ALMASH: an anonymity-based lightweight mutual authentication scheme for internet of healthcare things

被引:1
作者
Trivedi, Chandan [1 ,2 ]
Parmar, Keyur [1 ]
Rao, Udai Pratap [3 ]
机构
[1] Sardar Vallabhbhai Natl Inst Technol, Comp Sci & Engn, Surat 395007, Gujarat, India
[2] Nirma Univ, Inst Technol, Comp Sci & Engn, Ahemdabad 382481, Gujarat, India
[3] Natl Inst Technol, Comp Sci & Engn, Patna 800005, Bihar, India
关键词
Healthcare; Security; Mutual authentication; Secret sharing; IoHT; SECURE; EFFICIENT; SYSTEM;
D O I
10.1007/s11227-024-06801-7
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
The Internet of Things (IoT) is now integral to electronic healthcare patient monitoring based on medical sensor devices. Healthcare systems need secure message exchanges from sensors to intended receivers to maintain the confidentiality and privacy of personal medical readings. Designing and implementing an authentication strategy for healthcare servers, devices, and users is essential to address security and privacy concerns. Many authentication strategies related to the IoT domain are available but do not work based on a user's choice, where they can select devices in the environment for a specific task. The existing selective authentication scheme uses Shamir's secret-sharing scheme, considering the healthcare scenario claims they have addressed all security requirements and withstand various attacks. However, we observe that the existing scheme does not enable a mutual authentication process and lacks user and device anonymity, which are the essential requirements of an IoT-based authentication system. In addition, the scheme does not resist DoS attacks and lacks forward secrecy. We propose an anonymity-based mutual authentication scheme (ALMASH) for healthcare things using an elliptic curve and secret sharing to improve those security requirements. The proposed scheme uses lightweight cryptography primitives to alleviate the node's tiny processor burden. We prevent unauthorized access and modification of sensitive healthcare data by enhancing data security through device registration and mutual authentication. To demonstrate the effectiveness of our approach, we have compared our scheme with relevant authentication schemes. Additionally, we show formal security using the AVISPA tool, informal security analysis, and performance analysis to validate the robustness of our proposed solution.
引用
收藏
页数:32
相关论文
共 51 条
[1]   Two factor authentication protocol for IoT based healthcare monitoring system [J].
Agrahari A.K. ;
Varma S. ;
Venkatesan S. .
Journal of Ambient Intelligence and Humanized Computing, 2023, 14 (12) :16081-16098
[2]   Internet of Things: A Comprehensive Study of Security Issues and Defense Mechanisms [J].
Ahanger, Tariq Ahamed ;
Aljumah, Abdullah .
IEEE ACCESS, 2019, 7 :11020-11028
[3]   Authentication in the Internet of Medical Things: Taxonomy, Review, and Open Issues [J].
Alsaeed, Norah ;
Nadeem, Farrukh .
APPLIED SCIENCES-BASEL, 2022, 12 (15)
[4]   An Efficient and Practical Smart Card Based Anonymity Preserving User Authentication Scheme for TMIS using Elliptic Curve Cryptography [J].
Amin, Ruhul ;
Islam, S. K. Hafizul ;
Biswas, G. P. ;
Khan, Muhammad Khurram ;
Kumar, Neeraj .
JOURNAL OF MEDICAL SYSTEMS, 2015, 39 (11)
[5]   Secure and Authenticated Data Access and Sharing Model for Smart Wearable Systems [J].
Amintoosi, Haleh ;
Nikooghadam, Mahdi ;
Kumari, Saru ;
Jun, Feng ;
Xiong, Hu ;
Kumar, Sachin ;
Rodrigues, Joel J. P. C. .
IEEE INTERNET OF THINGS JOURNAL, 2022, 9 (07) :5368-5379
[6]   A Flexible and Lightweight Group Authentication Scheme [J].
Aydin, Yucel ;
Kurt, Gunes Karabulut ;
Ozdemir, Enver ;
Yanikomeroglu, Halim .
IEEE INTERNET OF THINGS JOURNAL, 2020, 7 (10) :10277-10287
[7]   An IoT Inventory Before Deployment: A Survey on IoT Protocols, Communication Technologies, Vulnerabilities, Attacks, and Future Research Directions [J].
Bang, Ankur O. ;
Rao, Udai Pratap ;
Visconti, Andrea ;
Brighente, Alessandro ;
Conti, Mauro .
COMPUTERS & SECURITY, 2022, 123
[8]   Improved Dynamic ID-based Authentication Scheme for Telecare Medical Information Systems [J].
Cao, Tianjie ;
Zhai, Jingxuan .
JOURNAL OF MEDICAL SYSTEMS, 2013, 37 (02)
[9]   Secure Signature-Based Authenticated Key Establishment Scheme for Future IoT Applications [J].
Challa, Sravani ;
Wazid, Mohammad ;
Das, Ashok Kumar ;
Kumar, Neeraj ;
Reddy, Alavalapati Goutham ;
Yoon, Eun-Jun ;
Yoo, Kee-Young .
IEEE ACCESS, 2017, 5 :3028-3043
[10]   A Multiserver Biometric Authentication Scheme for TMIS using Elliptic Curve Cryptography [J].
Chaudhry, Shehzad Ashraf ;
Khan, Muhammad Tawab ;
Khan, Muhammad Khurram ;
Shon, Taeshik .
JOURNAL OF MEDICAL SYSTEMS, 2016, 40 (11)