A NOVEL TRI-FACTOR MUTUAL AUTHENTICATION WITH BIOMETRICS FOR WIRELESS BODY SENSOR NETWORKS IN HEALTHCARE APPLICATIONS

Publications

Share / Export Citation / Email / Print / Text size:

International Journal on Smart Sensing and Intelligent Systems

Professor Subhas Chandra Mukhopadhyay

Exeley Inc. (New York)

Subject: Computational Science & Engineering , Engineering, Electrical & Electronic

GET ALERTS

eISSN: 1178-5608

DESCRIPTION

3
Reader(s)
7
Visit(s)
0
Comment(s)
0
Share(s)

VOLUME 6 , ISSUE 3 (June 2013) > List of articles

A NOVEL TRI-FACTOR MUTUAL AUTHENTICATION WITH BIOMETRICS FOR WIRELESS BODY SENSOR NETWORKS IN HEALTHCARE APPLICATIONS

Chen-Guang He * / Shu-Di Bao * / Ye Li *

Keywords : BSN, Biosensor, Mutual Authentication, Security, Pattern Vector.

Citation Information : International Journal on Smart Sensing and Intelligent Systems. Volume 6, Issue 3, Pages 910-931, DOI: https://doi.org/10.21307/ijssis-2017-572

License : (CC BY-NC-ND 4.0)

Received Date : 29-September-2012 / Accepted: 16-May-2013 / Published Online: 05-June-2013

ARTICLE

ABSTRACT

User authentication, as a fundamental security protocol, has been addressed with more concerns recently. Unlike normal authentication processes invoked by a user to access the network, biosensors with healthcare applications normally need to be validated automatically, followed by data transmission to the remote server without any explicit request. Hence, implied authentication procedure involved in such application scenarios shall be addressed. In this paper, a novel tri-factor user authentication protocol with mutual access is proposed for the body sensor networks (BSN) in healthcare application. It is demonstrated that the proposed protocol has its advantages over the existing two-factor user authentication schemes.

