2,499
Views
20
CrossRef citations to date
0
Altmetric
Articles

A formally verified authentication protocol in secure framework for mobile healthcare during COVID-19-like pandemic

ORCID Icon & ORCID Icon
Pages 532-554 | Received 10 Jun 2020, Accepted 16 Nov 2020, Published online: 04 Dec 2020

Abstract

Existing schemes in the realm of mobile healthcare (also, e-Healthcare) based on cloud and IoMT (Internet of Medical Things) do not ensure end-to-end security and are not compliant with HIPAA (Health Insurance Portability and Accountability Act). It is also very difficult often for these schemes to obtain evidence from the cloud in case of security breaches. In addition to these issues, mobile healthcare applications are prone to various types of attacks and formal proof is often unavailable. In this work, we propose our community cloud framework in an IoMT setting that ensures end-to-end security and circumvents many of the existing negative aspects using the Trusted Platform Module (TPM). We provide necessary proofs using BAN logic and Scyther tool. Also, we show that the energy consumption and the costs of communication and computation for our proposed protocol are far less than that of the existing protocols. We have implemented our protocol using Kotlin language in Android Studio ensuring all the required security properties.

1. Introduction

The exponential growth of IoT-enabled (Internet of Things-enabled) wearable devices such as smart medical sensors and healthcare management software has led to the revolution of collecting and storing healthcare data. Nowadays, we see a trend of increased use of IT (Information Technology) facilities and cyberspace. As one of the prominent technologies today, cloud computing also plays a vital role in some mobile healthcare systems. There is an expectation that this trend would grow fast in the coming days contributing to the field of IoMT in general. In fact, during recent outbreak of COVID-19 pandemic (Pathan, Citation2020), the necessity of IoMT for remote healthcare services has significantly been realised.

As part of IoMT (Parthasarathy & Vivekanandan, Citation2020), cloud computing is linked with the healthcare system; stored data could be sent to the hospitals and the doctors quickly from external storage. While using cloud can reduce the burden of a hospital to possess its own data storage facility and strong IT infrastructure, in such a setting, ensuring security and privacy of data would be quite difficult given the nature of cloud (as a third-party facility) and the overall communication and networking settings of IoMT. Security is basically considered a major challenge for wide-spread adoption of cloud technology or IoMT technology (Khan & Pathan, Citation2018) for mobile- or e-healthcare.

Medical data are often very sensitive and need to be protected maintaining some standard. For instance, to regulate healthcare industry, the US government introduced Health Insurance Portability and Accountability Act (HIPAA) (HIPAA, Citation2020). This was enacted to set some storage regulations and ensure sensitive medical data privacy to protect individuals covered by health insurance. While some legislated standards can ensure personal data privacy, often new technologies attract people, and when those are tried or tested (for practical implementation), there could be possibilities of violating standard terms. Many healthcare industries are not prepared for the new cyber age (Healthcare Cybersecurity, Citation2020). Fraud and identity theft in the healthcare sector have been on the exponential rise (Bay, Citation2015), just like in many other systems that take advantage of IT and cyber technologies today. ABI Research report (Bay, Citation2015) states that it is evident that the healthcare industry is adopting cloud technologies very swiftly and by the end of 2020, 80% of healthcare data might be stored at the cloud. Hence, in addition to its existing security challenges, healthcare industry has to cope with the security challenges of the cloud. At a minimum, the mobile healthcare industry should comply with HIPAA standards that regulate data privacy for personal healthcare information.

Motivation: There are various studies and predictions about healthcare data in the cloud as a part of IoMT. Global Market Insights Inc.’s report (Healthcare Cloud, Citation2020) states that the healthcare cloud computing market could surpass USD 55 billion by 2025, globally. However, in recent times, cyber-attacks have increased significantly, while many healthcare systems have not got sufficiently prepared to ensure patients’ data security and privacy. Hence, we consider a remote healthcare setting and tackle the key security issues in compliance with the HIPAA standard in this work.

Novelty and Contributions: The novelty and contribution of this work are as follows:

  1. Our mobile healthcare framework ensures end-to-end security and overcomes the flaws in the existing literature.

  2. The mobile healthcare framework complies with HIPAA regulations.

  3. As far as we have investigated, we are the first to use White-Box Cryptography (WBC) in mobile applications.

  4. Again, we are the first to propose a secure mobile healthcare framework using a community cloud and capable of collecting and preserving evidence (in case of security breaches) using the transaction log, counters, forensics method, and cryptographic audit log techniques.

  5. We are the first to implement our protocol in real-time using Kotlin language in Android Studio.

  6. Formal verification of our mobile healthcare protocol was successful using BAN logic (Burrows et al., Citation1990), (Abadi et al., Citation1993), and Scyther tool (Cremers, Citation2006).

  7. Finally, our proposed protocol’s energy consumption, communication, and computation costs are far less than that of the existing protocols.

Structure of the Paper: After this introduction, Section 2 discusses the related works. Section 3 presents our proposed mechanism. Section 4 contains formal verification while Section 5 presents the security analysis. Section 6 presents the threat model. Performance analysis and comparisons are presented in Section 7 and Section 8 concludes the paper with future research direction.

2. Related work

Hu et al. (Citation2010) propose a hybrid PKI (Public Key Infrastructure) based scheme for addressing HIPAA privacy and security regulations. Though this work links itself with HIPAA standard, it is proposed based on smart cards and not applicable for mobile healthcare applications and mobile clouds. Kumar et al. (Citation2012) propose a novel authentication scheme for Wireless Medical Sensor Networks. We found that the scheme is still vulnerable to insider attack and off-line password guessing attack.

Lee et al. (Citation2013) propose an improved mobile-Healthcare emergency system based on extended chaotic maps. The authors claim that their system provides flawless user anonymity and mutual authentication alongside reducing the computation cost. However, their scheme cannot withstand multi-protocol attack or Denial of Service (DoS) attack. Also, it was not implemented for real-time operations as we understand. Li et al. (Citation2013) propose an extended chaotic map and dynamic ID-based user authentication scheme against DoS attacks. But, this scheme also fails to protect itself against multi-protocol attack and is not for real-time operations. Though claim is made, clarity is missing in the work about how it overcomes the permanent DoS attack. Following this direction of work, Citation2015] propose a new three-party authenticated key agreement scheme based on chaotic maps that can work without passwords. Proposed scheme also offers thorough privacy protection to the users, so the user forgery attack can cause no damage. However, the same issues like lack of protection against multi-protocol attack, DoS attack, and absence of implementation aspect for real-time setting show its weaknesses. In addition to these issues, all these schemes in this line do not follow any specific standard.

