Muhammad Sibtain Ahmed Khan, Shehzad Ashraf Chaudhry
{"title":"An Untraceable Monitoring for Patients Using Wireless Medical Sensor Networks","authors":"Muhammad Sibtain Ahmed Khan, Shehzad Ashraf Chaudhry","doi":"10.1109/ComTech57708.2023.10165301","DOIUrl":null,"url":null,"abstract":"Medical sensor network consists of an architecture in which medical sensor devices are implanted in human body to collect different types of sensitive data and share it on a network. These networks are connected with each other via wireless technology. Wireless medical sensor network (WMSN) came into existence with these medical sensor networks. Transmitted data from these WMSN’s is then further processed in remotely located medical units. In the meanwhile, a registered medical professional of this network can access this information to rectify the patient’s conditions via internet. This transmitted information is critical for the patient. It should be secured and private. It is very important to provide secure and private access to patient’s data. Internet has an open infrastructure for every one as well as hackers whom can intrude such kind of sensitive information for their own benefits. It is a challenging issue for WMSNs to resist such kind of abrupt activity. A smaller number of protocols are being introduced in the literature, about WMSN, providing security and user authentication. Some of the protocols regarding WMSN are not standardized enough to provide user anonymity. This study is proposed to provide a protocol with potential to preserve user anonymity as well as mutual authentication for the mobile users. Precisely, this protocol is not only providing sufficient complexity but also robustness to security against unwanted threats. Moreover, it is providing a login phase, mutual authentication characteristics, and a phase to change the old password into a new one.","PeriodicalId":203804,"journal":{"name":"2023 International Conference on Communication Technologies (ComTech)","volume":"53 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2023-03-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2023 International Conference on Communication Technologies (ComTech)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ComTech57708.2023.10165301","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0
Abstract
Medical sensor network consists of an architecture in which medical sensor devices are implanted in human body to collect different types of sensitive data and share it on a network. These networks are connected with each other via wireless technology. Wireless medical sensor network (WMSN) came into existence with these medical sensor networks. Transmitted data from these WMSN’s is then further processed in remotely located medical units. In the meanwhile, a registered medical professional of this network can access this information to rectify the patient’s conditions via internet. This transmitted information is critical for the patient. It should be secured and private. It is very important to provide secure and private access to patient’s data. Internet has an open infrastructure for every one as well as hackers whom can intrude such kind of sensitive information for their own benefits. It is a challenging issue for WMSNs to resist such kind of abrupt activity. A smaller number of protocols are being introduced in the literature, about WMSN, providing security and user authentication. Some of the protocols regarding WMSN are not standardized enough to provide user anonymity. This study is proposed to provide a protocol with potential to preserve user anonymity as well as mutual authentication for the mobile users. Precisely, this protocol is not only providing sufficient complexity but also robustness to security against unwanted threats. Moreover, it is providing a login phase, mutual authentication characteristics, and a phase to change the old password into a new one.