Journal of Healthcare Engineering

Journal of Healthcare Engineering / 2021 / Article
Special Issue

Advancements in Computational Model-based Medical Image Analysis

View this Special Issue

Research Article | Open Access

Volume 2021 |Article ID 9954089 | https://doi.org/10.1155/2021/9954089

Saeed Ullah Jan, Sikandar Ali, Irshad Ahmed Abbasi, Mogeeb A. A. Mosleh, Ahmed Alsanad, Hizbullah Khattak, "Secure Patient Authentication Framework in the Healthcare System Using Wireless Medical Sensor Networks", Journal of Healthcare Engineering, vol. 2021, Article ID 9954089, 20 pages, 2021. https://doi.org/10.1155/2021/9954089

Secure Patient Authentication Framework in the Healthcare System Using Wireless Medical Sensor Networks

Academic Editor: Dilbag Singh
Received04 Apr 2021
Revised04 Jul 2021
Accepted10 Jul 2021
Published23 Jul 2021

Abstract

Biosensor is a means to transmit some physical phenomena, like body temperature, pulse, respiratory rate, electroencephalogram (EEG), electrocardiogram (ECG), and blood pressure. Such transmission is performed via Wireless Medical Sensor Network (WMSN) while diagnosing patients remotely through Internet-of-Medical-Things (IoMT). The sensitive data transmitted through WMSN from IoMT over an insecure channel is vulnerable to several threats and needs proper attention to be secured from adversaries. In contrast to addressing the security of all associated entities involving patient monitoring in the healthcare system or ensuring the integrity, authorization, and nonrepudiation of information over the communication line, no one can guarantee its security without a robust authentication protocol. Therefore, we have proposed a lightweight and robust authentication scheme for the network-enabled healthcare devices (IoMT) that mitigate all the identified weaknesses posed in the recent literature. The proposed protocol’s security has been analyzed formally using BAN logic and ProVerif2.02 and informally using pragmatic illustration. Simultaneously, at the end of the paper, the performance analysis result shows a delicate balance of security with performance that is often missing in the current protocols.

1. Introduction

A healthy human body is a prerequisite to happiness, mental ease, and calm existence. Such a body ensures a sound and robust mind too. On the other hand, an unhealthy physique necessitates caring, treating, diagnosing, and preventing a human for injury or any other illness collectively termed as a healthcare system. While managing healthcare, sight negligence can upset the whole process and may turn counterproductive. This negligence and the flawed nursing system are an embarrassment for patient monitoring due to the attached modules to the human body and recurrent power supply. Each time replacement of power-source can also create serious risks for the patient’s life. To ease the work of the whole team and stop human errors and aid the medical professional in examining a patient for a disease, technology and network-oriented devices (Internet-of-Medical-Things (IoMT)) are used that guarantee an authentic result [1]. IoMT facilitates healthcare personnel over the Internet and a decision control system without human-patient or patient-computer interaction. Such emerging technology needs novel services for grasping the attention of healthcare industries for the remote monitoring of their patients. This remote monitoring will not only minimize the cost of a disease for a layman, but also provide the facility for the maximum diagnosing of a patient in this crowded world [2].

Similarly, the healthcare industries are ever-growing, taking over 20.4bn technological interconnected and network-enabled devices. These devices have communication competencies that remotely collect patient information and send it to medical professionals for examination and treatment recommendations. However, the transmission of such sensitive data (body temperature, oxygen saturation, the glucose level in the blood, respiratory rate, heartbeat/pulse rate, etc.) is performed via an open network channel, vulnerable to several threats. It needs proper attention to make it secure. Security, communication, and computation cost or media consumption are also necessary, so that a doctor may easily recognize hand gestures, blood vessels contraction/relaxation, the flow of message in the neuron, and central nervous system (CNS) response of a patient, etc. Attention is also needed for a robust detection system, different color recognition, and stereo sequence of an image control via media [3].

The data acquisition and processing competencies of scalable and practicable devices/machines, interconnected devices, embedded sensors, and installed software applications that can push data flow for patient monitoring are at peak today. After sensing the patient, data is transmitted to the medical professional with wireless networks named Wireless Medical Sensor Network (WMSN) (WMSN is a type of self-organizing network with multiple or mini-embedded sensors inside the human body to sense physical conditions with wireless connectivity. The working procedure of WMSN is to transport data among different participating entities or in the coverage area. WMSN is the fundamental foundation of Internet-of-Medical-Things (IoMT) that can enhance patients’ medical treatment) to practice for the diagnosis and medical care. The mutual authentication and cross-verification of each participating entity for such a sensitive transmission are impossible without a key-agreement protocol. It not only facilitates patients at home but is useful in diagnosing various types of diseases as well. Besides, health experts, too, are assisted in assessing and giving advice. While patients’ data and physicians’ diagnoses are linked/transferred via an open network channel, slight negligence may not only be detrimental and counterproductive, but will shatter people’s trust as well. Therefore, it needs extra care and a renewed approach to tackle the issues [4].

Amin et al. [5] proposed the scheme for communicating patient-sensitive information to the doctor/medical professional for diagnosis, which is vulnerable to man-in-the-middle, privileged insider attacks, and lack of mutual authentication. We proposed an improved, lightweight authentication framework that mitigates these weaknesses. The proposed scheme’s security has been analyzed using the BAN logic and Provierif2.02 toolkit with an informal discussion for justification. The evaluation results show that the scheme is lightweight in contrast to the state-of-the-art protocol in recent literature. As such, we recommend the proposed protocol for practical implementation in the healthcare online patient diagnoses environment. The main contributions of the research are as follows:(1)In IoMT, the medical professionals having mobile-device can securely obtain the real-time patient’s status for diagnosing(2)The outdated data broadcasting flaw common in prior protocols designed for the healthcare system has been fully addressed in this research work(3)A simple hash cryptographic function and public-private key pair are used for designing the security protocol that is lightweight and balances performance with security for the fast, reliable, consistent, and low-latency Wireless Medical Sensor Network (WMSN)(4)The sensor revocation/reissue phase demonstrates that, upon stolen or misplaced sensor or mobile device at any time, no one can assess the internally stored credentials, which means that the prospective scheme is free of offline/online identity guessing and stolen-verifier attacks(5)The protocol’s security has been scrutinized both formally using BAN logic and informally using realistic illustration, showing the protocol’s robustness(6)The protocol’s scalability, reachability, integrity, and authorization, as well as security features, have been achieved using ProVerif2.02 simulation

1.1. System Model

The wireless technology for the healthcare industry and installed applications in network-enabled devices can communicate seamlessly to the proper device via WMSN, which has limited battery capacity and low latency. It offers back-end services, quick and intelligent network features for IoMT in healthcare services delivery, while the embedded sensors in the human body can collect and communicate physical conditions to the gateway node using the said limited featured wireless network, for example, (i) visual sensor for sight checkup, (ii) pressure sensor on examining the breath duration of a patient or stress of central nervous system (CNS) or the lower part of the mouth, (iii) temperature sensor for finding the normal body heat, (iv) oxygen saturation sensor for oxygenated blood monitoring, (v) EEG/ECG/MRI sensor is for heart and other parts checkup, (vi) ventilator sensor to provide oxygen continuously to a patient, and (vii) imaging, treatment, diagnosing, and data analytics, etc.

Figure 1 represents the system model or architecture in this paper having four (04) main participants: online service provider for the healthcare system (Certificate Authority), the gateway node (GW), a set of sensors inside the patient body, and external user (medical professionals). The certificate authority (CA) is a specialized company that provides connectivity, data processing, and real-time problem-solving capabilities. The gateway node (GW) is an essential component of the system. All sensors and mobile devices used by patient/medical professionals must be fitted with a gateway node (GW) and connected with alternative network services such as 5G, 6G, and other wireless communication interfaces. The external user (medical professional) can access a designated sensor (patient monitoring) from some ward/location/area. When a patient is in a specialized region or location, the gateway node (GW) controls data broadcasting and verifies the patient’s validity. The identification of illegitimate sensors or patient or mobile device or medical professional in the designated area or location or any place may also be easily recognized due to the capability of the intermediary agent (gateway-node (GW)).

It is noteworthy that the Certificate Authority (CA) is officially a fully trusted entity. Their confidence must be consistent, because the trust deficit may impair the system's reliability. The proposed scheme ensures that the registration center can be fully trusted by the patient/sensor/medical professional and the gateway node (GW). In contrast, any other entity alone may not be fully trusted.

