Design and Testbed Experiments of User Authentication and Key Establishment Mechanism for Smart Healthcare Cyber Physical Systems

被引:12
作者
Wazid, Mohammad [1 ]
Thapliyal, Siddhant [1 ]
Singh, Devesh Pratap [1 ]
Das, Ashok Kumar [2 ]
Shetty, Sachin [3 ]
机构
[1] Graph Era Deemed Univ, Dept Comp Sci & Engn, Dehra Dun 248002, India
[2] Int Inst Informat Technol, Ctr Secur Theory & Algorithm Res, Hyderabad 500032, India
[3] Old Dominion Univ, Dept Computat Modeling & Simulat Engn, Virginia Modeling Anal & Simulat Ctr, Suffolk, VA 23435 USA
来源
IEEE TRANSACTIONS ON NETWORK SCIENCE AND ENGINEERING | 2023年 / 10卷 / 05期
关键词
Medical services; Security; Authentication; Computational modeling; Servers; Protocols; Costs; Smart healthcare; authentication; key agreement; security; testbed implementation; PROTOCOL; SECURITY; INTERNET; SCHEMES; STORAGE;
D O I
10.1109/TNSE.2022.3163201
中图分类号
T [工业技术];
学科分类号
08 ;
摘要
Smart healthcare technologies transform the traditional healthcare system in all possible ways. Smart healthcare has enormous number of benefits over the traditional system. However, at the same time, it also suffers from some healthcare data security and privacy related issues as the potential Internet attackers may get access to the sensitive healthcare through the deployment of various kinds of attacks. To mitigate these issues, in this paper, a new lightweight remote user authentication and key establishment scheme (in short, UAKM-SH) has been proposed by making the use of lightweight cryptographic operations. The security analysis of UAKM-SH is conducted to prove its robustness against various possible attacks. A detailed comparative study among the proposed UAKM-SH and other existing schemes shows that UAKM-SH performs better in terms of computation cost, communication cost, and the offerered security and functionality features. Finally, the testbed implementation of UAKM-SH is given to observe its behaviour in the real time scenario.
引用
收藏
页码:2697 / 2709
页数:13
相关论文
共 29 条
[1]  
Abadi M, 2009, LECT NOTES COMPUT SC, V5643, P35, DOI 10.1007/978-3-642-02658-4_5
[2]   HARCI: A Two-Way Authentication Protocol for Three Entity Healthcare IoT Networks [J].
Alladi, Tejasvi ;
Chamola, Vinay ;
Naren .
IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, 2021, 39 (02) :361-369
[3]   SecSVA: Secure Storage, Verification, and Auditing of Big Data in the Cloud Environment [J].
Aujla, Gagangeet Singh ;
Chaudhary, Rajat ;
Kumar, Neeraj ;
Das, Ashok Kumar ;
Rodrigues, Joel J. P. C. .
IEEE COMMUNICATIONS MAGAZINE, 2018, 56 (01) :78-85
[4]  
AVISPA, 2021, Automated validation of internet security protocols and applications, DOI [10.1007/11513988_27, DOI 10.1007/11513988_27]
[5]   Logic of authentication [J].
Burrows, Michael ;
Abadi, Martin ;
Needham, Roger .
Operating Systems Review (ACM), 1989, 23 (05) :1-13
[6]  
Canetti R, 2001, LECT NOTES COMPUT SC, V2045, P453
[7]   A Provable Secure Private Data Delegation Scheme for Mountaineering Events in Emergency System [J].
Chen, Chien-Ming ;
Li, Chun-Ta ;
Liu, Shuai ;
Wu, Tsu-Yang ;
Pan, Jeng-Shyang .
IEEE ACCESS, 2017, 5 :3410-3422
[8]   Provably Secure ECC-Based Device Access Control and Key Agreement Protocol for IoT Environment [J].
Das, Ashok Kumar ;
Wazid, Mohammad ;
Yannam, Animi Reddy ;
Rodrigues, Joel J. P. C. ;
Park, Youngho .
IEEE ACCESS, 2019, 7 :55382-55397
[9]   An Improved and Effective Secure Password-Based Authentication and Key Agreement Scheme Using Smart Cards for the Telecare Medicine Information System [J].
Das, Ashok Kumar ;
Bruhadeshwar, Bezawada .
JOURNAL OF MEDICAL SYSTEMS, 2013, 37 (05)
[10]   Smart Mutual Authentication Protocol for Cloud Based Medical Healthcare Systems Using Internet of Medical Things [J].
Deebak, B. D. ;
Al-Turjman, Fadi .
IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, 2021, 39 (02) :346-360