Bandwidth and power efficient lightweight authentication scheme for healthcare systeme☆☆☆☆☆☆


Jan S. U., Ghani A., Alzahrani A., Saqlain S. M., YAHYA H., Sajjad H.

Journal of King Saud University - Computer and Information Sciences, cilt.35, sa.7, 2023 (SCI-Expanded) identifier

  • Yayın Türü: Makale / Tam Makale
  • Cilt numarası: 35 Sayı: 7
  • Basım Tarihi: 2023
  • Doi Numarası: 10.1016/j.jksuci.2023.101601
  • Dergi Adı: Journal of King Saud University - Computer and Information Sciences
  • Derginin Tarandığı İndeksler: Science Citation Index Expanded (SCI-EXPANDED), Scopus, INSPEC, Directory of Open Access Journals
  • Anahtar Kelimeler: Authentication protocol, Cryptography, Efficiency, Privacy, Reliability, Security
  • İstanbul Gelişim Üniversitesi Adresli: Evet

Özet

With the emergence of the Internet of Things (IoT) and the rapid advancement in sensor technology, wireless medical sensor networks (WMSNs) have become increasingly important in improving health services. WMSNs are deployed for remote monitoring and collecting physiological data of patients for diagnosis and treatment. With the assistance of wearable and mobile devices, IoT-based innovative healthcare solution is extensively adopted to provide better, more precise, and quicker diagnoses. However, the WMSN of healthcare is bandwidth limited and has low latency, while the resource-limited sensors and tremendous IoT output cannot run on practiced security protocols that involve complex encryption/decryption operations. A security system that requires minimal computation and communication time to reduce delay and save the devices’ power source is much needed. Therefore, this article presents a lightweight and robust authentication protocol for the healthcare system that can be used with power and bandwidth-limited devices. Furthermore, this scheme uses random numbers instead of complex encryption/decryption to reduce computation time and energy consumption. The security and performance analysis results show that the proposed method performs better than its competitors regarding security, communication, and computation costs and prolongs the network lifetime.