1.2. Threat Model

The Dolev and Yao [6] model tells us about an adversary’s authority between two communicating bodies through an open network channel. According to this model, all the possibilities with an attacker are as follows:(i)An adversary might extract the stored data from the GW memory/sensor/mobile device of a medical professional and verify some credentials(ii)An adversary might alter, delete, update, corrupt, or inject false information on participants’ communication over a public network channel(iii)Adversaries can also have the capabilities to replay, modify, or delete the beneficial information exchange among the participants over a private channel(iv)An adversary can also obtain the internal sensitive credentials from a stolen sensor/mobile device of a medical professional or from the memory of misplaced sensor/mobile device of medical professional either by reverse engineering technique or by using some critical tags in offline mode, but cannot do both at the same time

With an adversary, our threat model additionally includes the following possibilities:(1)Privacy ThreatSuppose that an adversary uses aircrack-ng software to extract sensor locations and other helpful information from stolen data packets. In that case, they are using airodump-ng software to detect signal strength, filtering it for additional attacks, and disrupting the synergy by utilizing airplay-ng software to deauthenticate it. The attacker also has the chance to disrupt the entire network by transferring disassociation packets frequently to disguise its normal operations.(2)Stolen-Verifier ThreatSuppose that an attacker can physically steal the mobile device of a medical professional or sensor used by a patient and vice versa, or if it is misplaced, lost, or destroyed somewhere from a legitimate user, an adversary can attack it in order to obtain access to the information recorded in the sensor’s/mobile device’s memory. After that, they can reveal the encrypted data and begin authentication with another hospital’s gateway node or sensor used by other medical professionals or patients.(3)Traffic Analysis ThreatSuppose that an adversary can drill the data from IoMT and control the communication channel traffic of broadcasting information towards the sensors. The traffic also consists of sensitive patient’s physical phenomenon packets transferred between a medical professional’s sensor/mobile device and a gateway node; after the adversary’s forensic, the packets in traffic can reveal sensitive information about the system. The adversary evaluated it to see if it might be used as a threat.(4)Access Control ThreatThe adversary also can understand the different policies and inject false information in the communication path, which connects the different participants for useful information exchange. They can also gain complete control of the channel by examining the overall system activities.(5)Identity Spoofing ThreatAn adversary can obtain the identity of a legitimate participant in the system and maliciously spoof/fool the system. If they become successful in getting legitimate participants’ identities, they can easily control the communication line for altering, deleting, or injecting false information in it.

1.3. General Architecture of the Network Model

As explained earlier, the main participants in the proposed system are Certificate Authority (CA), Gateway Node (GW), Sensor Node (SN), and Medical Professional (Mobile-Device). The general working scenario of the system is as follows:(i)Gateway node, sensor node, and a medical professional will first register with the certificate authority(ii)Intelligent sensors embedded inside the patient’s body can sense physical phenomenon and broadcast it towards the gateway node through resource constraint WMSN(iii)From the gateway node, with the help of WMSN, the data is transmitted toward medical professionals for possible diagnosis

The diagrammatic representation of the proposed framework is shown in Figure 2.

2. Literature Review

Advances in technology for IoMT devices to transmit data of the healthcare domain and communicate with one another are increasing rapidly, and its security is a challenging task. Since their interconnectivity is vulnerable to several threats like other network-enabled devices, therefore, it needs to be appropriately authenticated with each other. Recently, Singh et al. [7] proposed a framework for orthopedics patients in the pandemic period of COVID-19. Such a patient is unable to attend the hospital for treatment due to chances of Corona. They demonstrated how the orthopedics’ patient could use it for his/her healthcare at home while being remotely connected with the hospital. The connectivity of both patient and doctor with the hospital using cloud computing is mandatory. Cloud computing offers infrastructure in three specific models, i.e., Software as a Service (SaaS), Platform as a Service (PaaS), and Infrastructure as a Service (IaaS). However, the stakeholders’ cloud-saved database usage can create security and interoperability issues; therefore, [7] failed to design a dynamic authentication scheme for the participants. Alsubaei et al. [8] proposed an IoMT security assessment software framework for the developers/hospitals. But they failed to express the secure authentication of associated devices for examining a patient. Sanaz et al. [9] presented secure IoT-Based e-Healthcare architecture for patient monitoring. They installed an intelligent gateway among all the participants during patient monitoring. They proposed an authentication protocol that authenticates all the entities, including an embedded sensor inside the patient for sensing patients’ data, time, temperature, and location intelligently, and transmits them to the health professional. A certificate-based methodology was adopted for the transport layer to work on Wireless Medical Sensor Networks (WMSNs), having a gateway node, a full-power computer system, and application software.

Subsequently, Lee et al. [10] suggested that a high-speed ICT tool can remotely be diagnosing a patient by monitoring and supervising his/her physical phenomenon, so that treatment costs can be minimized. They stated that the Graphical Processing Unit (GPU) is mandatory to reduce the load on the CPU during patient-sensitive data processing. However, they used simple encryption/decryption functions, which are not insufficient for security, privacy, and parallel computation. Rahimi et al. [11] enhanced the Datagram Transport Layer Security (DTLS) between the gateway nodes, patent, and medical professional. In addition, they stated that there is no need for a certificate for session initiation among the participants. Gope et al. [12, 13] suggested a useful structure for IoMT applications for data collection and interpretation based on privacy-preserving (P2DCA). Their architecture splits an interconnected network of integrated multimedia sensors into several clusters. A Cluster Head (CH) was defined as a bunch responsible for protecting the privacy of member MSNs and collecting data and location coordinates. Later, grouped multimedia data was analyzed on the cloud server using an artificial neural network for counterpropagation to extract meaningful information through segmentation. To integrate the infrastructure with mobile devices and overcome the shortage of medical services, Usman et al. [14] proposed an authentication protocol that mitigates medical resource misuse. A patient used its user’s name and password on a mobile device to sign in to the public. It is without a password and identity table in the database. It satisfies specific standard protection criteria like protecting against offline password guessing attacks, replay attacks, impersonation attacks, man-in-middle attacks, and insider attacks. However, during decision-making at any crucial time, strong encrypted, authentic, and digitally signed information might be difficult to access even for a legitimate user and also vulnerable to known-key and forgery attacks.

Moghaddam et al. [15] implemented a client-based user authentication agent to validate client-side user identity; SaaS has been used to validate unregistered machines’ authentication. The scalability, efficiency, security, man-in-the-middle attack, brute force attack, and timing attack have been evaluated according to the parameters. However, they used two separate servers for authentication and cryptography, which is the wastage of resources. Because the same can be managed from a single centralized server, this might decrease the overall cost and increase security. Satheesh et al. [16] proposed a framework for security and privacy in the healthcare system. Patient-centric confidential information and access control with an improved method of encryption was considered. A digital signature algorithm (DSA), patient pseudoidentity, and personal sensitive information protection were identified. The researchers addressed an enhanced security model for authentication and authorization to discover a new technique that can build security, privacy, and cross-verification of e-healthcare credentials. Allouzi and Javed [17] suggested a framework for authentication of health care devices called Soter. It offers a range of advanced features, such as trust of medical devices, promoting virtual federations, and a trust circle for customized and dynamic access control policy. It is worth noting that when an adversary can get a patient’s login information by calling close to him, he/she can account for a hijacking attack on it. [1820] proposed a cryptographic-based authentication framework, but such frameworks do not provide a fast and secure authentication mechanism, because the performance and security are unable to match each other. The researchers of [21, 22] designed a robust protocol for WMSN, in which multimedia type message was securely transmitted among peers. Still, the networks have not been fixed during multimedia message transmission and created hurdles for the end-user. Shrestha et al. [23] suggested a privacy-protection authentication scheme for healthcare information systems, in which they used digital signatures.

A blockchain is also a means of security for protecting healthcare system records. In this regard, Mikula and Jacobsen [29] proposed a blockchain-based authentication scheme for a centralized digital system. Their approach was implemented in the healthcare domain, in which fundamental patient data of size 3.8 MB has been executed in 2-3 seconds. Immutable data history has shown slow execution and wastage of resources data concerning patients. Further, Das et al. [30] proposed a dynamic identity-based authentication scheme that can resist forgery attacks, insider attacks, stolen verifier attacks, and guessing attacks. However, their strategy is suffering from a privileged insider attack, as the password and identity are transmitted from the user openly towards the server. Kumari et al. [31] provided high-level protection without reducing cloud/fog computing performance, mostly when IoMT is used, and they named it Fog-based Access Control Model (FACM). A cloud-based approach is applied in either mobile or nonmobile context, operating as an additional layer for fog servers, and can offer personalized access control environment. However, the execution time is related to several inputs. Upon increasing intakes, the model’s performance will be degraded and vulnerable to impersonation and parallel session key attacks and lacks mutual authentication.

