Abstract
In recent years, the proportion of elderly population in various countries has gradually increased. Increasing with age, it can entail illness. When these diseases are sudden, the elderly often die because there is no immediate treatment. Elderly care has become an important issue. According to this issue, we want to monitor the physiological data of the elderly, such as heartbeat, blood pressure, etc., through wearable devices. Once an abnormal condition is detected, the wearable device can be used to immediately request treatment from a nearby clinic or hospital. In order to improve the network quality of this service, we use the architecture of the mobile edge computing. The mobile edge computing provides features such as immediacy, low latency, proximity etc. However, the process of data transmission on the mobile edge computing has the risk of being stolen and identity authentication is also an important issue. Therefore, we propose a secure protocol based on cryptography to protect personal information with lightweight authentication. The proposed scheme aims to achieve mutual authentication, non-repudiation, integrity, user privacy, and defend against known attacks.
Similar content being viewed by others
References
Hu, J. X., Chen, C. L., Fan, C. L., & Wang, K. H. (2017). An intelligent and secure health monitoring scheme using IoT sensor based on cloud computing. Journal of Sensors. https://doi.org/10.1155/2017/3734764.
Department of Statistics, the Ministry of The Internal of Taiwan. (2017). https://www.moi.gov.tw/stat/english/node.aspx?sn=7255. Accessed on 10 January 2019.
CNNMoney, See the ‘super-aged’ nations. https://money.cnn.com/interactive/news/aging-countries/?iid=EL. Accessed on 10 January 2019.
Hung, K., Zhang, Y. T., & Tai, B. (2004). Wearable medical devices for tele-home healthcare. In 26th annual international conference of the IEEE engineering in medicine and biology society (Vol. 2, pp. 5384–5387). https://ieeexplore.ieee.org/document/1404503.
Hu, Y. C., Patel, M., Sabella, D., Sprecher, N., & Young, V. (2015). Mobile edge computing—A key technology towards 5G. ETSI White Paper, 11(11), 1–16.
Mach, P., & Becvar, Z. (2017). Mobile edge computing: A survey on architecture and computation offloading. IEEE Communications Surveys and Tutorials,19(3), 1628–1656. https://doi.org/10.1109/COMST.2017.2682318.
Tran, T. X., Hajisami, A., Pandey, P., & Pompili, D. (2017). Collaborative mobile edge computing in 5G networks: New paradigms, scenarios, and challenges. IEEE Communications Magazine,55(4), 54–61. https://doi.org/10.1109/MCOM.2017.1600863.
Roman, R., Lopez, J., & Mambo, M. (2018). Mobile edge computing, Fog et al.: A survey and analysis of security threats and challenges. Future Generation Computer Systems,78, 680–698. https://doi.org/10.1016/j.future.2016.11.009.
Condoluci, M., & Mahmoodi, T. (2018). Softwarization and virtualization in 5G mobile networks: Benefits, trends and challenges. Computer Networks,146, 65–84.
Agiwal, M., Roy, A., & Saxena, N. (2016). Next generation 5G wireless networks: A comprehensive survey. IEEE Communications Surveys and Tutorials,18(3), 1617–1655. https://doi.org/10.1109/COMST.2016.2532458.
Hashem, I. A. T., Yaqoob, I., Anuar, N. B., Mokhtar, S., Gani, A., & Khan, S. U. (2015). The rise of “big data” on cloud computing: Review and open research issues. Information Systems,47, 98–115. https://doi.org/10.1016/j.is.2014.07.006.
Moosavi, S. R., Gia, T. N., Nigussie, E., Rahmani, A. M., Virtanen, S., Tenhunen, H., et al. (2016). End-to-end security scheme for mobility enabled healthcare Internet of Things. Future Generation Computer Systems,64, 108–124. https://doi.org/10.1016/j.future.2016.02.020.
Deng, Y. Y., Chen, C. L., Tsaur, W. J., Tang, Y. W., & Chen, J. H. (2017). Internet of Things (IoT) based design of a secure and lightweight body area network (BAN) healthcare system. Sensors,17(12), 2129. https://doi.org/10.3390/s17122919.
