Lightweight Two-Factor-Based User Authentication Protocol for IoT-Enabled Healthcare Ecosystem in Quantum Computing

被引:19
作者
Al-saggaf, Alawi A. [1 ]
Sheltami, Tarek [2 ]
Alkhzaimi, Hoda [3 ]
Ahmed, Gamil [2 ]
机构
[1] KFUPM, Math Sci Dept DCC, Interdisciplinary Res Ctr Intelligent Secure Syst, Dhahran 31261, Saudi Arabia
[2] KFUPM, Comp Engn Dept, Interdisciplinary Res Ctr Smart Mobil & Logist, Dhahran 31261, Saudi Arabia
[3] New York Univ Abu Dhabi, Ctr Cyber Secur & Interdisciplinary Studies, Abu Dhabi, U Arab Emirates
关键词
Internet of Things; IoT-enabled healthcare; Post-quantum cryptography; User authentication; Biometric; Lightweight authentication protocols;
D O I
10.1007/s13369-022-07235-0
中图分类号
O [数理科学和化学]; P [天文学、地球科学]; Q [生物科学]; N [自然科学总论];
学科分类号
07 ; 0710 ; 09 ;
摘要
The healthcare ecosystem is migrating from legacy systems to the Internet of Things (IoT), resulting in a digital environment. This transformation has increased importance on demanding both secure and usable user authentication methods. Recently, a post-quantum fuzzy commitment scheme (PQFC) has been constructed as a reliable and efficient method of biometric template protection. This paper presents a new two-factor-based user authentication protocol for the IoT-enabled healthcare ecosystem in post-quantum computing environments using the PQFC scheme. The proposed protocol is proved to be secure using random oracle model. Furthermore, the functionality and security of the proposed protocol are analyzed, showing that memoryless-effortless, user anonymity, mutual authentication, and resistance to biometric templates tampering and stolen attacks, stolen smart card attack, privileged interior attack are fulfilled. The costs of storage requirement, computation, communication and storage are estimated. The results demonstrate that the proposed protocol is more efficient than Mukherjee et al., Chaudhary et al., and Gupta et al. protocols.
引用
收藏
页码:2347 / 2357
页数:11
相关论文
共 38 条
  • [21] Mumtaz Majid, 2019, 2019 IEEE 21st International Conference on High Performance Computing and Communications
  • [22] IEEE 17th International Conference on Smart City
  • [23] IEEE 5th International Conference on Data Science and Systems (HPCC/SmartCity/DSS). Proceedings, P758, DOI 10.1109/HPCC/SmartCity/DSS.2019.00112
  • [24] USING ENCRYPTION FOR AUTHENTICATION IN LARGE NETWORKS OF COMPUTERS
    NEEDHAM, RM
    SCHROEDER, MD
    [J]. COMMUNICATIONS OF THE ACM, 1978, 21 (12) : 993 - 999
  • [25] A Decade of Lattice Cryptography
    Peikert, Chris
    [J]. FOUNDATIONS AND TRENDS IN THEORETICAL COMPUTER SCIENCE, 2014, 10 (04): : 283 - 424
  • [26] Statistical attack against fuzzy commitment scheme
    Rathgeb, C.
    Uhl, A.
    [J]. IET BIOMETRICS, 2012, 1 (02) : 94 - 104
  • [27] A survey on biometric cryptosystems and cancelable biometrics
    Rathgeb C.
    Uhl A.
    [J]. Eurasip Journal on Information Security, 2011, 2011 (1)
  • [28] On Lattices, Learning with Errors, Random Linear Codes, and Cryptography
    Regev, Oded
    [J]. JOURNAL OF THE ACM, 2009, 56 (06)
  • [29] A secure and improved multi server authentication protocol using fuzzy commitment
    Rehman, Hafeez Ur
    Ghani, Anwar
    Chaudhry, Shehzad Ashraf
    Alsharif, Mohammed H.
    Nabipour, Narjes
    [J]. MULTIMEDIA TOOLS AND APPLICATIONS, 2021, 80 (11) : 16907 - 16931
  • [30] Biometric template security: an overview
    Riaz, Naveed
    Riaz, Ayesha
    Khan, Sajid Ali
    [J]. SENSOR REVIEW, 2018, 38 (01) : 120 - 127