He et al. (Citation2015) present a lightweight authentication scheme for healthcare applications using symmetric algorithms and hash functions. The possibilities of off-line guessing attack, user impersonation attack, and sensor node capture attack still remain for this work due to its inherently weak mechanism. The work presented by Wu et al. (Citation2017) has a fatal flaw that the user is able to communicate with the sensor directly at the end of the authentication process. This makes it more vulnerable to various attacks while the work by Li et al. (Citation2016) cannot handle impersonation, off-line password guessing, and sensor node capture attacks.

Wazid et al. (Citation2016) identify some challenges in the field of security protocols for mobile healthcare systems. The argument is that those challenges must be taken into consideration in order to ensure any secure, robust, and cost-effective solution. Alkeem et al. (Citation2017) propose a healthcare system using cloud of things that combines various security concepts of both healthcare system and cloud computing. The authors claim that their approach ensures various security properties including non-repudiation. However, from the description of the mechanism, it is not clear how the non-repudiation and accountability are ensured. In fact, after a careful analysis, it can be noticed that there is no real end-to-end security ensured, anonymity of the patient is not ensured, there is no audit process, and there is no clarity about where the client’s credentials are stored.

A Multi-factor user authentication scheme for IoT-based healthcare services is proposed by Dhillon and Kalra (Citation2018). They basically propose an Elliptic Curve Cryptography (ECC)-based authentication protocol that ensures real-time remote patient monitoring and tracking based on cloud-IoT setting. This protocol allows the medical professionals real-time access to patient’s data and to take actions accordingly. Again, Sharma and Kalra (Citation2019) propose healthcare service that uses a lightweight user authentication scheme in a Cloud-IoT setting. Their work's main contribution is that legitimate users can get real-time access to remote patient’s sensor data that would be stored on some cloud server. However, examining the work, we find that it does not talk about cloud data security - they rely on some public cloud setting which is a real drawback. Also, there is no clear information how non-repudiation and accountability are ensured, the scheme does not ensure end-to-end security, there is no auditing process of cloud data, and like some other approaches, there is no clear information about the storage of client’s and cloud’s credentials (i.e. sensitive data). Tewari and Gupta (Citation2020) propose a simple and lightweight mutual authentication protocol for healthcare systems ensuring location privacy with low computation and storage capabilities, but this recent work also does not ensure end-to-end security.

Motivated by these works, we find no proposal so far available that ensures the HIPAA standard for mobile healthcare in an IoMT setting, which could help COVID-19 or similar other pandemic situations when patients would need such care while maintaining security and privacy of data. We name our mechanism, Security and Privacy-aware Mobile Healthcare Framework (SPMHF). Following sections describe it alongside necessary analysis and results.

3. Our proposed mobile healthcare system – SPMHF

This section describes the entire ecosystem of our framework. Following are the major entities involved:

  • Body Area Sensor Network (BSN). Here is the Sensor (S).

  • Healthcare Application in BSN.

  • Universal Integrated Circuit Card (UICC) in Smartphone.

  • Healthcare Application in UICC.

  • Central Healthcare Authority (CHA).

  • Certifying Authority Cloud (CAC).

  • Doctor (D).

  • Patient (P) and Family (individuals).

  • Community Cloud for Healthcare (CCH).

As reported in various reliable sources from the medical community, COVID-19 patients can show various types of symptoms like fever, cough, muscle pain, sore throat, shortness of breath, etc. (Symptoms, Citation2020). Due to the nature of the disease, it is classified as highly contagious. In such case or similar disease condition, when a patient needs emergency treatment or in the ICU (Intensive Care Unit), various types of bodily conditions need to be measured like low oxygen level in blood or hypoxia, high temperature, irregular pulse or heart rate, and so on (Wei-Hass, Citation2020), (Cardiac, Citation2020). A key requirement is as less physical contact with the patient as possible. Here, BSN could be very useful. Indeed, today there are various types of body sensors to automatically monitor body temperature, oxygen saturation, blood pressure, pulse rate, etc. (Khan & Pathan, Citation2018), (Zhang et al., Citation2020).

In our setting (see Figure ), the BSN contains a Secure Element (SE), SE contains a healthcare application which collects the health information (e.g. heart rate, temperature). This BSN healthcare application shares a symmetric key with the Mobile Healthcare Application (MHA) in UICC (Ahamad et al., Citation2014) of the patient’s smartphone. Again, this MHA and CCH share symmetric key between them. Both the Patient (P) and Doctor (D) possess mobile phones with UICCs as SEs and they communicate using 4G/5G through Mobile Network Operator (MNO). The MNO also enables Over-The-Air (OTA) connectivity. CCH provides healthcare services to the patients by bringing all hospitals or medical centres in the same cloud. The country's central government would manage CCH and it hosts a Trusted Platform Module (TPM) of all the hospitals (the respective hospitals personalise TPM).

Figure 1. Security and Privacy-aware Mobile Healthcare Framework (SPMHF).

Figure 1. Security and Privacy-aware Mobile Healthcare Framework (SPMHF).

CCH and patients are connected via 4G/5G ensuring communication security using Transport Layer Security (TLS) protocol. Application security is ensured using AES (Advanced Encryption Standard) and ECDSA (Elliptic Curve Digital Signature Algorithm). Certifying Authority (CA) serves as a Trusted Service Manager (TSM) (Ahamad & Pathan, Citation2019) in addition to its usual functions. Community Cloud here is controlled and shared by multiple organisations. Several owners can have some common interest and hence, it could be managed by a committee of owners or a third party – even can be located at a distant place. The legitimate members of the community would be given access to the data in the cloud. Wireless Public Key Infrastructure (WPKI) is implemented in this framework. Healthcare applications in BSN and UICC are personalised by the CCH using OTA. CCH updates the firmware in the SE of BSN and MNO updates the firmware in the UICC.

