Skip to main content
Log in

A Lightweight Mutual Authentication with Wearable Device in Location-Based Mobile Edge Computing

  • Published:
Wireless Personal Communications Aims and scope Submit manuscript

Abstract

In recent years, the proportion of elderly population in various countries has gradually increased. Increasing with age, it can entail illness. When these diseases are sudden, the elderly often die because there is no immediate treatment. Elderly care has become an important issue. According to this issue, we want to monitor the physiological data of the elderly, such as heartbeat, blood pressure, etc., through wearable devices. Once an abnormal condition is detected, the wearable device can be used to immediately request treatment from a nearby clinic or hospital. In order to improve the network quality of this service, we use the architecture of the mobile edge computing. The mobile edge computing provides features such as immediacy, low latency, proximity etc. However, the process of data transmission on the mobile edge computing has the risk of being stolen and identity authentication is also an important issue. Therefore, we propose a secure protocol based on cryptography to protect personal information with lightweight authentication. The proposed scheme aims to achieve mutual authentication, non-repudiation, integrity, user privacy, and defend against known attacks.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Institutional subscriptions

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5

Similar content being viewed by others

References

  1. Hu, J. X., Chen, C. L., Fan, C. L., & Wang, K. H. (2017). An intelligent and secure health monitoring scheme using IoT sensor based on cloud computing. Journal of Sensors. https://doi.org/10.1155/2017/3734764.

    Article  Google Scholar 

  2. Department of Statistics, the Ministry of The Internal of Taiwan. (2017). https://www.moi.gov.tw/stat/english/node.aspx?sn=7255. Accessed on 10 January 2019.

  3. CNNMoney, See the ‘super-aged’ nations. https://money.cnn.com/interactive/news/aging-countries/?iid=EL. Accessed on 10 January 2019.

  4. Hung, K., Zhang, Y. T., & Tai, B. (2004). Wearable medical devices for tele-home healthcare. In 26th annual international conference of the IEEE engineering in medicine and biology society (Vol. 2, pp. 5384–5387). https://ieeexplore.ieee.org/document/1404503.

  5. Hu, Y. C., Patel, M., Sabella, D., Sprecher, N., & Young, V. (2015). Mobile edge computing—A key technology towards 5G. ETSI White Paper, 11(11), 1–16.

  6. Mach, P., & Becvar, Z. (2017). Mobile edge computing: A survey on architecture and computation offloading. IEEE Communications Surveys and Tutorials,19(3), 1628–1656. https://doi.org/10.1109/COMST.2017.2682318.

    Article  Google Scholar 

  7. Tran, T. X., Hajisami, A., Pandey, P., & Pompili, D. (2017). Collaborative mobile edge computing in 5G networks: New paradigms, scenarios, and challenges. IEEE Communications Magazine,55(4), 54–61. https://doi.org/10.1109/MCOM.2017.1600863.

    Article  Google Scholar 

  8. Roman, R., Lopez, J., & Mambo, M. (2018). Mobile edge computing, Fog et al.: A survey and analysis of security threats and challenges. Future Generation Computer Systems,78, 680–698. https://doi.org/10.1016/j.future.2016.11.009.

    Article  Google Scholar 

  9. Condoluci, M., & Mahmoodi, T. (2018). Softwarization and virtualization in 5G mobile networks: Benefits, trends and challenges. Computer Networks,146, 65–84.

    Article  Google Scholar 

  10. Agiwal, M., Roy, A., & Saxena, N. (2016). Next generation 5G wireless networks: A comprehensive survey. IEEE Communications Surveys and Tutorials,18(3), 1617–1655. https://doi.org/10.1109/COMST.2016.2532458.

    Article  Google Scholar 

  11. Hashem, I. A. T., Yaqoob, I., Anuar, N. B., Mokhtar, S., Gani, A., & Khan, S. U. (2015). The rise of “big data” on cloud computing: Review and open research issues. Information Systems,47, 98–115. https://doi.org/10.1016/j.is.2014.07.006.

    Article  Google Scholar 

  12. Moosavi, S. R., Gia, T. N., Nigussie, E., Rahmani, A. M., Virtanen, S., Tenhunen, H., et al. (2016). End-to-end security scheme for mobility enabled healthcare Internet of Things. Future Generation Computer Systems,64, 108–124. https://doi.org/10.1016/j.future.2016.02.020.

    Article  Google Scholar 

  13. Deng, Y. Y., Chen, C. L., Tsaur, W. J., Tang, Y. W., & Chen, J. H. (2017). Internet of Things (IoT) based design of a secure and lightweight body area network (BAN) healthcare system. Sensors,17(12), 2129. https://doi.org/10.3390/s17122919.

