Secure Telemedicine System with Architectural Framework and Data Transfer Protocol Validation

Authors

  • Charul Dewan, T. Ganesh Kumar

Keywords:

WBAN, AVISPA, Healthcare, Telemedicine, security

Abstract

The human race lives in a globalized world and, thereby, enabling the humanity to communicate with individuals anywhere in the world. Similarly, telemedicine connects doctors and patients worldwide. Telemedicine is used to provide technical care and support to patients in long distance communication environment. In telemedicine services, patients' data is gathered using sensors and wireless broad area networks (WBANs). Doctors can examine the data that has been sent from sensors to cloud servers. Since telemedicine systems operate on public networks, it's critical to protect the privacy of sensitive and private data that is transferred. In this paper, the architectural framework of the proposed protocol will be illustrated that would verify the authenticity of data transfers between doctors and patients along with the proposed architecture's algorithm. It preserves privacy, efficiency and security more effective than prior methods using automated validation of internet security protocols and applications (AVISPA). These results show that the proposed architectural framework may be applied in practical scenarios. 

Downloads

Download data is not yet available.

References

P. Alexander, R. Baashirah, A. Abuzneid, Comparison and feasibility of various RFID authentication methods using ECC, Sensors 18 (9) (2018) 2902.

Lijun Xiao, Songyou Xie, Dezhi Han, Wei Liang, Jun Guo, Wen-Kuang Chou, A lightweight authentication scheme for telecare medical information system, Connect. Sci. 33 (3) (2021)769–785,

M. Samani, A. Khademzadeh, Integration of WSN and RFID networks, and redundant data filtering, J. Commun. Eng. (2021).

A.K. Singh, A. Anand, Z. Lv, H. Ko, A. Mohan, A survey on healthcare data: a security perspective, ACM Trans. Multimedia Comput. Commun. Appl. 17 (2s)

S. Shukla, S.J. Patel, A novel ECC-based provably secure and privacy-preserving multi-factor authentication protocol for cloud computing, Computing (2022)

Gupta, S. (2023). 17 System for secure edge healthcare. Edge-AI in Healthcare: Trends and Future Perspectives, 245.

Dewan, C., Kumar, T. G., & Gupta, S. (2022). A comparative analysis on remote user authentication schemes in telemedical healthcare systems. International Journal of System of Systems Engineering, 12(2), 134-149

Dewan, C., Ganesh Kumar, T., & Gupta, S. (2022). Comparative Study of Various Authentication Schemes in Tele Medical Information System. In Applications of Computational Methods in Manufacturing and Product Design: Select Proceedings of IPDIMS 2020 (pp. 557-564). Singapore: Springer Nature Singapore

Gupta, S., Sharma, H.K., Kapoor, M. (2023). Methodologies for Improving the Quality of Service and Safety of Smart Healthcare System. In: Blockchain for Secure Healthcare Using Internet of Medical Things (IoMT). Springer, Cham.

Gupta, S., Sharma, H.K., Kapoor, M. (2023). Internet of Medical Things (IoMedT) vs Internet of Things (IoT). In: Blockchain for Secure Healthcare Using Internet of Medical Things (IoMT). Springer, Cham. https://doi.org/10.1007/978-3-031-18896-1_3

Gupta, S., Sharma, H.K., Kapoor, M. (2023). Digital Medical Records (DMR) Security and Privacy Challenges in Smart Healthcare System. In: Blockchain for Secure Healthcare Using Internet of Medical Things (IoMT). Springer, Cham. https://doi.org/10.1007/978-3-031-18896-1_6.

Gupta, S., Sharma, H.K., Kapoor, M. (2023). Authentication Methods for Internet of Medical Things. In: Blockchain for Secure Healthcare Using Internet of Medical Things (IoMT). Springer, Cham. https://doi.org/10.1007/978-3-031-18896-1_10

Gupta, S., Sharma, H. K., & Kapoor, M. (2022). Blockchain for Secure Healthcare Using Internet of Medical Things (IoMT). Springer. ISBN: 978-3-031-18895-4

Gupta, S. (2023). Fog-based smart building IoT model: development and energy cost estimation. International Journal of Critical Infrastructures, 19(4),354-366.

https://doi.org/10.1504/IJCIS.2023.132209

Gupta, S., Sharma, H.K., Kapoor, M. (2023). Application and Challenges of Blockchain in IoMT in Smart Healthcare System. In: Blockchain for Secure Healthcare Using Internet of Medical Things (IoMT). Springer, Cham. https://doi.org/10.1007/978-3-031-18896-1_4

Gupta, S., Sharma, H.K., Kapoor, M. (2023). Emerging and Digital Technology in Telemedicine System. In: Blockchain for Secure Healthcare Using Internet of Medical Things (IoMT). Springer, Cham. https://doi.org/10.1007/978-3-031-18896-1_12.

