A Secure User Authentication Scheme with Biometrics for IoT Medical Environments
Journal Title: International Journal of Advanced Computer Science & Applications - Year 2018, Vol 9, Issue 11
Abstract
Internet of Things (IoT) is a ubiquitous network that devices are interconnected and users can access those devices through the Internet. Recently, medical healthcare systems are combined with these IoT networks and provide efficient and ef-fective medical services to medical staff and patients. However, the security threats are increased simultaneously as the requirements of medical services in IoT medical environments are increased. It is essential to provide security of the networks from malicious attacks. In 2018, Roy et al. proposed a remote user authentication and key agreement scheme with biometrics in IoT medical environments. Unfortunately, we analyze Roy et al.’s scheme and demonstrate that their scheme does not withstand various attacks, such as replay attacks and password guessing attacks. Then we propose a user authentication scheme to overcome these security drawbacks. The proposed scheme withstands various attacks from adversaries in IoT medical environments and provide better security functionalities of those of Roy et al. We then prove the authentication and session key of the proposed scheme using BAN logic and analyze that our proposed scheme is secure against various attacks.
Authors and Affiliations
YoHan Park
Mixed Profile Method of Speed and Location for Robotic Arms Motion used for Precise Positioning
The paper describes a new real-time computation method named Mixt Profile of Speed (MPS), which is used to obtain the value of speed, at every sampling period of time, during the acceleration and deceleration stage, wher...
Understanding Social Network Usage: Impact of Co-Presence, Intimacy, and Immediacy
This study examines individuals’ intentions and behaviour on Social Networking Sites (SNSs). The study proposed model asserts that “Co-presence”, “Intimacy”, “Immediacy”, “Perceived Enjoyment”, and “Perceived ease of use...
Using Academy Awards to Predict Success of Bollywood Movies using Machine Learning Algorithms
Motion Picture Production has always been a risky and pricey venture. Bollywood alone has released approximately 120 movies in 2017. It is disappointing that only 8% of the movies have made to box office and the remainin...
The Effects of Different Congestion Management Algorithms over Voip Performance
This paper presents one of the features of DS (Differentiated Services) architecture, namely the queuing or congestion management. Packets can be placed into separate buffer queues, on the basis of the DS value. Several...
Towards Securing Medical Documents from Insider Attacks
Medical organizations have sensitive health related documents. Unauthorized access attempts for these should not only be prevented but also detected in order to ensure correct treatment of the patients and to capture the...