    Article  Google Scholar 

  14. Dhillon, P. K., & Kalra, S. (2017). A lightweight biometrics based remote user authentication scheme for IoT services. Journal of Information Security and Application,34, 255–270. https://doi.org/10.1016/j.jisa.2017.01.003.

    Article  Google Scholar 

  15. Abbas, N., Zhang, Y., Taherkordi, A., & Skeie, T. (2018). Mobile edge computing: A survey. IEEE Internet of Things Journal,5(1), 450–465. https://doi.org/10.1109/JIOT.2017.2750180.

    Article  Google Scholar 

  16. Yang, H. B., Chen, J. H., & Zhang, Y. Y. (2015). A fresh two-party authentication key exchange protocol for mobile environment. International Conference on Industrial Technology and Management Science,30(16), 993–996. https://doi.org/10.2991/itms-15.2015.224.

    Article  Google Scholar 

  17. Li, X., Ibrahim, M. H., Kumari, S., Sangaiah, A. K., Gupta, V., & Choo, K. K. R. (2017). Anonymous mutual authentication and key agreement scheme for wearable sensors in wireless body area networks. Computer Networks,129, 429–443. https://doi.org/10.1016/j.comnet.2017.03.013.

    Article  Google Scholar 

  18. Chen, C. L., Chen, Y. Y., Lee, C. C., & Wu, C. H. (2014). Design and analysis of a secure and effective emergency system for mountaineering events. The Journal of Supercomputing,70(1), 54–74. https://doi.org/10.1007/s11227-013-1066-9.

    Article  Google Scholar 

  19. Mao, Y., You, C., Zhang, J., & Huang, K. K. B. (2017). A survey on mobile edge computing: The communication perspective. IEEE Communications Surveys and Tutorials,19(4), 2322–2358. https://doi.org/10.1109/COMST.2017.2745201.

    Article  Google Scholar 

  20. Rajput, U., Abbas, F., Eun, H., & Oh, H. (2017). A hybrid approach for efficient privacy-preserving authentication in vanet. IEEE Access,5, 12014–12030. https://doi.org/10.1109/ACCESS.2017.2717999.

    Article  Google Scholar 

  21. Dhillon, P. K., & Kalra, S. (2017). A lightweight biometrics based remote user authentication scheme for IoT services. Journal of Information Security and Applications,34, 255–270. https://doi.org/10.1016/j.jisa.2017.01.003.

    Article  Google Scholar 

  22. Miller, V. S. (1985). Use of elliptic curves in cryptography. In Conference on the theory and application of cryptographic techniques (pp. 417–426). Berlin: Springer.

  23. Zhao, Z. (2014). An efficient anonymous authentication scheme for wireless body area networks using elliptic curve cryptosystem. Journal of Medical Systems,38(2), 13. https://doi.org/10.1007/s10916-014-0013-5.

    Article  Google Scholar 

  24. Shen, J., Chang, S., Shen, J., Liu, Q., & Sun, X. (2018). A lightweight multi-layer authentication protocol for wireless body area networks. Future Generation Computer Systems,78, 956–963. https://doi.org/10.1016/j.future.2016.11.033.

    Article  Google Scholar 

  25. Burrows, M., Abad, M., & Needham, R. M. (1989). A logic of authentication. Proceedings of the Royal Society of London. Series A, Mathematical and Physical Sciences,426, 233–271.

    MathSciNet  MATH  Google Scholar 

  26. Tang, X., & Xu, J. (2005). QoS-aware replica placement for content distribution. IEEE Transactions on Parallel and Distributed Systems,16(10), 921–932.

    Article  Google Scholar 

  27. Marcus, M. J. (2015). 5G and IMT for 2020 and beyond. IEEE Wireless Communications,22(4), 2–3.

    Article  Google Scholar 

Download references

Acknowledgements

This research is partially sponsored by the Ministry of Science and Technology, Taiwan, ROC, under Contract No. MOST 108-2221-E-324-013 and the Ministry of Education, Taiwan, under the project: “The R&D and the cultivation of talent for Health-promotion products”.

Author information

Authors and Affiliations

Authors

Corresponding authors

Correspondence to Mao-Lun Chiang, Hui-Ching Hsieh or Yong-Yuan Deng.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Appendix

Appendix

Abbreviations are used in this paper and listed as follows:

3G/5G

Third generation mobile networks/fifth generation mobile networks

LTE

Long term evolution

MEC

Mobile edge computing

IoT

Internet of things

BS

Base station

CA

Certificate authority

IMEI

The international mobile equipment identity

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Chen, CL., Chiang, ML., Hsieh, HC. et al. A Lightweight Mutual Authentication with Wearable Device in Location-Based Mobile Edge Computing. Wireless Pers Commun 113, 575–598 (2020). https://doi.org/10.1007/s11277-020-07240-2

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11277-020-07240-2

Keywords

Navigation