Loading…

A Privacy-Preserving Authentication Scheme for Real-Time Medical Monitoring Systems

In real-time medical monitoring systems, given the significance of medical data and disease symptoms, a secure and always-on connection with the medical centre over the public channels is essential. To this end, an edge-enabled Internet of Medical Things (IoMT) scheme is designed to improve flexibil...

Full description

Saved in:
Bibliographic Details
Published in:IEEE journal of biomedical and health informatics 2023-05, Vol.27 (5), p.2314-2322
Main Authors: Soleymani, Seyed Ahmad, Goudarzi, Shidrokh, Anisi, Mohammad Hossein, Jindal, Anish, Kama, Nazri, Ismail, Saiful Adli
Format: Article
Language:English
Subjects:
Citations: Items that this one cites
Items that cite this one
Online Access:Get full text
Tags: Add Tag
No Tags, Be the first to tag this record!
cited_by cdi_FETCH-LOGICAL-c392t-e6040b7415bdb0a9a99b1dc989b4e0482e5371dd8decf01d72961947e0339fe83
cites cdi_FETCH-LOGICAL-c392t-e6040b7415bdb0a9a99b1dc989b4e0482e5371dd8decf01d72961947e0339fe83
container_end_page 2322
container_issue 5
container_start_page 2314
container_title IEEE journal of biomedical and health informatics
container_volume 27
creator Soleymani, Seyed Ahmad
Goudarzi, Shidrokh
Anisi, Mohammad Hossein
Jindal, Anish
Kama, Nazri
Ismail, Saiful Adli
description In real-time medical monitoring systems, given the significance of medical data and disease symptoms, a secure and always-on connection with the medical centre over the public channels is essential. To this end, an edge-enabled Internet of Medical Things (IoMT) scheme is designed to improve flexibility and scalability of the network and provide seamless connectivity with minimum latency. The entities involved in such network are vulnerable to various attacks and can potentially be compromised. To address this issue, an authentication scheme comprised of digital signature and Authenticated Key Exchange (AKE) protocol is proposed which guarantees only authorized entities get access to the services available in the medical system. Moreover, to fulfill the privacy-preserving, each entity is mapped to a different pseudo-identity. The non-mathematical and performance analysis show that the proposed scheme is robust against various attacks such as impersonation and replay attacks.
doi_str_mv 10.1109/JBHI.2022.3143207
format article
fullrecord <record><control><sourceid>proquest_ieee_</sourceid><recordid>TN_cdi_proquest_miscellaneous_2620081401</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><ieee_id>9682577</ieee_id><sourcerecordid>2809890517</sourcerecordid><originalsourceid>FETCH-LOGICAL-c392t-e6040b7415bdb0a9a99b1dc989b4e0482e5371dd8decf01d72961947e0339fe83</originalsourceid><addsrcrecordid>eNpdkMtOwzAQRS0Eogj6AQgJRWLDJmVsJ7G9LBWPIhAVhbWVxwRc5QF2Uql_j6O2LJiNZzznjj2XkHMKE0pB3TzdPs4nDBibcBpxBuKAnDCayJAxkIf7nKpoRMbOrcCH9FcqOSYjHgP3pTghy2mwsGad5ptwYdGhXZvmM5j23Rc2ncnTzrRNsMy_sMagbG3whmkVvhtfvWDh-1Xw0jama-0gW25ch7U7I0dlWjkc785T8nF_9z57DJ9fH-az6XOYc8W6EBOIIBMRjbMig1SlSmW0yJVUWYQQSYYxF7QoZIF5CbQQTCV-HYHAuSpR8lNyvZ37bdufHl2na-NyrKq0wbZ3miVs2DkC6tGrf-iq7W3jf6eZBP8kxFR4im6p3LbOWSz1tzV1ajeagh5M14PpejBd70z3msvd5D6rsfhT7C32wMUWMIj411aJZLEQ_BfyI4Pj</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>2809890517</pqid></control><display><type>article</type><title>A Privacy-Preserving Authentication Scheme for Real-Time Medical Monitoring Systems</title><source>IEEE Electronic Library (IEL) Journals</source><creator>Soleymani, Seyed Ahmad ; Goudarzi, Shidrokh ; Anisi, Mohammad Hossein ; Jindal, Anish ; Kama, Nazri ; Ismail, Saiful Adli</creator><creatorcontrib>Soleymani, Seyed Ahmad ; Goudarzi, Shidrokh ; Anisi, Mohammad Hossein ; Jindal, Anish ; Kama, Nazri ; Ismail, Saiful Adli</creatorcontrib><description>In real-time medical monitoring systems, given the significance of medical data and disease symptoms, a secure and always-on connection with the medical centre over the public channels is essential. To this end, an edge-enabled Internet of Medical Things (IoMT) scheme is designed to improve flexibility and scalability of the network and provide seamless connectivity with minimum latency. The entities involved in such network are vulnerable to various attacks and can potentially be compromised. To address this issue, an authentication scheme comprised of digital signature and Authenticated Key Exchange (AKE) protocol is proposed which guarantees only authorized entities get access to the services available in the medical system. Moreover, to fulfill the privacy-preserving, each entity is mapped to a different pseudo-identity. The non-mathematical and performance analysis show that the proposed scheme is robust against various attacks such as impersonation and replay attacks.</description><identifier>ISSN: 2168-2194</identifier><identifier>EISSN: 2168-2208</identifier><identifier>DOI: 10.1109/JBHI.2022.3143207</identifier><identifier>PMID: 35030087</identifier><identifier>CODEN: IJBHA9</identifier><language>eng</language><publisher>United States: IEEE</publisher><subject>Authentication ; Computer Security ; Computer Systems ; Confidentiality ; Data privacy ; Digital signatures ; edge computing ; Health care facilities ; Humans ; Internet of medical things ; Latency ; Medical diagnosis ; Medical diagnostic imaging ; medical monitoring system ; Monitoring ; Monitoring systems ; Network latency ; Privacy ; Real time ; Real-time systems ; Robustness (mathematics) ; Security ; Signs and symptoms ; Telemedicine ; WBAN ; Wireless communication</subject><ispartof>IEEE journal of biomedical and health informatics, 2023-05, Vol.27 (5), p.2314-2322</ispartof><rights>Copyright The Institute of Electrical and Electronics Engineers, Inc. (IEEE) 2023</rights><lds50>peer_reviewed</lds50><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c392t-e6040b7415bdb0a9a99b1dc989b4e0482e5371dd8decf01d72961947e0339fe83</citedby><cites>FETCH-LOGICAL-c392t-e6040b7415bdb0a9a99b1dc989b4e0482e5371dd8decf01d72961947e0339fe83</cites><orcidid>0000-0002-6099-5834 ; 0000-0001-8414-2708 ; 0000-0003-0383-3553 ; 0000-0003-2535-3438 ; 0000-0002-9299-5652 ; 0000-0002-3052-2892</orcidid></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://ieeexplore.ieee.org/document/9682577$$EHTML$$P50$$Gieee$$H</linktohtml><link.rule.ids>314,780,784,27924,27925,54796</link.rule.ids><backlink>$$Uhttps://www.ncbi.nlm.nih.gov/pubmed/35030087$$D View this record in MEDLINE/PubMed$$Hfree_for_read</backlink></links><search><creatorcontrib>Soleymani, Seyed Ahmad</creatorcontrib><creatorcontrib>Goudarzi, Shidrokh</creatorcontrib><creatorcontrib>Anisi, Mohammad Hossein</creatorcontrib><creatorcontrib>Jindal, Anish</creatorcontrib><creatorcontrib>Kama, Nazri</creatorcontrib><creatorcontrib>Ismail, Saiful Adli</creatorcontrib><title>A Privacy-Preserving Authentication Scheme for Real-Time Medical Monitoring Systems</title><title>IEEE journal of biomedical and health informatics</title><addtitle>JBHI</addtitle><addtitle>IEEE J Biomed Health Inform</addtitle><description>In real-time medical monitoring systems, given the significance of medical data and disease symptoms, a secure and always-on connection with the medical centre over the public channels is essential. To this end, an edge-enabled Internet of Medical Things (IoMT) scheme is designed to improve flexibility and scalability