Loading…
A Privacy-Preserving Authentication Scheme for Real-Time Medical Monitoring Systems
In real-time medical monitoring systems, given the significance of medical data and disease symptoms, a secure and always-on connection with the medical centre over the public channels is essential. To this end, an edge-enabled Internet of Medical Things (IoMT) scheme is designed to improve flexibil...
Saved in:
Published in: | IEEE journal of biomedical and health informatics 2023-05, Vol.27 (5), p.2314-2322 |
---|---|
Main Authors: | , , , , , |
Format: | Article |
Language: | English |
Subjects: | |
Citations: | Items that this one cites Items that cite this one |
Online Access: | Get full text |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
cited_by | cdi_FETCH-LOGICAL-c392t-e6040b7415bdb0a9a99b1dc989b4e0482e5371dd8decf01d72961947e0339fe83 |
---|---|
cites | cdi_FETCH-LOGICAL-c392t-e6040b7415bdb0a9a99b1dc989b4e0482e5371dd8decf01d72961947e0339fe83 |
container_end_page | 2322 |
container_issue | 5 |
container_start_page | 2314 |
container_title | IEEE journal of biomedical and health informatics |
container_volume | 27 |
creator | Soleymani, Seyed Ahmad Goudarzi, Shidrokh Anisi, Mohammad Hossein Jindal, Anish Kama, Nazri Ismail, Saiful Adli |
description | In real-time medical monitoring systems, given the significance of medical data and disease symptoms, a secure and always-on connection with the medical centre over the public channels is essential. To this end, an edge-enabled Internet of Medical Things (IoMT) scheme is designed to improve flexibility and scalability of the network and provide seamless connectivity with minimum latency. The entities involved in such network are vulnerable to various attacks and can potentially be compromised. To address this issue, an authentication scheme comprised of digital signature and Authenticated Key Exchange (AKE) protocol is proposed which guarantees only authorized entities get access to the services available in the medical system. Moreover, to fulfill the privacy-preserving, each entity is mapped to a different pseudo-identity. The non-mathematical and performance analysis show that the proposed scheme is robust against various attacks such as impersonation and replay attacks. |
doi_str_mv | 10.1109/JBHI.2022.3143207 |
format | article |
fullrecord | <record><control><sourceid>proquest_ieee_</sourceid><recordid>TN_cdi_proquest_miscellaneous_2620081401</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><ieee_id>9682577</ieee_id><sourcerecordid>2809890517</sourcerecordid><originalsourceid>FETCH-LOGICAL-c392t-e6040b7415bdb0a9a99b1dc989b4e0482e5371dd8decf01d72961947e0339fe83</originalsourceid><addsrcrecordid>eNpdkMtOwzAQRS0Eogj6AQgJRWLDJmVsJ7G9LBWPIhAVhbWVxwRc5QF2Uql_j6O2LJiNZzznjj2XkHMKE0pB3TzdPs4nDBibcBpxBuKAnDCayJAxkIf7nKpoRMbOrcCH9FcqOSYjHgP3pTghy2mwsGad5ptwYdGhXZvmM5j23Rc2ncnTzrRNsMy_sMagbG3whmkVvhtfvWDh-1Xw0jama-0gW25ch7U7I0dlWjkc785T8nF_9z57DJ9fH-az6XOYc8W6EBOIIBMRjbMig1SlSmW0yJVUWYQQSYYxF7QoZIF5CbQQTCV-HYHAuSpR8lNyvZ37bdufHl2na-NyrKq0wbZ3miVs2DkC6tGrf-iq7W3jf6eZBP8kxFR4im6p3LbOWSz1tzV1ajeagh5M14PpejBd70z3msvd5D6rsfhT7C32wMUWMIj411aJZLEQ_BfyI4Pj</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>2809890517</pqid></control><display><type>article</type><title>A Privacy-Preserving Authentication Scheme for Real-Time Medical Monitoring Systems</title><source>IEEE Electronic Library (IEL) Journals</source><creator>Soleymani, Seyed Ahmad ; Goudarzi, Shidrokh ; Anisi, Mohammad Hossein ; Jindal, Anish ; Kama, Nazri ; Ismail, Saiful Adli</creator><creatorcontrib>Soleymani, Seyed Ahmad ; Goudarzi, Shidrokh ; Anisi, Mohammad Hossein ; Jindal, Anish ; Kama, Nazri ; Ismail, Saiful Adli</creatorcontrib><description>In real-time medical monitoring systems, given the significance of medical data and disease symptoms, a secure and always-on connection with the medical centre over the public channels is essential. To this end, an edge-enabled Internet of Medical Things (IoMT) scheme is designed to improve flexibility and scalability of the network and provide seamless connectivity with minimum latency. The entities involved in such network are vulnerable to various attacks and can potentially be compromised. To address this issue, an authentication scheme comprised of digital signature and Authenticated Key Exchange (AKE) protocol is proposed which guarantees only authorized entities get access to the services available in the medical system. Moreover, to fulfill the privacy-preserving, each entity is mapped to a different pseudo-identity. The non-mathematical and performance analysis show that the proposed scheme is robust against various attacks such as impersonation and replay attacks.</description><identifier>ISSN: 2168-2194</identifier><identifier>EISSN: 2168-2208</identifier><identifier>DOI: 10.1109/JBHI.2022.3143207</identifier><identifier>PMID: 35030087</identifier><identifier>CODEN: IJBHA9</identifier><language>eng</language><publisher>United States: IEEE</publisher><subject>Authentication ; Computer Security ; Computer Systems ; Confidentiality ; Data privacy ; Digital signatures ; edge computing ; Health care facilities ; Humans ; Internet of medical things ; Latency ; Medical diagnosis ; Medical diagnostic imaging ; medical monitoring system ; Monitoring ; Monitoring systems ; Network latency ; Privacy ; Real time ; Real-time systems ; Robustness (mathematics) ; Security ; Signs and symptoms ; Telemedicine ; WBAN ; Wireless communication</subject><ispartof>IEEE journal of biomedical and health informatics, 2023-05, Vol.27 (5), p.2314-2322</ispartof><rights>Copyright The Institute of Electrical and Electronics Engineers, Inc. (IEEE) 2023</rights><lds50>peer_reviewed</lds50><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c392t-e6040b7415bdb0a9a99b1dc989b4e0482e5371dd8decf01d72961947e0339fe83</citedby><cites>FETCH-LOGICAL-c392t-e6040b7415bdb0a9a99b1dc989b4e0482e5371dd8decf01d72961947e0339fe83</cites><orcidid>0000-0002-6099-5834 ; 0000-0001-8414-2708 ; 0000-0003-0383-3553 ; 0000-0003-2535-3438 ; 0000-0002-9299-5652 ; 0000-0002-3052-2892</orcidid></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://ieeexplore.ieee.org/document/9682577$$EHTML$$P50$$Gieee$$H</linktohtml><link.rule.ids>314,780,784,27924,27925,54796</link.rule.ids><backlink>$$Uhttps://www.ncbi.nlm.nih.gov/pubmed/35030087$$D View this record in MEDLINE/PubMed$$Hfree_for_read</backlink></links><search><creatorcontrib>Soleymani, Seyed Ahmad</creatorcontrib><creatorcontrib>Goudarzi, Shidrokh</creatorcontrib><creatorcontrib>Anisi, Mohammad Hossein</creatorcontrib><creatorcontrib>Jindal, Anish</creatorcontrib><creatorcontrib>Kama, Nazri</creatorcontrib><creatorcontrib>Ismail, Saiful Adli</creatorcontrib><title>A Privacy-Preserving Authentication Scheme for Real-Time Medical Monitoring Systems</title><title>IEEE journal of biomedical and health informatics</title><addtitle>JBHI</addtitle><addtitle>IEEE J Biomed Health Inform</addtitle><description>In real-time medical monitoring systems, given the significance of medical data and disease symptoms, a secure and always-on connection with the medical centre over the public channels is essential. To this end, an edge-enabled Internet of Medical Things (IoMT) scheme is designed to improve flexibility and scalability of the network and provide seamless connectivity