Wireless medical sensor network user identity authentication protocol based on biological characteristic information

A biometric information, user identity authentication technology, applied in decryption and confidential fields, can solve problems such as damage to patient privacy, wrong diagnosis results, medical malpractice, etc.

Inactive Publication Date: 2020-02-14
NANCHANG HANGKONG UNIVERSITY
View PDF4 Cites 5 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] However, once the patient's physical physiological data is leaked, on the one hand, the patient's privacy is damaged; on the other hand, if the patient's physiological information received by the attending doctor is maliciously tampered with, it will lead to the attending doctor giving wrong diagnostic results, Serious and even cause medical accidents

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Wireless medical sensor network user identity authentication protocol based on biological characteristic information

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0019] The following will refer to the attached figure 1 , to describe the identity authentication protocol of the present invention in detail.

[0020] (1) Registration stage:

[0021] (a) Phase of registration of healthcare personnel:

[0022] To become a legitimate user, medical staff must register with a reliable hospital registration center. The specific steps are as follows:

[0023] Step 1: User U i First choose your own ID i and password PW i , and collect biometric information template B on the corresponding human biometric information scanning device i . Then, U i Use B i and by fuzzy extraction function i , P i >=Gen(B i ) to obtain the biometric key BPW i =h(R i ). In addition, U i Calculate RBPW i =h(ID i ||PW i ||BPW i ). Finally, U i Pass the information {ID i ,RBPW i} Send gateway GW.

[0024] Step 2: After receiving U i The registration request information {ID i ,RBPW i}, GW randomly generates a random value r g , and calculate X GW...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a wireless medical sensor network user identity authentication protocol based on biological characteristic information. The identity authentication protocol mainly comprises four stages: a user registration stage, a user login stage, an authentication and key negotiation stage and a password changing stage. The standard for measuring the advantages and disadvantages of theuser identity authentication protocol is based on whether various security attacks can be resisted or not, the calculation complexity and the communication overhead. Finally, by utilizing the advantages that the human body biological characteristic information is unique, easy to carry, difficult to copy and the like, the human body biological characteristic information is combined with the identity authentication system of the wireless medical sensor network, so that the identity authentication system can be accepted only under the condition that the two pieces of biological characteristic information are matched. According to the identity authentication method, the human body biological characteristic information, the intelligent card and the password are used as three factors of identityauthentication, security is high, reliability is high, and the identity authentication method is suitable for being applied to a wireless medical sensor network.

Description

technical field [0001] The invention relates to the technical field of confidentiality and decryption, and more particularly relates to a wireless medical sensor network user identity authentication protocol based on biological feature information. Background technique [0002] With the rapid development of Internet of Things technology, wireless communication technology has become more and more mature, and chip and sensor technology have also achieved great success. Based on the comprehensive application of these technologies above, the rapid development of the entire Internet of Things has been promoted, resulting in the deployment of sensor nodes in wireless sensor networks in many application fields to collect monitoring data in designated monitoring areas. As an important application field in the branch of wireless sensor networks, wireless medical sensor networks have gained more and more attention in recent years, because in the field of medical monitoring, wireless m...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/08H04L29/06H04W4/38
CPCH04L63/083H04L63/0861H04L67/12H04W4/38
Inventor 陈英葛杨铭汪文源
Owner NANCHANG HANGKONG UNIVERSITY
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products