Applied Sciences | |
Secure Authentication and Prescription Safety Protocol for Telecare Health Services Using Ubiquitous IoT | |
Ata Ullah1  Xuanxia Yao2  Huansheng Ning2  Zahid Mahmood2  | |
[1] Department of Computer Science, National University of Modern Languages, Islamabad 44000, Pakistan;School of Computer and Communication Engineering University of Science and Technology Beijing (USTB), Beijing 10008, China; | |
关键词: authentication; key agreement; telecare medical information system; anonymity; un-traceability; | |
DOI : 10.3390/app7101069 | |
来源: DOAJ |
【 摘 要 】
Internet-of-Things (IoT) include a large number of devices that can communicate across different networks. Cyber-Physical Systems (CPS) also includes a number of devices connected to the internet where wearable devices are also included. Both systems enable researchers to develop healthcare systems with additional intelligence as well as prediction capabilities both for lifestyle and in hospitals. It offers as much persistence as a platform to ubiquitous healthcare by using wearable sensors to transfer the information over servers, smartphones, and other smart devices in the Telecare Medical Information System (TMIS). Security is a challenging issue in TMIS, and resourceful access to health care services requires user verification and confidentiality. Existing schemes lack in ensuring reliable prescription safety along with authentication. This research presents a Secure Authentication and Prescription Safety (SAPS) protocol to ensure secure communication between the patient, doctor/nurse, and the trusted server. The proposed procedure relies upon the efficient elliptic curve cryptosystem which can generate a symmetric secure key to ensure secure data exchange between patients and physicians after successful authentication of participants individually. A trusted server is involved for mutual authentication between parties and then generates a common key after completing the validation process. Moreover, the scheme is verified by doing formal modeling using Rubin Logic and validated using simulations in NS-2.35. We have analyzed the SAPS against security attacks, and then performance analysis is elucidated. Results prove the dominance of SAPS over preliminaries regarding mutual authentication, message integrity, freshness, and session key management and attack prevention.
【 授权许可】
Unknown