Gupta, S., Sharma, H.K., Kapoor, M. (2023). Introduction to Internet of Medical Things (IoMT) and Its Application in Smart Healthcare System. In: Blockchain for Secure Healthcare Using Internet of Medical Things (IoMT). Springer, Cham. https://doi.org/10.1007/978-3-031-18896-1_2

Gupta, S., Sharma, H.K., Kapoor, M. (2023). Introduction to Smart Healthcare and Telemedicine Systems. In: Blockchain for Secure Healthcare Using Internet of Medical Things (IoMT). Springer, Cham. https://doi.org/10.1007/978-3-031-18896-1_1.

Vyas, S., & Gupta, S. (2023). WBAN-based remote monitoring system utilizing machine learning for healthcare services. International Journal of System of Systems Engineering, 13(1), 100-108.

Gupta, S., Sharma, H.K., Kapoor, M. (2023). Integration of IoMT and Blockchain in Smart Healthcare System. In: Blockchain for Secure Healthcare Using Internet of Medical Things (IoMT). Springer, Cham. https://doi.org/10.1007/978-3-031-18896-1_7

Gupta, S., Sharma, H.K., Kapoor, M. (2023). Smart Healthcare and Telemedicine Systems: Present and Future Applications. In: Blockchain for Secure Healthcare Using Internet of Medical Things (IoMT). Springer, Cham. https://doi.org/10.1007/978-3-031-18896-1_15

Gupta, S., Sharma, H.K., Kapoor, M. (2023). Introduction to Blockchain and Its Application in Smart Healthcare System. In: Blockchain for Secure Healthcare Using Internet of Medical Things (IoMT). Springer, Cham. https://doi.org/10.1007/978-3-031-18896-1_5

V. Tan, "Secure Delegation-Based Authentication for Telecare Medicine Information Systems," in IEEE Access, vol. 6, pp. 26091-26110, 2018, doi: 10.1109/ACCESS.2018.2832077.

Hwang and C.-H. You, ‘‘A delegation-based unlinkable authentication protocol for portable communication systems with non-repudiation,’’ in Advanced Technologies, Embedded and Multimedia for Human Centric Computing (Lecture Notes in Electrical Engineering), vol. 260. Heidelberg, Germany: Springer, 2014, pp. 923–932.

M. Kim, N. Park, and D. Won, ‘‘Security analysis of a delegation-based authentication protocol for wireless roaming service,’’ in Multimedia and Ubiquitous Engineering (Lecture Notes in Electrical Engineering), vol. 308. Heidelberg, Germany: Springer, 2014, pp. 445–450.

R. Amin, S. H. Islam, P. Gope, K. -K. R. Choo and N. Tapas, "Anonymity Preserving and Lightweight Multimedical Server Authentication Protocol for Telecare Medical Information System," in IEEE Journal of Biomedical and Health Informatics, vol. 23, no. 4, pp. 1749-1759, July 2019, doi: 10.1109/JBHI.2018.2870319

A.K. Das, V. Odelu, and A. Goswami, “A secure and robust user authenticated key agreement scheme for hierarchical multi-medical server environment in TMIS,” J. Med. Syst., vol. 39, no. 9, 2015, Art. no. 92.

T. Maitra and D. Giri, “An efficient biometric and password based remote user authentication using smart card for telecare medical information systems in multi-server environment,” J. Med. Syst., vol. 38, no. 12, 2014, Art. no. 142. doi: 10.1007/s10916-014-0142-x.

R.Amin and G. P. Biswas, “A novel user authentication and key agreement protocol for accessing multimedical server usable in TMIS,” J. Med. Syst., vol. 39, no. 3, 2015, Art. no. 33

X. Li, Y. P. Xiong, J. Ma, and W. D. Wang, “An efficient and security dynamic identity-based authentication protocol for multi-server architecture using smartcards,” J. Netw. Comput. Appl., vol. 35, no. 2, pp. 763–769, 2012.

B. Wang and M. Ma, “A smart card based efficient and secured multi-server authentication scheme,”Wireless Pers. Commun., vol. 68, no. 2, pp. 361–378, 2013

Z. Mehmood, A. Ghani, G. Chen and A. S. Alghamdi, "Authentication and Secure Key Management in E-Health Services: A Robust and Efficient Protocol Using Biometrics," in IEEE Access, vol. 7, pp. 113385-113397, 2019, doi: 10.1109/ACCESS.2019.2935313.

O. Mir and M. Nikooghadam, ‘‘A secure biometrics-based authentication with key agreement scheme in telemedicine networks for e-health services,’’ Wireless Pers. Commun., vol. 83, no. 4, pp. 2439–2461, 2015

C -L. Lei and Y. -H. Chuang, "Privacy Protection for Telecare Medicine Information systems with Multiple Servers Using a Biometric-based Authenticated Key Agreement Scheme," in

IEEE Access, vol. 7, pp. 186480-186490, 2019, doi: 10.1109/ACCESS.2019.2958830.

