2,499
Views
20
CrossRef citations to date
0
Altmetric
Articles

A formally verified authentication protocol in secure framework for mobile healthcare during COVID-19-like pandemic

ORCID Icon & ORCID Icon
Pages 532-554 | Received 10 Jun 2020, Accepted 16 Nov 2020, Published online: 04 Dec 2020

References

  • Abadi, M., Burrows, M., Kaufman, C., & Lampson, B. (1993). Authentication and delegation with smart-cards. Science of Computer Programming, 21(2), 93–113. doi:10.1016/0167-6423(93)90002-7
  • Ahamad, S. S., & Pathan, A.-S. K. (2019). Trusted Service Manager (TSM) based Privacy Preserving and Secure Mobile Commerce Framework with Formal Verification. Complex Adaptive Systems Modeling, 7(1), 3. Springer Open. doi:10.1186/s40294-019-0064-z
  • Ahamad, S. S., Sastry, V. N., & Udgata, S. K. (2014). Secure mobile payment framework based on UICC with formal verification. Intl Jrnl of Computational Science and Engineering, 9(4), 355–370. Inderscience. doi:10.1504/IJCSE.2014.060718
  • Alkeem, E. A., Shehada, D., Yeun, C. Y., Zemerly, M. J., & Hu, J. (2017). New secure healthcare system using cloud of things. Cluster Computing, 20(3), 2211–2229. doi:10.1007/s10586-017-0872-x
  • Bay, O. (2015). Healthcare Cybersecurity a Massive Concern as Spending Set to Reach Only US$10 Billion by 2020. Retrieved 26 May 2020, from https://www.abiresearch.com/press/healthcare-cybersecurity-a-massive-concern-as-spen/.
  • Beunardeau, M., Connolly, A., Géraud, R., & Naccache, D. (2016). White-Box Cryptography: Security in an Insecure Environment. IEEE Security & Privacy, 14(5), 88–92. doi:10.1109/MSP.2016.100
  • Bhatia, S., & Ibrahim, A. (2020).  Understanding Security Risks When Exchanging Medical Records Using IHE. Proc. of 17th International Conf on Info Tech –New Generations (ITNG), AISC, V: 1134, Springer, pp. 477-481.
  • Burrows, M., Abadi, M., & Needham, R. (1990). A logic of Authentication. ACM Transactions on Computer Systems, 8(1), 18–36. doi:10.1145/77648.77649
  • Cardiac Complications of COVID-19: Signs to Watch for on the ECG. 2020. GE Healthcare, Retrieved 17 April, 2020, from https://www.gehealthcare.com/article/cardiac-complications-of-covid-19-signs-to-watch-for-on-the-ecg.
  • Chang, S.-C., & Wu, J.-L. (2019). A privacy-preserving cloud-based data management system with efficient revocation scheme. International Journal of Computational Science and Engineering, 20(2), 190–199. http://www.inderscience.com/info/inarticletoc.php?jcode=ijcse&year=2019&vol=20&issue=2. doi:10.1504/IJCSE.2019.103819
  • Chen, K., Zhang, Y., & Liu, P. (2018). Leveraging Information Asymmetry to Transform Android Apps into Self-Defending Code Against Repackaging Attacks. IEEE Trans. on Mobile Computing, 17(8), 1879–1893. doi:10.1109/TMC.2017.2782249
  • Cremers, C. J. F. (2006). Scyther – Semantics and Verification of Security Protocols (Ph.D. dissertation), Eindhoven University of Technology. Retrieved 01 December 2020 from https://pure.tue.nl/ws/files/2425555/200612074.pdf
  • Dhillon, P. K., & Kalra, S. (2018). Multi-factor user authentication scheme for IoT-based healthcare services. Journal of Reliable Intelligent Environments, 4(3), 141–160. doi:10.1007/s40860-018-0062-5
  • Gerdes, M., & Fensli, R. (2015, June 15–17). End-to-end Security and Privacy Protection for Co-operative Access to Health and Care Data in a Telehealth Trial System for Remote Supervision of COPD-Patients. Proceedings from The 13th Scandinavien Conference on Health Informatics (SHI'15), Tromsø, Norway. https://ep.liu.se/en/conference-issue.aspx?series=ecp&issue=115
  • He, D., Kumar, N., Chen, J., Lee, C.-C., Chilamkurti, N., & Yeo, S.-S. (2015). Robust anonymous authentication protocol for health-care applications using wireless medical sensor networks. Multimedia Systems, 21(1), 49–60. doi:10.1007/s00530-013-0346-9
  • Healthcare Cloud Computing Market to Hit $55 Billion by 2025. 2020. Global Market Insights Inc., PR Newswire. Retrieved 01 June 2020, from https://www.prnewswire.com/news-releases/healthcare-cloud-computing-market-to-hit-55-billion-by-2025-global-market-insights-inc-300839513.html.
  • Healthcare Cybersecurity. 2020 Retrieved 01 June, 2020, from https://www.hipaajournal.com/category/healthcare-cybersecurity/.
  • HIPAA - Summary of the HIPAA Privacy Rule. (2020) US Dept. of HHS. Retrieved 01 June, 2020, from https://www.hhs.gov/hipaa/for-professionals/privacy/laws-regulations/index.html.
  • Hu, J., Chen, H.-H., & Hou, T.-W. (2010). A hybrid public key infrastructure solution (HPKI) for HIPAA privacy/security regulations. Computer Standards & Interfaces, 32(5-6), 274–280. doi:10.1016/j.csi.2009.04.005
  • Javan, S. L., & Bafghi, A. G. (2014). An anonymous mobile payment protocol based on SWPP. Electronic Commerce Research, 14(4), 635–660. doi:10.1007/s10660-014-9151-6