Finally, Rathore et al. [32] demonstrated a novel multilayer perception model for securely diagnosing diabetic patients. They said that the insulin pump inside a patient that controls blood glucose transmits patient sensitive information via the wireless channel and can easily be compromised. Neural-network-based multilayer security can provide security to the embedded medical device inside the patient. Their study revealed 91% accuracy upon an evaluation of the linear vector machine. However, still, no one can trust its reliability for such a sensitive treatment. Wu et al. [33] used Identity and password for designing a protocol via WMSN and healthcare applications. They said that, to overcome the noted disadvantages in their designed protocol, a novel approach is required. Their scheme attracts the modern healthcare industry, in which a paramedical professional can examine patent data remotely using a mobile device. However, because there are no encryption/decryption functions, their scheme is vulnerable to stolen-verifier attacks and privileged-insider attacks. Some related literature review is comprehensively described in Table 1.


ReferenceTechnique usedMain contributionLimitation

[24]KlonoffCertificate-based datagram transport layer security (DTLS)The proposed scheme consists of a secure and efficient end-user authentication and authorization architecture based on the certificate based DTLS handshake, secure end-to-end communication based on session resumption, and full mobility based on interconnected gatewaysThe authentication is performed in several steps, due to which multiple round trips can degrade the performance of the process. Also, the securities of the said architecture can easily be breached by an attacker

[25]Borthakur et al.Access-control determination (ACD) algorithmThis work proposes a fine-grained access control mechanism suitable for various implementation scenarios, including data storage, directories, and file managementThe execution time length is associated with the number of the input task. Therefore the performance will be degraded by increasing the number of input tasks

[26]Dastjerdi and BuyyaBLE bonding processThis paper addressed some of the fundamental problems. In designing, implementing, and deploying an end-to-end healthcare application that leverages the advantages of the fog computing approachIf the number of corresponding ECG devices increases, more storage will be required, and throughput will be reduced

[27]Engineer et al.Contextual-based access control (CBAC) technique and role-based access control (RBAC)The paper suggested service-oriented security architecture in the IoT environment for remote medical services. The proposed framework accommodates dynamic security elements and requirements regarding different kinds of usersThe proposed framework reduces sensitive information exposure by applying a security channel and encryption during the transmission of sensitive information between network parts

[9]Sanaz et al.Lightweight anonymous authentication protocolA secure IoT-based healthcare system was proposed using BSN, called BSN-Care, which can efficiently accomplish various security requirements of the BSN-based healthcareThe proposed work can have stolen verifier attack, replay attack, and anonymity issue

[20]Wang et al.Machine learning/deep learningThis paper introduces a novel ECG-based biometric authentication approach that utilizes legendre polynomial extraction and MLP classifier for identification and authorizationLack of standardization, not accommodate changes to the biometric overtime, sample collection phase is influenced by environmental and mental conditions

[28]Akrivopoulos et al.Physical unclonable functions (PUFs)This paper presents a PUF based device authentication protocol capable of authenticating devices without demanding high CPU power from the end devicesNo information about the end device is directly stored on the server, requiring an extra layer of security

3. Review Analysis of Amin et al. Protocol

Amin et al. [5] proposed a scheme for IoMT using WMSN in the healthcare domain. Their protocol consists of four phases, i.e., setup phase, registration phase, login and authentication phase, and password change phase. Each of these phases is described one by one under the following headings; notations used in their scheme and their description are shown in Table 2.


SymbolDescription

UiaMedical professional
SNjaSensor node
IDiaUser’s identity
KGateway secret key
R1, R2, R3Random numbers
||Concatenation function
GWGateway node
PWiaUser’s password
IDSNjSensor nodes identity
TIDiaTemporary-identity generated by GW for Uia
h(·)Collision-free hash-operation
Bitwise XOR operation

3.1. Setup Phase

The registration center (RC) first selects a secrete key K for the gateway node (GW) and calculates SKGW-SNj = h(IDSNj||K). In contrast, n is the number of embedded sensors inside the patient’s body, and its jth value lies between 1 and n (1 ≤ j ≤ n). The collision-free one way-hash cryptographic function is also defined here in this phase of the protocol as h:{0, 1} ⟶ {0, 1}l.

3.2. Registration Phase

For user’s registration, a legitimate user Uia provides IDia, PWia, and computes HPW = h(IDia ⊕ PWia) and relays {IDia, HPWia} towards gateway node (GW) via a secure channel. Upon receiving {IDia, HPWia} message, the GW calculates Regia = h(IDia||Ria||HPWia), Aia = HPWia, Bia = h(IDia||Ria||K), Cia = Bia ⊕ h(IDiaRia ⊕ HPWia), and Dia = Ria ⊕ h(TIDia||K). It stores {TIDia, Dia} in its database and sends {TIDia, Regia, Aia, Cia, h(·)} towards user Uia over a secure channel, where the user can also store all these parameters in its memory, while, for a patient’s registration, he/she first provides his/her name to the registration center (RC). RC assigns the requisite sensor and sends it to the medical professional for future monitoring, prescription or diagnosis.

3.3. Login and Authentication Phase

The login and authentication phase of [5] has been completed in the following steps:(i)In this phase of the protocol, the user Uia provides identity IDia and password PWia using hand-held device (Smart Phone) and computes  = h(IDia ⊕ PWia),  = Aia ⊕ HPWia,  = h() and confirms ? = Regia; if a match occurs, further computation is performed; else, termination message is displayed. It generates an arbitrary number R1 and computes  = Cia ⊕ h(IDia ⊕ ||HPWia), CIDia = IDia ⊕ h(TIDia||||T1), M1 = h(IDia||||R1||T1), M2 = h(Ria||T1) ⊕ R1 and relays {TIDia, IDSNj, CIDia, M1, M2, T1} towards gateway node (GW) via a public network channel.(ii)The gateway node finds TIDia in its storage table, extracts Dia, and computes  = Dia ⊕ h(TIDia||K),  = CIDia ⊕ h(TIDia||||T1),  = h(||||K),  = M2 ⊕ h(||T1), and  = h(||||||T1) and confirms ? = M1; if not matched, authentication is denied; else, gateway node generates another arbitrary number R2 and computes SKGW−SNja = h(IDSNja||K), M3 = h(h(h(IDia||||R2))||SKGW−SNja||R2), M4 = h(IDia||R1||R2) ⊕ SKGW−SNja, M5 = R2 ⊕ h(SKGW−SNja) and relays {M3, M4, M5} message towards senor node (SNj) via a public network channel.(iii)The SNj computes  = M5 ⊕ h(SKGW−SNja),  = M4 ⊕ SKGW−SNja,  = h(h(||1)||SKGW−SNja|| ) and confirms ? = M3; if matched, sensor node produces a third arbitrary number R3, calculates SK = h(||R2||R3), M7 = h(SK||R3||SKGW−SNja), M8 = h(R2) ⊕ R3, and sends {M7, M8} message towards GW via the same public network channel.(iv)The GW computes  = M8 ⊕ h(R2), SK/ = h(h(IDia||R1||R2)||R2||),  = h(SK/||||SKGW−SNja) and confirms ? = M7; if matched, it produces a temporary identity , calculates M9 = R2 ⊕ h(IDia||R1), M10 = h(IDia||SK/||), M11 =  ⊕ h(R2 ⊕ R3), and transmits {M8, M9, M10, M11} message towards user over the same insecure channel.(v)The user calculates  = M9 ⊕ h(IDia||R1),  = M8 ⊕ h(),  = M11 ⊕ h( ⊕ ), SK = h(h(IDia||R1s  = h(IDia||SK||) and confirms ? = M10; if matched, it relays a confirmation acknowledgement message towards GW and modifies TIDia to , while the gateway node calculates the fresh value  = Ria ⊕ h(||K) and interchanges {TIDia, Dia} with the new calculates values {, }.

3.4. Password Change Phase

If a legitimate user wishes to change his/her password, the protocol provides password change facility in a secure way. The user provides his/her IDia, and PWia the computations performed are HPWia = h(IDia ⊕ PWia),  = Aia ⊕ HPWia, = h (IDia||||) and confirm ? = Regia; if not matched, a denied message is displayed on the user’s screen; else, the user is asked to enter a new password. Upon receiving the password change message, the user is now able to enter a fresh password of his/her own choice and computes  = h(IDia ⊕ ),  = h(IDia|| ||),  =  ⊕ , Bia = h(IDia||Ria||K),  = Bia ⊕ h(IDia ⊕  ⊕ ) and replace {Regia, Aia, Cia} with{, , }.