of the network and provide seamless connectivity with minimum latency. The entities involved in such network are vulnerable to various attacks and can potentially be compromised. To address this issue, an authentication scheme comprised of digital signature and Authenticated Key Exchange (AKE) protocol is proposed which guarantees only authorized entities get access to the services available in the medical system. Moreover, to fulfill the privacy-preserving, each entity is mapped to a different pseudo-identity. The non-mathematical and performance analysis show that the proposed scheme is robust against various attacks such as impersonation and replay attacks.</description><subject>Authentication</subject><subject>Computer Security</subject><subject>Computer Systems</subject><subject>Confidentiality</subject><subject>Data privacy</subject><subject>Digital signatures</subject><subject>edge computing</subject><subject>Health care facilities</subject><subject>Humans</subject><subject>Internet of medical things</subject><subject>Latency</subject><subject>Medical diagnosis</subject><subject>Medical diagnostic imaging</subject><subject>medical monitoring system</subject><subject>Monitoring</subject><subject>Monitoring systems</subject><subject>Network latency</subject><subject>Privacy</subject><subject>Real time</subject><subject>Real-time systems</subject><subject>Robustness (mathematics)</subject><subject>Security</subject><subject>Signs and symptoms</subject><subject>Telemedicine</subject><subject>WBAN</subject><subject>Wireless communication</subject><issn>2168-2194</issn><issn>2168-2208</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2023</creationdate><recordtype>article</recordtype><recordid>eNpdkMtOwzAQRS0Eogj6AQgJRWLDJmVsJ7G9LBWPIhAVhbWVxwRc5QF2Uql_j6O2LJiNZzznjj2XkHMKE0pB3TzdPs4nDBibcBpxBuKAnDCayJAxkIf7nKpoRMbOrcCH9FcqOSYjHgP3pTghy2mwsGad5ptwYdGhXZvmM5j23Rc2ncnTzrRNsMy_sMagbG3whmkVvhtfvWDh-1Xw0jama-0gW25ch7U7I0dlWjkc785T8nF_9z57DJ9fH-az6XOYc8W6EBOIIBMRjbMig1SlSmW0yJVUWYQQSYYxF7QoZIF5CbQQTCV-HYHAuSpR8lNyvZ37bdufHl2na-NyrKq0wbZ3miVs2DkC6tGrf-iq7W3jf6eZBP8kxFR4im6p3LbOWSz1tzV1ajeagh5M14PpejBd70z3msvd5D6rsfhT7C32wMUWMIj411aJZLEQ_BfyI4Pj</recordid><startdate>20230501</startdate><enddate>20230501</enddate><creator>Soleymani, Seyed Ahmad</creator><creator>Goudarzi, Shidrokh</creator><creator>Anisi, Mohammad Hossein</creator><creator>Jindal, Anish</creator><creator>Kama, Nazri</creator><creator>Ismail, Saiful Adli</creator><general>IEEE</general><general>The Institute of Electrical and Electronics Engineers, Inc. (IEEE)</general><scope>97E</scope><scope>RIA</scope><scope>RIE</scope><scope>CGR</scope><scope>CUY</scope><scope>CVF</scope><scope>ECM</scope><scope>EIF</scope><scope>NPM</scope><scope>AAYXX</scope><scope>CITATION</scope><scope>7QF</scope><scope>7QO</scope><scope>7QQ</scope><scope>7SC</scope><scope>7SE</scope><scope>7SP</scope><scope>7SR</scope><scope>7TA</scope><scope>7TB</scope><scope>7U5</scope><scope>8BQ</scope><scope>8FD</scope><scope>F28</scope><scope>FR3</scope><scope>H8D</scope><scope>JG9</scope><scope>JQ2</scope><scope>K9.</scope><scope>KR7</scope><scope>L7M</scope><scope>L~C</scope><scope>L~D</scope><scope>NAPCQ</scope><scope>P64</scope><scope>7X8</scope><orcidid>https://orcid.org/0000-0002-6099-5834</orcidid><orcidid>https://orcid.org/0000-0001-8414-2708</orcidid><orcidid>https://orcid.org/0000-0003-0383-3553</orcidid><orcidid>https://orcid.org/0000-0003-2535-3438</orcidid><orcidid>https://orcid.org/0000-0002-9299-5652</orcidid><orcidid>https://orcid.org/0000-0002-3052-2892</orcidid></search><sort><creationdate>20230501</creationdate><title>A Privacy-Preserving Authentication Scheme for Real-Time