with minimum latency. The entities involved in such network are vulnerable to various attacks and can potentially be compromised. To address this issue, an authentication scheme comprised of digital signature and Authenticated Key Exchange (AKE) protocol is proposed which guarantees only authorized entities get access to the services available in the medical system. Moreover, to fulfill the privacy-preserving, each entity is mapped to a different pseudo-identity. The non-mathematical and performance analysis show that the proposed scheme is robust against various attacks such as impersonation and replay attacks.</description><subject>Authentication</subject><subject>Computer Security</subject><subject>Computer Systems</subject><subject>Confidentiality</subject><subject>Data privacy</subject><subject>Digital signatures</subject><subject>edge computing</subject><subject>Health care facilities</subject><subject>Humans</subject><subject>Internet of medical things</subject><subject>Latency</subject><subject>Medical diagnosis</subject><subject>Medical diagnostic imaging</subject><subject>medical monitoring system</subject><subject>Monitoring</subject><subject>Monitoring systems</subject><subject>Network latency</subject><subject>Privacy</subject><subject>Real time</subject><subject>Real-time systems</subject><subject>Robustness (mathematics)</subject><subject>Security</subject><subject>Signs and symptoms</subject><subject>Telemedicine</subject><subject>WBAN</subject><subject>Wireless communication</subject><issn>2168-2194</issn><issn>2168-2208</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2023</creationdate><recordtype>article</recordtype><recordid>eNpdkMtOwzAQRS0Eogj6AQgJRWLDJmVsJ7G9LBWPIhAVhbWVxwRc5QF2Uql_j6O2LJiNZzznjj2XkHMKE0pB3TzdPs4nDBibcBpxBuKAnDCayJAxkIf7nKpoRMbOrcCH9FcqOSYjHgP3pTghy2mwsGad5ptwYdGhXZvmM5j23Rc2ncnTzrRNsMy_sMagbG3whmkVvhtfvWDh-1Xw0jama-0gW25ch7U7I0dlWjkc785T8nF_9z57DJ9fH-az6XOYc8W6EBOIIBMRjbMig1SlSmW0yJVUWYQQSYYxF7QoZIF5CbQQTCV-HYHAuSpR8lNyvZ37bdufHl2na-NyrKq0wbZ3miVs2DkC6tGrf-iq7W3jf6eZBP8kxFR4im6p3LbOWSz1tzV1ajeagh5M14PpejBd70z3msvd5D6rsfhT7C32wMUWMIj411aJZLEQ_BfyI4Pj</recordid><startdate>20230501</startdate><enddate>20230501</enddate><creator>Soleymani, Seyed Ahmad</creator><creator>Goudarzi, Shidrokh</creator><creator>Anisi, Mohammad Hossein</creator><creator>Jindal, Anish</creator><creator>Kama, Nazri</creator><creator>Ismail, Saiful Adli</creator><general>IEEE</general><general>The Institute of Electrical and Electronics Engineers, Inc. (IEEE)</general><scope>97E</scope><scope>RIA</scope><scope>RIE</scope><scope>CGR</scope><scope>CUY</scope><scope>CVF</scope><scope>ECM</scope><scope>EIF</scope><scope>NPM</scope><scope>AAYXX</scope><scope>CITATION</scope><scope>7QF</scope><scope>7QO</scope><scope>7QQ</scope><scope>7SC</scope><scope>7SE</scope><scope>7SP</scope><scope>7SR</scope><scope>7TA</scope><scope>7TB</scope><scope>7U5</scope><scope>8BQ</scope><scope>8FD</scope><scope>F28</scope><scope>FR3</scope><scope>H8D</scope><scope>JG9</scope><scope>JQ2</scope><scope>K9.</scope><scope>KR7</scope><scope>L7M</scope><scope>L~C</scope><scope>L~D</scope><scope>NAPCQ</scope><scope>P64</scope><scope>7X8</scope><orcidid>https://orcid.org/0000-0002-6099-5834</orcidid><orcidid>https://orcid.org/0000-0001-8414-2708</orcidid><orcidid>https://orcid.org/0000-0003-0383-3553</orcidid><orcidid>https://orcid.org/0000-0003-2535-3438</orcidid><orcidid>https://orcid.org/0000-0002-9299-5652</orcidid><orcidid>https://orcid.org/0000-0002-3052-2892</orcidid></search><sort><creationdate>20230501</creationdate><title>A Privacy-Preserving Authentication Scheme for Real-Time Medical Monitoring