3.5. Cryptanalysis of Scheme [5]

By applying the Dolev and Yao [6] model, we find the following weaknesses in Amin et al. protocol:(1)Masquerade AttackAn attacker can quickly identify the secret credentials from CIDia = IDia ⊕ h(TIDiaǁǁT1) and M2 = h(RiaǁT1)R1. The adversary first recovers IDia from CIDia, and then R1 from M2. These two are crucial parameters, and once an attacker gets access to these, he/she can masquerade the system.(2)Privileged Insider AttackLet a user Uia transmit identity IDia and password PWia towards gateway-node (GW). The system operator, in which he/they can use the system, can quickly identify user credentials by either guessing password or computing  = h(IDia ⊕ PWia) and run tuples to correct the password.(3)Man-In-The-Middle AttackIn such a scheme, authors do not share the synchronized resource’s detail. For example, after a successful login of the medical professional to monitor his/her patient, such scheme missed the secure log out procedure of him/her. According to the given scenario, the mutual authentication and cross-verification key are still stored in the synchronous storage. An attacker can easily copy and launch a man-in-the-middle attack, desynchronizing the shared resources, and can hang the system proper operations.(4)Password Change Phase IssueAn attacker can easily initiate a new password request by using the power analysis technique. He/she first reaches TIDia, Regia, h(·), Aia and Cia and calculates Aia ⊕ HPWia and h(IDia||||) by confirming ? = Regia; if matched, he/she can get the message “Enter your new password,” which is, in turn, harmful for the system.(5)Anonymity ViolationAccording to such scheme of [5], the messages are transmitted over insecure channels like {TIDia, IDSNja, CIDia, M1, M2, T1}, {M3, M4, M5}, {M7, M8}, and {M8, M9, M10, M11} and in such way, an attacker can easily detect the medical professional due to the match of extracted values/random number from M2, M5 and M8, i.e., R1, R2, and R3. These random numbers can be quickly figured out by an adversary, for whom he/she can easily trace the paramedical professional’s location. Also, the attacker can disturb privacy and can quickly launch a traceability attack. Therefore, the scheme suffered from traceability attacks and could not withstand the privacy and legitimacy of a user, either patient or paramedical professional. Also, in the Identity, IDia and IDSNj are transmitted openly, in which an attacker can easily pick and launch an attack some other time.(6)Traceability AttackAccording to the scheme, the messages CIDia = IDia ⊕ h(TIDia||||T1), M2 = h(Ria||T1) ⊕ R1, M4 = h(IDia||R1||R2) ⊕ SKGW−SNja, M5 = R2 ⊕ h (SKGW−SNja), and M8 = h(R2) ⊕ R3 are transmitted over a public network channel openly, in which an adversary can catch and figure out credentials by specifying location by repeatedly monitoring different sessions started by the same user. To prevent the adversary from figuring out any identity or tracing any credentials like the exact location of a legitimate user, it must be transmitted securely or linked with a vigorous session shared key (SK).(7)Mutual Authentication IssueThe gateway node computes the session key as SKGW−SNja = h(IDSNja||K), and the sensor node SK = h(||R2||R3). In the second round, the gateway node computes the shared session as SK/ = h(h(IDia||R1||R2)||||) and user SK = h(h(IDia||R1||)||R2||), which means that the key between the user and gateway node is computed. Still, the sensor embedded in the patient does not know about the shared session key. Therefore, the scheme is failed to deliver mutual authentication and cross-verification with/of all the participants.(8)Lack of Revocation/Reissue PhasesBesides the drawbacks mentioned above, [5] did not explain the expansion/recede of the network by the addition/revocation of a new patient/professional. The scheme has missed explaining sensor/patient revocation/reissue or professional revocation/reassignment phases.

4. Proposed Solution

We will use critical public infrastructure to generate dynamic numbers for each session for such a resource deficit environment. The scheme consists of the setup phase, registration phase, key-agreement phase, password change phase, and revocation/reissue phase; each of these is discussed one by one under the following headings:

4.1. Setup Phase

Extract a prime P, the CA first generates two random numbers x, y of size 160 bits, compute a secret key s = xP, and l = sP called a public key, collision-free hash function H(·):{0, 1}⟶{0, 1}l. Keep (IDSNj||s) in sensor node, s, and l in gateway-node, which is the key role in the whole system.

4.2. Registration Phase

This phase consists of two subphases, including patients’ and medical professionals’ registration subphases, which are described as follows:(1)Patient’s RegistrationA patient first sends his/her name to the CA. CA allocates the requisite accurately and offers/entitles the services to medical professionals. CA also shares a patient’s Identity and assigned sensor information to a medical professional.(2)Professional Registration PhaseThe user selects identity IDia, password PWia, nonce Nia and computes DPWia = h(PWia||Nia||IDia), DIDia = h(IDia||Nia) and transmits {DPWia, DIDia} to gateway node over a secure channel. The gateway node has already a secret key s and computes A = h(IDia||DIDia||s), B = h(IDia||DPWia||s), C = A ⊕ B and O=C ⊕ h(IDgwt||s). The gateway-node (GW) stores O and sends {A, B, C, h(·)} towards user over a secure channel and stores all these parameters in its own record too as shown in Figure 3.

4.3. Key Agreement Phase

This phase of the proposed protocol is accomplished in the following steps:(i)A user provides his/her identity, and password computations performed are HPW = h(IDia ⊕  PWia), A = h(IDia||s||HPW), confirms A? = A; if not found valid, computation stops; else, it generates R1, s and computes B = C ⊕ h(IDia ⊕ A||HPW), F = B ⊕ h(s||A||T1), J1 = h(IDia||B||R1||T1), J2 = IDia ⊕ h(s||T1) and L1 = El(J2||R1||s). Finally, it relays {IDSN, F, L1, T1} towards gateway node (GW) over public channel.(ii)Verifies timestamp, T1, decrypts L1 using s to obtain IDia, R1 and s. Next, it extracts O from the already stored record in gateway node (GW) and computes O = k⊕h(IDSN||s) and confirms O? = O; if not matched, computation stops; else, it computes  = F ⊕ h(l||A||T1), B = h(||A||l),  = J2 ⊕ h(A||T1), J1 = h(||B||||T1) and again confirms J1? = J1; if not matched, the process terminated; else, it generates R2 and computes sk = h(IDSN||l), L3 = h(h(h(IDia||||R2))||IDSN||R2), L4 = h(IDia||R1||R2) ⊕ sk, L5 = R2 ⊕ IDSNj and L6 = El(IDSN||R1||R2||L5). In this step of the login and authentication phase, the gateway node forwards {L3, L4, L5, L6} message towards sensor over a public network channel.(iii)Upon receiving the {L4, L5, L6} message, the sensor node first decrypts L6 using s to obtain IDSN, R1, R2 and L5 and computes  = L5 ⊕ sk, L7 = L4 ⊕ sk, L8 = h(h(L7||IDP)||sk||),  = h(h(h(IDia||||))||IDSN||R2) and confirms ? = L3; if not matched, termination of the whole process takes place; else, it generates R3 and computes sk = h(h(IDia||R1||)||R2||R3), L9 = h(sk||R3||R1||), and L10 = IDia||||R2||R3 and sends {L9, L10} to GW over public channel.(iv)Further, GW computes and calculates  = L9||R2, sk/ = h(h(IDia||R1||)||R2||),  = h(sk/||||R1||) and confirms ? = L9; if found not valid, the process becomes terminated; else, it produces l and calculates L11 = El(h(IDia||R1) ⊕ R2), L12 = h(IDia||sk/||), L13 = Ek(IDSN||l||L11) and transmits {L11, L12} towards user over a public network channel.(v)The user first decrypts L11 using s to obtain IDSNj, R3, L10 and calculates  = L11 ⊕ h(IDia||R1),  = L10||, A/ = L13||h( ⊕ ), sk = h(h(IDia||R1||)||R2||),  = h(IDia||sk||) and verifies ? = L11 and keeps sk, sk/and sk session shared keys in each peer for secure message transmission among all the participants as shown in Figure 4, while general framework of the system is shown in Figure 5.

4.4. Revocation/Reissue Phase

This phase of the protocol is performed between the user’s device and gateway node. The following steps are performed in this phase of the protocol.(i)The user provides his/her previous identity IDia, password PWia, selects new identity and computes A1 = h(||R1), B1 = O ⊕ A1, C1 = IDia ⊕ B1 and transmits {IDia, , A1, C1} towards the gateway node over a secure channel.(ii)Upon receiving the {IDia, , A1, C1} message, the gateway node computes  = h(s||l||A1),  = IDia ⊕ , and confirms ? = C1; if not hold, the process is terminated; else, it computes: V1 = h(||A1), O1 =  ⊕ A1, F1 = El(A1||s||l) and stores {V1, O1, F1, h(·)} in its database and transmits it also to the medical device over a secure channel. In this regard, the sensor cancels/evokes/reissues that the process has been made successfully.(iii)Further, if the medical professional desires to evoke/cancel/reenter, CA asks for entering the Identity IDia, and password PWia of the medical professional and computes: W = h(IDia ⊕ PWia), Y = h(IDia||s||W). CA confirms W and Y in its database; if not correct, the process is terminated; else, CA changes the status of a medical professional as inactive. CA also relays the revocation message to the patient to revoke the medical professional’s credentials and transmits the changed status back to CA. Finally, CA also updates the gateway node to revoke the specified medical professional.

