A Multiserver Authentication Protocol With Integrated Monitoring for IoMT-Based Healthcare System

被引:1
作者
Xie, Qi [1 ]
Zhao, Yuanyuan [1 ]
Xie, Qingyun [1 ]
Li, Xiumei [1 ]
He, Debiao [2 ]
Chen, Kefei [1 ]
机构
[1] Hangzhou Normal Univ, Key Lab Cryptog Zhejiang Prov, Hangzhou 311121, Peoples R China
[2] Wuhan Univ, Sch Cyber Sci & Engn, Wuhan 430072, Peoples R China
来源
IEEE INTERNET OF THINGS JOURNAL | 2025年 / 12卷 / 02期
关键词
Authentication; Servers; Security; Protocols; Monitoring; Medical services; Physical unclonable function; Accuracy; Passwords; Long short term memory; Authentication protocol; continuous monitoring; intelligent healthcare system; multiserver authentication; SECURITY; EFFICIENT;
D O I
10.1109/JIOT.2024.3469629
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Internet of Medical Things-based healthcare system (IoMTHS) is a kind of industrial information system that integrates life monitoring, pathological inference and drug therapy. However, the sensitive nature and high value of its data make it a prime target for cyberattacks. Although many multiserver authentication protocols have been studied in recent years to ensure that only authorized users can access medical services, new vulnerabilities are always identified and covertly utilized by the smarter adversary due to lack of continuous monitoring and dynamic authentication, reducing the trustworthiness of IoMTHS. To address above challenges, in this article, we propose a multiserver authentication scheme with integrated monitoring (MAIM) for IoMTHS, which achieves user locked access control by strictly and continuously binding system access permissions and user behavior. MAIM consists of a three-factor-based static authentication (TFSA) and a deep learning-based continuous authentication (DLCA). TFSA utilizes double-anonymity strategy to protect users' privacy and track their malicious behaviors, and uses physical unclonable function (PUF) to protect the security of privacy information in users' devices and servers, which achieves lightweight and three-factor secrecy. The DLCA trains a deep neural network to recognize the legitimacy of users based on the user behavior transmitted by their sensing devices. TFSA is provably secure under the random oracle model, whereas DLCA exhibits high feasibility with experimental accuracy reaching 100%.
引用
收藏
页码:2265 / 2278
页数:14
相关论文
共 28 条
  • [1] A Secure Three-Factor Authentication Protocol for E-Governance System Based on Multiserver Environments
    Cho, Yeongjae
    Oh, Jihyeon
    Kwon, Deokkyu
    Son, Seunghwan
    Yu, Sungjin
    Park, Yohan
    Park, Youngho
    [J]. IEEE ACCESS, 2022, 10 : 74351 - 74365
  • [2] Securing IoT-Based Smart Healthcare Systems by Using Advanced Lightweight Privacy-Preserving Authentication Scheme
    Das, Sangjukta
    Namasudra, Suyel
    Deb, Suman
    Moreno Ger, Pablo
    Gonzalez Crespo, Ruben
    [J]. IEEE INTERNET OF THINGS JOURNAL, 2023, 10 (21) : 18486 - 18494
  • [3] Dodis Y, 2004, LECT NOTES COMPUT SC, V3027, P523
  • [4] ON THE SECURITY OF PUBLIC KEY PROTOCOLS
    DOLEV, D
    YAO, AC
    [J]. IEEE TRANSACTIONS ON INFORMATION THEORY, 1983, 29 (02) : 198 - 208
  • [5] Touchalytics: On the Applicability of Touchscreen Input as a Behavioral Biometric for Continuous Authentication
    Frank, Mario
    Biedert, Ralf
    Ma, Eugene
    Martinovic, Ivan
    Song, Dawn
    [J]. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2013, 8 (01) : 136 - 148
  • [6] LSTM: A Search Space Odyssey
    Greff, Klaus
    Srivastava, Rupesh K.
    Koutnik, Jan
    Steunebrink, Bas R.
    Schmidhuber, Juergen
    [J]. IEEE TRANSACTIONS ON NEURAL NETWORKS AND LEARNING SYSTEMS, 2017, 28 (10) : 2222 - 2232
  • [7] Efficient and Anonymous Mobile User Authentication Protocol Using Self-Certified Public Key Cryptography for Multi-Server Architectures
    He, Debiao
    Zeadally, Sherali
    Kumar, Neeraj
    Wu, Wei
    [J]. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2016, 11 (09) : 2052 - 2064
  • [8] An efficient and anonymous multi-server authenticated key agreement based on chaotic map without engaging Registration Centre
    Irshad, Azeem
    Sher, Muhammad
    Chaudhary, Shehzad Ashraf
    Naqvi, Husnain
    Farash, Mohammad Sabzinejad
    [J]. JOURNAL OF SUPERCOMPUTING, 2016, 72 (04) : 1623 - 1644
  • [9] A remote password authentication scheme for multiserver architecture using neural networks
    Li, LH
    Lin, IC
    Hwang, MS
    [J]. IEEE TRANSACTIONS ON NEURAL NETWORKS, 2001, 12 (06): : 1498 - 1504
  • [10] A Robust Physical Unclonable Function With Enhanced Challenge-Response Set
    Maiti, Abhranil
    Kim, Inyoung
    Schaumont, Patrick
    [J]. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2012, 7 (01) : 333 - 345