Systems</title><author>Soleymani, Seyed Ahmad ; Goudarzi, Shidrokh ; Anisi, Mohammad Hossein ; Jindal, Anish ; Kama, Nazri ; Ismail, Saiful Adli</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c392t-e6040b7415bdb0a9a99b1dc989b4e0482e5371dd8decf01d72961947e0339fe83</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2023</creationdate><topic>Authentication</topic><topic>Computer Security</topic><topic>Computer Systems</topic><topic>Confidentiality</topic><topic>Data privacy</topic><topic>Digital signatures</topic><topic>edge computing</topic><topic>Health care facilities</topic><topic>Humans</topic><topic>Internet of medical things</topic><topic>Latency</topic><topic>Medical diagnosis</topic><topic>Medical diagnostic imaging</topic><topic>medical monitoring system</topic><topic>Monitoring</topic><topic>Monitoring systems</topic><topic>Network latency</topic><topic>Privacy</topic><topic>Real time</topic><topic>Real-time systems</topic><topic>Robustness (mathematics)</topic><topic>Security</topic><topic>Signs and symptoms</topic><topic>Telemedicine</topic><topic>WBAN</topic><topic>Wireless communication</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Soleymani, Seyed Ahmad</creatorcontrib><creatorcontrib>Goudarzi, Shidrokh</creatorcontrib><creatorcontrib>Anisi, Mohammad Hossein</creatorcontrib><creatorcontrib>Jindal, Anish</creatorcontrib><creatorcontrib>Kama, Nazri</creatorcontrib><creatorcontrib>Ismail, Saiful Adli</creatorcontrib><collection>IEEE All-Society Periodicals Package (ASPP) 2005-present</collection><collection>IEEE All-Society Periodicals Package (ASPP) Online</collection><collection>IEEE</collection><collection>Medline</collection><collection>MEDLINE</collection><collection>MEDLINE (Ovid)</collection><collection>MEDLINE</collection><collection>MEDLINE</collection><collection>PubMed</collection><collection>CrossRef</collection><collection>Aluminium Industry Abstracts</collection><collection>Biotechnology Research Abstracts</collection><collection>Ceramic Abstracts</collection><collection>Computer and Information Systems Abstracts</collection><collection>Corrosion Abstracts</collection><collection>Electronics & Communications Abstracts</collection><collection>Engineered Materials Abstracts</collection><collection>Materials Business File</collection><collection>Mechanical & Transportation Engineering Abstracts</collection><collection>Solid State and Superconductivity Abstracts</collection><collection>METADEX</collection><collection>Technology Research Database</collection><collection>ANTE: Abstracts in New Technology & Engineering</collection><collection>Engineering Research Database</collection><collection>Aerospace Database</collection><collection>Materials Research Database</collection><collection>ProQuest Computer Science Collection</collection><collection>ProQuest Health & Medical Complete (Alumni)</collection><collection>Civil Engineering Abstracts</collection><collection>Advanced Technologies Database with Aerospace</collection><collection>Computer and Information Systems Abstracts – Academic</collection><collection>Computer and Information Systems Abstracts Professional</collection><collection>Nursing & Allied Health Premium</collection><collection>Biotechnology and BioEngineering Abstracts</collection><collection>MEDLINE - Academic</collection><jtitle>IEEE journal of biomedical and health informatics</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Soleymani, Seyed Ahmad</au><au>Goudarzi, Shidrokh</au><au>Anisi, Mohammad Hossein</au><au>Jindal, Anish</au><au>Kama, Nazri</au><au>Ismail, Saiful Adli</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>A Privacy-Preserving Authentication Scheme