One of the most critical attacks against MHA is repackaging attack (Chen et al., Citation2018) where an attacker with malicious intent alters an application distributed in the market and then redistributes it. In order to overcome the repackaging attacks on MHA from the get-go, our framework implements the following countermeasures:

  1. Self-Signing Restriction: This is a countermeasure against repackaging attacks. MHAs should be signed by both CA and CHA.

  2. Code Obfuscation: By obstructing analysis, it can prevent disclosure of logic or code (i.e. less chance of reverse engineering). SPMHF adopts logic obfuscation such as control obfuscation.

  3. Code Attestation: TPM and UICC are hardware-based platform security solutions in SPMHF. TPM ensures secure booting process from boot loader to the kernel of OS (Operating System) and loading of library modules. Platform integrity is checked remotely by privileged isolation between applications along with remote attestation. Thus, any forgery of data (exchanged between CCH and patient's application) can be detected.

3.1. Certifying authority cloud (CAC)

CA has a cloud with usual functions like issuing certificates, providing directory services, Online Certificate Status Protocol (OCSP), and Certificate Revocation List (CRL).

Registration Authority (RA): CA infrastructure contains this authority for checking the credentials of patients.

Signing Services and Certificate Repository (SSCR): This entity is responsible for generating and signing the certificates. It also maintains the certificates in the Certificate Repository. Different types of certificates are issued which includes X.509, Short Lived Certificates and Lightweight Certificates. CA generates digital signatures in TPM of the CA. TPM is considered a Secure Signature Creation Device (SSCD); hence, CA's digital signatures are considered Qualified Electronic Signatures (QES).

OCSP: OCSP maintains X.509 certificates; this entity helps verify certificate validity.

TSA: Time Stamping Authority is for timestamping services.

CRL: It maintains the list of revoked certificates.

3.2. Central healthcare authority (CHA)

This entity monitors the functions of the hospitals. It also ensures the implementation of HIPAA in hospitals. CHA and CA employ Trusted Party Auditor (TPA) for monitoring the functions of CCH. CHA acts as an adjudicator and TSM. CCH is a subsidiary of CHA and CHA controls TPA.

3.3. Community cloud for healthcare (CCH)

The following entities are involved in CCH:

Communication Manager (CM): Information about CCH services, standards of communications, and interfaces used for different devices is kept in it. Three data interoperability methodologies are HL7 (Health Level Seven) (https://www.hl7.org/), DICOM (Digital Imaging and Communications in Medicine) (https://www.dicomstandard.org/), and IHE (Integrated the Healthcare Enterprise) (Bhatia & Ibrahim, Citation2020). HL7 and DICOM are the standards applied for data transmission among CCH, hospitals and CHA. For encrypted communication, IPSec VPN (Internet Protocol Security Virtual Private Network) is placed at the forefront of medical gateways. To engage in HTTPS (Hypertext Transfer Protocol Secure) communication, SSL (Secure Sockets Layer) protocol is applied for servers at the medical gateways (for web servers).

TPA: This entity is employed by TSM (i.e. CA) and CHA in our framework which monitors the functions of CCH.

WPKI Manager: This is responsible for the lifecycle of stakeholder’s certificates, and it takes care of the certificate status and directly contacts with the CA. This entity closely works with PM (Personalisation Manager) and CA.

Logging and Monitoring Control Manager (LMCM): It performs anomaly detection using statistical and machine learning (ML) algorithms and identifies traffic variances against pre-defined conditions. Any deviation of a system from standard access control policies could be monitored. Also, various authentication attempts (either passed or failed), management of users, rights management, and so on can be recorded using logs. The items in a log can be:

  • User IDs (identities).

  • Exact timestamp (date-time) for logging in and logging off.

  • Device location that uses the LAN (Local Area Network), ID of access point, or ID of remote-access system.

The hospital TPM contains:

  1. Identity and Access Management (IAM): This entity authenticates IoT devices, IoT Medical Applications (IMA) and Doctor (D) credentials which are issued by TSM, i.e. CA and issues a token which is used to carry out transactions.

  2. Time Stamping Authority (TSA): It offers timestamping services for CCH generated messages.

  3. Personalisation Manager (PM): PM is responsible for provisioning and personalising of the IoT device, IMA, and UICC of the doctor. UICC is the SE in doctor’s smartphone.

  4. Evidence Manager (EM): It collects evidences using various audit log techniques. When any dispute arises among the stakeholders, this entity can provide proofs to the court of law. Once ECDSA is signed, it can prove that data is valid – by matching confirmation data with log data, timestamps, nonce, and old certificates. It also collects evidence from LMCM. TPA finds evidence in TPM of CCH. TPA audits the logs of TPM and detects tampering with the logs.

  5. Patch Management and System Hardening: Applications and OSs are often targeted by various types of attacks on a daily basis. Effective “Patch Management” can successfully reduce the risk of compromising systems. System hardening process ensures relatively less attack surface of various types of networking devices and applications. As part of this task, system administrators can close specific network ports, enable or disable some services, use minimal software, etc. If a server runs a huge number of functions, it would be more prone to cyber-attacks and then, system hardening would be also more difficult. To facilitate system hardening, in our approach, we do whatever is required based on the requirements set for the system complying with the standard chosen before implementation of the system. After talking about various entities and aspects of our system, we describe here the health monitoring mechanism.

3.4. Doctor registration phase

Doctor submits his/her credentials to the hospital after being appointed as an employee of the hospital and hospital staff checks his/her credentials (such as National Identity). Hospital acts as an RA and starts the procedure of getting X.509 certificate from CA, hospital gets his/her credentials, takes his signature on the document, then allows to download key pair application on the UICC of the mobile phone. The doctor generates key pairs and then, CA maps the credentials. The public key will be in the repository of the CA. Hospital TPM customises the MHA in the UICC of doctor; it updates the software and firmware. A symmetric key (SKHD) is agreed upon between the MHA of the doctor and hospital TPM in the CCH.

3.5. Customisation of sensor (BSN) phase

Hospital gets/buys sensors from the manufacturer containing an SE and MHA for recording different body parameters. The hospital records the sensor’s identity, date of manufacturing in its database and installs MHA in the SE of sensor. This MHA only supports symmetric encryption to consume fewer resources.

