A Lightweight PUF based Multi-factor Authentication Technique for Intelligent Smart Healthcare System

被引:4
作者
Chaudhary, Ravi Raushan Kumar [1 ]
Chatterjee, Kakali [1 ]
机构
[1] Natl Inst Technol Patna, Dept Comp Sci & Engn, Patna 800005, Bihar, India
关键词
Lightweight Cryptography; Authentication; PUF; IoT based System; MUTUAL AUTHENTICATION; ARBITER PUF; SECURITY; PROTOCOL; SCHEME;
D O I
10.1007/s12083-023-01509-6
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The Internet of Things is gaining popularity throughout the world. With the growth of digital communication, healthcare 4.0 are being implemented by many businesses industry in order to establish a more resilient, competent, and intelligent smart healthcare system. Healthcare monitoring services are the part of smart healthcare system. These types of monitoring systems are mainly based on the Internet of Things (IoT). IoT helps to integrate multiple sensors and objects that can directly communicate with each other without human intervention. This type of IoT based systems are vulnerable to different adversarial threats such as cloning attack, impersonation attack etc. Hence medical IoT device authentication is essential in smart healthcare to verify user legitimacy. One way to verify user legitimacy is using physical unclonable function (PUF). The PUF protects sensor nodes from tampering, cloning attack. In this paper, we have proposed a lightweight PUF based authentication mechanism for embedded IoT devices in e-healthcare system. The proposed authentication technique helps to authenticate IoT sensor nodes which are responsible for transmitting sensitive health data in a health monitoring system. The performance comparison shows that the protocol is efficient with high through put and low computational load. The security analysis of the authentication scheme shows it would resist different types of network attacks. The proposed authen-tication provides a facility that no one except that the primary users can have access to the raw challenge response pair of integrated PUF circuits so that adversary will unable to build another same PUF model. Also the success probability is 2(-76) for recovering the transformed 128 bit challenge and responses.
引用
收藏
页码:1975 / 1992
页数:18
相关论文
共 34 条
  • [11] ON THE SECURITY OF PUBLIC KEY PROTOCOLS
    DOLEV, D
    YAO, AC
    [J]. IEEE TRANSACTIONS ON INFORMATION THEORY, 1983, 29 (02) : 198 - 208
  • [12] CRC-PUF: A Machine Learning Attack Resistant Lightweight PUF Construction
    Dubrova, Elena
    Naslund, Oskar
    Degen, Bernhard
    Gawell, Anders
    Yu, Yang
    [J]. 2019 4TH IEEE EUROPEAN SYMPOSIUM ON SECURITY AND PRIVACY WORKSHOPS (EUROS&PW), 2019, : 264 - 271
  • [13] Robust and Lightweight Mutual Authentication Scheme in Distributed Smart Environments
    Gaba, Gurjot Singh
    Kumar, Gulshan
    Monga, Himanshu
    Kim, Tai-Hoon
    Kumar, Pardeep
    [J]. IEEE ACCESS, 2020, 8 : 69722 - 69733
  • [14] PUF-FSM: A Controlled Strong PUF
    Gao, Yansong
    Ma, Hua
    Al-Sarawi, Said F.
    Abbott, Derek
    Ranasinghe, Damith C.
    [J]. IEEE TRANSACTIONS ON COMPUTER-AIDED DESIGN OF INTEGRATED CIRCUITS AND SYSTEMS, 2018, 37 (05) : 1104 - 1108
  • [15] A Scalable Protocol Level Approach to Prevent Machine Learning Attacks on Physically Unclonable Function Based Authentication Mechanisms for Internet of Medical Things
    Gope, Prosanta
    Millwood, Owen
    Sikdar, Biplab
    [J]. IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2022, 18 (03) : 1971 - 1980
  • [16] Cloud-Supported Cyber-Physical Localization Framework for Patients Monitoring
    Hossain, M. Shamim
    [J]. IEEE SYSTEMS JOURNAL, 2017, 11 (01): : 118 - 127
  • [17] Lim D., 2004, THESIS MIT
  • [18] Privacy-Enhanced Data Fusion for COVID-19 Applications in Intelligent Internet of Medical Things
    Lin, Hui
    Garg, Sahil
    Hu, Jia
    Wang, Xiaoding
    Piran, Md Jalil
    Hossain, M. Shamim
    [J]. IEEE INTERNET OF THINGS JOURNAL, 2021, 8 (21): : 15683 - 15693
  • [19] Mahalat MH, 2018, PROCEEDINGS OF THE 2018 8TH INTERNATIONAL SYMPOSIUM ON EMBEDDED COMPUTING AND SYSTEM DESIGN (ISED 2018), P183, DOI 10.1109/ISED.2018.8703993
  • [20] Majzoobi Mehrdad, 2008, 2008 IEEE/ACM International Conference on Computer-Aided Design (ICCAD), P670, DOI 10.1109/ICCAD.2008.4681648