4.5. Password Change Phase

If a user desires to change his/her password, this protocol provides a password change facility to change the old one with a new one securely. The following steps are performed while changing the password:(i)The user provides his/her Identity IDia, and old password PWia via its mobile device. The computations performed are DPWia = h(IDia ⊕ PWia), A = h(DIDia||s||), and confirm A? = A; if not matched, a denying message will display on the user’s screen; else, it computes h(IDgwt||s) ⊕ Nia and O? = O and user is asked to enter the new password.(ii)Upon receiving the password change message, the medical professional is now able to enter a fresh password of his/her own choice, and computes: DPWnew = h(IDia ⊕ ), Anew = h (IDia||s||DPWnew), Onew = A ⊕ DPWnew, Bnew = h (IDia||s||l), Cnew = Bnew ⊕ h(IDia ⊕ A ⊕ DPWnew) and replaces {A, O, C} with{Anew, Onew, Cnew}.Therefore, the medical professional can easily change his/her password without interacting with the gateway node and the senor, as shown in Figure 6.

5. Security Analysis

In this section, the security analysis of the proposed scheme can be performed both formally and informally. The formal security proof will be performed using a BAN logic and ProVerif2.02 and informal operating assumptions. These are discussed as follows:

5.1. BAN Logic Proof

The shared session key sk has been computed among the user, gateway node, and sensor node for future communication. This subsection is a result of This subsection is added in order to prove the scheme's robustness using BAN [27]. BAN is a logic of belief, and trust was first introduced by Mike Burrows, Martin Abadi, and Roger Needham called BAN. The BAN’s reasoning covers the following major issues:(a)Are participants familiar with one another?(b)Do they know if the message is fresh?(c)Is it possible to be confident that a third party did not simply insert incorrect information into the original message?

Different rules and their description for the proposed protocol are shown as follows:(1)Message MeaningAccording to this rule, embedded sensor (user) and gateway node communication are carried out on a secure secret session key. Suppose the user believes that the broadcasting between sensor and gateway-node is carried out on session private key SK. Both participants see the message M encrypted on key K. In that case, the user also believes in the freshness of message M exchanged between user and gateway-node.Similar is the case in gateway node (GW); accordingly, if the gateway node believes that the information exchange among GW and SN is performed through a session shared secret key SK, and both participants see the encrypted message M via key K; then GW believes SN once said message M.(2)Message IntegrityThis rule means that if the user believes that the data transmission over session shared key SK towards gateway node (GW), the message M decrypted with key K, then the user also believes sensor node once said message M.Similarly, suppose a user believes the user that the data transmission over session shared key SK towards gateway node (GW) sees the encrypted message M via key K. In that case, the user also believes the gateway node (GW) once said message M.(3)Seeing MessageIf GW believes the data transmission towards SN over SK and sees message M via key K, then GW also believes SN once said message M.Similarly, suppose GW believes data transmission towards Sn through session shared key SK and sees message M encrypted over key K, then GW believes SN once said message M.(4)Message AuthorizationUser believes data broadcasting towards Sn over SK and sees the decrypted message M through key Y, then user also believes GW once said message M.Similarly, if GW believes data broadcasting towards SN over Sk and sees the decrypted message M via key Y, then GW also believes SN once said message M.(5)Message FreshnessSuppose the user believes that the message received is fresh and GW once said message M, then both user and GW believe that the received message M is also fresh.Similarly, GW believes that M’s received message is fresh; SN once said message M then both GW and SN also believe that the received message M is fresh.(6)Message BeliefSuppose both user and GW believe jurisdiction and encryption over key K, then GW believes encryption on message by key K.Similarly, if both user and SN believe message jurisdiction and message encryption on key K, then SN believes encrypted message M through key K.(7)Message HidingSuppose user and GW jurisdiction over message M, and decrypted message M via key K, then GW believes the decrypted message M via key K.Similarly, if a user and SN jurisdiction over message M, and decrypted message M via key K, then SN believes the decrypted message M via key K.Remark: |≡ Believes,Communication through session key,sees,Jurisdiction, ∼ once said, # freshness, <M>Kencryption using K, <M>K−1Description via K and P/Q, if P then Q.

Now, we are using these rules, equations, and definitions for realizing the secure communication between all the participants of the system. These steps are as follows.

Security goals defined for the proposed protocols are as follows:Goal1: Uia|≡ GW UiaGoal2: Uia|≡ GW|≡ SN UiaGoal3: GW|≡ SN UiaGoal4: SN|≡ Uia|≡ GW Uia

The idealization form of the communication message of the protocol is given as follows:Msg1: Uia ⟶ GW: {IDSN, F, L1, T1}lMsg2: GW ⟶ SN: {L3, L4, L6}lMsg3: SN ⟶ GW: {L9, L10}lMsg4: GW ⟶ Uia: {L11, L12, L13}l

Assumptions stated for the proposed authentication protocol is as follows:Asmpt1: Uia|≡ ⧣ (R1)Asmpt2: GN|≡ ⧣ (R1, R2)Asmpt3: SN|≡ GN UiaAsmpt4: GN|≡ SN UiaAsmpt5: Uia|≡ SN  GNAsmpt6: SN|≡ GW UiaAsmpt7: Uia|≡ GW ⇒ (s ⊕ R1)Asmpt8: GW|≡ SN ⇒ (R2||l)Asmpt9: SN|≡ GW ⇒ (R2 ⊕ R3)Asmpt8: GW|≡ Uia ⇒ (R3||l)Take Msg1: Uia ⟶ GW: {IDSN, F, L1, T1}l and Msg2: GW ⟶ SN: {L3, L4, L6}l

Sees rules for the proposed authentication protocol are defined as follows:S1: GW⊲ {IDSN, F, L1, T1}l and SN⊲{L3, L4, L6}lAs per Asmpt1, and Asmpt3 it is stated that:S2: GW|≡ Uia∼ {IDSN, F, L1, T1}lAs per Asmpt1, S2, s, and L1S3: GW|≡SN|≡ {L9, L10}lAs per Asmpt7, S3, and Jurisdictional rulesS4: GW|≡ {L9, L10}lAs per Asmpt5, S4, and skS5: Uia |≡ GW|≡ SN UiaG1 RealizedAccording to Asmpt7, S5, and R3S6: Uia |≡ GW|≡ SN UiaG2 RealizedMsg3: SN ⟶ GW: {L9, L10}l, GW ⟶ Uia: {L11, L12, L13}l and take Msg3 and Msg4 asMsg3: SN ⟶ GW: {L9, L10}l and Msg4: GW ⟶ Uia: Applying the seeing rulesS7:Uia⊲GW ⟶ Uia: , L11, L12, L13}l, so as per S7, Asmpt4, and L9S8: Uia|≡GW∼h(s||R3||l), as per Asmpt2, S8, s, and L12, getsS9: SN|≡Uia|≡ h(IDia||sk/||)As per Asmpt6, S9, and L9, L10S10: Uia|≡{L11, L12, L13}, as per Asmpt4, S10, and skS11: S|≡ SN UiaG3 RealizedAs per Asmpt8, S11, and Jurisdictional rulesS12: SN|≡ Uia|≡ GW UiaG4 Realized

It means that all the peers successfully authenticate each other and at any stage do not compromise on a session shared secret key (sk).

5.2. Proverif2.02 Simulation

In this subsection of the research paper, a widely used software verification toolkit is used to verify the scheme’s confidentiality, authorization, authenticity, and reachability. The ProVerif2.02 simulation code is in appendix A of the paper.

5.3. Algorithmic Representation (a Formal Security Validation)

It is to mention that the leading entities in the proposed authentication protocol are Certificate Authority (CA), Gateway Node (GW), Sensor Node (SN), and Medical Professional (User). Gateway node, sensor node, and a medical professional will first register with the certificate authority. The intelligent sensors embedded inside the patient’s body can transmit data to the gateway node via a wireless medical sensor network. Finally, from the gateway node, with the help of WMSN, the data is transmitted toward medical professionals. The algorithmic overview/representation of the proposed authentication protocol is shown in Algorithm 1.

(1)Provide Identity, Password
(2)Extract saved credentials from the server
(3)if (A==A) then
(4)Transmits Message1
(5) if(T − T1 ≤ ∆T) then
(6) Extracts O from the record of GW
(7) = F ⊕ h(R1||A||T1), B = h(||A||R1),  = J2 ⊕ h(A||T1)
(8) and J1 = h(||B||||T1)
(9)  if(J1==J1) then
(10)  key and computes
(11)  L3 = h(h(h(IDia||||R2))||IDSN||R2),
(12)  L4 = h(IDia||R1||R2) ⊕ sk, L5 = R2 ⊕ IDSN and L6 = El(IDSN||R1||R2||L5)
(13)  Transmits Message2 and computes
(14)   = L5 ⊕ sk, L7 = L4 ⊕ sk, L8 = h(h(L7||IDP)||sk||) and
(15)   = h(h(h(IDia||||))||IDSN||R2)
(16)   if(==L3) then
(17)   key
(18)   Computes
(19)    if(==L13)
(20)    key
(21)    Return(1) Pass
(22)    else
(23)    Return(0), fail
(24)    end if
(25)   Return(1) Pass
(26)   else
(27)   Return(0), fail
(28)   end if
(29)  else
(30)  Return(1), Pass
(31)  end if
(32) else
(33) Return(1) Pass
(34) end if
(35)else
(36)Return(1), Pass
(37)end if
5.3.1. Privileged Insider Attack

A privileged user, either medical professional or any other administrator cannot extract any credentials for future usage, as each and everything are kept secret from all types of user.