Medical Monitoring Systems</title><author>Soleymani, Seyed Ahmad ; Goudarzi, Shidrokh ; Anisi, Mohammad Hossein ; Jindal, Anish ; Kama, Nazri ; Ismail, Saiful Adli</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c392t-e6040b7415bdb0a9a99b1dc989b4e0482e5371dd8decf01d72961947e0339fe83</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2023</creationdate><topic>Authentication</topic><topic>Computer Security</topic><topic>Computer Systems</topic><topic>Confidentiality</topic><topic>Data privacy</topic><topic>Digital signatures</topic><topic>edge computing</topic><topic>Health care facilities</topic><topic>Humans</topic><topic>Internet of medical things</topic><topic>Latency</topic><topic>Medical diagnosis</topic><topic>Medical diagnostic imaging</topic><topic>medical monitoring system</topic><topic>Monitoring</topic><topic>Monitoring systems</topic><topic>Network latency</topic><topic>Privacy</topic><topic>Real time</topic><topic>Real-time systems</topic><topic>Robustness (mathematics)</topic><topic>Security</topic><topic>Signs and symptoms</topic><topic>Telemedicine</topic><topic>WBAN</topic><topic>Wireless communication</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Soleymani, Seyed Ahmad</creatorcontrib><creatorcontrib>Goudarzi, Shidrokh</creatorcontrib><creatorcontrib>Anisi, Mohammad Hossein</creatorcontrib><creatorcontrib>Jindal, Anish</creatorcontrib><creatorcontrib>Kama, Nazri</creatorcontrib><creatorcontrib>Ismail, Saiful Adli</creatorcontrib><collection>IEEE All-Society Periodicals Package (ASPP) 2005-present</collection><collection>IEEE All-Society Periodicals Package (ASPP) Online</collection><collection>IEEE</collection><collection>Medline</collection><collection>MEDLINE</collection><collection>MEDLINE (Ovid)</collection><collection>MEDLINE</collection><collection>MEDLINE</collection><collection>PubMed</collection><collection>CrossRef</collection><collection>Aluminium Industry Abstracts</collection><collection>Biotechnology Research Abstracts</collection><collection>Ceramic Abstracts</collection><collection>Computer and Information Systems Abstracts</collection><collection>Corrosion Abstracts</collection><collection>Electronics &amp; Communications Abstracts</collection><collection>Engineered Materials Abstracts</collection><collection>Materials Business File</collection><collection>Mechanical &amp; Transportation Engineering Abstracts</collection><collection>Solid State and Superconductivity Abstracts</collection><collection>METADEX</collection><collection>Technology Research Database</collection><collection>ANTE: Abstracts in New Technology &amp; Engineering</collection><collection>Engineering Research Database</collection><collection>Aerospace Database</collection><collection>Materials Research Database</collection><collection>ProQuest Computer Science Collection</collection><collection>ProQuest Health &amp; Medical Complete (Alumni)</collection><collection>Civil Engineering Abstracts</collection><collection>Advanced Technologies Database with Aerospace</collection><collection>Computer and Information Systems Abstracts – Academic</collection><collection>Computer and Information Systems Abstracts Professional</collection><collection>Nursing &amp; Allied Health Premium</collection><collection>Biotechnology and BioEngineering Abstracts</collection><collection>MEDLINE - Academic</collection><jtitle>IEEE journal of biomedical and health informatics</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Soleymani, Seyed Ahmad</au><au>Goudarzi, Shidrokh</au><au>Anisi, Mohammad Hossein</au><au>Jindal, Anish</au><au>Kama, Nazri</au><au>Ismail, Saiful Adli</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>A