A Security-Enhanced and Ultralightweight Communication Protocol for Internet of Medical Things

被引:11
作者
Chen, Chien-Ming [1 ]
Chen, Zhaoting [2 ]
Das, Ashok Kumar [3 ]
Chaudhry, Shehzad Ashraf [4 ,5 ]
机构
[1] Nanjing Univ Informat Sci & Technol, Sch Artificial Intelligence, Nanjing 211544, Peoples R China
[2] Shandong Univ Sci & Technol, Coll Comp Sci & Engn, Qingdao 266590, Peoples R China
[3] Int Inst Informat Technol Hyderabad, Ctr Secur Theory & Algorithm Res, Hyderabad 500032, Telangana, India
[4] Abu Dhabi Univ, Coll Engn, Dept Comp Sci & Informat Technol, Abu Dhabi, U Arab Emirates
[5] Nisantasi Univ, Dept Software Engn, Fac Engn & Architecture, TR-34398 Istanbul, Turkiye
关键词
Protocols; Resists; Authentication; Telemedicine; Servers; Medical services; Computer architecture; cryptography; insider attack; Internet of Medical Things (IoMT); privacy; stolen smartcard; KEY AGREEMENT PROTOCOL; HEALTH-CARE; AUTHENTICATION PROTOCOL; USER AUTHENTICATION; ALGORITHM; SERVICES; EXCHANGE; SCHEMES;
D O I
10.1109/JIOT.2023.3327322
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
With the emergence, development, and maturity of various Internet technologies, the healthcare industry is also trying to integrate with these technologies to provide more convenient healthcare services to patients by establishing telemedicine to develop and continuously improve the public healthcare system. Various protocols were proposed in the recent past to provide attack resistance in addition to computational efficiency; however, several such protocols were proved inefficient or prone to one or more attacks. Some of these protocols lack user anonymity and privacy. Keeping in consideration the flaws of existing protocols, in this article, we propose an efficient and secure protocol based on extremely lightweight symmetric key operations. In addition, we provide formal and informal analyses to demonstrate the protocol's security. Moreover, to measure the efficiency of the proposed protocol, we conducted a real-time experiment, which confirms that the proposed protocol completes an authentication round in 117.1071 ms with an exchange of four messages and 2592 bits among the three participating entities. Finally, by comparing it with other protocols, we show that the proposed protocol has significant security advantages and performance benefits.
引用
收藏
页码:10168 / 10182
页数:15
相关论文
共 55 条
[1]  
Abdalla M, 2005, LECT NOTES COMPUT SC, V3386, P65
[2]   LACO: Lightweight Three-Factor Authentication, Access Control and Ownership Transfer Scheme for E-Health Systems in IoT [J].
Aghili, Seyed Farhad ;
Mala, Hamid ;
Shojafar, Mohammad ;
Peris-Lopez, Pedro .
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2019, 96 :410-424
[3]   An enhanced three factor based authentication protocol using wireless medical sensor networks for healthcare monitoring [J].
Ali R. ;
Pal A.K. ;
Kumari S. ;
Sangaiah A.K. ;
Li X. ;
Wu F. .
Journal of Ambient Intelligence and Humanized Computing, 2024, 15 (01) :1165-1186
[4]   A robust and anonymous patient monitoring system using wireless medical sensor networks [J].
Amin, Ruhul ;
Islam, S. K. Hafizul ;
Biswas, G. P. ;
Khan, Muhammad Khurram ;
Kumar, Neeraj .
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2018, 80 :483-495
[5]   Authentication Schemes for Healthcare Applications Using Wireless Medical Sensor Networks: A Survey [J].
Bahache A.N. ;
Chikouche N. ;
Mezrag F. .
SN Computer Science, 3 (5)
[6]   Highly Efficient Bidirectional Multifactor Authentication and Key Agreement for Real-Time Access to Sensor Data [J].
Braeken, An .
IEEE INTERNET OF THINGS JOURNAL, 2023, 10 (23) :21089-21099
[7]  
Canetti R, 2002, LECT NOTES COMPUT SC, V2332, P337
[8]   An efficient ECC-based provably secure three-factor user authentication and key agreement protocol for wireless healthcare sensor networks [J].
Challa, Sravani ;
Das, Ashok Kumar ;
Odelu, Vanga ;
Kumar, Neeraj ;
Kumari, Saru ;
Khan, Muhammad Khurram ;
Vasilakos, Athanasios V. .
COMPUTERS & ELECTRICAL ENGINEERING, 2018, 69 :534-554
[9]   An anonymous device to device access control based on secure certificate for internet of medical things systems [J].
Chaudhry, Shehzad Ashraf ;
Irshad, Azeem ;
Nebhen, Jamel ;
Bashir, Ali Kashif ;
Moustafa, Nour ;
Al-Otaibi, Yasser D. ;
Bin Zikria, Yousaf .
SUSTAINABLE CITIES AND SOCIETY, 2021, 75
[10]   Rotating behind Privacy: An Improved Lightweight Authentication Scheme for Cloud-based IoT Environment [J].
Chaudhry, Shehzad Ashraf ;
Irshad, Azeem ;
Yahya, Khalid ;
Kumar, Neeraj ;
Alazab, Mamoun ;
Bin Zikria, Yousaf .
ACM TRANSACTIONS ON INTERNET TECHNOLOGY, 2021, 21 (03)