User authentication in a tactile internet based remote surgery environment

Security issues, challenges, and future research directions

Mohammad Wazid, Ashok Kumar Das, Jong Hyouk Lee

Research output: Contribution to journalArticle

Abstract

Recently, the Tactile Internet (TI) becomes a new era of the Internet. The TI provides ultra-reliable, ultra-responsive and intelligent network connectivity for delivering real-time control and physical haptic experiences from a remote location. The TI provides a different feeling to human–machine interaction by implementing the real-time interactive systems. In this review article, we discuss a generalized authentication model which can be used to perform authentication procedure among different communicating parties in order to secure remote surgery in the TI environment. By using the proposed authentication model, an authentication protocol can be designed so that an authenticated surgeon can use the robot/robotic arms to perform the surgery securely as well as remotely. Since the application is very critical, the important instructions provided by the surgeon to the robot/robotic arms must not be leaked in between the communication during the surgical procedure. To deal with this emerging research area, a secure mutual user authentication mechanism should be provided between a remote surgeon and the robot/robotic arms so that they can communicate securely using the established session key among them. Further, several security issues and challenges for such kind of communication are also discussed in this article. Finally, we discuss few points that need to be considered as future research works that are related to authentication for securing remote surgery in the TI environment.

Original languageEnglish
Pages (from-to)71-85
Number of pages15
JournalPervasive and Mobile Computing
Volume54
DOIs
Publication statusPublished - 01-03-2019
Externally publishedYes

Fingerprint

User Authentication
Surgery
Authentication
Internet
Robotic arms
Robotics
Robot
Robots
Human-machine Interaction
Real-time
Mutual Authentication
Intelligent networks
Authentication Protocol
Network Connectivity
Interactive Systems
Haptics
Communication
Real time control
Network protocols
Model

All Science Journal Classification (ASJC) codes

  • Computer Science (miscellaneous)
  • Software
  • Information Systems
  • Hardware and Architecture
  • Computer Science Applications
  • Computer Networks and Communications
  • Applied Mathematics

Cite this

@article{6844d511e472419ba1ba0f3dbf88c166,
title = "User authentication in a tactile internet based remote surgery environment: Security issues, challenges, and future research directions",
abstract = "Recently, the Tactile Internet (TI) becomes a new era of the Internet. The TI provides ultra-reliable, ultra-responsive and intelligent network connectivity for delivering real-time control and physical haptic experiences from a remote location. The TI provides a different feeling to human–machine interaction by implementing the real-time interactive systems. In this review article, we discuss a generalized authentication model which can be used to perform authentication procedure among different communicating parties in order to secure remote surgery in the TI environment. By using the proposed authentication model, an authentication protocol can be designed so that an authenticated surgeon can use the robot/robotic arms to perform the surgery securely as well as remotely. Since the application is very critical, the important instructions provided by the surgeon to the robot/robotic arms must not be leaked in between the communication during the surgical procedure. To deal with this emerging research area, a secure mutual user authentication mechanism should be provided between a remote surgeon and the robot/robotic arms so that they can communicate securely using the established session key among them. Further, several security issues and challenges for such kind of communication are also discussed in this article. Finally, we discuss few points that need to be considered as future research works that are related to authentication for securing remote surgery in the TI environment.",
author = "Mohammad Wazid and Das, {Ashok Kumar} and Lee, {Jong Hyouk}",
year = "2019",
month = "3",
day = "1",
doi = "10.1016/j.pmcj.2019.02.004",
language = "English",
volume = "54",
pages = "71--85",
journal = "Pervasive and Mobile Computing",
issn = "1574-1192",
publisher = "Elsevier",

}

User authentication in a tactile internet based remote surgery environment : Security issues, challenges, and future research directions. / Wazid, Mohammad; Das, Ashok Kumar; Lee, Jong Hyouk.

In: Pervasive and Mobile Computing, Vol. 54, 01.03.2019, p. 71-85.

Research output: Contribution to journalArticle

TY - JOUR

T1 - User authentication in a tactile internet based remote surgery environment

T2 - Security issues, challenges, and future research directions

AU - Wazid, Mohammad

AU - Das, Ashok Kumar

AU - Lee, Jong Hyouk

PY - 2019/3/1

Y1 - 2019/3/1

N2 - Recently, the Tactile Internet (TI) becomes a new era of the Internet. The TI provides ultra-reliable, ultra-responsive and intelligent network connectivity for delivering real-time control and physical haptic experiences from a remote location. The TI provides a different feeling to human–machine interaction by implementing the real-time interactive systems. In this review article, we discuss a generalized authentication model which can be used to perform authentication procedure among different communicating parties in order to secure remote surgery in the TI environment. By using the proposed authentication model, an authentication protocol can be designed so that an authenticated surgeon can use the robot/robotic arms to perform the surgery securely as well as remotely. Since the application is very critical, the important instructions provided by the surgeon to the robot/robotic arms must not be leaked in between the communication during the surgical procedure. To deal with this emerging research area, a secure mutual user authentication mechanism should be provided between a remote surgeon and the robot/robotic arms so that they can communicate securely using the established session key among them. Further, several security issues and challenges for such kind of communication are also discussed in this article. Finally, we discuss few points that need to be considered as future research works that are related to authentication for securing remote surgery in the TI environment.

AB - Recently, the Tactile Internet (TI) becomes a new era of the Internet. The TI provides ultra-reliable, ultra-responsive and intelligent network connectivity for delivering real-time control and physical haptic experiences from a remote location. The TI provides a different feeling to human–machine interaction by implementing the real-time interactive systems. In this review article, we discuss a generalized authentication model which can be used to perform authentication procedure among different communicating parties in order to secure remote surgery in the TI environment. By using the proposed authentication model, an authentication protocol can be designed so that an authenticated surgeon can use the robot/robotic arms to perform the surgery securely as well as remotely. Since the application is very critical, the important instructions provided by the surgeon to the robot/robotic arms must not be leaked in between the communication during the surgical procedure. To deal with this emerging research area, a secure mutual user authentication mechanism should be provided between a remote surgeon and the robot/robotic arms so that they can communicate securely using the established session key among them. Further, several security issues and challenges for such kind of communication are also discussed in this article. Finally, we discuss few points that need to be considered as future research works that are related to authentication for securing remote surgery in the TI environment.

UR - http://www.scopus.com/inward/record.url?scp=85061782247&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=85061782247&partnerID=8YFLogxK

U2 - 10.1016/j.pmcj.2019.02.004

DO - 10.1016/j.pmcj.2019.02.004

M3 - Article

VL - 54

SP - 71

EP - 85

JO - Pervasive and Mobile Computing

JF - Pervasive and Mobile Computing

SN - 1574-1192

ER -