Dhillon, P. K., & Kalra, S. (2017). A lightweight biometrics based remote user authentication scheme for IoT services. Journal of Information Security and Application,34, 255–270. https://doi.org/10.1016/j.jisa.2017.01.003.
Abbas, N., Zhang, Y., Taherkordi, A., & Skeie, T. (2018). Mobile edge computing: A survey. IEEE Internet of Things Journal,5(1), 450–465. https://doi.org/10.1109/JIOT.2017.2750180.
Yang, H. B., Chen, J. H., & Zhang, Y. Y. (2015). A fresh two-party authentication key exchange protocol for mobile environment. International Conference on Industrial Technology and Management Science,30(16), 993–996. https://doi.org/10.2991/itms-15.2015.224.
Li, X., Ibrahim, M. H., Kumari, S., Sangaiah, A. K., Gupta, V., & Choo, K. K. R. (2017). Anonymous mutual authentication and key agreement scheme for wearable sensors in wireless body area networks. Computer Networks,129, 429–443. https://doi.org/10.1016/j.comnet.2017.03.013.
Chen, C. L., Chen, Y. Y., Lee, C. C., & Wu, C. H. (2014). Design and analysis of a secure and effective emergency system for mountaineering events. The Journal of Supercomputing,70(1), 54–74. https://doi.org/10.1007/s11227-013-1066-9.
Mao, Y., You, C., Zhang, J., & Huang, K. K. B. (2017). A survey on mobile edge computing: The communication perspective. IEEE Communications Surveys and Tutorials,19(4), 2322–2358. https://doi.org/10.1109/COMST.2017.2745201.
Rajput, U., Abbas, F., Eun, H., & Oh, H. (2017). A hybrid approach for efficient privacy-preserving authentication in vanet. IEEE Access,5, 12014–12030. https://doi.org/10.1109/ACCESS.2017.2717999.
Dhillon, P. K., & Kalra, S. (2017). A lightweight biometrics based remote user authentication scheme for IoT services. Journal of Information Security and Applications,34, 255–270. https://doi.org/10.1016/j.jisa.2017.01.003.
Miller, V. S. (1985). Use of elliptic curves in cryptography. In Conference on the theory and application of cryptographic techniques (pp. 417–426). Berlin: Springer.
Zhao, Z. (2014). An efficient anonymous authentication scheme for wireless body area networks using elliptic curve cryptosystem. Journal of Medical Systems,38(2), 13. https://doi.org/10.1007/s10916-014-0013-5.
Shen, J., Chang, S., Shen, J., Liu, Q., & Sun, X. (2018). A lightweight multi-layer authentication protocol for wireless body area networks. Future Generation Computer Systems,78, 956–963. https://doi.org/10.1016/j.future.2016.11.033.
Burrows, M., Abad, M., & Needham, R. M. (1989). A logic of authentication. Proceedings of the Royal Society of London. Series A, Mathematical and Physical Sciences,426, 233–271.
Tang, X., & Xu, J. (2005). QoS-aware replica placement for content distribution. IEEE Transactions on Parallel and Distributed Systems,16(10), 921–932.
Marcus, M. J. (2015). 5G and IMT for 2020 and beyond. IEEE Wireless Communications,22(4), 2–3.
Acknowledgements
This research is partially sponsored by the Ministry of Science and Technology, Taiwan, ROC, under Contract No. MOST 108-2221-E-324-013 and the Ministry of Education, Taiwan, under the project: “The R&D and the cultivation of talent for Health-promotion products”.
Author information
Authors and Affiliations
Corresponding authors
Additional information
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Appendix
Appendix
Abbreviations are used in this paper and listed as follows:
3G/5G | Third generation mobile networks/fifth generation mobile networks |
LTE | Long term evolution |
MEC | Mobile edge computing |
IoT | Internet of things |
BS | Base station |
CA | Certificate authority |
IMEI | The international mobile equipment identity |
Rights and permissions
About this article
Cite this article
Chen, CL., Chiang, ML., Hsieh, HC. et al. A Lightweight Mutual Authentication with Wearable Device in Location-Based Mobile Edge Computing. Wireless Pers Commun 113, 575–598 (2020). https://doi.org/10.1007/s11277-020-07240-2
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11277-020-07240-2