A Security-Enhanced and Ultralightweight Communication Protocol for Internet of Medical Things

被引:5
|
作者
Chen, Chien-Ming [1 ]
Chen, Zhaoting [2 ]
Das, Ashok Kumar [3 ]
Chaudhry, Shehzad Ashraf [4 ,5 ]
机构
[1] Nanjing Univ Informat Sci & Technol, Sch Artificial Intelligence, Nanjing 211544, Peoples R China
[2] Shandong Univ Sci & Technol, Coll Comp Sci & Engn, Qingdao 266590, Peoples R China
[3] Int Inst Informat Technol Hyderabad, Ctr Secur Theory & Algorithm Res, Hyderabad 500032, Telangana, India
[4] Abu Dhabi Univ, Coll Engn, Dept Comp Sci & Informat Technol, Abu Dhabi, U Arab Emirates
[5] Nisantasi Univ, Dept Software Engn, Fac Engn & Architecture, TR-34398 Istanbul, Turkiye
关键词
Protocols; Resists; Authentication; Telemedicine; Servers; Medical services; Computer architecture; cryptography; insider attack; Internet of Medical Things (IoMT); privacy; stolen smartcard; KEY AGREEMENT PROTOCOL; HEALTH-CARE; AUTHENTICATION PROTOCOL; USER AUTHENTICATION; ALGORITHM; SERVICES; EXCHANGE; SCHEMES;
D O I
10.1109/JIOT.2023.3327322
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
With the emergence, development, and maturity of various Internet technologies, the healthcare industry is also trying to integrate with these technologies to provide more convenient healthcare services to patients by establishing telemedicine to develop and continuously improve the public healthcare system. Various protocols were proposed in the recent past to provide attack resistance in addition to computational efficiency; however, several such protocols were proved inefficient or prone to one or more attacks. Some of these protocols lack user anonymity and privacy. Keeping in consideration the flaws of existing protocols, in this article, we propose an efficient and secure protocol based on extremely lightweight symmetric key operations. In addition, we provide formal and informal analyses to demonstrate the protocol's security. Moreover, to measure the efficiency of the proposed protocol, we conducted a real-time experiment, which confirms that the proposed protocol completes an authentication round in 117.1071 ms with an exchange of four messages and 2592 bits among the three participating entities. Finally, by comparing it with other protocols, we show that the proposed protocol has significant security advantages and performance benefits.
引用
收藏
页码:10168 / 10182
页数:15
相关论文
共 50 条
  • [41] Blockchain for the Management of Internet of Things Devices in the Medical Industry
    Akkaoui, Raifa
    IEEE TRANSACTIONS ON ENGINEERING MANAGEMENT, 2023, 70 (08) : 2707 - 2718
  • [42] Enhanced constrained application protocol for secured medical data transmission model for internet of things
    Krishnasamy, Kamalam Gobichettipalayam
    Selvaraj, Anandamurugan
    COMPUTATIONAL INTELLIGENCE, 2021, 37 (03) : 1014 - 1033
  • [43] Designing a Security Framework Based on Hybrid Communication in Internet of Nano Things
    Rana, Aryan
    Prajapat, Sunil
    Kumar, Pankaj
    Gautam, Deepika
    Chen, Chien-Ming
    IEEE INTERNET OF THINGS JOURNAL, 2024, 11 (04): : 7265 - 7284
  • [44] A Security Enhanced Chaotic-Map-Based Authentication Protocol for Internet of Drones
    Mahmood, Khalid
    Ghaffar, Zahid
    Farooq, Muhammad
    Yahya, Khalid
    Das, Ashok Kumar
    Chaudhry, Shehzad Ashraf
    IEEE INTERNET OF THINGS JOURNAL, 2024, 11 (12): : 22301 - 22309
  • [45] An Efficient and Provably Secure Certificateless Protocol for Industrial Internet of Things
    Rafique, Farva
    Obaidat, Mohammad S.
    Mahmood, Khalid
    Ayub, Muhammad Faizan
    Ferzund, Javed
    Chaudhry, Shehzad Ashraf
    IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2022, 18 (11) : 8039 - 8046
  • [46] An Improved Authentication Protocol Using Smart Cards for the Internet of Things
    Cao Shouqi
    Liu Wanrong
    Cao Liling
    He Xin
    Ji Zhiyong
    IEEE ACCESS, 2019, 7 : 157284 - 157292
  • [47] A Novel Cross-Layer Authentication Protocol for the Internet of Things
    Lee, Yonggu
    Yoon, Jiseok
    Choi, Jinho
    Hwang, Euiseok
    IEEE ACCESS, 2020, 8 : 196135 - 196150
  • [48] Security flaws in a recent ultralightweight RFID protocol
    Peris-Lopez P.
    Hernandez-Castro J.C.
    Tapiador J.M.E.
    Van Der Lubbe J.C.A.
    Cryptology and Information Security Series, 2010, 4 : 83 - 94
  • [49] Security and Privacy for the Internet of Medical Things Enabled Healthcare Systems: A Survey
    Sun, Yingnan
    Lo, Frank P-W
    Lo, Benny
    IEEE ACCESS, 2019, 7 : 183339 - 183355
  • [50] Enhancing Internet of Medical Things security with artificial intelligence: A comprehensive review
    Messinis, Sotirios
    Temenos, Nikos
    Protonotarios, Nicholas E.
    Rallis, Ioannis
    Kalogeras, Dimitrios
    Doulamis, Nikolaos
    COMPUTERS IN BIOLOGY AND MEDICINE, 2024, 170