  • Khan, R. A., & Pathan, A.-S. K. (2018). The State of the Art Wireless Body Area Sensor Networks – A Survey. International Journal of Distributed Sensor Networks, SAGE pub, 14(4), doi:10.1177/1550147718768994
  • Kumar, P., Lee, S.-G., & Lee, H.-J. (2012). E-SAP: efficient-strong authentication protocol for healthcare applications using wireless medical sensor networks. Sensors, 12(2), 1625–1647. doi:10.3390/s120201625
  • Kungpisdan, S., Srinivasan, B., & Le, P. D. (2003). Lightweight Mobile Credit-Card Payment Protocol. INDOCRYPT 2003, LNCS, 2904, 295–308. doi:10.1007/978-3-540-24582-7_22
  • Lee, C.-C., Hsu, C.-W., Lai, Y.-M., & Vasilakos, A. (2013). An Enhanced Mobile-Healthcare Emergency System Based on Extended Chaotic Maps. Journal of Medical Systems, 37(5), 9973. doi:10.1007/s10916-013-9973-0
  • Lee, C.-C., Li, C.-T., Chiu, S.-T., & Lai, Y.-M. (2015). A new three-party-authenticated key agreement scheme based on chaotic maps without password table. Nonlinear Dynamics, 79(4), 2485–2495. doi:10.1007/s11071-014-1827-x
  • Li, C.-T., Lee, C.-C., & Weng, C.-Y. (2013). An extended chaotic maps based user authentication and privacy preserving scheme against DoS attacks in pervasive and ubiquitous computing environments. Nonlinear Dynamics, 74(4), 1133–1143. doi:10.1007/s11071-013-1029-y
  • Li, X., Niu, J., Kumari, S., Liao, J., Liang, W., & Khan, M. K. (2016). A new authentication protocol for healthcare applications using wireless medical sensor networks with user anonymity. Security and Communication Networks, 9(15), 2643–2655. doi:10.1002/sec.1214
  • Parthasarathy, P., & Vivekanandan, S. (2020). A typical IoT architecture-based regular monitoring of arthritis disease using time wrapping algorithm. International Journal of Computers and Applications, Taylor & Francis, 42(3), 222–232. doi:10.1080/1206212X.2018.1457471
  • Pathan, A.-S. K. (2010). Denial of Service in Wireless Sensor Networks: Issues and Challenges. Advances in Communications and Media Research, Vol. 6 (A.V. Stavros ed), ISBN:978-1-60876-576-8, Nova Science, USA.
  • Pathan, A.-S. K. (2020). Access to information vs blocking of information during COVID-19 pandemic: a governance dilemma in the era of crowdsourcing based on ICT. International Journal of Computers and Applications, Taylor & Francis, 531–532. doi:10.1080/1206212X.2020.1767396
  • Sharma, G., & Kalra, S. (2019). A Lightweight User Authentication Scheme for Cloud-IoT Based Healthcare Services,” Iranian Journal of Science and Technology. Transactions of Electrical Engineering, 43, 619–636. doi:10.1007/s40998-018-0146-5
  • Shostack, A. (2014) Threat modeling: Designing for security. ISBN: 978-1-118-80999-0, John Wiley & Sons, 2014.
  • Symptoms of Coronavirus. (2020). CDC, US Government, Retrieved 14 May 2020, from https://www.cdc.gov/coronavirus/2019-ncov/symptoms-testing/symptoms.html.
  • Tewari, A., & Gupta, B. B. (2020). An internet-of-things-based security scheme for healthcare environment for robust location privacy. International Journal of Computational Science and Engineering, 21(2), 298–303. doi:10.1504/IJCSE.2020.105742
  • Wazid, M., Zeadally, S., Das, A. K., & Odelu, V. (2016). Analysis of Security Protocols for Mobile Healthcare. Journal of Medical Systems, 40(11), 229. doi:10.1007/s10916-016-0596-0
  • Wei-Hass, M. (2020). They don’t struggle to breathe—but COVID-19 is starving them of oxygen. National Geo. Retrieved 8 May, 2020, from https://www.nationalgeographic.com/science/2020/05/they-do-not-struggle-to-breathe-but-coronavirus-starves-them-of-oxygen-cvd/.
  • Wu, F., Xu, L., Kumari, S., & Li, X. (2017). An improved and anonymous two-factor authentication protocol for health-care applications with wireless medical sensor networks. Multimedia Systems, 23(2), 195–205. doi:10.1007/s00530-015-0476-3
  • Xiao, T., Han, D., He, J., Li, K.-C., & de Mello, R. F. (2020). Multi-Keyword ranked search based on mapping set matching in cloud ciphertext storage system. Connection Science, doi:10.1080/09540091.2020.1753175
  • Xu, L., & Wu, F. (2015). Cryptanalysis and Improvement of a User Authentication Scheme Preserving Uniqueness and Anonymity for Connected Health Care. Journal of Medical Systems, 39(2), 10. doi:10.1007/s10916-014-0179-x
  • Zhang, Y., Zhang, Y., Zhao, X., Zhang, Z., & Chen, H. (2020). Design and Data Analysis of Sports Information Acquisition System Based on Internet of Medical Things. IEEE Access, 8, 84792–84805. doi:10.1109/ACCESS.2020.2992526
  • Zhao, H., Yao, L., Zeng, Z., Li, D., Xie, J., Zhu, W., & Tang, J. (2020). An edge streaming data processing framework for autonomous driving. Connection Science. doi:10.1080/09540091.2020.1782840

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.