5.3.2. Ensuring Anonymity

The session key is shared securely, and each computation round trip starts from a separate timestamp, in which the other peer verifies before starting of calculation. Similarly, after data transmission, all the credentials are successfully finished due to the log out facility, so no one traces a legitimate user. Therefore, the proposed protocol is ensuring anonymity and resists traceability drawbacks.

5.3.3. Denial-of-Service (DoS) Attack

As each session starts with a separate session key and time threshold, if an attacker, for example, desires to send false requests to any peer for a disturbance, he/she fails to do so, because Identity, password, and random keys are much secured, and peers respond only to authenticated credentials. Such requests are denied by peers and stopped for such unlawful activity. Therefore, the proposed protocol resists the DoS attack.

5.3.4. Sensor Attack

If two different sensors communicate simultaneously, it will not affect each other due to different identities. Also, the two sessions between the sensor and another user will not act.

5.3.5. Mutual Authentication

As each peer computes the session key sk and shares it for future communication, the proposed protocol has no mutual authentication.

5.3.6. Man-in-Middle Attack

The proposed protocol is modified by sensor revocation and patient revocation phases. These phases successfully log out the requisite user from the process; no credentials were left in either sensor or patient memory. This protocol never allows the evoking entity to start synchronization at any stage in the future. Therefore, the protocol resists the main-in-middle attack.

Finally, the researchers have the following recommendations:(i)The proposed work can be tested for a deep learning approach for microarray cancer data classification [34]; graphology based handwritten character analysis for human behavior identification [35] and a deep neural network-based screening model for COVID-19-infected patients using chest X-ray images [36].(ii)Also, the work done in this research can also be practiced/verified for the rapid COVID-19 diagnosis using ensemble deep transfer learning models from chest radiographic images [37], visibility improvement, and mass segmentation of mammogram images using quantile separated histogram equalization with local contrast enhancement [3840].

6. Performance Evaluations

In this section of the paper, the proposed authentication scheme’s performance analysis is performed by finding its storage overheads, computation, and communication. We analyze each of these features by considering the findings of previous experiment by [41, 42].

6.1. Attacks and Functionalities Comparison Analysis

Subsequently, it can be compared with some recent and prominent protocols like Kumari et al. [31], Rathore et al. [32], Wu et al. [33], and Amin et al. [5]. The result shows that our scheme is more robust than these schemes. It is worth mentioning that ✓ means that the mentioned attack is “Yes” for the said protocol; it cannot resist and cannot violate the mentioned features, whereas ✖ means that the mentioned security feature is “No” for the said protocol and cannot valid for the mentioned attack, security violation, loophole, etc., as shown in Table 3.


Attack description[31][32][33][5]Our

Replay attack
Masquerade attack
Privileged insider attack
Man-in-middle attack
Malicious attack
Anonymity violation
Mutual authentication
DoS attack
Offline guessing attack
Impersonation attack
Spoofing attack
Sensor capture attack

6.2. Storage-Overheads Analysis and Comparison

In the work done by [41, 42], identity occupies 64 bits of space, password 60 bits, timestamp 56 bits, secret key 60 bits, MD5 512 bits, encryption 192 bits, and decryption also 192 bits of memory space. Therefore, keeping in view these measures/calculations and computations, the storage overhead analysis of the proposed authentication protocol is shown in Table 4. Upon comparing it with Kumari et al. [31], Rathore et al. [32], Wu et al. [33], and Amin et al. [5], it proves different and fundamental security characteristics/objectives that are higher than those of the mentioned protocols. Graphically, the storage overhead analysis is shown in Figure 7.


ProtocolStorage overheads in bits

Kumari et al. [31]2976
Rathore et al. [32]3978
Wu et al. [33]3968
Amin et al. [5]2112
Our2088

Remark. Encryption = 192, decryption = 192 bits, identity = 64 bits, random numbers = 64 bits, MD5 = 512 bits, and public key = 64 bits, calculating for the proposed protocol 192 + 192 + 64(3) + 64(5) + 512 + 512 + 56(3) = 384 + 192 + 320 + 512 + 16 8 = 2088

6.3. Computation Costs Analysis and Comparison

Comparing the proposed scheme in terms of computation time complexity due to the experiment performed by [41, 42] of collision-free one-way hash(·) and XOR functions, it is demonstrated that the protocol presented in [31] consists of the registration phase of time complexity for the hash, and XOR functions are 4th + 1t; healthcare system upload phase 14th + 6t; patient upload phase 16th + 1t; treatment phase 15th + 6t and checkup phase 6th + 1t. The computation time complexity of the proposed scheme is slightly higher compared to [5, 31, 33], as shown in Table 5.


Protocol[31][33][5]Our
Phase↓

Registration4th + 1t3th + 2t5th + 6t3th + 3t
Login and authentication10th + 1t19th + 11t35th + 22t34th + 22t

The protocol presented by [31] is a minimum one-way hash time, but it has maximum exponential execution time, while the XOR time complexity is negligibly equal to zero. Rathore et al. [32] used Advanced Encryption Standard (AES) of key size 512, in which polynomial-time generated the random keys, so its hash value is minimal compared to the proposed and [5]. Similarly, [5] used an extra round trip during the login and authentication phase, which our scheme does not have. Therefore, our method consists of a simple hash cryptographic function based; here, it does not affect the computation cost, as shown in Figure 8.

7. Conclusion and Future Work

In this modern era, the development of a robust certification environment for the healthcare system gains much attention from researchers, because the intelligent sensors, network-enabled devices (IoMT) and pervasive data acquisition, etc., pushed the healthcare industry to facilitate its patients for diagnoses and remote monitoring. Two things to be focused on for such environment, i.e., information authentication and identification authentication, are challenging, because, without solving these issues and challenges, no one can guarantee secure communication. To ensure data integrity, authorization, nonrepudiation, and user legitimacy and adequately tackle information identification, without a robust authentication protocol, it is not possible. Therefore, we have designed improved, lightweight, and robust authentication protocols for IoMT using WMSN. The proposed protocol mitigated all the known flaws noted for [5] and posed in the existing literature. The robustness of the protocol has been verified using a verification toolkit ProVerif2.00 and BAN logic of belief. In contrast, the performance evaluation result shows that the proposed scheme is fast and secure. The comparison analysis section shows that the proposed protocol is lightweight and balanced with security, often missing in several methods.

In the future, researchers plan to design protocols using the cloud, fog, and edge computing using 5G technology. This is ultra-low latency, which may be utilized for ultra-high reliability in examining a patient’s physiological and psychosocial conditions. Also, we plan to discuss the COVID-19 patient X-ray image on a metaheuristic model-based deep learning/screening.

