RAMHU: A New Robust Lightweight Scheme for Mutual Users Authentication in Healthcare Applications

02/22/2019
by   Mishall Al-Zubaidie, et al.
0

Providing a mechanism to authenticate users in healthcare applications is an essential security requirement to prevent both external and internal attackers from penetrating patients' identities and revealing their health data. Many schemes have been developed to provide authentication mechanisms to ensure that only legitimate users are authorized to connect, but these schemes still suffer from vulnerable security. Various attacks expose patients' data for malicious tampering or destruction. Transferring health-related data and information between users and the health centre makes them exposed to penetration by adversaries as they may move through an insecure channel. In addition, previous mechanisms have suffered from the poor protection of users' authentication information. To ensure the protection of patients' information and data, we propose a scheme that authenticates users based on the information of both the device and the legitimate user. In this paper, we propose a Robust Authentication Model for Healthcare Users (RAMHU) that provides mutual authentication between server and clients. This model utilizes an Elliptic Curve Integrated Encryption Scheme (ECIES) and PHOTON to achieve strong security and a good overall performance. RAMHU relies on multi pseudonyms, physical address, and one-time password mechanisms to authenticate legitimate users. Moreover, extensive informal and formal security analysis with the automated validation of Internet security protocols and applications (AVISPA) tool demonstrates that our model offers a high level of security in repelling a wide variety of possible attacks.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
10/13/2021

Privacy-Preserving Mutual Authentication and Key Agreement Scheme for Multi-Server Healthcare System

The usage of different technologies and smart devices helps people to ge...
research
09/09/2020

Impersonation-as-a-Service: Characterizing the Emerging Criminal Infrastructure for User Impersonation at Scale

In this paper we provide evidence of an emerging criminal infrastructure...
research
03/25/2023

A User-Based Authentication and DoS Mitigation Scheme for Wearable Wireless Body Sensor Networks

Wireless Body Sensor Networks (WBSNs) is one of the greatest growing tec...
research
01/29/2021

Detection and Prevention of New Attacks for ID-based Authentication Protocols

The rapid development of information and network technologies motivates ...
research
11/11/2021

An End-to-End Authentication Mechanism for Wireless Body Area Networks

Wireless Body Area Network (WBAN) ensures high-quality healthcare servic...
research
02/01/2023

A Robust Certificate Management System to Prevent Evil Twin Attacks in IEEE 802.11 Networks

The evil twin attack is a major security threat to WLANs. An evil twin i...
research
07/27/2020

A Proposed Access Control-Based Privacy Preservation Model to Share Healthcare Data in Cloud

Healthcare data in cloud computing facilitates the treatment of patients...

Please sign up or login with your details

Forgot password? Click here to reset