Secure Telemedicine System with Architectural Framework and Data Transfer Protocol Validation
Keywords:
WBAN, AVISPA, Healthcare, Telemedicine, securityAbstract
The human race lives in a globalized world and, thereby, enabling the humanity to communicate with individuals anywhere in the world. Similarly, telemedicine connects doctors and patients worldwide. Telemedicine is used to provide technical care and support to patients in long distance communication environment. In telemedicine services, patients' data is gathered using sensors and wireless broad area networks (WBANs). Doctors can examine the data that has been sent from sensors to cloud servers. Since telemedicine systems operate on public networks, it's critical to protect the privacy of sensitive and private data that is transferred. In this paper, the architectural framework of the proposed protocol will be illustrated that would verify the authenticity of data transfers between doctors and patients along with the proposed architecture's algorithm. It preserves privacy, efficiency and security more effective than prior methods using automated validation of internet security protocols and applications (AVISPA). These results show that the proposed architectural framework may be applied in practical scenarios.
Downloads
References
P. Alexander, R. Baashirah, A. Abuzneid, Comparison and feasibility of various RFID authentication methods using ECC, Sensors 18 (9) (2018) 2902.
Lijun Xiao, Songyou Xie, Dezhi Han, Wei Liang, Jun Guo, Wen-Kuang Chou, A lightweight authentication scheme for telecare medical information system, Connect. Sci. 33 (3) (2021)769–785,
M. Samani, A. Khademzadeh, Integration of WSN and RFID networks, and redundant data filtering, J. Commun. Eng. (2021).
A.K. Singh, A. Anand, Z. Lv, H. Ko, A. Mohan, A survey on healthcare data: a security perspective, ACM Trans. Multimedia Comput. Commun. Appl. 17 (2s)
S. Shukla, S.J. Patel, A novel ECC-based provably secure and privacy-preserving multi-factor authentication protocol for cloud computing, Computing (2022)
Gupta, S. (2023). 17 System for secure edge healthcare. Edge-AI in Healthcare: Trends and Future Perspectives, 245.
Dewan, C., Kumar, T. G., & Gupta, S. (2022). A comparative analysis on remote user authentication schemes in telemedical healthcare systems. International Journal of System of Systems Engineering, 12(2), 134-149
Dewan, C., Ganesh Kumar, T., & Gupta, S. (2022). Comparative Study of Various Authentication Schemes in Tele Medical Information System. In Applications of Computational Methods in Manufacturing and Product Design: Select Proceedings of IPDIMS 2020 (pp. 557-564). Singapore: Springer Nature Singapore
Gupta, S., Sharma, H.K., Kapoor, M. (2023). Methodologies for Improving the Quality of Service and Safety of Smart Healthcare System. In: Blockchain for Secure Healthcare Using Internet of Medical Things (IoMT). Springer, Cham.
Gupta, S., Sharma, H.K., Kapoor, M. (2023). Internet of Medical Things (IoMedT) vs Internet of Things (IoT). In: Blockchain for Secure Healthcare Using Internet of Medical Things (IoMT). Springer, Cham. https://doi.org/10.1007/978-3-031-18896-1_3
Gupta, S., Sharma, H.K., Kapoor, M. (2023). Digital Medical Records (DMR) Security and Privacy Challenges in Smart Healthcare System. In: Blockchain for Secure Healthcare Using Internet of Medical Things (IoMT). Springer, Cham. https://doi.org/10.1007/978-3-031-18896-1_6.
Gupta, S., Sharma, H.K., Kapoor, M. (2023). Authentication Methods for Internet of Medical Things. In: Blockchain for Secure Healthcare Using Internet of Medical Things (IoMT). Springer, Cham. https://doi.org/10.1007/978-3-031-18896-1_10
Gupta, S., Sharma, H. K., & Kapoor, M. (2022). Blockchain for Secure Healthcare Using Internet of Medical Things (IoMT). Springer. ISBN: 978-3-031-18895-4
Gupta, S. (2023). Fog-based smart building IoT model: development and energy cost estimation. International Journal of Critical Infrastructures, 19(4),354-366.
https://doi.org/10.1504/IJCIS.2023.132209
Gupta, S., Sharma, H.K., Kapoor, M. (2023). Application and Challenges of Blockchain in IoMT in Smart Healthcare System. In: Blockchain for Secure Healthcare Using Internet of Medical Things (IoMT). Springer, Cham. https://doi.org/10.1007/978-3-031-18896-1_4
Gupta, S., Sharma, H.K., Kapoor, M. (2023). Emerging and Digital Technology in Telemedicine System. In: Blockchain for Secure Healthcare Using Internet of Medical Things (IoMT). Springer, Cham. https://doi.org/10.1007/978-3-031-18896-1_12.
