An enhanced three-factor based authentication and key agreement protocol using PUF in IoMT

被引:0
作者
Wu, Tsu-Yang [1 ,2 ]
Wu, Haozhi [2 ]
Kumari, Saru [3 ]
Chen, Chien-Ming [1 ]
机构
[1] Nanjing Univ Informat Sci & Technol, Sch Artificial Intelligence, Nanjing 210044, Jiangsu, Peoples R China
[2] Shandong Univ Sci & Technol, Coll Comp Sci & Engn, Qingdao 266590, Shandong, Peoples R China
[3] Chaudhary Charan Singh Univ, Dept Math, Meerut 250004, Uttar Pradesh, India
关键词
Authentication; IoMT; PUF; Cryptanalysis; ANONYMOUS USER AUTHENTICATION; PROVABLY SECURE; MUTUAL AUTHENTICATION; EFFICIENT; SCHEME; LIGHTWEIGHT;
D O I
10.1007/s12083-024-01839-z
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
With the rapid development of Internet of Things (IoT) technology, Internet of Medical Things (IoMT) plays a huge important role in improving the quality of healthcare services. By using IoMT, doctors are able to remotely monitor real-time physiological information of patients automatically, thereby alleviating their burden. This approach is not only considered more efficient and cost-effective, but also provides support from medical experts for emergency treatment of patients. However, as these health data contain sensitive information related to patient privacy, any leakage or malicious tampering of information can lead to incorrect diagnosis by doctors, seriously endangering patient health. Therefore, ensuring the security of patients' health data has become particularly important. In 2023, Kim et al. proposed an improved lightweight user authentication protocol for IoMT. Unfortunately, we found that this protocol is vulnerable to security threats such as user device capture attacks, man-in-the-middle attacks. In response to the above security problems, we propose an enhanced three-factor based authentication and key agreement protocol. The protocol enhances security by utilizing both strong physical unclonable functions (PUF) and weak PUF. In terms of protocol security, we verify its properties using Real-or-Random (ROR) model, informal analysis, and AVISPA tool. Finally, this paper is compared with seven other protocols. We analyzed the security, computational cost, and communication cost of each scheme. The results show that our protocol has low computational and communication costs while ensuring security.
引用
收藏
页数:19
相关论文
共 50 条
  • [21] Three-Factor User Authentication and Key Agreement Using Elliptic Curve Cryptosystem in Wireless Sensor Networks
    Park, YoHan
    Park, YoungHo
    SENSORS, 2016, 16 (12)
  • [22] Privacy Protection for E-Health Systems by Means of Dynamic Authentication and Three-Factor Key Agreement
    Zhang, Liping
    Zhang, Yixin
    Tang, Shanyu
    Luo, He
    IEEE TRANSACTIONS ON INDUSTRIAL ELECTRONICS, 2018, 65 (03) : 2795 - 2805
  • [23] Enhancing the Security: A Lightweight Authentication and Key Agreement Protocol for Smart Medical Services in the IoHT
    Wu, Tsu-Yang
    Wang, Liyang
    Chen, Chien-Ming
    MATHEMATICS, 2023, 11 (17)
  • [24] A Combined Approach of PUF and Physiological Data for Mutual Authentication and Key Agreement in WMSN
    Rai, Shanvendra
    Paul, Rituparna
    Banerjee, Subhasish
    Meher, Preetisudha
    Sah, Gulab
    JOURNAL OF GRID COMPUTING, 2024, 22 (01)
  • [25] PUFTAP-IoT: PUF-Based Three-Factor Authentication Protocol in IoT Environment Focused on Sensing Devices
    Lee, JoonYoung
    Oh, JiHyeon
    Kwon, DeokKyu
    Kim, MyeongHyun
    Yu, SungJin
    Jho, Nam-Su
    Park, Youngho
    SENSORS, 2022, 22 (18)
  • [26] PUF-Based Authentication and Key Agreement Protocols for IoT, WSNs, and Smart Grids: A Comprehensive Survey
    Mall, Priyanka
    Amin, Ruhul
    Das, Ashok Kumar
    Leung, Mark T.
    Choo, Kim-Kwang Raymond
    IEEE INTERNET OF THINGS JOURNAL, 2022, 9 (11): : 8205 - 8228
  • [27] Secure Three-Factor Authentication Protocol for Multi-Gateway IoT Environments
    Lee, JoonYoung
    Yu, SungJin
    Park, KiSung
    Park, YoHan
    Park, YoungHo
    SENSORS, 2019, 19 (10):
  • [28] Privacy-Preserving Fast Three-Factor Authentication and Key Agreement for IoT-Based E-Health Systems
    Zhang, Liping
    Zhu, Yue
    Ren, Wei
    Zhang, Yixin
    Choo, Kim-Kwang Raymond
    IEEE TRANSACTIONS ON SERVICES COMPUTING, 2023, 16 (02) : 1324 - 1333
  • [29] An efficient multi-gateway-based three-factor user authentication and key agreement scheme in hierarchical wireless sensor networks
    Das, Ashok Kumar
    Sutrala, Anil Kumar
    Kumari, Saru
    Odelu, Vanga
    Wazid, Mohammad
    Li, Xiong
    SECURITY AND COMMUNICATION NETWORKS, 2016, 9 (13) : 2070 - 2092
  • [30] A Lightweight Three-Factor Authentication and Key Agreement Scheme for Multigateway WSNs in IoT
    Xue, Lingyan
    Huang, Qinglong
    Zhang, Shuaiqing
    Huang, Haiping
    Wang, Wenming
    SECURITY AND COMMUNICATION NETWORKS, 2021, 2021