Next Article in Journal
Output-Only Damage Detection in Plate-Like Structures Based on Proportional Strain Flexibility Matrix
Next Article in Special Issue
An Energy-Efficient and Secure Data Inference Framework for Internet of Health Things: A Pilot Study
Previous Article in Journal
Success Probability Characterization of Long-Range in Low-Power Wide Area Networks
Previous Article in Special Issue
E-HIP: An Energy-Efficient OpenHIP-Based Security in Internet of Things Networks
Open AccessArticle

A Lightweight Three-Factor Authentication Scheme for WHSN Architecture

Department of Computer Science, College of Computer Science and Information Technology, Imam, Abdulrahman Bin Faisal University, P.O. Box 1982, Dammam 31441, Saudi Arabia
Author to whom correspondence should be addressed.
Sensors 2020, 20(23), 6860;
Received: 29 October 2020 / Revised: 23 November 2020 / Accepted: 24 November 2020 / Published: 30 November 2020
Wireless Healthcare Sensor Network (WHSN) is a benchmarking technology deployed to levitate the quality of lives for the patients and doctors. WHSN systems must fit IEEE 802.15.6 standard for specific application criteria, unlike some standard criteria that are difficult to meet. Therefore, many security models were suggested to enhance the security of the WHSN and promote system performance. Yu and Park proposed a three-factor authentication scheme based on the smart card, biometric, and password, and their scheme can be easily employed in three-tier WHSN architecture. Furthermore, they claimed that their scheme can withstand guessing attack and provide anonymity, although, after cryptanalysis, we found that their scheme lacks both. Accordingly, we suggested a three-factor authentication scheme with better system confusion due to multiplex parametric features, hash function, and higher key size to increase the security and achieve anonymity for the connected nodes. Moreover, the scheme included initialization, authentication, re-authentication, secure node addition, user revocation, and secure data transmission via blockchain technology. The formal analysis of the scheme was conducted by BAN logic (Burrows Abadi Nadeem) and the simulation was carried out by Tamarin prover to validate that the proposed scheme is resistant to replay, session hijacking, and guessing attacks, plus it provides anonymity, perfect forward secrecy, and authentication along with the key agreement. View Full-Text
Keywords: WHSN; BAN logic; tamarin prover; authentication protocol; stolen smart card; anonymity WHSN; BAN logic; tamarin prover; authentication protocol; stolen smart card; anonymity
Show Figures

Figure 1

MDPI and ACS Style

Almuhaideb, A.M.; Alqudaihi, K.S. A Lightweight Three-Factor Authentication Scheme for WHSN Architecture. Sensors 2020, 20, 6860.

AMA Style

Almuhaideb AM, Alqudaihi KS. A Lightweight Three-Factor Authentication Scheme for WHSN Architecture. Sensors. 2020; 20(23):6860.

Chicago/Turabian Style

Almuhaideb, Abdullah M.; Alqudaihi, Kawther S. 2020. "A Lightweight Three-Factor Authentication Scheme for WHSN Architecture" Sensors 20, no. 23: 6860.

Find Other Styles
Note that from the first issue of 2016, MDPI journals use article numbers instead of page numbers. See further details here.

Article Access Map by Country/Region

Search more from Scilit
Back to TopTop