EURASIP Journal on Wireless Communications and Networking (Jul 2020)

Securing communication by attribute-based authentication in HetNet used for medical applications

  • Tufail A. Lone,
  • Aabid Rashid,
  • Sumeet Gupta,
  • Sachin Kumar Gupta,
  • Duggirala Srinivasa Rao,
  • Mohd Najim,
  • Ashutosh Srivastava,
  • Abhishek Kumar,
  • Lokendra Singh Umrao,
  • Achintya Singhal

DOI
https://doi.org/10.1186/s13638-020-01759-5
Journal volume & issue
Vol. 2020, no. 1
pp. 1 – 21

Abstract

Read online

Abstract One of the major applications of the Heterogeneous Network (HetNet) is in the healthcare system. Deploying HetNet in healthcare systems enables patients, physicians, and other stakeholders to communicate easily with each other. Due to the large growth in the network’s subscribers, the security of the stored health data became one of the major concerns because unauthorized access to this data may lead to very serious complications, and unreliable transmission of data may lead to fatal risks to the patient’s life. Therefore, taking data integrity into consideration, user authentication has become one of the main factors. However, significant research work has been performed at HetNet’s physical layer to secure communication, but the result of this leads to an increase in hardware components. The increasing hardware components not only costs money but also power consumption. Therefore, this paper presents an alternate way of securing communication in HetNet at the network layer. However, resolving security problems at the network layer increases computational complexity. Nevertheless, earlier, some encryption techniques like identity-based encryption (IBE), symmetric key encryption (SKE), and public-key encryption (PKE) have been utilized for securing data. Due to their own disadvantages, this paper utilizes an attribute-based encryption (ABE) authentication scheme for securing health data in medical applications. With the help of this method, access to the intruders is denied which results in reduced communication overhead. This authentication scheme helps protect the essential information against attacks by the intruders. It includes a third party server that helps to authenticate and store patient’s information. The whole security technique has been written in the form of HLPSL (high-level protocol specification language) codes, and the results are then validated with the help of AVISPA (automated validation of Internet security protocols and applications) tool.

Keywords