A Security-Enhanced and Ultralightweight Communication Protocol for Internet of Medical Things

被引:5
|
作者
Chen, Chien-Ming [1 ]
Chen, Zhaoting [2 ]
Das, Ashok Kumar [3 ]
Chaudhry, Shehzad Ashraf [4 ,5 ]
机构
[1] Nanjing Univ Informat Sci & Technol, Sch Artificial Intelligence, Nanjing 211544, Peoples R China
[2] Shandong Univ Sci & Technol, Coll Comp Sci & Engn, Qingdao 266590, Peoples R China
[3] Int Inst Informat Technol Hyderabad, Ctr Secur Theory & Algorithm Res, Hyderabad 500032, Telangana, India
[4] Abu Dhabi Univ, Coll Engn, Dept Comp Sci & Informat Technol, Abu Dhabi, U Arab Emirates
[5] Nisantasi Univ, Dept Software Engn, Fac Engn & Architecture, TR-34398 Istanbul, Turkiye
关键词
Protocols; Resists; Authentication; Telemedicine; Servers; Medical services; Computer architecture; cryptography; insider attack; Internet of Medical Things (IoMT); privacy; stolen smartcard; KEY AGREEMENT PROTOCOL; HEALTH-CARE; AUTHENTICATION PROTOCOL; USER AUTHENTICATION; ALGORITHM; SERVICES; EXCHANGE; SCHEMES;
D O I
10.1109/JIOT.2023.3327322
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
With the emergence, development, and maturity of various Internet technologies, the healthcare industry is also trying to integrate with these technologies to provide more convenient healthcare services to patients by establishing telemedicine to develop and continuously improve the public healthcare system. Various protocols were proposed in the recent past to provide attack resistance in addition to computational efficiency; however, several such protocols were proved inefficient or prone to one or more attacks. Some of these protocols lack user anonymity and privacy. Keeping in consideration the flaws of existing protocols, in this article, we propose an efficient and secure protocol based on extremely lightweight symmetric key operations. In addition, we provide formal and informal analyses to demonstrate the protocol's security. Moreover, to measure the efficiency of the proposed protocol, we conducted a real-time experiment, which confirms that the proposed protocol completes an authentication round in 117.1071 ms with an exchange of four messages and 2592 bits among the three participating entities. Finally, by comparing it with other protocols, we show that the proposed protocol has significant security advantages and performance benefits.
引用
收藏
页码:10168 / 10182
页数:15
相关论文
共 50 条
  • [1] A Security-Enhanced Interoperability Middleware for the Internet of Things
    Sandor, Hunor
    Genge, Bela
    Haller, Piroska
    Bica, Andrei
    2019 7TH INTERNATIONAL SYMPOSIUM ON DIGITAL FORENSICS AND SECURITY (ISDFS), 2019,
  • [2] Security-enhanced Search Engine Design in Internet of Things
    Qian, Xiaojun
    Che, Xiaoping
    JOURNAL OF UNIVERSAL COMPUTER SCIENCE, 2012, 18 (09) : 1218 - 1235
  • [3] Proposing and verifying a security-enhanced protocol for IoT-based communication for medical devices
    Kun-Hee Han
    Woo-Sik Bae
    Cluster Computing, 2016, 19 : 2335 - 2341
  • [4] Proposing and verifying a security-enhanced protocol for IoT-based communication for medical devices
    Han, Kun-Hee
    Bae, Woo-Sik
    CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2016, 19 (04): : 2335 - 2341
  • [5] Internet of Things: A Survey on Communication Protocol Security
    Santo, Walter E.
    Salgueiro, Ricardo J. P. de B.
    Santos, Reneilson
    Souza, Danilo
    Ribeiro, Admilson
    Moreno, Edward
    PROCEEDINGS OF THE EURO AMERICAN CONFERENCE ON TELEMATICS AND INFORMATION SYSTEMS (EATIS '18), 2018,
  • [6] Popular Matching for Security-Enhanced Resource Allocation in Social Internet of Flying Things
    Wang, Bowen
    Sun, Yanjing
    Duong, Trung Q.
    Nguyen, Long D.
    Zhao, Nan
    IEEE TRANSACTIONS ON COMMUNICATIONS, 2020, 68 (08) : 5087 - 5101
  • [7] Passive secret disclosure attack on an ultralightweight authentication protocol for Internet of Things
    Masoumeh Safkhani
    Nasour Bagheri
    The Journal of Supercomputing, 2017, 73 : 3579 - 3585
  • [8] A decentralized and security-enhanced professional title evaluation system in universities under mobile Internet of Things
    Miao, Miao
    Jing, Zhengjun
    Xu, Xiaolong
    Xue, Meiqing
    HELIYON, 2024, 10 (05)
  • [9] Security-Enhanced Operational Architecture for Decentralized Industrial Internet of Things: A Blockchain-Based Approach
    Yao, Pengchao
    Yan, Bingjing
    Yang, Tao
    Wang, Yubin
    Yang, Qiang
    Wang, Wenhai
    IEEE INTERNET OF THINGS JOURNAL, 2024, 11 (06) : 11073 - 11086
  • [10] Passive secret disclosure attack on an ultralightweight authentication protocol for Internet of Things
    Safkhani, Masoumeh
    Bagheri, Nasour
    JOURNAL OF SUPERCOMPUTING, 2017, 73 (08): : 3579 - 3585