Content not available PDF Share

FIGURES & TABLES

REFERENCES

[1] M. L Das, “Two-Factor User Authentication in Wireless Sensor Networks”, IEEE Transaction on Wireless Communication, Vol.8, no.3, pp. 25-31, March 2009.
[2] M. L. Das, A. Saxena, and V. P. Gulati, “A Dynamic ID-based Remote User Authentication Scheme”, IEEE Transactions on Consumer Electronics, Vol. 50, no. 2, pp.629-631, May 2004.
[3] A. Tiwari, Sudip Sanyal, A. Abraham, S. J. Knapskog, and Sugata Sanyal, “A Multi-Factor Security Protocol for Wireless Payment Secure Web Authentication Using Mobile Devices”, Proceedings of the IADIS Int’l. Conference on Applied Computing, pp. 160-167, Salamanca, Spain, February 17-20, 2007.
[4] D. Glynos, P. Kotzanikolaou and C. Douligeris, “Preventing Impersonation Attacks in MANET with Multi-factor Authentication”, Proc. of WiOpt'05, pp. 59-64, Trentino, Venezuela, 2005.
[5] C. C. Chang and T. C. Wu, “Remote Password Authentication with Smart Cards”, IEE Proceedings-E of Computers and Digital Techniques, Vol. 138, Iss. 3, pp. 165-168, May 1991,
[6] K. Wong, Y. Zheng, J. Cao, and S. Wang, “A Dynamic User Authentication Scheme for Wireless Sensor Networks”, Proceedings of IEEE Int’l. Conference. on Sensor Networks, Ubiquitous, and Trustworthy Computing (SUTC’06), Vol. 1, Taichung, Taiwan, Jun 5-7, 2006.
[7] Z. Benenson, F. Gartner, and D. Kesdogan, “User Authentication in sensor network (extended abstract)”, Proc. of Informatics’04, Workshop on Sensor Networks, Ulm, German, September 2004.
[8]. M. S. Hwang and L. H. Li, “A new remote user authentication scheme using smart cards”, IEEE Transactions. on Consumer Electron, Vol. 46, Iss. 1. pp.28-30, 2000.
[9] C. K. Chan and L. M. Cheng, “Cryptanalysis of a remote user authentication scheme using smart cards”, IEEE Transactions. on Consumer Electron, Vol. 46, Iss. 4, pp. 992-993, 2000.
[10] A. K. Awasthi and S. Lal, “A Remote User Authntication Scheme Using Smart Cards with Forward Secrecy”, IEEE Transactions. on Consumer Electronics, Vol. 49, Iss. 4, pp. 1246-1248, 2003.
[11] S. W. Lee, H. S. Kim, and K. Y. Yoo, “Comment on ‘A Remote User Authentication Scheme using Smart Cards with Forward Secrecy’ ”, IEEE Transactions. on Consumer Electronics, Vol. 50, Iss. 2, pp. 576-577, May 2004.
[12] A. K. Awasthi, “Comment on ‘A Dynamic ID-based Remote User Authentication Scheme’ ”, Transc. on Cryptology Vol.1, Iss. 2, pp. 15-16, Aug. 2004.
[13] H. F. Huang, Y. F. Chang, and C. H. Liu, “Enhancement of Two-Factor User Authentication in Wireless Sensor Networks”, Proceedings. of the 6th IEEE Int’l. Conference. on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP), pp. 27-30, Darmstadt, German, October 15-17, 2010.
[14]. P. Kumar, M. Sain, and H. J. Lee, “An Efficient Two-Factor User Authentication Framework for Wireless Sensor Networks”, Proceedings. of the 13rd IEEE Int’l. Conference. on Advanced Communication Technology (ICACT), pp.574-578, Phoenix Park, R. Korea, 2011.
[15] M. K. Khan and K. Alghathbar, “Cryptanalysis and Security Improvement of ‘Two-Factor User Authentication in Wireless Sensor Networks’ ”, Journal of Sensors, Vol.10, pp. 2450-2459, 2010.
[16] C. Adams and M. J. Wiener, Multi-Factor Biometric Authenticating Device and Method, U.S. Patent 6,363,485, Mar 26, 2002.
[17] A. Bhargav-Spantzel, A. C. Squicciarini, S. Modi, M. Young, E. Bertino, and S. J. Elliott, “Privacy Preserving Multi-Factor Authentication with Biometrics”, Journal of Computer Security Vol. 15, no. 5, pp. 529-560, 2007.
[18] R. B. Paranjape, J. Mahovsky, L. Benedicenti, and Z. Koles, “The Elechoencephalogram as a Biometric”, Proc. Canadian Conference on Electrical and Computer Engineering, pp. 1363-1366, Toronto, Canada, May 13-16, 2001.
[19] L. Biel, O. Pettersson, L. Philipson, and P. Wide, “ECG Analysis: A New Approach in Human Identification”, IEEE Transactions on Instrumentation and Measurement, Vol. 50, Iss.3, pp. 808-812, 2001.
[20] F. Sufi and I. Khalil, “Faster Person Identification Using Compressed ECG in Time Critical Wireless Telecardiology Applications”, Journal of Network and Computer Applications, Vol. 34, pp. 282-293, 2011.
[21] Y. Y. Gu, Y. Zhang, and Y. T. Zhang, “A Novel Biometric Approach in Human Verification by Photoplethysmographic Signals”, Proceedings of the 4th Annual IEEE Conference on Information Technology Applications in Biomedicine, pp. 13-14, Birmingham, U.K., April 24-26, 2003.
[22] C. C. Y. Poon, Y. T. Zhang and S. D. Bao, “A Novel Biometrics Method to Secure Wireless Body Area Sensor Networks for Telemedicine and m-Health”, IEEE Communications Magazine, Vol. 44, no.4, pp.73–81, 2006.
[23] S. D. Bao, C. C. Y. Poon, Y. T. Zhang, and L. F. Shen, “Using the Timing Information of Heartbeats as the Entity Identity to Secure Medical Body Sensor Networks”, IEEE Transactions on Information Technology in Biomedicine, Vol.12, Iss. 6, pp. 772-779, Nov. 2008.
[24] F. Miao, S. D. Bao, and Y. Li, “A Modified Fuzzy Vault Scheme for Biometrics-Based Body Sensor Networks Security”, Proc. of the 53rd IEEE GLOBECOM 2010, pp.1-5, Miami, USA, Dec. 6-10, 2010.
[25] C. Z. Cao, C. G. He, S. D. Bao, and Ye Li, “Improvement of fuzzy vault scheme for securing key distribution in body sensor network”, Proceedings of 33rd IEEE Int’l Conference Engineering in Medicine and Biology Society (EMBC’11), pp. 3563-3567, Boston, USA, August 30–September 3, 2011.
[26] J. Shen, S. D. Bao, L. C. Yang, and Y. Li, “The PLR-DTW Method for ECG Based Biometric Identification”, Proceedings of 33rd IEEE Int’l Conference Engineering in Medicine and Biology Society (EMBC’11), pp. 5248-5251, Boston, USA, August 30–September 3, 2011
[27] K. Singh and V. Muthukkumarasamy, “Authenticated Key Establishment Protocols for a Home Health Care System”. Proceedings of the IEEE Int’l Conference on Intelligent Sensors, Sensor Networks and Information Processing (ISSNIP), pp. 353-358, Melbourne, Australia, Dec 3-6, 2007.
[28] C. G. He, S. D. Bao, “An Encryption Algorithm Based on Chaotic System for 3G Security Authentication”, Proc. 2nd IEEE Youth Conference on Information, Computing and Telecommunications, pp. 351–354, Beijing, China, Nov 28-20, 2010.
[29] Z. Li, X. Xu and Z. Fan, “Light Weight Trusted ID-Based Signcryption Scheme for Wireless Sensor Networks“, International Journal on Smart Sensing and Intelligent Systems, Vol. 5, no.4, pp.799-810, 2012.
[30] T. Hong, S. D. Bao, Y. T. Zhang, Y. Li and P. Yang. “An Improved Scheme of IPI-based Entity Identifier Generation for Securing Body Sensor Networks”, Proceedings of 33rd IEEE Int’l Conference Engineering in Medicine and Biology Society (EMBC’11), pp. 1519-1522, Boston, USA, August 30–September 3, 2011.

EXTRA FILES

COMMENTS