منوی کاربری
  • پشتیبانی: ۴۲۲۷۳۷۸۱ - ۰۴۱
  • سبد خرید

دانلود رایگان مقاله انگلیسی سیستم مانیتورینگ بیمار قوی و ناشناس با استفاده از شبکه های حسگر بی سیم پزشکی - الزویر 2018

عنوان فارسی
سیستم مانیتورینگ بیمار قوی و ناشناس با استفاده از شبکه های حسگر بی سیم پزشکی
عنوان انگلیسی
A robust and anonymous patient monitoring system using wireless medical sensor networks
صفحات مقاله فارسی
0
صفحات مقاله انگلیسی
27
سال انتشار
2018
نشریه
الزویر - Elsevier
فرمت مقاله انگلیسی
PDF
نوع مقاله
ISI
نوع نگارش
مقالات پژوهشی (تحقیقاتی)
رفرنس
دارد
پایگاه
اسکوپوس
کد محصول
E9046
رشته های مرتبط با این مقاله
مهندسی کامپیوتر، فناوری اطلاعات، فناوری اطلاعات و ارتباطات
گرایش های مرتبط با این مقاله
امنیت اطلاعات، شبکه های کامپیوتری، دیتا و امنیت شبکه
مجله
نسل آینده سیستم های کامپیوتری - Future Generation Computer Systems
دانشگاه
Department of Computer Science and Engineering - Indian School of Mines - Dhanbad - Jharkhand - India
کلمات کلیدی
شبکه حسگر بی سیم پزشکی؛ تأیید اعتبار رمز عبور؛ ناشناس بودن کاربر؛ عملکرد Hash؛ ابزار AVISPA؛ منطق BAN
doi یا شناسه دیجیتال
http://dx.doi.org/10.1016/j.future.2016.05.032
۰.۰ (بدون امتیاز)
امتیاز دهید
چکیده

Abstract


In wireless medical sensor network (WMSN), bio-sensors are implanted within the patient body to sense the sensitive information of a patient which later on can be transmitted to the remote medical centres for further processing. The patient’s data can be accessed using WMSN by medical professionals from anywhere across the globe with the help of Internet. As the patient sensitive information is transmitted over an insecure WMSN, so providing the secure access and privacy of the patient’s data are various challenging issues in WMSN environments. To provide secure data access, in the literature very less number of user authentication protocols are available. But, most of these existing protocols may not be applicable to WMSNs for providing user’s anonymity. In this article, we propose an architecture for patient monitoring health-care system in WMSN and then design an anonymitypreserving mutual authentication protocol for mobile users. We used the AVISPA tool to simulate the proposed protocol. The results obtained indicate that the proposed authentication protocol resists the known attacks. In addition, the BAN logic model confirms mutual authentication feature of the proposed protocol. Moreover, an informal cryptanalysis is also given, which ensures that the proposed protocol withstands all known attacks. We perform a comparative discussion of the proposed protocol against the existing protocols and the comparative results demonstrate that the proposed protocol is efficient and robust. Specifically, the proposed protocol is not only effective for complexity and robustness against common security threats, but it also offers efficient login, robust mutual authentication, and user-friendly password change phases.

نتیجه گیری

7. Conclusion


The wireless medical sensor network (WMSN) incorporates the wireless sensor network and mobile communication network. Recently, WMSN is popularly used in patient monitoring system to boosts the quality of life of the patients. In patient monitoring system, the sensor devices sense various health conditions of a patient, and send the sensitive health data it to the medical professional through a gateway node of the WMSN. The patient data is transmitted through an open channel and the protection of it is a big concern in health-care applications. To make secure the patient data over WMSN, in this article, we have designed an architecture to support health monitoring system for WMSN and then proposed a robust anonymous authentication protocol for WMSN. The AVISPA software is used and the proposed protocol is simulated on it to ensure the security attack resilience of the proposed protocol, and the results obtained confirm that the protocol is robust against the known threats. Moreover, the mutual authentication verification of the protocol has been analyzed using BAN logic model. Moreover, we have proved that the proposed protocol is robust against the relevant and known security attacks. We have also measured the complexity of the proposed protocol and compared against the existing protocols. The comparative analysis ensured that that the proposed protocol is more cost-effective and robust and than the existing protocols. In the future, we would like to implement the proposed protocol in Internet-of-Things and cloud environments. Furthermore, the provable security of the proposed protocol will be examined in a computational model and the breaching probability of the adversary to break the proposed protocol will be estimated.


بدون دیدگاه