[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
article

Proposing and verifying a security-enhanced protocol for IoT-based communication for medical devices

Published: 01 December 2016 Publication History

Abstract

Internet of things technology has recently drawn much attention across industries. IoT technology has gradually been applied to industries and everyday life in general including healthcare, where people can access hospital information systems to view personal health and medical information. Still, due to security vulnerabilities, personal health and medical information is prone to hacking attacks. Thus, concerns over privacy invasion have come to the fore, and at the same time security issues are considered to override information services. This paper proposes a communication protocol based on hash lock, session keys, random numbers and security keys designed to be safe against intruders' hacking attempts in information communication between medical devices. Instead of arguing for the safety of the proposed protocol with mathematical theorem proving as in prior research on protocol proving, this paper verifies the safety of the proposed authentication protocol against a range of attacks using a model checking program, Casper/FDR program. In brief, the proposed communication protocol for medical devices is safe and secure against diverse attacks.

References

[1]
Bibri, S.E.: Ethical implications of am i and the IoT: risks to privacy, security, and trust, and prospective technological safeguards. Shap. Ambient Intell. Internet Things 10, 217---238 (2015)
[2]
Punithavathani, D.S., Sujatha, K., Jain, J.M.: Surveillance of anomaly and misuse in critical networks to counter insider threats using computational intelligence. Clust. Comput. 18(1), 435---451 (2015)
[3]
Wei, J., Hu, X., Liu, W.: AnImproved authentication scheme for telecare medicine information systems. J. Med. Syst. 36(6), 3597---3609 (2012).
[4]
Song, J.E., et al.: Security issues and its technology trends in u-healthcare. ETRI Electron. Telecommun. Trends 22(1), 119---129 (2007)
[5]
Cirani, S., Picone, M., Gonizzi, P., Veltri, L., Ferrari, G.: IoT-OAS: an oauth-based authorization service architecture for secure services in IoT scenarios. IEEE Sens. J. 15(2), 1224---1234 (2015)
[6]
Ray, B.R., Abawajy, J., Chowdhury, M.: Scalable RFID security framework and protocol supporting internet of things. Comput. Netw. 67, 89---103 (2014)
[7]
Jincy, J., Sundararajan, S.: Classification mechanism for IoT devices towards creating a security framework. Intell. Distrib. Comput. 321, 265---277 (2015)
[8]
Olivier, F., Carlos, G., Florent, N.: New security architecture for IoT network. Procedia Comput. Sci. 52, 1028---1033 (2015)
[9]
Woo Sik, B.: Formal verification of an RFID authentication protocol based on hash function and secret code. Wirel. Pers. Commun. 79(4), 2595---2609 (2014)
[10]
Lowe, G.: Casper: a compiler for the analysis of security protocols. User manual and tutorial. Version 1.12, (2009)
[11]
Formal Systems (Europe) Ltd, Oxford University Computing Laboratory, "Failures-Divergence Renement," FDR2 User Manual, 19th October (2010)
[12]
Kratz, M., Humenn, P., Tucker, M., Nolte, M., Wagner, S., Seppala, G.,Shadrow, G., Wilson, W., Auton, S.: Health level seven security services framework, HL7 security group (1999)
[13]
Niu, B., Zhu, X.A., Li, Q.C., chen, J., Li, H.: A novel attack to spatial cloaking schemes in location-based services. Future Gener. Comput. Syst. 49, 125---132 (2015)
[14]
Lin, X.J., Sun, L., Qu, H.: Insecurity of an anonymous authentication for privacy-preserving IoT target-driven applications. Comput. Secur. 48, 142---149 (2015)
[15]
Park, R.C., Jung, H., Shin, D.K., Kim, G.J., Yoon, Kun-Ho: M2M-based smart health service for human UI/UX using motion recognition. Clust. Comput. 18(1), 221---232 (2015)
[16]
An Na, K., Leonard, B., Jong Hyuk, P., Young-Sik, J.: A strengthening plan for enterprise information security based on cloud computing. Clust. Comput. 17(3), 703---710 (2014)

Cited By

View all
  1. Proposing and verifying a security-enhanced protocol for IoT-based communication for medical devices

    Recommendations

    Comments

    Please enable JavaScript to view thecomments powered by Disqus.

    Information & Contributors

    Information

    Published In

    cover image Cluster Computing
    Cluster Computing  Volume 19, Issue 4
    December 2016
    625 pages

    Publisher

    Kluwer Academic Publishers

    United States

    Publication History

    Published: 01 December 2016

    Author Tags

    1. Authentication protocol
    2. IoT authentication
    3. IoT security
    4. Model checking
    5. Security protocol

    Qualifiers

    • Article

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)0
    • Downloads (Last 6 weeks)0
    Reflects downloads up to 02 Mar 2025

    Other Metrics

    Citations

    Cited By

    View all
    • (2022)A Survey of Approaches to Unobtrusive Sensing of HumansACM Computing Surveys10.1145/349120855:2(1-28)Online publication date: 18-Jan-2022
    • (2020)Securing the LoRaWAN join procedure using blockchainsCluster Computing10.1007/s10586-020-03064-823:3(2123-2138)Online publication date: 3-Feb-2020
    • (2019)Safe and convenient personal authentication method using Moiré 3D authentication based on biometric authenticationCluster Computing10.1007/s10586-017-1234-422:1(2017-2026)Online publication date: 1-Jan-2019
    • (2019)Verifying a secure authentication protocol for IoT medical devicesCluster Computing10.1007/s10586-017-1107-x22:1(1985-1990)Online publication date: 1-Jan-2019

    View Options

    View options

    Figures

    Tables

    Media

    Share

    Share

    Share this Publication link

    Share on social media