for Real-Time Medical Monitoring Systems</atitle><jtitle>IEEE journal of biomedical and health informatics</jtitle><stitle>JBHI</stitle><addtitle>IEEE J Biomed Health Inform</addtitle><date>2023-05-01</date><risdate>2023</risdate><volume>27</volume><issue>5</issue><spage>2314</spage><epage>2322</epage><pages>2314-2322</pages><issn>2168-2194</issn><eissn>2168-2208</eissn><coden>IJBHA9</coden><abstract>In real-time medical monitoring systems, given the significance of medical data and disease symptoms, a secure and always-on connection with the medical centre over the public channels is essential. To this end, an edge-enabled Internet of Medical Things (IoMT) scheme is designed to improve flexibility and scalability of the network and provide seamless connectivity with minimum latency. The entities involved in such network are vulnerable to various attacks and can potentially be compromised. To address this issue, an authentication scheme comprised of digital signature and Authenticated Key Exchange (AKE) protocol is proposed which guarantees only authorized entities get access to the services available in the medical system. Moreover, to fulfill the privacy-preserving, each entity is mapped to a different pseudo-identity. The non-mathematical and performance analysis show that the proposed scheme is robust against various attacks such as impersonation and replay attacks.</abstract><cop>United States</cop><pub>IEEE</pub><pmid>35030087</pmid><doi>10.1109/JBHI.2022.3143207</doi><tpages>9</tpages><orcidid>https://orcid.org/0000-0002-6099-5834</orcidid><orcidid>https://orcid.org/0000-0001-8414-2708</orcidid><orcidid>https://orcid.org/0000-0003-0383-3553</orcidid><orcidid>https://orcid.org/0000-0003-2535-3438</orcidid><orcidid>https://orcid.org/0000-0002-9299-5652</orcidid><orcidid>https://orcid.org/0000-0002-3052-2892</orcidid><oa>free_for_read</oa></addata></record> |
fulltext | fulltext |
identifier | ISSN: 2168-2194 |
ispartof | IEEE journal of biomedical and health informatics, 2023-05, Vol.27 (5), p.2314-2322 |
issn | 2168-2194 2168-2208 |
language | eng |
recordid | cdi_proquest_miscellaneous_2620081401 |
source | IEEE Electronic Library (IEL) Journals |
subjects | Authentication Computer Security Computer Systems Confidentiality Data privacy Digital signatures edge computing Health care facilities Humans Internet of medical things Latency Medical diagnosis Medical diagnostic imaging medical monitoring system Monitoring Monitoring systems Network latency Privacy Real time Real-time systems Robustness (mathematics) Security Signs and symptoms Telemedicine WBAN Wireless communication |
title | A Privacy-Preserving Authentication Scheme for Real-Time Medical Monitoring Systems |
url | http://sfxeu10.hosted.exlibrisgroup.com/loughborough?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-07T15%3A38%3A35IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_ieee_&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=A%20Privacy-Preserving%20Authentication%20Scheme%20for%20Real-Time%20Medical%20Monitoring%20Systems&rft.jtitle=IEEE%20journal%20of%20biomedical%20and%20health%20informatics&rft.au=Soleymani,%20Seyed%20Ahmad&rft.date=2023-05-01&rft.volume=27&rft.issue=5&rft.spage=2314&rft.epage=2322&rft.pages=2314-2322&rft.issn=2168-2194&rft.eissn=2168-2208&rft.coden=IJBHA9&rft_id=info:doi/10.1109/JBHI.2022.3143207&rft_dat=%3Cproquest_ieee_%3E2809890517%3C/proquest_ieee_%3E%3Cgrp_id%3Ecdi_FETCH-LOGICAL-c392t-e6040b7415bdb0a9a99b1dc989b4e0482e5371dd8decf01d72961947e0339fe83%3C/grp_id%3E%3Coa%3E%3C/oa%3E%3Curl%3E%3C/url%3E&rft_id=info:oai/&rft_pqid=2809890517&rft_id=info:pmid/35030087&rft_ieee_id=9682577&rfr_iscdi=true |