Appendix

(---------CHANNELS----------)free ChSec:channel [private]. (secure channel between Uia and GW)free ChPub:channel. (public channel between User, GW and SN)(-----------SESSION SHARED KEYS-----------)free sk:bitstring [private].free skdash:bitstring [private].free skstr:bitstring [private].(-----------CONSTANTS AND VARIABLES---------)free IDsn:bitstring.free IDia:bitstring.free IDiadash:bitstring.free SN:bitstring [private].free GW:bitstring.Free Uia:bitstring.free k:bitstring.free kstr:bitstring.free x:bitstring.free xstr:bitstring.free PWia:bitstring [private].free R1: bitstring.free R1str:bitstring.free R2:bitstring.free R2str:bitstring.free R3:bitstring.free R3str:bitstring.free R1dash:bitstring.free R2dash:bitstring.free R3dash:bitstring.free T1:bitstring.(-------QUERIES------)query attacker(sk).query attacker(skdash),query attacker(skstr).query attacker(x).query attacker(xstr).query attacker(R1).query attacker(R2).query attacker(R3).query id:bitstring; inj-event(end_SN(IDsn))==>inj-event(start_SN(IDsn)).Query id:bitstring; inj-event(end_IDia(IDia))==>inj-event(start_IDia(IDia)).(----------EVENTS----------)event start_Uia(bitstring).event end_Uia(bitstring).event start_GW(bitstring).event end_GW(bitstring).event start_SN(bitstring).event end_SN(bitstring).(----------REDUCTIONS and FUNCTIONS----------)fun h(bitstring):bitstring.fun mult(bitstring, bitstring):bitstring.fun con(bitstring, bitstring):bitstring.fun xor(bitstring, bitstring):bitstring.fun Encsk(bitstring):bitstring.fun Encsksn(bitstring):bitstring.fun Decsksn(bitstring):bitstring.fun Decsksn(bitstring):bitstring.fun PBKDF(bitstring):bitstring.(----------EQUATIONS----------)equation forall u: bitstring, : bitstring; xor(xor(), u) = .(-------------USER’S PROCESSES--------------)let Uia = event start_Uia(IDia); let HPWstr = h(xor(IDia, PWia) inlet Astr = h(concat(IDia, x, HPW)) inif Astr = A thenlet Bstr = xor(h(xor(concat(C, IDia, Astr, HPWstr))) inlet F = xor(h(IDia, (concat(xstr, Astr, T1))) inlet J1 = h(concat(IDia, Bstr, R1, T1)) inlet J2 = xor(h(concat(xstr, T1))) inlet L1 = Enc(xor(concat(J2, R1, xstr)) inout(ChPub, (IDsn, F, L1, T1)); in(ChPub, (L11: bitstring, L12: bitstring, L13: bitstring)); let Dec(concat(IDsn, k, L11)) inlet R2dash = xor(L11, h(concat(IDia, R1))) inlet R3str = concat(L10, Rstr2)) inlet Adash = xor(L13, h(xor(R2str, R3str))) inlet skstr = h(h(concat(IDia, R1, R2str), R2, R3str)) inlet L11dash = h(concat(IDia, skstr, R3str)) inif L11dash = L11 thenevent end_Uia(IDia)else0.(-------------SENSOR NODE PROCESSES--------------)let UiaReg = in(ChSec, (IDia:bitstring, HPWia:bitstring)); let HPWia = concat(PWia, Nia) inlet A = h(concat(IDia, IDg, x)) inlet B = h(concat(IDia, HPWia, x)) inlet C = xor(C, B) inlet O = xor(Nia, h(concat(IDsn, x))) inout(CheSec, (A, B, C)); let GW = event start_GW(IDGW); in(ChPub, (IDsn:bitstring, F: bitstring, T1: bitstring)); Dec(concat(J2, R1, xstr)) inlet Ostr = xor(R1, h(concat(IDsn, xstr))) inif Ostr = O thenlet IDiastr = xor(F, h(concat(R1, Astr, T1))) inlet Bstr = h(concat(IDia, A, R1)) inlet R1str = xor(J2, h(concat(Astr, T1))) inlet J1str = h(concat(IDiastr, Bstr, R1str, T1)) inif J1str = J1 thenlet sk = h(concat(IDsn, R1)) inlet L3 = h(h(h(concat(IDia, R1str, R2, h(concat(IDsn, R2))))) inlet L4 = xor(h(concat(IDia, R1, R2), sk)) inlet L5 = sor(R2, IDsn) inlet L6 = Enc(concat(IDsn, R1, R2, L5)) inout(ChPub, (L3, L4, L5, L6)); in(ChPub, (L9: bitstring, L10: bitstring)); let Dec(concat(IDsn, R1, R2), sk)) inlet R3dash = concat(L9, R2)) inlet skdash = h(h(concat(IDia, R1, R2str), h(R2, R3dash)) inlet L9dash = h(concat(skdash, R3dash, R2str)) inif L9dash = L9 thenLet L11 = xor(h(concat(IDia, R1), R2)) inLet L12 = h(concat(IDia, skdash, R3dash)) inlet L13 = Enc(IDsn, kstr, L11)) inout(ChPub, (L11, L12, L13));event end_GW(IDGW)else0.process ((!GW) | (!Uia))Running the code, the listed results are displayed, which shows that the attacker could not trace the session share key SK for reconstruction and secure from cracking, as shown below.(……………………RESULT……………………)Completing equations...-- Query not attacker(sk[]),Completing...Starting query not attacker(sk[])RESULT not attacker(sk[]) is true.-- Query inj-event(end_Ui(id))==> inj-event(start_Ui(id)),Completing...Starting query inj-event(end_Ui(id))==> inj-event(start_Ui(id))RESULT inj-event(end_Ui(id))==> inj-event(start_Ui(id)) is true.-- Query inj-event(end_S(id_57))==> inj-event(start_S(id_57)).Completing...Starting query inj-event(end_S(id_57))==> inj-event(start_S(id_57))RESULT inj-event(end_S(id_57))==> inj-event(start_S(id_57)) is true.

Data Availability

The data collected during the data collection phase will be provided upon request to the corresponding authors.

Conflicts of Interest

The authors declare no conflicts of interest.

Acknowledgments

The authors are grateful to the Deanship of Scientific Research, King Saud University, for funding through Vice Deanship of Scientific Research Chairs.

