PAAF-SHS: PUF and authenticated encryption based authentication framework for the IoT-enabled smart healthcare system

被引:21
作者
Aldosary, Abdallah [1 ]
Tanveer, Muhammad [2 ]
机构
[1] Prince Sattam bin Abdulaziz Univ, Dept Comp Engn, Wadi Addwasir 11991, Ar Riyadh, Saudi Arabia
[2] Univ Management & Technol, Dept Comp Sci, Lahore 54770, Pakistan
关键词
Smart healthcare system; Secure communication; Security; Authentication; Data security; USER AUTHENTICATION; MUTUAL AUTHENTICATION; SCHEME; SECURE; LIGHTWEIGHT; EFFICIENT; PROTOCOL;
D O I
10.1016/j.iot.2024.101159
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The Internet of Things (IoT) is increasingly becoming a fundamental component of our everyday existence with the swift advancement in communication technology. Critical infrastructures, smart city monitoring, and smart healthcare systems (SHS) all make significant use of IoT-enabled devices. Nevertheless, the computing power of IoT devices utilized in SHS is constrained. These IoT devices gather sensitive patient data and send it to a medical server. Doctors use IoT-enabled devices to retrieve patient data that has been stored on the medical server using a public communication channel that is susceptible to different types of security attacks. In order to provide information security for IoT-enabled devices with limited resources, the NIST has developed an array of authenticated encryption algorithms. When compared to conventional security techniques, these authenticated encryption algorithms offer computational efficiency. The existing authentication schemes are developed by computationally expensive symmetric and asymmetric encryption schemes and are vulnerable to privileged insider and medical server key compromise attacks. Therefore, this paper introduces a physical unclonable function (PUF) and authenticated encryption (GIFT-COFB)-based authentication framework for IoT-enabled SHS, called PAAF-SHS. PAAF-SHS ensures secure encrypted communication between users and medical servers following mutual authentication. The PUF is incorporated within the medical server and the IoT-enabled device to improve resistance against insider attackers and potential compromises to the medical server key attack. Even in the case of a potential medical server key compromise attack, PAAF-SHS ensures that user-medical server communication remains confidential. The implementation of BAN logic ensures the logical exactitude of PAAF-SHS. Informal security analysis is conducted to validate PAAF-SHS's resilience against impersonation, replay, and denial-of-service attacks. Security validation using Scyther is performed to illustrate the robustness of PAAF-SHS. Finally, performance evaluations demonstrate that the proposed PAAF-SHS achieves a significant reduction in computational and communication costs while enhancing security features.
引用
收藏
页数:19
相关论文
共 51 条
[1]   Lightweight and anonymous three-factor authentication and access control scheme for real-time applications in wireless sensor networks [J].
Adavoudi-Jolfaei, AmirHosein ;
Ashouri-Talouki, Maede ;
Aghili, Seyed Farhad .
PEER-TO-PEER NETWORKING AND APPLICATIONS, 2019, 12 (01) :43-59
[2]   Design of an anonymity-preserving three-factor authenticated key exchange protocol for wireless sensor networks [J].
Amin, Ruhul ;
Islam, S. K. Hafizul ;
Biswas, G. P. ;
Khan, Muhammad Khurram ;
Leng, Lu ;
Kumar, Neeraj .
COMPUTER NETWORKS, 2016, 101 :42-62
[3]   HCALA: Hyperelliptic curve-based anonymous lightweight authentication scheme for Internet of Drones [J].
Berini, Aymen Dia Eddine ;
Ferrag, Mohamed Amine ;
Farou, Brahim ;
Seridi, Hamid .
PERVASIVE AND MOBILE COMPUTING, 2023, 92
[4]   Cogent and Energy Efficient Authentication Protocol for WSN in IoT [J].
Butt, Tariq Mahmood ;
Riaz, Rabia ;
Chakraborty, Chinmay ;
Rizvi, Sanam Shahla ;
Paul, Anand .
CMC-COMPUTERS MATERIALS & CONTINUA, 2021, 68 (02) :1877-1898
[5]   An efficient ECC-based provably secure three-factor user authentication and key agreement protocol for wireless healthcare sensor networks [J].
Challa, Sravani ;
Das, Ashok Kumar ;
Odelu, Vanga ;
Kumar, Neeraj ;
Kumari, Saru ;
Khan, Muhammad Khurram ;
Vasilakos, Athanasios V. .
COMPUTERS & ELECTRICAL ENGINEERING, 2018, 69 :534-554
[6]   GCACS-IoD: A certificate based generic access control scheme for Internet of drones [J].
Chaudhry, Shehzad Ashraf ;
Yahya, Khalid ;
Karuppiah, Marimuthu ;
Kharel, Rupak ;
Bashir, Ali Kashif ;
Bin Zikria, Yousaf .
COMPUTER NETWORKS, 2021, 191
[7]   An enhanced lightweight anonymous biometric based authentication scheme for TMIS [J].
Chaudhry, Shehzad Ashraf ;
Naqvi, Husnain ;
Khan, Muhammad Khurram .
MULTIMEDIA TOOLS AND APPLICATIONS, 2018, 77 (05) :5503-5524
[8]   Efficient and secure three-party mutual authentication key agreement protocol for WSNs in IoT environments [J].
Chen, Chi-Tung ;
Lee, Cheng-Chi ;
Lin, Iuon-Chang .
PLOS ONE, 2020, 15 (04)
[9]   A Security-Enhanced and Ultralightweight Communication Protocol for Internet of Medical Things [J].
Chen, Chien-Ming ;
Chen, Zhaoting ;
Das, Ashok Kumar ;
Chaudhry, Shehzad Ashraf .
IEEE INTERNET OF THINGS JOURNAL, 2024, 11 (06) :10168-10182
[10]   A provably-secure authenticated key agreement protocol for remote patient monitoring IoMT [J].
Chen, Chien-Ming ;
Liu, Shuangshuang ;
Li, Xuanang ;
Islam, S. K. Hafizul ;
Das, Ashok Kumar .
JOURNAL OF SYSTEMS ARCHITECTURE, 2023, 136