3.6. Healthcare data upload phase

A patient visits the hospital for some health issues (with symptoms of COVID-19 or any other disease), hospital staff checks his/her credentials, performs preliminary health checkups, and allocates a doctor. Doctor checks and prescribes treatment (PRD) and uploads the treatment data to the hospital database which is in the CCH. If the patient needs sensors to be embedded on/in the body (after getting admitted to ICU or so), doctor instructs the staff to allocate and embed sensors on/in the patient’s body. Doctor (D): DH:{IDD,TD,ND,IDP,PRD,H(PRD)}SKHD.

3.7. Customisation of patient’s secure element phase

This is exactly similar to how the doctor generates key pairs and CA maps the credentials as described in subsection 3.4. Instead of doctor, this is for the patient’s credentials.

3.8. Customisation of MHA Phase

Here are the steps for this phase:

  • Hospital Staff allocates sensors to the patient, maps sensor identity with patient identity and public key of the patient.

  • Hospital TPM customises the MHA in the UICC. It updates the software and firmware. A symmetric key is agreed upon between the MHA and Hospital TPM in the CCH.

  • A symmetric key is agreed upon between the MHA of sensors and MHA in the UICC.

3.9. Health monitoring mechanism

Figure  shows the steps involved in health monitoring mechanism while Table  elaborates the major notations used in the paper.

Figure 2. Steps in the Health Monitoring Mechanism.

Figure 2. Steps in the Health Monitoring Mechanism.

Table 1. Major notations and their meanings.

Step 1: The BSN (S) starts collecting the data from the patient and sends it to the UICC of the smartphone of the patient (P) every one minute via Bluetooth; the data transmitted to the UICC is encrypted with the symmetric encryption key shared between MHA of BSN (S) and MHA in UICC (P). SP:{IDP,IDS,TS,NS,LOCP,PD}SKPS

Step 2: MHA in UICC (P) decrypts the message and forwards the message to the TPM of the hospital (H) in CCH. PH:{IDP,IDH,TP,NP,LOCP,PD}SKPH Step 3: If the readings are within the limits, Hospital (H) updates the database or if there is any deviation, it sends the message to the doctor (D) and patient’s family members. Hospital (H) sends an ambulance to the patient’s location. It also informs to the family members in case of emergency. HD:{IDP,IDH,TH,NH,LOCP,PD}SKHD Symmetric keys are generated each time using hashing algorithms with one-bit cyclic shift of a master secret as described in (Kungpisdan et al., Citation2003). The key set SKAB (with {1, 2, 3, … n}) is generated from the secret key, SKAB. The symmetric key shared between two parties, A and B generates session keys for each session and hence, session keys will be different for different sessions. In our case, symmetric secret key is shared between the MHA of SE in the smartphone and MHA of Hospital TPM. This system uses White Box Cryptography (WBC) (Beunardeau et al., Citation2016) which enables secure storage of secret keys and session keys in the MHA. The hospital TPM updates the keys in the MHA of SE in the smartphone. CCH stores patients’ data in the ciphertext, and hospital searches and retrieves patient data using the scheme proposed in (Xiao et al., Citation2020). CCH ensures patient data privacy using the scheme proposed by (Chang & Wu, Citation2019).

4. Formal verification using BAN logic and scyther tool

4.1. BAN logic based formal verification

Using BAN logic, we have formally verified our protocol.

  1. Assumptions

    • (a) Secrets and Keys: “X” is a set of entities having {S, P, H and D}. CA issues certificates to all the entities involved and all the entities have their keys (AS1, AS2).

    • AS1. CA believes (S{S,P,HandD}KXX)

    • CA believes all stakeholders own their public keys.

    • AS2. X{ S, P, H and D} X believes KCACA). All system entities possess the public key and X.509 certificate of CA.

    • (b) Freshness:

      • AS3. G believes freshness NS, if G sees quantity NS in a message, then G considers that as a replay message.

      • AS4. H believes freshness NP, if H sees quantity NP in a message, then H considers that as a replay message.

      • AS5. D believes freshness NH, if D sees quantity NH in a message, then D considers that as a replay message.

    • (c) Timeliness:

      • All entities involved believe that the nonce generated by them are unique and fresh.

      • AS6. TS is timestamp generated by S ensuring timeliness.

      • AS7. TP is timestamp generated by P ensuring timeliness.

      • AS8. TH is timestamp generated by H ensuring timeliness.

    • d) Assumptions about trust:

      • These assumptions are about the trust levels of all entities.

      • AS9. (∀X, Q ∈ {S, P, H and D}, X believes CA controls KCAQ. CA is trusted by all entities.

      • AS10.belief Y, CA believes (TPM controls (H believes Y)). CA trusts CCH that Hospital TPM to relay CCH’s beliefs.

  2. BAN Logic Based Verification

Step 1: P decrypts: {IDP,IDS,TS,NS,LOCP,PD}SKPS from the assumptions AS1, AS2, AS5, AS6, & AS7. (1) P\ believes:{IDP,IDS,TS,NS,LOCP,PD}SKPS(1)

P verifies public key of S (AS7) got from S that includes,

  1. Verifying the public key of the certificate from the CA.

  2. Validating the lifetime of “S” certificate.

  3. Verifying the “S” Certificate from CRL.

  4. If certificate verification is successful, then, (2) P\ believesS said:{IDP,IDS,TS,NS,LOCP,PD}SKPS(2) (3) Pbelieves freshTSfrom AS3(3) (4) Pbelieves freshNSNSfrom AS4(4)

So, from the statements (1) to (4),

P believes: {IDP,IDS,TS,NS,LOCP,PD}SKPS

Step 2: PH:{IDP,IDH,TP,NP,LOCP,PD}SKPH

H decrypts PH:{IDP,IDH,TP,NP,LOCP,PD}SKPH {IDP,IDG,TG,NG,Reading,LOC P}SK GH from the assumptions, AS1, AS2, AS5, AS6, & AS7.

