LAAC: Lightweight Lattice-Based Authentication and Access Control Protocol for E-Health Systems in IoT Environments

被引:28
|
作者
Gupta, Daya Sagar [1 ]
Islam, Sk Hafizul [2 ]
Obaidat, Mohammad S. [3 ,4 ,5 ,6 ]
Karati, Arijit [7 ]
Sadoun, Balqies [8 ,9 ]
机构
[1] Shershah Engn Coll Sasaram, Dept Comp Sci & Engn, Sasaram 821113, India
[2] Indian Inst Informat Technol Kalyani, Dept Comp Sci & Engn, Kalyani 741235, W Bengal, India
[3] Univ Sharjah, Coll Comp & Informat, Sharjah 27272, U Arab Emirates
[4] Univ Jordan, King Abdullah II Sch Informat Technol, Amman 11972, Jordan
[5] Univ Sci & Technol Beijing, Beijing 100083, Peoples R China
[6] Amity Univ, Noida 201313, India
[7] Natl Sun Yat Sen Univ, Dept Comp Sci & Engn, Kaohsiung 80424, Taiwan
[8] Univ Sharjah, Coll Engn, Sharjah 27272, U Arab Emirates
[9] Al Balqa Appl Univ, Coll Engn, Al Salt 19117, Jordan
来源
IEEE SYSTEMS JOURNAL | 2021年 / 15卷 / 03期
关键词
Protocols; Authentication; Lattices; Cryptography; Internet of Things; Access control; e-health systems; Internet of Things (IoT); lattice-based cryptography; privacy; EFFICIENT; CHALLENGES; INTERNET; THINGS; CARE; CRYPTOSYSTEM; SCHEME;
D O I
10.1109/JSYST.2020.3016065
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Over the past few years, the Internet of Things (IoT) has played a crucial role in designing e-health systems. An IoT-enabled e-health system allows different entities to examine a patient's health condition anywhere and anytime. However, the deployment of e-health systems in an IoT environment faces various security and privacy challenges. The authentication of participating entities, the confidentiality of information transferred through an insecure channel, and access control are essential issues to be resolved. To settle these challenges, we found many authentication protocols for e-health systems based on the discrete logarithm and integer factorization problems. However, quantum attacks expose all these protocols. In this article, we propose a lattice-based authentication and access control (LAAC) protocol for IoT-enabled e-health systems to mitigate the quantum attacks. We prove that LAAC is robust with the hardness assumption of the inhomogeneous small integer solution problem. Moreover, we provide provable security analysis of LAAC. Besides, performance evaluation shows it is reasonable to execute LAAC in an IoT device.
引用
收藏
页码:3620 / 3627
页数:8
相关论文
共 50 条
  • [21] Rotating behind Security: A Lightweight Authentication Protocol Based on IoT-Enabled Cloud Computing Environments
    Wu, Tsu-Yang
    Meng, Qian
    Kumari, Saru
    Zhang, Peng
    SENSORS, 2022, 22 (10)
  • [22] Advancing Interoperable IoT-Based Access Control Systems: A Unified Security Approach in Diverse Environments
    Penica, Mihai
    Bhattacharya, Mangolika
    O'Brien, William
    Mcgrath, Sean
    Hayes, Martin
    O'Connell, Eoin
    IEEE ACCESS, 2025, 13 : 27767 - 27782
  • [23] A Permissioned Blockchain-Based Identity Management and User Authentication Scheme for E-Health Systems
    Xiang, Xinyin
    Wang, Mingyu
    Fan, Weiguo
    IEEE ACCESS, 2020, 8 : 171771 - 171783
  • [24] DAAC: Digital Asset Access Control in a Unified Blockchain Based E-Health System
    Biswas, Sujit
    Sharif, Kashif
    Li, Fan
    Alam, Iqbal
    Mohanty, Saraju P.
    IEEE TRANSACTIONS ON BIG DATA, 2022, 8 (05) : 1273 - 1287
  • [25] Anonymous Role-Based Access Control on E-Health Records
    Zhou, Xingguang
    Liu, Jianwei
    Liu, Weiran
    Wu, Qianhong
    ASIA CCS'16: PROCEEDINGS OF THE 11TH ACM ASIA CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2016, : 559 - 570
  • [26] Identity Management to Support Access Control in E-Health Systems
    Chen, Xu
    Berry, Damon
    Grimson, William
    4TH EUROPEAN CONFERENCE OF THE INTERNATIONAL FEDERATION FOR MEDICAL AND BIOLOGICAL ENGINEERING, 2009, 22 (1-3): : 880 - 886
  • [27] A secure three-factor-based authentication with key agreement protocol for e-Health clouds
    Chen, Yulei
    Chen, Jianhua
    JOURNAL OF SUPERCOMPUTING, 2021, 77 (04) : 3359 - 3380
  • [28] Authentication Scheme Interface for Mobile e-Health Monitoring Using Unique and Lightweight Identity-based Authentication
    Kamarudin, Nazhatul Hafizah
    Yussoff, Yusnani Mohd
    INTERNATIONAL CONFERENCE ON ADVANCED SCIENCE, ENGINEERING AND TECHNOLOGY (ICASET 2015), 2016, 1774
  • [29] Lattice-Based Fine-grained Data Access Control and Sharing Scheme in Fog and Cloud Computing Environments for the 6G Systems
    Pei, Bei
    Zhou, Xianbin
    Jiang, Rui
    2022 18TH INTERNATIONAL CONFERENCE ON MOBILITY, SENSING AND NETWORKING, MSN, 2022, : 563 - 570
  • [30] Mutual Authentication Protocol for D2D Communications in a Cloud-Based E-Health System
    Lopes, Ana Paula G.
    Gondim, Paulo R. L.
    SENSORS, 2020, 20 (07)