LAAC: Lightweight Lattice-Based Authentication and Access Control Protocol for E-Health Systems in IoT Environments

被引:28
|
作者
Gupta, Daya Sagar [1 ]
Islam, Sk Hafizul [2 ]
Obaidat, Mohammad S. [3 ,4 ,5 ,6 ]
Karati, Arijit [7 ]
Sadoun, Balqies [8 ,9 ]
机构
[1] Shershah Engn Coll Sasaram, Dept Comp Sci & Engn, Sasaram 821113, India
[2] Indian Inst Informat Technol Kalyani, Dept Comp Sci & Engn, Kalyani 741235, W Bengal, India
[3] Univ Sharjah, Coll Comp & Informat, Sharjah 27272, U Arab Emirates
[4] Univ Jordan, King Abdullah II Sch Informat Technol, Amman 11972, Jordan
[5] Univ Sci & Technol Beijing, Beijing 100083, Peoples R China
[6] Amity Univ, Noida 201313, India
[7] Natl Sun Yat Sen Univ, Dept Comp Sci & Engn, Kaohsiung 80424, Taiwan
[8] Univ Sharjah, Coll Engn, Sharjah 27272, U Arab Emirates
[9] Al Balqa Appl Univ, Coll Engn, Al Salt 19117, Jordan
来源
IEEE SYSTEMS JOURNAL | 2021年 / 15卷 / 03期
关键词
Protocols; Authentication; Lattices; Cryptography; Internet of Things; Access control; e-health systems; Internet of Things (IoT); lattice-based cryptography; privacy; EFFICIENT; CHALLENGES; INTERNET; THINGS; CARE; CRYPTOSYSTEM; SCHEME;
D O I
10.1109/JSYST.2020.3016065
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Over the past few years, the Internet of Things (IoT) has played a crucial role in designing e-health systems. An IoT-enabled e-health system allows different entities to examine a patient's health condition anywhere and anytime. However, the deployment of e-health systems in an IoT environment faces various security and privacy challenges. The authentication of participating entities, the confidentiality of information transferred through an insecure channel, and access control are essential issues to be resolved. To settle these challenges, we found many authentication protocols for e-health systems based on the discrete logarithm and integer factorization problems. However, quantum attacks expose all these protocols. In this article, we propose a lattice-based authentication and access control (LAAC) protocol for IoT-enabled e-health systems to mitigate the quantum attacks. We prove that LAAC is robust with the hardness assumption of the inhomogeneous small integer solution problem. Moreover, we provide provable security analysis of LAAC. Besides, performance evaluation shows it is reasonable to execute LAAC in an IoT device.
引用
收藏
页码:3620 / 3627
页数:8
相关论文
共 50 条
  • [31] A Trust-based Access Control Scheme for e-Health Cloud
    Ben Daoud, Wided
    Meddeb-Makhlouf, Amel
    Zarai, Faouzi
    2018 IEEE/ACS 15TH INTERNATIONAL CONFERENCE ON COMPUTER SYSTEMS AND APPLICATIONS (AICCSA), 2018,
  • [32] Three-Factor Fast Authentication Scheme with Time Bound and User Anonymity for Multi-Server E-Health Systems in 5G-Based Wireless Sensor Networks
    Wong, Alice May-Kuen
    Hsu, Chien-Lung
    Tuan-Vinh Le
    Hsieh, Mei-Chen
    Lin, Tzu-Wei
    SENSORS, 2020, 20 (09)
  • [33] Context-Based E-Health System Access Control Mechanism
    Al-Neyadi, Fahed
    Abawajy, Jemal H.
    ADVANCES IN INFORMATION SECURITY AND ITS APPLICATION, 2009, 36 : 68 - 77
  • [34] A secure three-factor-based authentication with key agreement protocol for e-Health clouds
    Yulei Chen
    Jianhua Chen
    The Journal of Supercomputing, 2021, 77 : 3359 - 3380
  • [35] LAPCHS: A lightweight authentication protocol for cloud-based health-care systems
    Nikkhah, Fahimeh
    Safkhani, Masoumeh
    COMPUTER NETWORKS, 2021, 187
  • [36] A framework for IoT and E-Health Systems Integration based on the Social Internet of Things Paradigm
    Ruggeri, Giuseppe
    Briante, Orazio
    2017 INTERNATIONAL SYMPOSIUM ON WIRELESS COMMUNICATION SYSTEMS (ISWCS), 2017, : 426 - 431
  • [37] How to Develop IoT Cloud e-Health Systems Based on FIWARE: A Lesson Learnt
    Celesti, Antonio
    Fazio, Maria
    Galan Marquez, Fermin
    Glikson, Alex
    Mauwa, Hope
    Bagula, Antoine
    Celesti, Fabrizio
    Villari, Massimo
    JOURNAL OF SENSOR AND ACTUATOR NETWORKS, 2019, 8 (01):
  • [38] A Model-based Approach for Managing Criticality Requirements in e-Health IoT Systems
    Kotronis, Ch
    Nikolaidou, M.
    Dimitrakopoulos, G.
    Anagnostopoulos, D.
    Amira, A.
    Bensaali, F.
    2018 13TH ANNUAL CONFERENCE ON SYSTEM OF SYSTEMS ENGINEERING (SOSE), 2018, : 60 - 67
  • [39] An efficient two-factor authentication scheme with key agreement for IoT based E-health care application using smart card
    Karthigaiveni, M.
    Indrani, B.
    JOURNAL OF AMBIENT INTELLIGENCE AND HUMANIZED COMPUTING, 2019,
  • [40] Toward Privacy Preserving in IoT E-health Systems: A Key Escrow Identity-based Encryption Scheme
    Boussada, Rihab
    Elhdhili, Mohamed Elhoucine
    Saidane, Leila Azouz
    2018 15TH IEEE ANNUAL CONSUMER COMMUNICATIONS & NETWORKING CONFERENCE (CCNC), 2018,