Gupta, S., Sharma, H.K., Kapoor, M. (2023). Introduction to Internet of Medical Things (IoMT) and Its Application in Smart Healthcare System. In: Blockchain for Secure Healthcare Using Internet of Medical Things (IoMT). Springer, Cham. https://doi.org/10.1007/978-3-031-18896-1_2
Gupta, S., Sharma, H.K., Kapoor, M. (2023). Introduction to Smart Healthcare and Telemedicine Systems. In: Blockchain for Secure Healthcare Using Internet of Medical Things (IoMT). Springer, Cham. https://doi.org/10.1007/978-3-031-18896-1_1.
Vyas, S., & Gupta, S. (2023). WBAN-based remote monitoring system utilizing machine learning for healthcare services. International Journal of System of Systems Engineering, 13(1), 100-108.
Gupta, S., Sharma, H.K., Kapoor, M. (2023). Integration of IoMT and Blockchain in Smart Healthcare System. In: Blockchain for Secure Healthcare Using Internet of Medical Things (IoMT). Springer, Cham. https://doi.org/10.1007/978-3-031-18896-1_7
Gupta, S., Sharma, H.K., Kapoor, M. (2023). Smart Healthcare and Telemedicine Systems: Present and Future Applications. In: Blockchain for Secure Healthcare Using Internet of Medical Things (IoMT). Springer, Cham. https://doi.org/10.1007/978-3-031-18896-1_15
Gupta, S., Sharma, H.K., Kapoor, M. (2023). Introduction to Blockchain and Its Application in Smart Healthcare System. In: Blockchain for Secure Healthcare Using Internet of Medical Things (IoMT). Springer, Cham. https://doi.org/10.1007/978-3-031-18896-1_5
V. Tan, "Secure Delegation-Based Authentication for Telecare Medicine Information Systems," in IEEE Access, vol. 6, pp. 26091-26110, 2018, doi: 10.1109/ACCESS.2018.2832077.
Hwang and C.-H. You, ‘‘A delegation-based unlinkable authentication protocol for portable communication systems with non-repudiation,’’ in Advanced Technologies, Embedded and Multimedia for Human Centric Computing (Lecture Notes in Electrical Engineering), vol. 260. Heidelberg, Germany: Springer, 2014, pp. 923–932.
M. Kim, N. Park, and D. Won, ‘‘Security analysis of a delegation-based authentication protocol for wireless roaming service,’’ in Multimedia and Ubiquitous Engineering (Lecture Notes in Electrical Engineering), vol. 308. Heidelberg, Germany: Springer, 2014, pp. 445–450.
R. Amin, S. H. Islam, P. Gope, K. -K. R. Choo and N. Tapas, "Anonymity Preserving and Lightweight Multimedical Server Authentication Protocol for Telecare Medical Information System," in IEEE Journal of Biomedical and Health Informatics, vol. 23, no. 4, pp. 1749-1759, July 2019, doi: 10.1109/JBHI.2018.2870319
A.K. Das, V. Odelu, and A. Goswami, “A secure and robust user authenticated key agreement scheme for hierarchical multi-medical server environment in TMIS,” J. Med. Syst., vol. 39, no. 9, 2015, Art. no. 92.
T. Maitra and D. Giri, “An efficient biometric and password based remote user authentication using smart card for telecare medical information systems in multi-server environment,” J. Med. Syst., vol. 38, no. 12, 2014, Art. no. 142. doi: 10.1007/s10916-014-0142-x.
R.Amin and G. P. Biswas, “A novel user authentication and key agreement protocol for accessing multimedical server usable in TMIS,” J. Med. Syst., vol. 39, no. 3, 2015, Art. no. 33
X. Li, Y. P. Xiong, J. Ma, and W. D. Wang, “An efficient and security dynamic identity-based authentication protocol for multi-server architecture using smartcards,” J. Netw. Comput. Appl., vol. 35, no. 2, pp. 763–769, 2012.
B. Wang and M. Ma, “A smart card based efficient and secured multi-server authentication scheme,”Wireless Pers. Commun., vol. 68, no. 2, pp. 361–378, 2013
Z. Mehmood, A. Ghani, G. Chen and A. S. Alghamdi, "Authentication and Secure Key Management in E-Health Services: A Robust and Efficient Protocol Using Biometrics," in IEEE Access, vol. 7, pp. 113385-113397, 2019, doi: 10.1109/ACCESS.2019.2935313.
O. Mir and M. Nikooghadam, ‘‘A secure biometrics-based authentication with key agreement scheme in telemedicine networks for e-health services,’’ Wireless Pers. Commun., vol. 83, no. 4, pp. 2439–2461, 2015
C -L. Lei and Y. -H. Chuang, "Privacy Protection for Telecare Medicine Information systems with Multiple Servers Using a Biometric-based Authenticated Key Agreement Scheme," in
IEEE Access, vol. 7, pp. 186480-186490, 2019, doi: 10.1109/ACCESS.2019.2958830.
