Enhanced Lightweight and Secure Session Key Establishment Protocol for Smart Hospital Inhabitants

Document Type : Research Paper

Authors

1 Department of Radio Engineering & Computer Technology, Moscow Institute of Physics & Technology, Moscow, Russia – 9 Institutskiy per., Dolgoprudny, Moscow Region, 141701, Russian Federation.

2 Department of Radio Engineering & Computer Technology, Moscow Institute of Physics & Technology, Moscow, Russia – 9 Institutskiy per., Dolgoprudny, Moscow Region, 141701, Russian Federation

3 School of Computer and Systems Sciences, JNU, New Delhi- 110067, India.

Abstract

In the era of internet technologies, to provide wireless communication and transfer the information in seconds from one place to another has arrived because of the need to consume information technologies. All users desire to quickly access the smart world’s life and interact with the entire world socially. This paper proposed an environment for the safe and secure smart patient’s room connected to the WSN, BAN, and RFID. All the data will be transferred to the session key, secure and contains the patient’s information. The network connected through WSN and data will be sent through the session key to make an smart hospital’s patient cabin. The small token is there that will be transferred throughout the network to get authenticated by each network. This proposed scheme is secure enough to overcome the drawbacks of the other protocol in such a way as to make the protocol more secure from the entire adversary’s attack may occur.

Keywords


Seshadri, A., Luk, M., & Perrig, A. (2011). SAKE: Software attestation for key establishment in sensor networks. Ad Hoc Networks, 9(6), 1059-1067.
Aghili, S. F., Mala, H., Shojafar, M., & Peris-Lopez, P. (2019). LACO: Lightweight three-factor authentication, access control and ownership transfer scheme for e-health systems in IoT. future generation computer systems, 96, 410-424.
Al Ameen, M., Liu, J., & Kwak, K. (2012). Security and privacy issues in wireless sensor networks for healthcare applications. Journal of medical systems, 36(1), 93-101.
Almulhim, M., & Zaman, N. (2018, February). Proposing secure and lightweight authentication scheme for IoT based E-health applications. In 2018 20th International Conference on advanced communication technology (ICACT) (pp. 481-487). IEEE.
Anunobi, C. V., & Okoye, I. B. (2008). The role of academic libraries in universal access to print and electronic resources in the developing countries. Library philosophy and practice, 5(20), 1-5.
Attkan, A., & Ahlawat, P. (2020). Lightweight two-factor authentication protocol and session key generation scheme for WSN in IoT deployment. In Advances in Cybernetics, Cognition, and Machine Learning for Communication Technologies (pp. 189-198). Springer, Singapore.
Gomez, C., & Paradells, J. (2010). Wireless home automation networks: A survey of architectures and technologies. IEEE Communications Magazine, 48(6), 92-101.
Mantas, G., Lymberopoulos, D., & Komninos, N. (2011). Security in smart home environment. In Wireless Technologies for Ambient Assisted Living and Healthcare: Systems and Applications (pp. 170-191). IGI global.
Gubbi, J., Buyya, R., Marusic, S., & Palaniswami, M. (2013). Internet of Things (IoT): A vision, architectural elements, and future directions. Future generation computer systems, 29(7), 1645-1660.
Han, K., Kim, J., Shon, T., & Ko, D. (2013). A novel secure key paring protocol for RF4CE ubiquitous smart home systems. Personal and ubiquitous computing, 17(5), 945-949.
He, D., Zeadally, S., Kumar, N., & Lee, J. H. (2016). Anonymous authentication for wireless body area networks with provable security. IEEE Systems Journal, 11(4), 2590-2601.
Jalal, A., Kamal, S., & Kim, D. (2014). A depth video sensor-based life-logging human activity recognition system for elderly care in smart indoor environments. Sensors, 14(7), 11735-11759.
Jara, A. J., Zamora, M. A., & Skarmeta, A. (2012). Glowbal IP: An adaptive and transparent IPv6 integration in the Internet of Things. Mobile Information Systems, 8(3), 177-197.
Kim, J. E., Barth, T., Boulos, G., Yackovich, J., Beckel, C., & Mosse, D. (2017). Seamless integration of heterogeneous devices and access control in smart homes and its evaluation. Intelligent Buildings International, 9(1), 23-39.
Kim, J. T. (2014). Attacks and threats on the U-healthcare application with mobile agent. International Journal of Security and Its Applications, 8(4), 59-66.
Minaie, A., Sanati-Mehrizy, A., Sanati-Mehrizy, P., & Sanati-Mehrizy, R. (2013, June). Application of wireless sensor networks in health care system. In 2013 ASEE Annual Conference & Exposition (pp. 23-200).
Nayak, M., & Agrawal, N. (2013). Security in Body Sensor Networks for Healthcare applications. IOSR Journal of Computer Engineering, pg, 41-46.
Balakrishna, D., Sujeethnanda, M., & Murthy, G. R. (2013, February). Mobile Wireless Sensor Networks: Healthcare in Hospitals. In ifth International Conference on eHealth, Telemedicine, and Social Medicine (eTELEMED 2013).
Pandesswaran, C., Surender, S., & Karthik, K. V. (2016). Remote patient monitoring system based coap in wireless sensor networks. International Journal of Sensor Networks and Data Communications, 5(3).