期刊论文详细信息
Healthcare Technology Letters
Computationally efficient mutual authentication protocol for remote infant incubator monitoring system
article
Subramani Jegadeesan1  Muneeswaran Dhamodaran1  Maria Azees2  Swaminathan Sri Shanmugapriya3 
[1] Department of Electronics and Communication Engineering, M. Kumarasamy College of Engineering;Department of Electronics and Communication Engineering, GMR Institute of Technology;Department of Electronics and Communication Engineering, V.S.B. Engineering College
关键词: Internet of Things;    wireless sensor networks;    public key cryptography;    message authentication;    cryptography;    health care;    protocols;    patient monitoring;    cloud computing;    cryptographic protocols;    telecommunication security;    resource-limited sensors;    continuous operations;    accurate operations;    received information;    authenticity;    doctors;    computationally efficient mutual authentication protocol;    incubator monitoring systems;    computational cost;    existing protocol;    remote infant incubator monitoring system;    cloud computing;    wireless medical sensor networks;    remote healthcare monitoring;    healthcare monitoring system;   
DOI  :  10.1049/htl.2018.5006
学科分类:肠胃与肝脏病学
来源: Wiley
PDF
【 摘 要 】

Internet of Things (IoT), cloud computing and wireless medical sensor networks have significantly improved remote healthcare monitoring. In a healthcare monitoring system, many resource-limited sensors are deployed to sense, process and communicate the information. However, continuous and accurate operations of these devices are very important, especially in the infant incubator monitoring system. Because important decisions are made on the received information. Therefore, it is necessary to ensure the authenticity between the incubator monitoring system and doctors. In this work, a public key encryption based computationally efficient mutual authentication protocol is proposed for secure data transmission between incubator monitoring systems and doctors or administrators. The proposed protocol improves performance and reduces the computational cost without compromising the security. The security analysis part shows the strength of the proposed protocol against various attacks, performance analysis part shows that the proposed protocol performs better than other existing protocol based on Rivest–Shamir–Adleman and elliptic-curve cryptography schemes.

【 授权许可】

CC BY|CC BY-ND|CC BY-NC|CC BY-NC-ND   

【 预 览 】
附件列表
Files Size Format View
RO202107100000908ZK.pdf 205KB PDF download
  文献评价指标  
  下载次数:8次 浏览次数:1次