H believes (5) {IDP,IDH,TP,NP,LOCP,PD}SKPH{IDP,IDG,TG,NG,Reading,LOCP}SKGH(5)

H verifies public key of S (AS7) got from S that includes,

  1. Verifies the public key

  2. Validating the lifetime of “P” certificate

  3. Verifying the “P” Certificate from CRL

  4. If certificate verification is successful, then

H believes P said: (6) {IDP,IDH,TP,NP,LOCP,PD}SKPH(6) (7) believesfreshTPTGfromAS3(7) (8) Hbelieves freshNPNGfromAS4(8)

So, from the statements (5) to (8),

H believes {IDP,IDH,TP,NP,LOCP,PD}SKPH

Step 3: HD:{IDP,IDH,TH,NH,LOCP,PD}SKHD

D decrypts the received {IDP,IDH,TH,NH,LOCP,PD}SKHD {IDP,IDG,IDH,TH,NH,Reading,LOCP}SKHD from the assumptions AS1, AS2, AS5, AS6, & AS7. (9) Dbelieves{IDP,IDH,TH,NH,LOCP,PD}SKHD(9)

D verifies public key of H (AS7) got from S that includes,

  1. Verifies the public key

  2. Validating the lifetime of “H” certificate.

  3. Verifying the “H” Certificate from CRL.

  4. If certificate verification is successful, then,

D believes H said: (10) {IDP,IDH,TH,NH,LOCP,PD}SKHD{IDP,IDG,IDH,TH,NH,Reading,LOCP}SKHD(10) (11) DbelievesfreshTHTHfromAS3(11) (12) DbelievesfreshNHNHNHfromAS4(12)

So, from the statements (9) to (12), Dbelieves{IDP,IDH,TH,NH,LOCP,PD}SKHD

4.2. Formal verification of our protocol using scyther tool

There are three types of attacks, first type is about the integrity of the messages exchanged among S, P, H and D, second type of attack is about the authentication of entities involved in the system and third is an attack on the confidentiality of data exchanged among the entities involved in the system. We used the default properties of the Scyther tool (Cremers, Citation2006). It is a simulation tool used to verify, falsify, and analyse the security properties and is the only tool that can verify multi-protocol attacks. Appendix A presents the code in SPDL (Security Protocol Description Language).

5. Security analysis

This section analyses our proposed protocol’s security, considering the known threats and attacks relevant to such a system. Threat model would consider the relevant cloud and application related issues.

5.1. Key security properties

To ensure authorisation, a patient needs to gain permission to store the data collected from his/her body in order to store it in the CCH. CCH needs to verify whether the patient is registered and authorised to place the messages in the CCH. CCH/Hospital TPM establishes a secure channel with MHA in the UICC using SSL/TLS protocol at the communication layer. Data exchanged between the entities are encrypted using shared symmetric key. Encrypted messages also contain timestamps and nonce which ensure timeliness and uniqueness properties. Hence, confidentiality is ensured. For mutual authentication, MHAs of the patient and doctor are personalised by the CCH i.e. a symmetric key is agreed between “Hospital TPM and patient” and “Hospital TPM and doctor”. This achieves the goal of mutual authentication, the privacy of credentials, and the session key’s security using symmetric key cryptography. The patient’s information is not accessible by any unauthorised entity; the intruder cannot send, capture or read the messages as the messages are encrypted at the application layer and transmitted using SSL/TLS protocol at the communication layer. This ensures integrity of exchanged messages.

To ensure availability, CCH makes sure that it is available to patients all the time. UICC in patent’s mobile phone and SE in BSN continuously send messages to CCH. These two (UICC and SE in BSN) will not keep any message in their memory. Moreover, a secure channel is established between MHA in UICC and CCH using SSL/TLS protocol. To ensure non-repudiation property, we use WPKI Manager which is responsible for the lifecycle of the stakeholder’s certificates. It takes care of the certificate status and directly contacts the CA. This entity closely works with PM and CA. Also, as noted before, digital signatures are generated in SSCD, which are considered QES. SSCD in this framework are SE and TPM.

5.2. Accountability, personalisation of MHA, and session key agreement

Each and every user in the ecosystem is accountable for his/her actions. The shared symmetric key (that is agreed upon between entities) encrypts all messages with Hospital TPM. Therefore, the patient and the doctor are responsible for their transmitted messages. As already noted before, Hospital TPM personalises the MHA in UICC. It updates the software and firmware.

5.3. Key freshness, repackaging attack, and security of keys

As discussed in Section 3, in order to thwart the repackaging attack on MHA, Self-Signing Restriction, Code Obfuscation, and Code Attestation are used. If the symmetric shared key is compromised, CCH would automatically update keys using OTA, thereby ensuring key freshness. In order to implement Signature-Creation Data, SSCD can configure hardware or software or both. The stakeholders in SPMHF generate digital signatures in UICC and hospital TPM so that they are considered as QES.

5.4. Secure key distribution

Patient’s private key is securely stored in UICC; symmetric keys are securely stored in MHA. Each MHA is independent of other applications (applications are protected by firewalls).

5.5. Denial of service attack (DoS)

The patient could withstand request or fake message-based DoS attack (Pathan, Citation2010) as CCH/Hospital TPM establishes a secure channel with MHA at the communication layer. Application security is also ensured by encrypting the messages using AES algorithm. Hence, fake messages are simply discarded to foil DoS attack.

5.6. Multi-protocol, man-in-the-middle (mitm), and replay attacks

Our protocol overcomes such attack (where multiple protocols are involved) as it has been successfully verified using Scyther tool. It also overcomes Man-In-The-Middle (MITM) attack as data exchanged between the entities are encrypted using shared symmetric key. As with that encryption, timestamps are recorded for all messages, replay attack is not possible to be launched as well.

5.7. Impersonation attack and parallel session attack

An intruder cannot generate a session key. Hence, it cannot decrypt the messages transmitted. Respective entities personalise MHA. If symmetric shared key is compromised, CCH updates the keys OTA automatically; so, key freshness is ensured. Therefore, it could thwart impersonation attack. Again, parallel session attack is not possible in our mechanism as SSL/TLS protocol is used for secure channel initiation while application security is ensured by encryption using AES algorithm.

5.8. Auditing

TPA is employed by CA and CHA (both act as TSM). TPA monitors and audits all hospital TPMs in CCH; thereby, ensuring transparency and accountability. In case of dispute among stakeholders, TPA collects evidence from networks, firewalls, and hospital TPM, etc. LMCM performs anomaly detection using statistical and ML algorithms, and identify traffic variances against pre-defined conditions.

5.9. HIPAA compliance

Our framework puts responsibility on the organisations to protect patient’s information. Secrecy of patient’s information is maintained during its rest and during the transit. Hospital TPM keeps patient’s data in encrypted form. The data can be decrypted with the shared symmetric key between hospital TPM and MHA in the patient’s UICC. Here, SSL/TLS protocol ensures the communication security.