P. Vijayakumar, M. S. Obaidat, M. Azees, S. H. Islam and N. Kumar, "Efficient and Secure Anonymous Authentication with Location Privacy for IoT-Based WBANs," in IEEE Transactions on Industrial Informatics, vol. 16, no. 4, pp. 2603-2611, April 2020, doi: 10.1109/TII.2019.2925071.

J. Shen, Z. Gui, S. Ji, J. Shen, H. Tan, and Y. Tang, “Cloud-aided lightweight certificateless authentication protocol with anonymity for wireless body area networks,” J. Netw. Comput. Appl., vol. 106, no. 6, pp. 117–123, 2018.

Kashif Hameed, Imran Sarwar Bajwa, Nadeem Sarwar, Waheed Anwar, Zaigham Mushtaq, Tayyaba Rashid, "Integration of 5G and Block-Chain Technologies in Smart Telemedicine Using IoT", Journal of Healthcare Engineering, vol. 2021, Article ID 8814364, 18 pages, 2021. https://doi.org/10.1155/2021/8814364

Lin, T.-W.; Hsu, C.-L.; Le, T.-V.; Lu, C.-F.; Huang, B.-Y. A Smartcard-Based User-Controlled Single Sign-On for Privacy Preservation in 5G-IoT Telemedicine Systems. Sensors 2021, 21, 2880. doi:10.3390/s21082880

Wang, X.; Zhao, J. An Improved Key Agreement Protocol Based on Chaos. Commun. Nonlinear Sci. Numer. Simul. 2010, 15, 4052–4057

Lin, H.Y. Improved Chaotic Maps-Based Password-Authenticated Key Agreement Using Smart Cards. Commun. Nonlinear Sci. Numer. Simul. 2015, 20, 482–488

Sureshkumar, V.; Amin, R.; Obaidat, M.S.; Karthikeyan, I. An Enhanced Mutual Authentication and Key Establishment Protocol for TMIS Using Chaotic Map. J. Inf. Secur. Appl. 2020, 53, 102539.

Kumar, V., Mahmoud, M.S., Alkhayyat, A. et al. RAPCHI: Robust authentication protocol for IoMT- based cloud-healthcare infrastructure. J Supercomput 78, 16167–16196 (2022).

Chen C-L, Yang T-T, Chiang M-L, Shih T-F (2014) A privacy authentication scheme based on cloud for medical environment. J Med Syst 38(11):143

Chiou S-Y, Ying Z, Liu J (2016) Improvement of a privacy authentication scheme based on cloud for medical environment. J Med Syst 40(4):101

Li C-T, Shih D-H, Wang C-C (2018) Cloud-assisted mutual authentication and privacy preservation protocol for telecare medical information systems. Comput Methods Prog Biomed 157:191–203

Mohit P, Amin R, Karati A, Biswas G, Khan MK (2017) A standard mutual authentication protocol for cloud computing-based health care system. J Med Syst 41(4):50

Chandrakar P, Sinha S, Ali R (2019) Cloud-based authenticated protocol for healthcare monitoring system. J Ambient Intell Human Comput, 1–17

Deebak BD, Al-Turjman F (2020) Smart mutual authentication protocol for cloud based medical healthcare systems using internet of medical things. IEEE J Sel Areas Commun 39(2):346–360

Bhanu Chander, Kumaravelan Gopalakrishnan,A secured and lightweight RFID-tag based authentication protocol with privacy-preserving in Telecare medicine information system,Computer Communications, Volume 191,2022,pages 425-437,ISSN 0140-3664,https://doi.org/10.1016/j.comcom.2022.05.002

A A.K. Agrahari, S. Varma, A provably secure RFID authentication protocol based on ECQV for the medical internet of things, Peer-To-Peer Netw. Appl. 14 (3) (2021) 1277–1289.

B M. Hosseinzadeh, J. Lansky, A.M. Rahmani, C. Trinh, M. Safkhani, N. Bagheri, B.Huynh, A new strong adversary model for RFID authentication protocols, IEEE Access 8 (2020) 125029-125045.

CZ. Qikun, G. Yong, Z. Quanxin, W. Ruifang, T. Yu-An, A dynamic and cross-domain authentication asymmetric group key agreement in telemedicine application, IEEE Access 6 (2018) 24064–24074.

Downloads

Published

12.06.2024

How to Cite

Charul Dewan. (2024). Secure Telemedicine System with Architectural Framework and Data Transfer Protocol Validation. International Journal of Intelligent Systems and Applications in Engineering, 12(4), 2111 –. Retrieved from https://www.ijisae.org/index.php/IJISAE/article/view/6546

Issue

Section

Research Article