A Lightweight PUF based Multi-factor Authentication Technique for Intelligent Smart Healthcare System

被引:4
作者
Chaudhary, Ravi Raushan Kumar [1 ]
Chatterjee, Kakali [1 ]
机构
[1] Natl Inst Technol Patna, Dept Comp Sci & Engn, Patna 800005, Bihar, India
关键词
Lightweight Cryptography; Authentication; PUF; IoT based System; MUTUAL AUTHENTICATION; ARBITER PUF; SECURITY; PROTOCOL; SCHEME;
D O I
10.1007/s12083-023-01509-6
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The Internet of Things is gaining popularity throughout the world. With the growth of digital communication, healthcare 4.0 are being implemented by many businesses industry in order to establish a more resilient, competent, and intelligent smart healthcare system. Healthcare monitoring services are the part of smart healthcare system. These types of monitoring systems are mainly based on the Internet of Things (IoT). IoT helps to integrate multiple sensors and objects that can directly communicate with each other without human intervention. This type of IoT based systems are vulnerable to different adversarial threats such as cloning attack, impersonation attack etc. Hence medical IoT device authentication is essential in smart healthcare to verify user legitimacy. One way to verify user legitimacy is using physical unclonable function (PUF). The PUF protects sensor nodes from tampering, cloning attack. In this paper, we have proposed a lightweight PUF based authentication mechanism for embedded IoT devices in e-healthcare system. The proposed authentication technique helps to authenticate IoT sensor nodes which are responsible for transmitting sensitive health data in a health monitoring system. The performance comparison shows that the protocol is efficient with high through put and low computational load. The security analysis of the authentication scheme shows it would resist different types of network attacks. The proposed authen-tication provides a facility that no one except that the primary users can have access to the raw challenge response pair of integrated PUF circuits so that adversary will unable to build another same PUF model. Also the success probability is 2(-76) for recovering the transformed 128 bit challenge and responses.
引用
收藏
页码:1975 / 1992
页数:18
相关论文
共 34 条
  • [1] Provably secured lightweight authenticated key agreement protocol for modern health industry
    Abdussami, Mohammad
    Amin, Ruhul
    Vollala, Satyanarayana
    [J]. AD HOC NETWORKS, 2023, 141
  • [2] Cloud-Based Remote RFID Authentication for Security of Smart Internet of Things Applications
    Ahmed, Mohammed Imtyaz
    Kannan, G.
    [J]. JOURNAL OF INFORMATION & KNOWLEDGE MANAGEMENT, 2021, 20
  • [3] A PUF-based mutual authentication scheme for Cloud-Edges IoT systems
    Barbareschi, Mario
    De Benedictis, Alessandra
    La Montagna, Erasmo
    Mazzeo, Antonino
    Mazzocca, Nicola
    [J]. FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2019, 101 : 246 - 261
  • [4] Binu PK, 2017, 2017 INTERNATIONAL CONFERENCE ON ADVANCES IN COMPUTING, COMMUNICATIONS AND INFORMATICS (ICACCI), P487, DOI 10.1109/ICACCI.2017.8125887
  • [5] PUF Based Authentication Protocol for IoT
    Braeken, An
    [J]. SYMMETRY-BASEL, 2018, 10 (08):
  • [6] An efficient multi-factor authenticated key exchange with physically unclonable function
    Byun, Jin Wook
    [J]. 2019 INTERNATIONAL CONFERENCE ON ELECTRONICS, INFORMATION, AND COMMUNICATION (ICEIC), 2019, : 477 - 480
  • [7] Practical UC Security with a Global Random Oracle
    Canetti, Ran
    Jain, Abhishek
    Scafuro, Alessandra
    [J]. CCS'14: PROCEEDINGS OF THE 21ST ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2014, : 597 - 608
  • [8] 3PAA: A Private PUF Protocol for Anonymous Authentication
    Chaterjee, Urbi
    Mukhopadhyay, Debdeep
    Chakraborty, Rajat Subhra
    [J]. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2021, 16 (16) : 756 - 769
  • [9] Building PUF Based Authentication and Key Exchange Protocol for IoT Without Explicit CRPs in Verifier Database
    Chatterjee, Urbi
    Govindan, Vidya
    Sadhukhan, Rajat
    Mukhopadhyay, Debdeep
    Chakraborty, Rajat Subhra
    Mahata, Debashis
    Prabhu, Mukesh M.
    [J]. IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2019, 16 (03) : 424 - 437
  • [10] A PUF-Based Secure Communication Protocol for IoT
    Chatterjee, Urbi
    Chakraborty, Rajat Subhra
    Mukhopadhyay, Debdeep
    [J]. ACM TRANSACTIONS ON EMBEDDED COMPUTING SYSTEMS, 2017, 16 (03)