A Secure Authentication at Remote Real-Time Data Access in IWSN-Based Healthcare Environment

E. Haodudin Nurkifli, Tzonelih Hwang

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Abstract

The fundamental concept in an IWSN-based Healthcare Environment is that doctors' devices can directly access the data from a patient's sensor in real-time. Unfortunately, wireless-based communication between the doctor's device and the patient's sensor is vulnerable to attacks such as impersonation, tracking, DoS, and cloning attacks. Therefore, this article tries to resolve the security problems in an IWSN-based Healthcare Environment by developing a secure authentication protocol using biometric and PUF -based. In addition, the informal use of solid reasoning analysis and formal analysis using the scyther tool proves that our protocol achieves security features and withstanding well-known attacks.

Original languageEnglish
Title of host publication2022 5th International Conference on Computer and Informatics Engineering, IC2IE 2022
EditorsIndra Hermawan, Asep Taufik Muharram
PublisherInstitute of Electrical and Electronics Engineers Inc.
Pages35-40
Number of pages6
ISBN (Electronic)9781665453387
DOIs
Publication statusPublished - 2022
Event5th IEEE International Conference on Computer and Informatics Engineering, IC2IE 2022 - Jakarta, Indonesia
Duration: 2022 Sept 132022 Sept 14

Publication series

Name2022 5th International Conference on Computer and Informatics Engineering, IC2IE 2022

Conference

Conference5th IEEE International Conference on Computer and Informatics Engineering, IC2IE 2022
Country/TerritoryIndonesia
CityJakarta
Period22-09-1322-09-14

All Science Journal Classification (ASJC) codes

  • Information Systems and Management
  • Artificial Intelligence
  • Computer Networks and Communications
  • Computer Science Applications
  • Hardware and Architecture
  • Information Systems

Fingerprint

Dive into the research topics of 'A Secure Authentication at Remote Real-Time Data Access in IWSN-Based Healthcare Environment'. Together they form a unique fingerprint.

Cite this