References

  1. S. Vishnu, S. J. Ramson, and R. Jegan, “Internet of medical things (IoMT)-an overview,” in Proceedings of the 5th International Conference on Devices, Circuits and Systems (ICDCS), pp. 101–104, Coimbatore, India, March 2020. View at: Publisher Site | Google Scholar
  2. D. Rizk, R. Rizk, and S. Hsu, “Applied layered-security model to IoMT,” in Proceedings of the 2019 IEEE International Conference on Intelligence and Security Informatics (ISI), p. 227, IEEE, Shenzhen, China, July 2019. View at: Publisher Site | Google Scholar
  3. V. Yanambaka, S. Mohanty, E. Kougianos, D. Puthal, and L. Rachakonda, “PMsec: PUF-based energy-efficient authentication of devices on the internet of medical things (IoMT),” in Proceedings of the IEEE International Symposium on Smart Electronic Systems (iSES)(Formerly iNiS), pp. 320-321, IEEE, Rourkela, India, December 2019. View at: Publisher Site | Google Scholar
  4. A. Yang, S. M. Chun, and J. G. Kim, “Detection and recognition of hand gesture for wearable applications in IoMT,” in Proceedings of the 2018 20th International Conference on Advanced Communication Technology (ICACT), pp. 1046–1053, IEEE, hunched-si Gangwon-do, Chuncheon, Korea, February 2018. View at: Publisher Site | Google Scholar
  5. R. Amin, S. H. Islam, G. P. Biswas, M. K. Khan, and N. Kumar, “A robust and anonymous patient monitoring system using wireless medical sensor networks,” Future Generation Computer Systems, vol. 80, pp. 483–495, 2018. View at: Publisher Site | Google Scholar
  6. D. Dolev and A. Yao, “On the security of public key protocols,” IEEE Transactions on Information Theory, vol. 29, no. 2, pp. 198–208, 1983. View at: Publisher Site | Google Scholar
  7. R. P. Singh, M. Javaid, A. Haleem, R. Vaishya, and S. Al, “Internet of medical things (IoMT) for orthopedic in COVID-19 pandemic: roles, challenges, and applications,” Journal of Clinical Orthopaedics and Trauma, vol. 11, pp. 1–5, 2020. View at: Publisher Site | Google Scholar
  8. F. Alsubaei, A. Abuhussein, V. Shandilya, and S. Shiva, “IoMT-SAF: internet of medical things security assessment framework,” Internet of Things, vol. 8, Article ID 100123, 2019. View at: Publisher Site | Google Scholar
  9. M. R. Sanaz, E. Nigussie, M. Levorato, S. Virtanen, and J. Isoaho, “Performance analysis of end-to-end security schemes in healthcare IoT,” Procedia computer science, vol. 130, pp. 432–439, 2018. View at: Publisher Site | Google Scholar
  10. J. D. Lee, T. S. Yoon, S. H. Chung, and H. S. Cha, “Service-oriented security framework for remote medical services in the Internet of Things environment,” Healthcare informatics research, vol. 21, no. 4, pp. 271–282, 2015. View at: Publisher Site | Google Scholar
  11. M. S. Rahimi, T. N. Gia, and E. Nigussie, “session resumption-based end-to-end security for healthcare internet-of-things,” in Proceedings of the IEEE International Conference, pp. 581–588, Liverpool, UK, October 2015. View at: Publisher Site | Google Scholar
  12. P. Gope, Y. Gheraibia, S. Kabir, and B. Sikdar, “A secure IoT-based modern healthcare system with the fault-tolerant decision-making process,” IEEE Journal of Biomedical and Health Informatics, vol. 1, p. 1, 2020. View at: Google Scholar
  13. P. Gope and T. Hwang, “BSN-Care: a secure IoT-based modern healthcare system using body sensor network,” IEEE Sensors Journal, vol. 16, pp. 1368–1376, 2015. View at: Publisher Site | Google Scholar
  14. M. Usman, M. A. Jan, X. He, and J. Chen, “P2DCA: a privacy-preserving-based data collection and analysis framework for IoMT applications,” IEEE Journal on Selected Areas in Communications, vol. 37, no. 6, pp. 1222–1230, 2019. View at: Publisher Site | Google Scholar
  15. F. F. Moghaddam, S. G. Moghaddam, S. Rouzbeh, S. K. Araghi, and N. M. Alibeigi, “A scalable and efficient user authentication scheme for cloud computing environments,” in Proceedings of the IEEE Region 10 Symposium, pp. 508–513, Kuala Lumpur, Malaysia, April 2014. View at: Publisher Site | Google Scholar
  16. S. R. Satheesh, D. Sangeetha, and V. Vaidehi, “EPSSHIC-enabling privacy and security of smart health care system in the cloud,” in Proceedings of the 2013 International Conference on Recent Trends in Information Technology (ICRTIT), pp. 79–83, Chennai, India, July 2013. View at: Publisher Site | Google Scholar
  17. M. A. Allouzi and I. K. Javed, “Soter: trust discovery framework for internet of medical things (IoMT),” in Proceedings of the 2019 IEEE 20th International Symposium on A World of Wireless, Mobile and Multimedia Networks (WoWMoM), pp. 1–9, Washington, DC, USA, June 2019. View at: Publisher Site | Google Scholar
  18. A. H. Mohsin, A. A. Zaidan, B. B. Zaidan et al., “Based medical systems for patient’s authentication: towards a new verification secure framework using CIA standard,” Journal of Medical Systems, vol. 43, no. 7, p. 192, 2019. View at: Publisher Site | Google Scholar
  19. L. C. Chen, T. Tsai, F. Y. L. Yang, and Y. L. Huang, “Designing a healthcare authorization model based on cloud authentication,” Intelligent Automation & Soft Computing, vol. 20, pp. 65–379, 2014. View at: Publisher Site | Google Scholar
  20. X. Wang, L. Wang, Y. Li, and K. Gai, “Privacy-Aware efficient fine-grained data access control in internet of medical things based fog computing,” IEEE Access, vol. 6, pp. 47657–47665, 2018. View at: Publisher Site | Google Scholar
  21. A. D. Dwivedi, L. Malina, P. Dzurenda, and G. Srivastava, “Optimized blockchain model for internet of things based healthcare applications,” in Proceedings of the 2019 42nd International Conference on Telecommunications and Signal Processing (TSP), pp. 135–139, IEEE, Budapest, Hungary, July 2019. View at: Publisher Site | Google Scholar
  22. M. Selim and K. Elgazzar, “BIoMT: blockchain for the internet of medical things,” in Proceedings of the 2019 IEEE International Black Sea Conference on Communications and Networking (BlackSeaCom), pp. 1–4, IEEE, Sochi, Russia, June 2019. View at: Publisher Site | Google Scholar
  23. M. N. Shrestha, A. Alsadoon, P. W. C. Prasad, L. Hourani, and A. Elchouemi, “Enhanced e-health framework for security and privacy in the healthcare system,” in Proceedings of the 2016 Sixth International Conference on Digital Information Processing and Communications (ICDIPC), pp. 75–79, IEEE, Beirut, Lebanon, April 2016. View at: Publisher Site | Google Scholar
  24. D. C. Klonoff, “Fog computing and edge computing architectures for processing data from diabetes devices connected to the medical internet,” Journal of Diabetes Science and Technology, vol. 11, 2017. View at: Publisher Site | Google Scholar
  25. D. Borthakur, H. Dubey, N. Constant, L. Mahler, and K. Mankodiya, “Smart fog: fog computing framework for unsupervised clustering analytics in wearable internet of things,” in Proceedings of the 2017 IEEE Global Conference on Signal and Information Processing (GlobalSIP), pp. 472–476, IEEE, Montreal, Canada, 2017, November. View at: Publisher Site | Google Scholar
  26. A. V. Dastjerdi and R. Buyya, “Fog computing: helping the internet of things realize its potential,” Computer, vol. 49, no. 8, pp. 112–116, 2016. View at: Publisher Site | Google Scholar
  27. M. Engineer, R. Tusha, A. Shah, and K. Adhvaryu, “Insight into the importance of fog computing on the internet of medical things (IoMT),” in Proceedings of the 2019 International Conference on Recent Advances in Energy-efficient Computing and Communication (ICRAECC), pp. 1–7, IEEE, Nagercoil, India, 2019 March. View at: Publisher Site | Google Scholar
  28. O. Akrivopoulos, I. Chatzigiannakis, C. Tselios, and A. Antoniou, “On the deployment of healthcare applications over fog computing infrastructure,” in Proceedings of the 2017 IEEE 41st annual computer software and applications conference (COMPSAC), pp. 288–293, IEEE, Turin, Italy, 2017 July. View at: Publisher Site | Google Scholar
  29. T. Mikula and R. H. Jacobsen, “Identity and access management with blockchain in electronic healthcare records,” in Proceedings of the 2018 21st Euromicro conference on digital system design (DSD), pp. 699–706, IEEE, Prague, Czech Republic, August 2018. View at: Publisher Site | Google Scholar
  30. M. L. Das, A. Saxena, and V. P. Gulati, “A dynamic ID-based remote user authentication scheme,” IEEE Transactions on Consumer Electronics, vol. 50, no. 2, pp. 629–631, 2004. View at: Publisher Site | Google Scholar
  31. A. Kumari, V. Kumar, M. Y. Abbasi et al., “CSEF: cloud-based secure and efficient framework for smart medical system using ECC,” IEEE Access, vol. 8, pp. 107838–107852, 2020. View at: Publisher Site | Google Scholar
  32. H. Rathore, L. Wenzel, A. K. Al-Ali, A. Mohamed, X. Du, and M. Guizani, “Multi-layer perceptron model on chip for secure diabetic treatment,” IEEE Access, vol. 6, pp. 44718–44730, 2018. View at: Publisher Site | Google Scholar
  33. F. Wu, L. Xu, S. Kumari, and X. Li, “An improved and anonymous two-factor authentication protocol for health-care applications with wireless medical sensor networks,” Multimedia Systems, vol. 23, no. 2, pp. 195–205, 2017. View at: Publisher Site | Google Scholar
  34. R. Mishra and S. P. Tripathi, “Deep learning based search engine for biomedical images using convolutional neural networks,” Multimedia Tools and Applications, vol. 80, no. 10, pp. 15057–15065, 2021. View at: Publisher Site | Google Scholar
  35. S. Ghosh, P. Shivakumara, P. Roy, U. Pal, and T. Lu, “Graphology based handwritten character analysis for human behaviour identification,” CAAI Transactions on Intelligence Technology, vol. 5, no. 1, pp. 55–65, 2020. View at: Publisher Site | Google Scholar
  36. M. Kaur and D. Singh, “Multiobjective evolutionary optimization techniques based hyperchaotic map and their applications in image encryption,” Multidimensional Systems and Signal Processing, vol. 32, no. 1, pp. 281–301, 2021. View at: Publisher Site | Google Scholar
  37. N. Kumar, M. Gupta, D. Gupta et al., “Novel deep transfer learning model for COVID-19 patient detection using X-ray chest images,” Journal of Ambient Intelligence and Humanized Computing, vol. 12, 2021. View at: Publisher Site | Google Scholar
  38. B. Gupta, M. Tiwari, and S. Singh Lamba, “Visibility improvement and mass segmentation of mammogram images using quantile separated histogram equalisation with local contrast enhancement,” CAAI Transactions on Intelligence Technology, vol. 4, no. 2, pp. 73–79, 2019. View at: Publisher Site | Google Scholar
  39. H. S. Basavegowda and G. Dagnew, “Deep learning approach for microarray cancer data classification,” CAAI Transactions on Intelligence Technology, vol. 5, no. 1, pp. 22–33, 2020. View at: Publisher Site | Google Scholar
  40. M. Kaur, D. Singh, and V. Kumar, “Color image encryption using minimax differential evolution-based 7D hyper-chaotic map,” Applied Physics B, vol. 126, no. 9, pp. 1–19, 2020. View at: Publisher Site | Google Scholar
  41. H. H. Kilinc and T. Yanik, “A survey of SIP authentication and key agreement schemes,” IEEE Communications Surveys & Tutorials, vol. 16, no. 2, pp. 1005–1023, 2013. View at: Publisher Site | Google Scholar
  42. P. Bart, “Cryptographic hash functions,” European Transactions on Telecommunications, vol. 5, no. 4, pp. 431–448, 1994. View at: Google Scholar

Copyright © 2021 Saeed Ullah Jan et al. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.


More related articles

 PDF Download Citation Citation
 Download other formatsMore
 Order printed copiesOrder
Views251
Downloads140
Citations

Related articles

Article of the Year Award: Outstanding research contributions of 2020, as selected by our Chief Editors. Read the winning articles.