A Security-Enhanced and Ultralightweight Communication Protocol for Internet of Medical Things

被引:5
|
作者
Chen, Chien-Ming [1 ]
Chen, Zhaoting [2 ]
Das, Ashok Kumar [3 ]
Chaudhry, Shehzad Ashraf [4 ,5 ]
机构
[1] Nanjing Univ Informat Sci & Technol, Sch Artificial Intelligence, Nanjing 211544, Peoples R China
[2] Shandong Univ Sci & Technol, Coll Comp Sci & Engn, Qingdao 266590, Peoples R China
[3] Int Inst Informat Technol Hyderabad, Ctr Secur Theory & Algorithm Res, Hyderabad 500032, Telangana, India
[4] Abu Dhabi Univ, Coll Engn, Dept Comp Sci & Informat Technol, Abu Dhabi, U Arab Emirates
[5] Nisantasi Univ, Dept Software Engn, Fac Engn & Architecture, TR-34398 Istanbul, Turkiye
关键词
Protocols; Resists; Authentication; Telemedicine; Servers; Medical services; Computer architecture; cryptography; insider attack; Internet of Medical Things (IoMT); privacy; stolen smartcard; KEY AGREEMENT PROTOCOL; HEALTH-CARE; AUTHENTICATION PROTOCOL; USER AUTHENTICATION; ALGORITHM; SERVICES; EXCHANGE; SCHEMES;
D O I
10.1109/JIOT.2023.3327322
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
With the emergence, development, and maturity of various Internet technologies, the healthcare industry is also trying to integrate with these technologies to provide more convenient healthcare services to patients by establishing telemedicine to develop and continuously improve the public healthcare system. Various protocols were proposed in the recent past to provide attack resistance in addition to computational efficiency; however, several such protocols were proved inefficient or prone to one or more attacks. Some of these protocols lack user anonymity and privacy. Keeping in consideration the flaws of existing protocols, in this article, we propose an efficient and secure protocol based on extremely lightweight symmetric key operations. In addition, we provide formal and informal analyses to demonstrate the protocol's security. Moreover, to measure the efficiency of the proposed protocol, we conducted a real-time experiment, which confirms that the proposed protocol completes an authentication round in 117.1071 ms with an exchange of four messages and 2592 bits among the three participating entities. Finally, by comparing it with other protocols, we show that the proposed protocol has significant security advantages and performance benefits.
引用
收藏
页码:10168 / 10182
页数:15
相关论文
共 50 条
  • [21] An Authentication Protocol for the Medical Internet of Things
    El-Meniawy, Nagwa
    Rizk, Mohamed R. M.
    Ahmed, Magdy A.
    Saleh, Mohamed
    SYMMETRY-BASEL, 2022, 14 (07):
  • [22] Cyber Security for Personal Medical Devices Internet of Things
    Mohan, Apurva
    2014 IEEE INTERNATIONAL CONFERENCE ON DISTRIBUTED COMPUTING IN SENSOR SYSTEMS (IEEE DCOSS 2014), 2014, : 372 - 374
  • [23] Security in Internet of Things: A Review
    Khan, Naqash Azeem
    Awang, Azlan
    Karim, Samsul Ariffin Abdul
    IEEE ACCESS, 2022, 10 : 104649 - 104670
  • [24] A security-enhanced key agreement protocol based on chaotic maps
    Chen, Tzung-Her
    Wang, Bing-Jian
    Tu, Tai-Yuan
    Wang, Chih-Hung
    SECURITY AND COMMUNICATION NETWORKS, 2013, 6 (01) : 108 - 114
  • [25] Scalable RFID security framework and protocol supporting Internet of Things
    Ray, Biplob R.
    Abawajy, Jemal
    Chowdhury, Morshed
    COMPUTER NETWORKS, 2014, 67 : 89 - 103
  • [26] On the Security of Chien's Ultralightweight RFID Authentication Protocol
    Sun, Hung-Min
    Ting, Wei-Chih
    Wang, King-Hang
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2011, 8 (02) : 315 - 317
  • [27] A Lightweight Mutual Authentication Protocol for V2V Communication in Internet of Vehicles
    Vasudev, Harsha
    Deshpande, Varad
    Das, Debasis
    Das, Sajal K.
    IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2020, 69 (06) : 6709 - 6717
  • [28] A provably secure RFID authentication protocol based on ECQV for the medical internet of things
    Abhay Kumar Agrahari
    Shirshu Varma
    Peer-to-Peer Networking and Applications, 2021, 14 : 1277 - 1289
  • [29] A provably secure RFID authentication protocol based on ECQV for the medical internet of things
    Agrahari, Abhay Kumar
    Varma, Shirshu
    PEER-TO-PEER NETWORKING AND APPLICATIONS, 2021, 14 (03) : 1277 - 1289
  • [30] Security and Privacy in the Internet of Medical Things: Taxonomy and Risk Assessment
    Alsubaei, Faisal
    Shiva, Sajjan
    Abuhussein, Abdullah
    2017 IEEE 42ND CONFERENCE ON LOCAL COMPUTER NETWORKS WORKSHOPS (LCN WORKSHOPS 2017), 2017, : 112 - 120