LAAC: Lightweight Lattice-Based Authentication and Access Control Protocol for E-Health Systems in IoT Environments

被引:28
|
作者
Gupta, Daya Sagar [1 ]
Islam, Sk Hafizul [2 ]
Obaidat, Mohammad S. [3 ,4 ,5 ,6 ]
Karati, Arijit [7 ]
Sadoun, Balqies [8 ,9 ]
机构
[1] Shershah Engn Coll Sasaram, Dept Comp Sci & Engn, Sasaram 821113, India
[2] Indian Inst Informat Technol Kalyani, Dept Comp Sci & Engn, Kalyani 741235, W Bengal, India
[3] Univ Sharjah, Coll Comp & Informat, Sharjah 27272, U Arab Emirates
[4] Univ Jordan, King Abdullah II Sch Informat Technol, Amman 11972, Jordan
[5] Univ Sci & Technol Beijing, Beijing 100083, Peoples R China
[6] Amity Univ, Noida 201313, India
[7] Natl Sun Yat Sen Univ, Dept Comp Sci & Engn, Kaohsiung 80424, Taiwan
[8] Univ Sharjah, Coll Engn, Sharjah 27272, U Arab Emirates
[9] Al Balqa Appl Univ, Coll Engn, Al Salt 19117, Jordan
来源
IEEE SYSTEMS JOURNAL | 2021年 / 15卷 / 03期
关键词
Protocols; Authentication; Lattices; Cryptography; Internet of Things; Access control; e-health systems; Internet of Things (IoT); lattice-based cryptography; privacy; EFFICIENT; CHALLENGES; INTERNET; THINGS; CARE; CRYPTOSYSTEM; SCHEME;
D O I
10.1109/JSYST.2020.3016065
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Over the past few years, the Internet of Things (IoT) has played a crucial role in designing e-health systems. An IoT-enabled e-health system allows different entities to examine a patient's health condition anywhere and anytime. However, the deployment of e-health systems in an IoT environment faces various security and privacy challenges. The authentication of participating entities, the confidentiality of information transferred through an insecure channel, and access control are essential issues to be resolved. To settle these challenges, we found many authentication protocols for e-health systems based on the discrete logarithm and integer factorization problems. However, quantum attacks expose all these protocols. In this article, we propose a lattice-based authentication and access control (LAAC) protocol for IoT-enabled e-health systems to mitigate the quantum attacks. We prove that LAAC is robust with the hardness assumption of the inhomogeneous small integer solution problem. Moreover, we provide provable security analysis of LAAC. Besides, performance evaluation shows it is reasonable to execute LAAC in an IoT device.
引用
收藏
页码:3620 / 3627
页数:8
相关论文
共 50 条
  • [41] SAREF4health: Towards IoT standard-based ontology-driven cardiac e-health systems
    Moreira, Joao
    Pires, Luis Ferreira
    van Sinderen, Marten
    Daniele, Laura
    Girod-Genet, Marc
    APPLIED ONTOLOGY, 2020, 15 (03) : 385 - 410
  • [42] Real-time-based E-health systems: design and implementation of a lightweight key management protocol for securing sensitive information of patients
    Iqbal, Salman
    Kiah, Miss Laiha Mat
    Zaidan, A. A.
    Zaidan, B. B.
    Albahri, O. S.
    Albahri, A. S.
    Alsalem, M. A.
    HEALTH AND TECHNOLOGY, 2019, 9 (02) : 93 - 111
  • [43] RETRACTED: TC-PSLAP: Temporal Credential-Based Provably Secure and Lightweight Authentication Protocol for IoT-Enabled Drone Environments (Retracted Article)
    Ali, Zeeshan
    Alzahrani, Bander A.
    Barnawi, Ahmed
    Al-Barakati, Abdullah
    Vijayakumar, Pandi
    Chaudhry, Shehzad Ashraf
    SECURITY AND COMMUNICATION NETWORKS, 2021, 2021
  • [44] FEACS: A fog enhanced expressible access control scheme with secure services delegation among carers in E-health systems
    Olakanmi, Oladayo
    Odeyemi, Kehinde
    INTERNET OF THINGS, 2020, 12
  • [45] PP-NDNoT: On preserving privacy in IoT-based E-health systems over NDN
    Boussada, Rihab
    Hamdane, Balkis
    Elhdhili, Mohamed Elhoucine
    Saidane, Leila Azouz
    2019 IEEE WIRELESS COMMUNICATIONS AND NETWORKING CONFERENCE (WCNC), 2019,
  • [46] A Secure Data Dissemination Scheme for IoT-Based e-Health Systems using AI and Blockchain
    Kumar, Prabhat
    Kumar, Randhir
    Garg, Sahil
    Kaur, Kuljeet
    Zhang, Yin
    Guizani, Mohsen
    2022 IEEE GLOBAL COMMUNICATIONS CONFERENCE (GLOBECOM 2022), 2022, : 1397 - 1403
  • [47] Real geo-time-based secured access computation model for e-Health systems
    Kumar, Ajay
    Abhishek, Kumar
    Chakraborty, Chinmay
    Rodrigues, Joel J. P. C.
    COMPUTATIONAL INTELLIGENCE, 2023, 39 (01) : 18 - 35
  • [48] Real-Time Lightweight Cloud-Based Access Control for Wearable IoT Devices: A Zero Trust Protocol
    Ejiyeh, Atefeh Mohseni
    PROCEEDINGS OF THE FIRST INTERNATIONAL WORKSHOP ON SECURITY AND PRIVACY OF SENSING SYSTEMS, SENSORS S&P 2023, 2023, : 22 - 29
  • [49] An Optimized Role-Based Access Control Using Trust Mechanism in E-Health Cloud Environment
    Butt, Ateeq Ur Rehman
    Mahmood, Tariq
    Saba, Tanzila
    Bahaj, Saeed Ali Omer
    Alamri, Faten S.
    Iqbal, Muhammad Waseem
    Khan, Amjad R.
    IEEE ACCESS, 2023, 11 : 138813 - 138826
  • [50] Smart health system with deep kronecker network-based key generation for privacy-aware aggregate authentication and access control in IoT
    M. Sathya
    V. Mareeswari
    M. Jeyaselvi
    A. Solairaj
    Journal of Combinatorial Optimization, 2025, 49 (5)