Privacy-Preserving Authentication Scheme for Real-Time Medical Monitoring Systems</atitle><jtitle>IEEE journal of biomedical and health informatics</jtitle><stitle>JBHI</stitle><addtitle>IEEE J Biomed Health Inform</addtitle><date>2023-05-01</date><risdate>2023</risdate><volume>27</volume><issue>5</issue><spage>2314</spage><epage>2322</epage><pages>2314-2322</pages><issn>2168-2194</issn><eissn>2168-2208</eissn><coden>IJBHA9</coden><abstract>In real-time medical monitoring systems, given the significance of medical data and disease symptoms, a secure and always-on connection with the medical centre over the public channels is essential. To this end, an edge-enabled Internet of Medical Things (IoMT) scheme is designed to improve flexibility and scalability of the network and provide seamless connectivity with minimum latency. The entities involved in such network are vulnerable to various attacks and can potentially be compromised. To address this issue, an authentication scheme comprised of digital signature and Authenticated Key Exchange (AKE) protocol is proposed which guarantees only authorized entities get access to the services available in the medical system. Moreover, to fulfill the privacy-preserving, each entity is mapped to a different pseudo-identity. The non-mathematical and performance analysis show that the proposed scheme is robust against various attacks such as impersonation and replay attacks.</abstract><cop>United States</cop><pub>IEEE</pub><pmid>35030087</pmid><doi>10.1109/JBHI.2022.3143207</doi><tpages>9</tpages><orcidid>https://orcid.org/0000-0002-6099-5834</orcidid><orcidid>https://orcid.org/0000-0001-8414-2708</orcidid><orcidid>https://orcid.org/0000-0003-0383-3553</orcidid><orcidid>https://orcid.org/0000-0003-2535-3438</orcidid><orcidid>https://orcid.org/0000-0002-9299-5652</orcidid><orcidid>https://orcid.org/0000-0002-3052-2892</orcidid><oa>free_for_read</oa></addata></record>
fulltext fulltext
identifier ISSN: 2168-2194
ispartof IEEE journal of biomedical and health informatics, 2023-05, Vol.27 (5), p.2314-2322
issn 2168-2194
2168-2208
language eng
recordid cdi_proquest_miscellaneous_2620081401
source IEEE Electronic Library (IEL) Journals
subjects Authentication
Computer Security
Computer Systems
Confidentiality
Data privacy
Digital signatures
edge computing
Health care facilities
Humans
Internet of medical things
Latency
Medical diagnosis
Medical diagnostic imaging
medical monitoring system
Monitoring
Monitoring systems
Network latency
Privacy
Real time
Real-time systems
Robustness (mathematics)
Security
Signs and symptoms
Telemedicine
WBAN
Wireless communication
title A Privacy-Preserving Authentication Scheme for Real-Time Medical Monitoring Systems
url http://sfxeu10.hosted.exlibrisgroup.com/loughborough?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-07T15%3A38%3A35IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_ieee_&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=A%20Privacy-Preserving%20Authentication%20Scheme%20for%20Real-Time%20Medical%20Monitoring%20Systems&rft.jtitle=IEEE%20journal%20of%20biomedical%20and%20health%20informatics&rft.au=Soleymani,%20Seyed%20Ahmad&rft.date=2023-05-01&rft.volume=27&rft.issue=5&rft.spage=2314&rft.epage=2322&rft.pages=2314-2322&rft.issn=2168-2194&rft.eissn=2168-2208&rft.coden=IJBHA9&rft_id=info:doi/10.1109/JBHI.2022.3143207&rft_dat=%3Cproquest_ieee_%3E2809890517%3C/proquest_ieee_%3E%3Cgrp_id%3Ecdi_FETCH-LOGICAL-c392t-e6040b7415bdb0a9a99b1dc989b4e0482e5371dd8decf01d72961947e0339fe83%3C/grp_id%3E%3Coa%3E%3C/oa%3E%3Curl%3E%3C/url%3E&rft_id=info:oai/&rft_pqid=2809890517&rft_id=info:pmid/35030087&rft_ieee_id=9682577&rfr_iscdi=true