Lightweight Two-Factor-Based User Authentication Protocol for IoT-Enabled Healthcare Ecosystem in Quantum Computing

被引:19
作者
Al-saggaf, Alawi A. [1 ]
Sheltami, Tarek [2 ]
Alkhzaimi, Hoda [3 ]
Ahmed, Gamil [2 ]
机构
[1] KFUPM, Math Sci Dept DCC, Interdisciplinary Res Ctr Intelligent Secure Syst, Dhahran 31261, Saudi Arabia
[2] KFUPM, Comp Engn Dept, Interdisciplinary Res Ctr Smart Mobil & Logist, Dhahran 31261, Saudi Arabia
[3] New York Univ Abu Dhabi, Ctr Cyber Secur & Interdisciplinary Studies, Abu Dhabi, U Arab Emirates
关键词
Internet of Things; IoT-enabled healthcare; Post-quantum cryptography; User authentication; Biometric; Lightweight authentication protocols;
D O I
10.1007/s13369-022-07235-0
中图分类号
O [数理科学和化学]; P [天文学、地球科学]; Q [生物科学]; N [自然科学总论];
学科分类号
07 ; 0710 ; 09 ;
摘要
The healthcare ecosystem is migrating from legacy systems to the Internet of Things (IoT), resulting in a digital environment. This transformation has increased importance on demanding both secure and usable user authentication methods. Recently, a post-quantum fuzzy commitment scheme (PQFC) has been constructed as a reliable and efficient method of biometric template protection. This paper presents a new two-factor-based user authentication protocol for the IoT-enabled healthcare ecosystem in post-quantum computing environments using the PQFC scheme. The proposed protocol is proved to be secure using random oracle model. Furthermore, the functionality and security of the proposed protocol are analyzed, showing that memoryless-effortless, user anonymity, mutual authentication, and resistance to biometric templates tampering and stolen attacks, stolen smart card attack, privileged interior attack are fulfilled. The costs of storage requirement, computation, communication and storage are estimated. The results demonstrate that the proposed protocol is more efficient than Mukherjee et al., Chaudhary et al., and Gupta et al. protocols.
引用
收藏
页码:2347 / 2357
页数:11
相关论文
共 38 条
  • [1] Ajtai M., 1996, Proceedings of the Twenty-Eighth Annual ACM Symposium on the Theory of Computing, P99, DOI 10.1145/237814.237838
  • [2] A Post-Quantum Fuzzy Commitment Scheme for Biometric Template Protection: An Experimental Study
    Al-Saggaf, Alawi A.
    [J]. IEEE ACCESS, 2021, 9 (09): : 110952 - 110961
  • [3] Al-Saggaf AA, 2018, J UNIVERS COMPUT SCI, V24, P341
  • [4] A Framework for Ranking IoMT Solutions Based on Measuring Security and Privacy
    Alsubaei, Faisal
    Abuhussein, Abdullah
    Shiva, Sajjan
    [J]. PROCEEDINGS OF THE FUTURE TECHNOLOGIES CONFERENCE (FTC) 2018, VOL 1, 2019, 880 : 205 - 224
  • [5] Post-Quantum Cryptosystems for Internet-of-Things: A Survey on Lattice-Based Algorithms
    Asif, Rameez
    [J]. IOT, 2021, 2 (01): : 71 - 91
  • [6] Putting the Passe Into Passwords: How Passwordless Technologies Are Reshaping Digital Identity
    Campbell, Mark
    [J]. COMPUTER, 2020, 53 (08) : 89 - 93
  • [7] Anti-Quantum Fast Authentication and Data Transmission Scheme for Massive Devices in 5G NB-IoT System
    Cao, Jin
    Yu, Pu
    Xiang, Xinyin
    Ma, Maode
    Li, Hui
    [J]. IEEE INTERNET OF THINGS JOURNAL, 2019, 6 (06) : 9794 - 9805
  • [8] LSCSH: Lattice-Based Secure Cryptosystem for Smart Healthcare in Smart Cities Environment
    Chaudhary, Rajat
    Jindal, Anish
    Aujla, Gagangeet Singh
    Kumar, Neeraj
    Des, Ashok Kumar
    Saxena, Neetesh
    [J]. IEEE COMMUNICATIONS MAGAZINE, 2018, 56 (04) : 24 - 32
  • [9] Changes in Federal Information Processing Standard (FIPS) 180-4, Secure Hash Standard
    Dang, Quynh
    [J]. CRYPTOLOGIA, 2013, 37 (01) : 69 - 73
  • [10] LAAC: Lightweight Lattice-Based Authentication and Access Control Protocol for E-Health Systems in IoT Environments
    Gupta, Daya Sagar
    Islam, Sk Hafizul
    Obaidat, Mohammad S.
    Karati, Arijit
    Sadoun, Balqies
    [J]. IEEE SYSTEMS JOURNAL, 2021, 15 (03): : 3620 - 3627