Lightweight and efficient privacy-preserving mutual authentication scheme to secure Internet of Things-based smart healthcare

被引:26
作者
Das, Sangjukta [1 ]
Namasudra, Suyel [2 ]
机构
[1] Natl Inst Technol Patna, Dept Comp Sci & Engn, Patna, Bihar, India
[2] Natl Inst Technol Agartala, Dept Comp Sci & Engn, Agartala, Tripura, India
关键词
KEY AGREEMENT SCHEME; 2-FACTOR USER AUTHENTICATION; ESTABLISHMENT SCHEME; CRYPTANALYSIS;
D O I
10.1002/ett.4716
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
In recent years, Internet of Things (IoT) technology has been adopted in numerous application areas, such as healthcare, agriculture, industrial automation, and many more. The use of IoT and other technologies like cloud computing and machine learning has made the modern healthcare system to be smart, automated, and efficient. However, the continuous proliferation of cyber-attacks on IoT devices has increased IoT challenges like data security, privacy protection, authentication, and so forth. In smart healthcare systems, due to the lack of authentication protocols, attackers can undermine the availability, confidentiality, and integrity of both smart healthcare devices and data, which can be life-threatening in some situations. In this article, a privacy-preserving mutual authentication scheme for IoT-enabled healthcare systems is proposed to achieve lightweight and effective authentication of network devices. To support the processing capabilities of the IoT devices, this proposed authentication scheme is designed using lightweight cryptographic primitives, namely XOR, concatenation, and hash operation. The proposed scheme can establish a secure session between an authorized device and a gateway, and prevent unauthorized devices from getting access to healthcare systems. The security analysis and performance analysis assess the proposed authentication technique's effectiveness over existing well-known schemes.
引用
收藏
页数:15
相关论文
共 40 条
[1]   A survey on adversarial attacks and defences [J].
Chakraborty, Anirban ;
Alam, Manaar ;
Dey, Vishal ;
Chattopadhyay, Anupam ;
Mukhopadhyay, Debdeep .
CAAI TRANSACTIONS ON INTELLIGENCE TECHNOLOGY, 2021, 6 (01) :25-45
[2]   Secure Signature-Based Authenticated Key Establishment Scheme for Future IoT Applications [J].
Challa, Sravani ;
Wazid, Mohammad ;
Das, Ashok Kumar ;
Kumar, Neeraj ;
Reddy, Alavalapati Goutham ;
Yoon, Eun-Jun ;
Yoo, Kee-Young .
IEEE ACCESS, 2017, 5 :3028-3043
[3]   A Provably Secure, Efficient, and Flexible Authentication Scheme for Ad hoc Wireless Sensor Networks [J].
Chang, Chin-Chen ;
Le, Hai-Duong .
IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 2016, 15 (01) :357-366
[4]  
Chen ZH, 2022, Journal of Computational and Cognitive Engineering, V1, P103, DOI [10.47852/bonviewjcce149145205514, 10.47852/bonviewJCCE149145205514, DOI 10.47852/BONVIEWJCCE149145205514, 10.47852/bonviewjcce149145205514]
[5]   Two-Factor User Authentication in Wireless Sensor Networks [J].
Das, Manik Lal .
IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 2009, 8 (03) :1086-1090
[6]   Multiauthority CP-ABE-based Access Control Model for IoT-enabled Healthcare Infrastructure [J].
Das, Sangjukta ;
Namasudra, Suyel .
IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2023, 19 (01) :821-829
[7]   A Novel Hybrid Encryption Method to Secure Healthcare Data in IoT-enabled Healthcare Infrastructure [J].
Das, Sangjukta ;
Namasudra, Suyel .
COMPUTERS & ELECTRICAL ENGINEERING, 2022, 101
[8]   MACPABE: Multi-Authority-based CP-ABE with efficient attribute revocation for IoT-enabled healthcare infrastructure [J].
Das, Sangjukta ;
Namasudra, Suyel .
INTERNATIONAL JOURNAL OF NETWORK MANAGEMENT, 2023, 33 (03)
[9]   ON THE SECURITY OF PUBLIC KEY PROTOCOLS [J].
DOLEV, D ;
YAO, AC .
IEEE TRANSACTIONS ON INFORMATION THEORY, 1983, 29 (02) :198-208
[10]  
G?mez B., 2022, INT J INTERACT MULTI, V6, P4