5.10. Application security

WPKI Manager takes care of the certificate status and directly contacts with the CA. This entity closely works with PM and CA. In order to ensure non-repudiation property, digital signatures are generated in the SSCD.

5.11. Physically stolen medical sensor attack or node capture attack

If an adversary steals sensor or smartphone, he will not be able to extract patient’s credentials (keys) or health information as the sensor and smartphone do not store patient’s health records (i.e. the SEs and MHAs of both the sensor and smartphone do not contain any of patient’s health information). Moreover, the credentials (keys) stored in SE cannot be captured by the adversary as SE is tamper-resistant. Adversary cannot obtain credentials (keys) from MHA either because, it adopts WBC which resists white-box attacks.

5.12. Resistance against unauthorised key computation

An adversary will not be able to compute symmetric key shared between hospital TPM and sensor or between hospital TPM and gateway as the hospital TPM generates symmetric keys in CCH.

5.13. Resistance against privileged insider attack

An insider can try intentionally to hack the data from the Hospital TPM in CCH. However, he needs to access an authorised doctor’s credentials, including the password, biometric, and doctor’s digital signature. Hence, the adversary cannot steal patient’s information; hence, the proposed system withstands privileged insider attacks.

5.14. Resistance against stolen verifier attack

Our system is safe against stolen verifier attack as the adversary cannot get any verifier or any relevant information from the SE or MHA of either the sensor or the smartphone as SE is tamper-resistant while MHA adopts WBC as mentioned in subsection 5.11.

5.15. Defense-in-depth

Our framework incorporates security in design at every phase of development and implementation. Trying to add security at the end of development phase can turn out to be very costly. As presented so far, with personalisation of MHA, encryption, secure channel and overall, step by step building process, we ensure defense-in-depth and end-to-end security.

Before presenting the performance analysis, let us talk about the threat modelling used for our approach in the next section.

6. Threat modelling

We have identified and analysed all the potential threats against the proposed system. In order to reduce the risks, the mitigation strategy for each threat has been identified. According to the security and privacy protection requirements in (Gerdes & Fensli, Citation2015) and countermeasure techniques corresponding to STRIDE (Shostack, Citation2014), Table  suggests a list of countermeasure techniques corresponding to STRIDE, to address the identified threats.

Table 2. Threat modelling.

7. Performance analysis, comparisons, and implementation

Comparative data about the costs of computation for login and authentication phases are presented in Table . Here, TH denotes the time complexity of computing the one-way hash function while TS stands for the same regarding symmetric encryption/decryption operation.

Table 3. Computational Costs for Login & Authentication Phases.

Our performance analysis confirms the efficacy of the proposed scheme. It employs one-way hash and symmetric encryption/decryption operations. These are the relatively low-cost operations in comparison with other cryptographic operations. As presented in (Xu & Wu, Citation2015), the time complexities (in seconds) are TH=0.0004 and TS=0.1303 where TH is time taken for hashing and TS is the time taken for encryption/decryption. Clearly, our proposed work shows better performance (see Figure ).

Figure 3. Bar chart for computational costs of login and authentication phases.

Figure 3. Bar chart for computational costs of login and authentication phases.

Table  compares the energy consumption of our proposed protocol against the other works. To evaluate the energy consumption, cryptographic operations; hash and symmetric key operations are executed. As of (Javan & Bafghi, Citation2014), the energy consumed to generate encryption/decryption using AES algorithm is (ES): 1.21 Micro Joules/byte and to calculate SHA-1 hash (EH) is 0.76 Micro Joules. Clearly, as shown in the table, our scheme outperforms other alternative schemes based on the same platform (Figure ).

Table 4. Comparative chart of energy costs.

Figure 4. Bar chart for energy costs of login and authentication phases.

Figure 4. Bar chart for energy costs of login and authentication phases.

We have implemented a part of our Mobile Healthcare Application. Our implementation related information and Kotlin code could be found at: https://webmah.com/security/mobile-healthcare.zip

8. Conclusions and future work

SPMHF is designed in compliance with HIPAA standard. Given various practical circumstances of COVID-19 pandemic or any other similar situation that may appear in the future, it is a requirement to ensure appropriate level security and privacy for patient’s data as well as to develop a mechanism of minimum-contact based remote health monitoring of critical-stage patients. Our framework and protocol could be very effective in this case. In a nutshell, our framework ensures confidentiality of the messages exchanged, integrity of the message, audit control, effective patient authentication, access control, data availability, transparency, freshness of health data and the patient’s consent in the process. Overall, the HIPAA standard is strictly maintained and several known attacks could be thwarted with this practical-setting based work. We would like to work on mobile healthcare system’s accountability issues in compliance with HIPAA regulations in the future. Also, we plan to investigate possible adaptation of edge computing framework proposed in (Zhao et al., Citation2020) in order to overcome the end-to-end delays from cloud computing data centre for medical issue monitoring mobile applications.

Disclosure statement

The authors declare that there is no conflict of interest for this work.

