Visible to the public Secure and Lightweight Biometric-Based Remote Patient Authentication Scheme for Home Healthcare Systems

TitleSecure and Lightweight Biometric-Based Remote Patient Authentication Scheme for Home Healthcare Systems
Publication TypeConference Paper
Year of Publication2018
AuthorsMohammedi, M., Omar, M., Aitabdelmalek, W., Mansouri, A., Bouabdallah, A.
Conference Name2018 International Symposium on Programming and Systems (ISPS)
Keywordsauthentication, Biometric, biometric encryption, biometrics (access control), digital systems, e-Healthcare, elliptic curve encryption, Elliptic curves, Health Care, healthcare system, home computing, home healthcare system, lightweight biometric-based remote patient authentication scheme, medical computing, medical data, Medical diagnostic imaging, medical information systems, Medical services, Metrics, Mobile handsets, mobile healthcare system communication, patient care, pubcrawl, public key cryptography, public mobile healthcare environments, Remote authentication, remote medical treatment, resilience, Resiliency, Scalability, secure based remote patient authentication scheme, security, security of data, Servers

Recently, the home healthcare system has emerged as one of the most useful technology for e-healthcare. Contrary to classical recording methods of patient's medical data, which are, based on paper documents, nowadays all this sensitive data can be managed and forwarded through digital systems. These make possible for both patients and healthcare workers to access medical data or receive remote medical treatment using wireless interfaces whenever and wherever. However, simplifying access to these sensitive and private data can directly put patient's health and life in danger. In this paper, we propose a secure and lightweight biometric-based remote patient authentication scheme using elliptic curve encryption through which two mobile healthcare system communication parties could authenticate each other in public mobile healthcare environments. The security and performance analysis demonstrate that our proposal achieves better security than other concurrent schemes, with lower storage, communication and computation costs.

Citation Keymohammedi_secure_2018