Lightweight authentication protocols for wearable devices

Ashok Kumar Das, Sherali Zeadally, Mohammad Wazid

Research output: Contribution to journalArticlepeer-review

39 Scopus citations

Abstract

In the wearable communication environment, wearable devices are used for various applications including fitbit flex tracks steps, sleep cycles, workout stats, and recording health-related sensitive information. The decreasing costs and increasing performance of Information Communication Technologies (ICTs) have made wearable devices more cost effective. Different types of wearable devices are being used today by citizens to improve their health and lifestyle. However, the data (such as health-related or movement data) generated from the user's daily activities is often private and therefore, ensuring the security and privacy of this data is important. First, we present some emerging trends of wearable devices followed by a discussion of the main security and functionality requirements along with the threats to the wearable communication environment. We then present a review of some of the recently proposed lightweight authentication protocols for wearable devices based on performance metrics such as computation cost and communication cost. We also compare these authentication protocols in terms of various security features they support. Finally, we discuss some future challenges in the area of security protocols for wearable devices that need to be addressed in the future.

Original languageEnglish
Pages (from-to)196-208
Number of pages13
JournalComputers and Electrical Engineering
Volume63
DOIs
StatePublished - Oct 2017

Bibliographical note

Publisher Copyright:
© 2017

Keywords

  • Attack
  • Healthcare
  • Protocol
  • Security
  • Threat
  • Wearable devices

ASJC Scopus subject areas

  • Control and Systems Engineering
  • General Computer Science
  • Electrical and Electronic Engineering

Fingerprint

Dive into the research topics of 'Lightweight authentication protocols for wearable devices'. Together they form a unique fingerprint.

Cite this