References

  • Abadi, M., Burrows, M., Kaufman, C., & Lampson, B. (1993). Authentication and delegation with smart-cards. Science of Computer Programming, 21(2), 93–113. doi:10.1016/0167-6423(93)90002-7
  • Ahamad, S. S., & Pathan, A.-S. K. (2019). Trusted Service Manager (TSM) based Privacy Preserving and Secure Mobile Commerce Framework with Formal Verification. Complex Adaptive Systems Modeling, 7(1), 3. Springer Open. doi:10.1186/s40294-019-0064-z
  • Ahamad, S. S., Sastry, V. N., & Udgata, S. K. (2014). Secure mobile payment framework based on UICC with formal verification. Intl Jrnl of Computational Science and Engineering, 9(4), 355–370. Inderscience. doi:10.1504/IJCSE.2014.060718
  • Alkeem, E. A., Shehada, D., Yeun, C. Y., Zemerly, M. J., & Hu, J. (2017). New secure healthcare system using cloud of things. Cluster Computing, 20(3), 2211–2229. doi:10.1007/s10586-017-0872-x
  • Bay, O. (2015). Healthcare Cybersecurity a Massive Concern as Spending Set to Reach Only US$10 Billion by 2020. Retrieved 26 May 2020, from https://www.abiresearch.com/press/healthcare-cybersecurity-a-massive-concern-as-spen/.
  • Beunardeau, M., Connolly, A., Géraud, R., & Naccache, D. (2016). White-Box Cryptography: Security in an Insecure Environment. IEEE Security & Privacy, 14(5), 88–92. doi:10.1109/MSP.2016.100
  • Bhatia, S., & Ibrahim, A. (2020).  Understanding Security Risks When Exchanging Medical Records Using IHE. Proc. of 17th International Conf on Info Tech –New Generations (ITNG), AISC, V: 1134, Springer, pp. 477-481.
  • Burrows, M., Abadi, M., & Needham, R. (1990). A logic of Authentication. ACM Transactions on Computer Systems, 8(1), 18–36. doi:10.1145/77648.77649
  • Cardiac Complications of COVID-19: Signs to Watch for on the ECG. 2020. GE Healthcare, Retrieved 17 April, 2020, from https://www.gehealthcare.com/article/cardiac-complications-of-covid-19-signs-to-watch-for-on-the-ecg.
  • Chang, S.-C., & Wu, J.-L. (2019). A privacy-preserving cloud-based data management system with efficient revocation scheme. International Journal of Computational Science and Engineering, 20(2), 190–199. http://www.inderscience.com/info/inarticletoc.php?jcode=ijcse&year=2019&vol=20&issue=2. doi:10.1504/IJCSE.2019.103819
  • Chen, K., Zhang, Y., & Liu, P. (2018). Leveraging Information Asymmetry to Transform Android Apps into Self-Defending Code Against Repackaging Attacks. IEEE Trans. on Mobile Computing, 17(8), 1879–1893. doi:10.1109/TMC.2017.2782249
  • Cremers, C. J. F. (2006). Scyther – Semantics and Verification of Security Protocols (Ph.D. dissertation), Eindhoven University of Technology. Retrieved 01 December 2020 from https://pure.tue.nl/ws/files/2425555/200612074.pdf
  • Dhillon, P. K., & Kalra, S. (2018). Multi-factor user authentication scheme for IoT-based healthcare services. Journal of Reliable Intelligent Environments, 4(3), 141–160. doi:10.1007/s40860-018-0062-5
  • Gerdes, M., & Fensli, R. (2015, June 15–17). End-to-end Security and Privacy Protection for Co-operative Access to Health and Care Data in a Telehealth Trial System for Remote Supervision of COPD-Patients. Proceedings from The 13th Scandinavien Conference on Health Informatics (SHI'15), Tromsø, Norway. https://ep.liu.se/en/conference-issue.aspx?series=ecp&issue=115
  • He, D., Kumar, N., Chen, J., Lee, C.-C., Chilamkurti, N., & Yeo, S.-S. (2015). Robust anonymous authentication protocol for health-care applications using wireless medical sensor networks. Multimedia Systems, 21(1), 49–60. doi:10.1007/s00530-013-0346-9
  • Healthcare Cloud Computing Market to Hit $55 Billion by 2025. 2020. Global Market Insights Inc., PR Newswire. Retrieved 01 June 2020, from https://www.prnewswire.com/news-releases/healthcare-cloud-computing-market-to-hit-55-billion-by-2025-global-market-insights-inc-300839513.html.
  • Healthcare Cybersecurity. 2020 Retrieved 01 June, 2020, from https://www.hipaajournal.com/category/healthcare-cybersecurity/.
  • HIPAA - Summary of the HIPAA Privacy Rule. (2020) US Dept. of HHS. Retrieved 01 June, 2020, from https://www.hhs.gov/hipaa/for-professionals/privacy/laws-regulations/index.html.
  • Hu, J., Chen, H.-H., & Hou, T.-W. (2010). A hybrid public key infrastructure solution (HPKI) for HIPAA privacy/security regulations. Computer Standards & Interfaces, 32(5-6), 274–280. doi:10.1016/j.csi.2009.04.005
  • Javan, S. L., & Bafghi, A. G. (2014). An anonymous mobile payment protocol based on SWPP. Electronic Commerce Research, 14(4), 635–660. doi:10.1007/s10660-014-9151-6
  • Khan, R. A., & Pathan, A.-S. K. (2018). The State of the Art Wireless Body Area Sensor Networks – A Survey. International Journal of Distributed Sensor Networks, SAGE pub, 14(4), doi:10.1177/1550147718768994
  • Kumar, P., Lee, S.-G., & Lee, H.-J. (2012). E-SAP: efficient-strong authentication protocol for healthcare applications using wireless medical sensor networks. Sensors, 12(2), 1625–1647. doi:10.3390/s120201625
  • Kungpisdan, S., Srinivasan, B., & Le, P. D. (2003). Lightweight Mobile Credit-Card Payment Protocol. INDOCRYPT 2003, LNCS, 2904, 295–308. doi:10.1007/978-3-540-24582-7_22
  • Lee, C.-C., Hsu, C.-W., Lai, Y.-M., & Vasilakos, A. (2013). An Enhanced Mobile-Healthcare Emergency System Based on Extended Chaotic Maps. Journal of Medical Systems, 37(5), 9973. doi:10.1007/s10916-013-9973-0
  • Lee, C.-C., Li, C.-T., Chiu, S.-T., & Lai, Y.-M. (2015). A new three-party-authenticated key agreement scheme based on chaotic maps without password table. Nonlinear Dynamics, 79(4), 2485–2495. doi:10.1007/s11071-014-1827-x
  • Li, C.-T., Lee, C.-C., & Weng, C.-Y. (2013). An extended chaotic maps based user authentication and privacy preserving scheme against DoS attacks in pervasive and ubiquitous computing environments. Nonlinear Dynamics, 74(4), 1133–1143. doi:10.1007/s11071-013-1029-y
  • Li, X., Niu, J., Kumari, S., Liao, J., Liang, W., & Khan, M. K. (2016). A new authentication protocol for healthcare applications using wireless medical sensor networks with user anonymity. Security and Communication Networks, 9(15), 2643–2655. doi:10.1002/sec.1214
  • Parthasarathy, P., & Vivekanandan, S. (2020). A typical IoT architecture-based regular monitoring of arthritis disease using time wrapping algorithm. International Journal of Computers and Applications, Taylor & Francis, 42(3), 222–232. doi:10.1080/1206212X.2018.1457471
  • Pathan, A.-S. K. (2010). Denial of Service in Wireless Sensor Networks: Issues and Challenges. Advances in Communications and Media Research, Vol. 6 (A.V. Stavros ed), ISBN:978-1-60876-576-8, Nova Science, USA.
  • Pathan, A.-S. K. (2020). Access to information vs blocking of information during COVID-19 pandemic: a governance dilemma in the era of crowdsourcing based on ICT. International Journal of Computers and Applications, Taylor & Francis, 531–532. doi:10.1080/1206212X.2020.1767396
  • Sharma, G., & Kalra, S. (2019). A Lightweight User Authentication Scheme for Cloud-IoT Based Healthcare Services,” Iranian Journal of Science and Technology. Transactions of Electrical Engineering, 43, 619–636. doi:10.1007/s40998-018-0146-5
  • Shostack, A. (2014) Threat modeling: Designing for security. ISBN: 978-1-118-80999-0, John Wiley & Sons, 2014.
  • Symptoms of Coronavirus. (2020). CDC, US Government, Retrieved 14 May 2020, from https://www.cdc.gov/coronavirus/2019-ncov/symptoms-testing/symptoms.html.
  • Tewari, A., & Gupta, B. B. (2020). An internet-of-things-based security scheme for healthcare environment for robust location privacy. International Journal of Computational Science and Engineering, 21(2), 298–303. doi:10.1504/IJCSE.2020.105742
  • Wazid, M., Zeadally, S., Das, A. K., & Odelu, V. (2016). Analysis of Security Protocols for Mobile Healthcare. Journal of Medical Systems, 40(11), 229. doi:10.1007/s10916-016-0596-0
  • Wei-Hass, M. (2020). They don’t struggle to breathe—but COVID-19 is starving them of oxygen. National Geo. Retrieved 8 May, 2020, from https://www.nationalgeographic.com/science/2020/05/they-do-not-struggle-to-breathe-but-coronavirus-starves-them-of-oxygen-cvd/.
  • Wu, F., Xu, L., Kumari, S., & Li, X. (2017). An improved and anonymous two-factor authentication protocol for health-care applications with wireless medical sensor networks. Multimedia Systems, 23(2), 195–205. doi:10.1007/s00530-015-0476-3
  • Xiao, T., Han, D., He, J., Li, K.-C., & de Mello, R. F. (2020). Multi-Keyword ranked search based on mapping set matching in cloud ciphertext storage system. Connection Science, doi:10.1080/09540091.2020.1753175
  • Xu, L., & Wu, F. (2015). Cryptanalysis and Improvement of a User Authentication Scheme Preserving Uniqueness and Anonymity for Connected Health Care. Journal of Medical Systems, 39(2), 10. doi:10.1007/s10916-014-0179-x
  • Zhang, Y., Zhang, Y., Zhao, X., Zhang, Z., & Chen, H. (2020). Design and Data Analysis of Sports Information Acquisition System Based on Internet of Medical Things. IEEE Access, 8, 84792–84805. doi:10.1109/ACCESS.2020.2992526
  • Zhao, H., Yao, L., Zeng, Z., Li, D., Xie, J., Zhu, W., & Tang, J. (2020). An edge streaming data processing framework for autonomous driving. Connection Science. doi:10.1080/09540091.2020.1782840

