Analysis of Security Protocols for Mobile Healthcare

Mohammad Wazid, Sherali Zeadally, Ashok Kumar Das, Vanga Odelu

Research output: Contribution to journalArticlepeer-review

28 Scopus citations


Mobile Healthcare (mHealth) continues to improve because of significant improvements and the decreasing costs of Information Communication Technologies (ICTs). mHealth is a medical and public health practice, which is supported by mobile devices (for example, smartphones) and, patient monitoring devices (for example, various types of wearable sensors, etc.). An mHealth system enables healthcare experts and professionals to have ubiquitous access to a patient’s health data along with providing any ongoing medical treatment at any time, any place, and from any device. It also helps the patient requiring continuous medical monitoring to stay in touch with the appropriate medical staff and healthcare experts remotely. Thus, mHealth has become a major driving force in improving the health of citizens today. First, we discuss the security requirements, issues and threats to the mHealth system. We then present a taxonomy of recently proposed security protocols for mHealth system based on features supported and possible attacks, computation cost and communication cost. Our detailed taxonomy demonstrates the strength and weaknesses of recently proposed security protocols for the mHealth system. Finally, we identify some of the challenges in the area of security protocols for mHealth systems that still need to be addressed in the future to enable cost-effective, secure and robust mHealth systems.

Original languageEnglish
Article number229
JournalJournal of Medical Systems
Issue number11
StatePublished - Nov 1 2016


  • Attack
  • Communication cost
  • Computation cost
  • Mobile device
  • Mobile healthcare
  • Protocol
  • Security
  • Threat

ASJC Scopus subject areas

  • Medicine (miscellaneous)
  • Information Systems
  • Health Informatics
  • Health Information Management


Dive into the research topics of 'Analysis of Security Protocols for Mobile Healthcare'. Together they form a unique fingerprint.

Cite this