on a trus...
Incentivizing for Truth Discovery in Edge-assisted Large-scale Mobile Crowdsensing
Incentivizing for Truth Discovery in Edge-assisted Large-scale Mobile Crowdsensing
The recent development of human-carried mobile devices has promoted the great development of mobile crowdsensing systems. Most existing mobile crowdsensing systems depend on the cr...
An Authentication and Key Agreement Scheme Based on Roadside Unit Cache for VANET
An Authentication and Key Agreement Scheme Based on Roadside Unit Cache for VANET
Vehicular Ad Hoc Network (VANET) is a wireless Mobile Ad Hoc Network that is used for communication between vehicles, vehicles and fixed access points, and vehicles and pedestrians...
Blockchain-Based Anonymous Authentication in Edge Computing Environment
Blockchain-Based Anonymous Authentication in Edge Computing Environment
Authentication is an important requirement for the security of edge computing applications. The existing authentication schemes either frequently rely on third-party trusted author...
Smart Chatbot for User Authentication
Smart Chatbot for User Authentication
Despite being the most widely used authentication mechanism, password-based authentication is not very secure, being easily guessed or brute-forced. To address this, many systems w...
BCDAIoD: An Efficient Blockchain-Based Cross-Domain Authentication Scheme for Internet of Drones
BCDAIoD: An Efficient Blockchain-Based Cross-Domain Authentication Scheme for Internet of Drones
During long-distance flight, unmanned aerial vehicles (UAVs) need to perform cross-domain authentication to prove their identity and receive information from the ground control sta...
An Analytic Model for Reducing Authentication Signaling Traffic in an End-to-End Authentication Scheme
An Analytic Model for Reducing Authentication Signaling Traffic in an End-to-End Authentication Scheme
In an end-to-end authentication (E2EA) scheme, the physician, patient, and sensor nodes authenticate each other through the healthcare service provider in three phases: the long-te...

