An enhanced three-factor based authentication and key agreement protocol using PUF in IoMT

被引:0
作者
Wu, Tsu-Yang [1 ,2 ]
Wu, Haozhi [2 ]
Kumari, Saru [3 ]
Chen, Chien-Ming [1 ]
机构
[1] Nanjing Univ Informat Sci & Technol, Sch Artificial Intelligence, Nanjing 210044, Jiangsu, Peoples R China
[2] Shandong Univ Sci & Technol, Coll Comp Sci & Engn, Qingdao 266590, Shandong, Peoples R China
[3] Chaudhary Charan Singh Univ, Dept Math, Meerut 250004, Uttar Pradesh, India
关键词
Authentication; IoMT; PUF; Cryptanalysis; ANONYMOUS USER AUTHENTICATION; PROVABLY SECURE; MUTUAL AUTHENTICATION; EFFICIENT; SCHEME; LIGHTWEIGHT;
D O I
10.1007/s12083-024-01839-z
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
With the rapid development of Internet of Things (IoT) technology, Internet of Medical Things (IoMT) plays a huge important role in improving the quality of healthcare services. By using IoMT, doctors are able to remotely monitor real-time physiological information of patients automatically, thereby alleviating their burden. This approach is not only considered more efficient and cost-effective, but also provides support from medical experts for emergency treatment of patients. However, as these health data contain sensitive information related to patient privacy, any leakage or malicious tampering of information can lead to incorrect diagnosis by doctors, seriously endangering patient health. Therefore, ensuring the security of patients' health data has become particularly important. In 2023, Kim et al. proposed an improved lightweight user authentication protocol for IoMT. Unfortunately, we found that this protocol is vulnerable to security threats such as user device capture attacks, man-in-the-middle attacks. In response to the above security problems, we propose an enhanced three-factor based authentication and key agreement protocol. The protocol enhances security by utilizing both strong physical unclonable functions (PUF) and weak PUF. In terms of protocol security, we verify its properties using Real-or-Random (ROR) model, informal analysis, and AVISPA tool. Finally, this paper is compared with seven other protocols. We analyzed the security, computational cost, and communication cost of each scheme. The results show that our protocol has low computational and communication costs while ensuring security.
引用
收藏
页数:19
相关论文
共 50 条
  • [41] A Security-Enhanced Authentication and Key Agreement Protocol in Smart Grid
    Wu, Yapeng
    Guo, Hua
    Han, Yiran
    Li, Sijia
    Liu, Jianwei
    IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2024, 20 (09) : 11449 - 11457
  • [42] Enhanced Two-Factor Authentication and Key Agreement Using Dynamic Identities in Wireless Sensor Networks
    Chang, I-Pin
    Lee, Tian-Fu
    Lin, Tsung-Hung
    Liu, Chuan-Ming
    SENSORS, 2015, 15 (12) : 29841 - 29854
  • [43] A secure three-factor-based authentication with key agreement protocol for e-Health clouds
    Chen, Yulei
    Chen, Jianhua
    JOURNAL OF SUPERCOMPUTING, 2021, 77 (04) : 3359 - 3380
  • [44] An Improved Secure Remote Login Protocol with Three-Factor Authentication
    Tiwari, Minu
    Panda, Soumyashree S.
    Biswas, G. P.
    2016 3rd International Conference on Recent Advances in Information Technology (RAIT), 2016, : 365 - 371
  • [45] A Physically Secure, Lightweight Three-Factor and Anonymous User Authentication Protocol for IoT
    Liu, Zhenhua
    Guo, Changbo
    Wang, Baocang
    IEEE ACCESS, 2020, 8 : 195914 - 195928
  • [46] PUF based Lightweight Authentication and Key Exchange Protocol for IoT
    Roy, Sourav
    Das, Dipnarayan
    Mondal, Anindan
    Mahalat, Mahabub Hasan
    Roy, Suchismita
    Sen, Bibhash
    SECRYPT 2021: PROCEEDINGS OF THE 18TH INTERNATIONAL CONFERENCE ON SECURITY AND CRYPTOGRAPHY, 2021, : 698 - 703
  • [47] A privacy preserving three-factor authentication protocol for e-Health clouds
    Jiang, Qi
    Khan, Muhammad Khurram
    Lu, Xiang
    Ma, Jianfeng
    He, Debiao
    JOURNAL OF SUPERCOMPUTING, 2016, 72 (10) : 3826 - 3849
  • [48] PLGAKD: A PUF-Based Lightweight Group Authentication and Key Distribution Protocol
    Yildiz, Husnu
    Cenk, Murat
    Onur, Ertan
    IEEE INTERNET OF THINGS JOURNAL, 2021, 8 (07): : 5682 - 5696
  • [49] A Provably Secure Three-Factor Authentication Protocol Based on Chebyshev Chaotic Mapping for Wireless Sensor Network
    Mo, Jiaqing
    Hu, Zhongwang
    Shen, Wei
    IEEE ACCESS, 2022, 10 : 12137 - 12152
  • [50] Unified Biometric Privacy Preserving Three-Factor Authentication and Key Agreement for Cloud-Assisted Autonomous Vehicles
    Jiang, Qi
    Zhang, Ning
    Ni, Jianbing
    Ma, Jianfeng
    Ma, Xindi
    Choo, Kim-Kwang Raymond
    IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2020, 69 (09) : 9390 - 9401