Appendix

SAMPLE SPDL (Security Protocol Description Language) Code

/* SPMHF is based on Wireless PKI, SE, TPM */

const pk: Function;

secret sk: Function;

inverse keys (pk,sk);

usertype Timestamp;

usertype PID, SID,TP, NP, PD,LOCP,TS,NS,HID,TH,NH;

// Protocol description

Protocol SMHMS (S,P,H,D)

{

role S

{

const NS: Nonce;

const SKsp: SessionKey;

const SKph: SessionKey;

/* Authentication and Key Agreement Protocol */

send_1 (S,P, {PID,SID,TS,NS,PD,LOCP}SKsp);

claim_S1 (S, Secret, SKsp);

claim_S2 (S, Secret, NS);

claim_S3 (S, Niagree);

claim_S4 (S, Nisynch);

}

role P

{

const NP: Nonce;

var NS: Nonce;

const SKsp: SessionKey;

const SKph: SessionKey;

read_1 (S,P, {PID,SID,TS,NS,PD,LOCP}SKsp);

send_2 (P,H, {PID,HID,TP,NP,PD,LOCP}SKph);

claim_P1 (P, Secret, SKsp);

claim_P2 (P, Secret, SKph);

claim_P3 (P, Secret, NP);

claim_P4 (P, Niagree);

claim_P5 (P, Nisynch);

}

role H

{

const NH: Nonce;

var NP: Nonce;

var NS: Nonce;

const SKph: SessionKey;

const SKhd: SessionKey;

read_2 (P,H, {PID,HID,TP,NP,PD,LOCP}SKph);

send_3 (H,D, { PID,HID,TP,NP,PD,LOCP}SKhd);

claim_H1 (H, Secret, SKph);

claim_H2 (H, Secret, SKhd);

claim_H3 (H, Secret, NH);

claim_H4 (H, Niagree);

claim_H5 (H, Nisynch);

}

role D

{

var NH: Nonce;

const SKhd: SessionKey;

read_3 (H,D, { PID,HID,TP,NP,PD,LOCP}SKhd);

claim_D1 (D, Secret, SKhd);

claim_D2 (D, Niagree);

claim_D3 (D, Nisynch);

}

}

// With compromised key, an untrusted agent

const e: Agent;

untrusted e;

compromised sk(e);

Key generation technique

A set of shared keys are generated: Xi (shared between client and merchant) where i = 1, . . ., n. We present two possible efficient key generation techniques: one used for generating a set of Xi from the given secret X. The main concept is to apply one hash algorithm with one-bit shift (either left shift or right shift) of a master secret at each time of generating a session key. Both techniques could be shown as follows:

Generating Xi

X1=h(1bit-shiftofX),X2=h(2bit-shiftofX),,Xn=h(nbit-shiftofX) To generate a set of Xi, client runs merchant registration protocol to register itself to merchant in order to share the secret X with merchant.

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.