A Security-Enhanced and Ultralightweight Communication Protocol for Internet of Medical Things

被引:5
|
作者
Chen, Chien-Ming [1 ]
Chen, Zhaoting [2 ]
Das, Ashok Kumar [3 ]
Chaudhry, Shehzad Ashraf [4 ,5 ]
机构
[1] Nanjing Univ Informat Sci & Technol, Sch Artificial Intelligence, Nanjing 211544, Peoples R China
[2] Shandong Univ Sci & Technol, Coll Comp Sci & Engn, Qingdao 266590, Peoples R China
[3] Int Inst Informat Technol Hyderabad, Ctr Secur Theory & Algorithm Res, Hyderabad 500032, Telangana, India
[4] Abu Dhabi Univ, Coll Engn, Dept Comp Sci & Informat Technol, Abu Dhabi, U Arab Emirates
[5] Nisantasi Univ, Dept Software Engn, Fac Engn & Architecture, TR-34398 Istanbul, Turkiye
关键词
Protocols; Resists; Authentication; Telemedicine; Servers; Medical services; Computer architecture; cryptography; insider attack; Internet of Medical Things (IoMT); privacy; stolen smartcard; KEY AGREEMENT PROTOCOL; HEALTH-CARE; AUTHENTICATION PROTOCOL; USER AUTHENTICATION; ALGORITHM; SERVICES; EXCHANGE; SCHEMES;
D O I
10.1109/JIOT.2023.3327322
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
With the emergence, development, and maturity of various Internet technologies, the healthcare industry is also trying to integrate with these technologies to provide more convenient healthcare services to patients by establishing telemedicine to develop and continuously improve the public healthcare system. Various protocols were proposed in the recent past to provide attack resistance in addition to computational efficiency; however, several such protocols were proved inefficient or prone to one or more attacks. Some of these protocols lack user anonymity and privacy. Keeping in consideration the flaws of existing protocols, in this article, we propose an efficient and secure protocol based on extremely lightweight symmetric key operations. In addition, we provide formal and informal analyses to demonstrate the protocol's security. Moreover, to measure the efficiency of the proposed protocol, we conducted a real-time experiment, which confirms that the proposed protocol completes an authentication round in 117.1071 ms with an exchange of four messages and 2592 bits among the three participating entities. Finally, by comparing it with other protocols, we show that the proposed protocol has significant security advantages and performance benefits.
引用
收藏
页码:10168 / 10182
页数:15
相关论文
共 50 条
  • [31] Ontology-Based Security Recommendation for the Internet of Medical Things
    Alsubaei, Faisal
    Abuhussein, Abdullah
    Shiva, Sajjan
    IEEE ACCESS, 2019, 7 : 48948 - 48960
  • [32] Security and Privacy of Medical Internet of Things Devices for Smart Homes
    Harvey, Paige
    Toutsop, Otily
    Kornegay, Kevin
    Alale, Excel
    Reaves, Don
    2020 7TH INTERNATIONAL CONFERENCE ON INTERNET OF THINGS: SYSTEMS, MANAGEMENT AND SECURITY (IOTSMS), 2020,
  • [33] Mutual Authentication Scheme for the Device-to-Server Communication in the Internet of Medical Things
    Sun, Jiangfeng
    Khan, Fazlullah
    Li, Junxia
    Alshehri, Mohammad Dahman
    Alturki, Ryan
    Wedyan, Mohammad
    IEEE INTERNET OF THINGS JOURNAL, 2021, 8 (21) : 15663 - 15671
  • [34] Internet of Things Security
    Chahid, Yassine
    Benabdellah, Mohamed
    Azizi, Abdelmalek
    2017 INTERNATIONAL CONFERENCE ON WIRELESS TECHNOLOGIES, EMBEDDED AND INTELLIGENT SYSTEMS (WITS), 2017,
  • [35] SecIoT: a security framework for the Internet of Things
    Huang, Xin
    Craig, Paul
    Lin, Hangyu
    Yan, Zheng
    SECURITY AND COMMUNICATION NETWORKS, 2016, 9 (16) : 3083 - 3094
  • [36] Cryptanalysis of ultralightweight mutual authentication protocol for radio frequency identification enabled Internet of Things networks
    Khalid, Madiha
    Mujahid, Umar
    Najam-ul-Islam, Muhammad
    INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS, 2018, 14 (08):
  • [37] Towards a Secure and Sustainable Internet of Medical Things (IoMT): Requirements, Design Challenges, Security Techniques, and Future Trends
    Bhushan, Bharat
    Kumar, Avinash
    Agarwal, Ambuj Kumar
    Kumar, Amit
    Bhattacharya, Pronaya
    Kumar, Arun
    SUSTAINABILITY, 2023, 15 (07)
  • [38] Patient-Centric Token-Based Healthcare Blockchain Implementation Using Secure Internet of Medical Things
    Dewangan, Narendra K.
    Chandrakar, Preeti
    IEEE TRANSACTIONS ON COMPUTATIONAL SOCIAL SYSTEMS, 2023, 10 (06) : 3109 - 3119
  • [39] A Security-Enhanced Image Communication Scheme Using Cellular Neural Network
    Wen, Heping
    Xu, Jiajun
    Liao, Yunlong
    Chen, Ruiting
    Shen, Danze
    Wen, Lifei
    Shi, Yulin
    Lin, Qin
    Liang, Zhonghao
    Zhang, Sihang
    Liu, Yuxuan
    Huo, Ailin
    Li, Tong
    Cai, Chang
    Wen, Jiaqian
    Zhang, Chongfu
    ENTROPY, 2021, 23 (08)
  • [40] Energy-efficient mechanisms in security of the internet of things: A survey
    Hellaoui, Hamed
    Koudil, Mouloud
    Bouabdallah, Abdelmadjid
    COMPUTER NETWORKS, 2017, 127 : 173 - 189