1 / 14

Timestamp Authentication Protocol for Remote Monitoring in eHealth

Timestamp Authentication Protocol for Remote Monitoring in eHealth. Dasun Weerasinghe, Kalid Elmufti, M Rajarajan, Veselin Rakocevic Mobile Networks Research Group School of Engineering and Mathematical Sciences City University London. Outline of the Presentation. Problem domain

marny-cain
Download Presentation

Timestamp Authentication Protocol for Remote Monitoring in eHealth

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Timestamp Authentication Protocol for Remote Monitoring in eHealth Dasun Weerasinghe, Kalid Elmufti, M Rajarajan, Veselin Rakocevic Mobile Networks Research Group School of Engineering and Mathematical Sciences City University London

  2. Outline of the Presentation • Problem domain • eHealth System Architecture • Protocol initiation • Timestamp protocol • Issues with using Timestamp • Operation analysis

  3. Problem domain • Remote health monitoring with mobile devices • Patient authentication to a remote server • Prevent replay attacks • Freshness of the message • Protect data confidentiality • Protect data integrity

  4. Timestamp in authentication protocol • Verifies freshness of messages and expiration of keys • Message timelines are specified • Time-limited constrains on access privileges • Forced delays of a response messages can be detected • Reduced the number of transmitted messages

  5. eHealth System Architecture

  6. Protocol Initiation • Each device with a clock • Difference in clock values < threshold value T • Can be a maximum transmission delay of D • Message is considered fresh if • tc – T – D =< tm =< tc + T tc: current time tm: time stamp in the message

  7. Timestamp validation • When a message is received timestamp is compared with the current clock value • Message is fresh if the timestamp is satisfied as tc –T – D =< tm • Messages with inequality timestamp will be discarded

  8. Issues with using Timestamp • Clock Synchronization • Clocks are not accurate • In distributed environment via network protocols • Synchronization method should be secured • Trusted Clocks • The receiver’s clock has to be trusted • Clock values can be changed by users with GMS/UMTS handheld devices

  9. Operation Analysis • If [ tHAS –T – D =< tpatient1 ] is not • HAS advices the client to correct the clock and re-send the message • Else • Generate a User Token (UT) • Attached HAS timestamp and patient timestamp with signing HAS private key SKHAS (tpatient1, tHAS) Patient HAS tHAS tpatient1 tpatient1, Access Info

  10. Operation Analysis (Contd.) • HAS sends the UT and generated authentication timestamps to the patient Patient HAS tHAS tpatient1 S SKHAS (tpatient1, tHAS), UT

  11. Operation Analysis (Contd.) Patient HS tHS tpatient2 • Healthcare Staff (HS) verifies user message • Verifies the UT • Verifies the message S SKHSA (tpatient1, tHAS) with the public key of HAS ( PKHAS ) • Compares tpatient1 and tpatient2 • Message is fresh only if tpatient2 – T – D =< tpatient1 • Else Patient has to re-authenticate with the HAS and resend the message S SKHAS (tpatient1, tHAS), UT, tpatient2

  12. Conclusion • Remote monitoring for healthcare • Requirement of timestamp authentication • eHealth architecture • Proposed protocol • How to validate the timestamp • Issues with timestamp protocol • Operation analysis

  13. Q & A ??????

  14. Thank you !!!!!

More Related