P. Vijayakumar, M. S. Obaidat, M. Azees, S. H. Islam and N. Kumar, "Efficient and Secure Anonymous Authentication with Location Privacy for IoT-Based WBANs," in IEEE Transactions on Industrial Informatics, vol. 16, no. 4, pp. 2603-2611, April 2020, doi: 10.1109/TII.2019.2925071.
J. Shen, Z. Gui, S. Ji, J. Shen, H. Tan, and Y. Tang, “Cloud-aided lightweight certificateless authentication protocol with anonymity for wireless body area networks,” J. Netw. Comput. Appl., vol. 106, no. 6, pp. 117–123, 2018.
Kashif Hameed, Imran Sarwar Bajwa, Nadeem Sarwar, Waheed Anwar, Zaigham Mushtaq, Tayyaba Rashid, "Integration of 5G and Block-Chain Technologies in Smart Telemedicine Using IoT", Journal of Healthcare Engineering, vol. 2021, Article ID 8814364, 18 pages, 2021. https://doi.org/10.1155/2021/8814364
Lin, T.-W.; Hsu, C.-L.; Le, T.-V.; Lu, C.-F.; Huang, B.-Y. A Smartcard-Based User-Controlled Single Sign-On for Privacy Preservation in 5G-IoT Telemedicine Systems. Sensors 2021, 21, 2880. doi:10.3390/s21082880
Wang, X.; Zhao, J. An Improved Key Agreement Protocol Based on Chaos. Commun. Nonlinear Sci. Numer. Simul. 2010, 15, 4052–4057
Lin, H.Y. Improved Chaotic Maps-Based Password-Authenticated Key Agreement Using Smart Cards. Commun. Nonlinear Sci. Numer. Simul. 2015, 20, 482–488
Sureshkumar, V.; Amin, R.; Obaidat, M.S.; Karthikeyan, I. An Enhanced Mutual Authentication and Key Establishment Protocol for TMIS Using Chaotic Map. J. Inf. Secur. Appl. 2020, 53, 102539.
Kumar, V., Mahmoud, M.S., Alkhayyat, A. et al. RAPCHI: Robust authentication protocol for IoMT- based cloud-healthcare infrastructure. J Supercomput 78, 16167–16196 (2022).
Chen C-L, Yang T-T, Chiang M-L, Shih T-F (2014) A privacy authentication scheme based on cloud for medical environment. J Med Syst 38(11):143
Chiou S-Y, Ying Z, Liu J (2016) Improvement of a privacy authentication scheme based on cloud for medical environment. J Med Syst 40(4):101
Li C-T, Shih D-H, Wang C-C (2018) Cloud-assisted mutual authentication and privacy preservation protocol for telecare medical information systems. Comput Methods Prog Biomed 157:191–203
Mohit P, Amin R, Karati A, Biswas G, Khan MK (2017) A standard mutual authentication protocol for cloud computing-based health care system. J Med Syst 41(4):50
Chandrakar P, Sinha S, Ali R (2019) Cloud-based authenticated protocol for healthcare monitoring system. J Ambient Intell Human Comput, 1–17
Deebak BD, Al-Turjman F (2020) Smart mutual authentication protocol for cloud based medical healthcare systems using internet of medical things. IEEE J Sel Areas Commun 39(2):346–360
Bhanu Chander, Kumaravelan Gopalakrishnan,A secured and lightweight RFID-tag based authentication protocol with privacy-preserving in Telecare medicine information system,Computer Communications, Volume 191,2022,pages 425-437,ISSN 0140-3664,https://doi.org/10.1016/j.comcom.2022.05.002
A A.K. Agrahari, S. Varma, A provably secure RFID authentication protocol based on ECQV for the medical internet of things, Peer-To-Peer Netw. Appl. 14 (3) (2021) 1277–1289.
B M. Hosseinzadeh, J. Lansky, A.M. Rahmani, C. Trinh, M. Safkhani, N. Bagheri, B.Huynh, A new strong adversary model for RFID authentication protocols, IEEE Access 8 (2020) 125029-125045.
CZ. Qikun, G. Yong, Z. Quanxin, W. Ruifang, T. Yu-An, A dynamic and cross-domain authentication asymmetric group key agreement in telemedicine application, IEEE Access 6 (2018) 24064–24074.
Downloads
Published
How to Cite
Issue
Section
License

This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.
All papers should be submitted electronically. All submitted manuscripts must be original work that is not under submission at another journal or under consideration for publication in another form, such as a monograph or chapter of a book. Authors of submitted papers are obligated not to submit their paper for publication elsewhere until an editorial decision is rendered on their submission. Further, authors of accepted papers are prohibited from publishing the results in other publications that appear before the paper is published in the Journal unless they receive approval for doing so from the Editor-In-Chief.
IJISAE open access articles are licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. This license lets the audience to give appropriate credit, provide a link to the license, and indicate if changes were made and if they remix, transform, or build upon the material, they must distribute contributions under the same license as the original.