A Robust Authentication Protocol for Wireless Medical Sensor Networks Using Blockchain and Physically Unclonable Functions

被引:75
作者
Yu, Sungjin [1 ,2 ]
Park, Youngho [1 ]
机构
[1] Kyungpook Natl Univ, Sch Elect & Elect Engn, Daegu 41566, South Korea
[2] Elect & Telecommun Res Inst, Cryptog Engn Res Sect, Daejeon 34129, South Korea
基金
新加坡国家研究基金会;
关键词
Security; Blockchains; Authentication; Medical diagnostic imaging; Medical services; Protocols; Internet of Things; blockchain; cryptanalysis; physical unclonable functions; wireless medical sensor networks (WMSNs); KEY AGREEMENT PROTOCOL; HEALTH-CARE-SYSTEMS; PROVABLY SECURE; LIGHTWEIGHT; SCHEME; EXCHANGE; INTERNET;
D O I
10.1109/JIOT.2022.3171791
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Wireless medical sensor networks (WMSNs)-based medical systems are an emerging paradigm of the Internet of Medical Things (IoMT) in which the patients and doctors can access various healthcare services via wireless communication technology without visiting the hospital in person. However, an adversary attempts a variety of security attacks because the sensitive information in various fields is exchanged via an insecure channel. Thus, robust and lightweight authentication protocols are essential for providing dependable healthcare services in WMSN-based medical systems. Recently, Wang et al. (IEEE Internet of Things Journal, doi: 10.1109/JIOT.2021.3117762) proposed blockchain and physically unclonable functions (PUFs)-based lightweight authentication protocol for WMSN. They claimed that their protocol is resistant to cyber and physical security threats and also does provide necessary security requirements. However, we prove that their protocol is vulnerable to various security attacks, such as man-in-the-middle and session key disclosure attacks and also lacks mutual authentication. As a result, we propose a robust authentication protocol for WMSN using blockchain and PUF to address the security problems raised by Wang et al.'s scheme. we assess the security of the proposed scheme by using informal and formal security analyses, such as AVISPA simulation and the ROR oracle model. Furthermore, we present the testbed experiments using Raspberry PI 4 based on MIRACL Crypto SDK. Then, we show the performance of the enhanced scheme compared with related schemes based on testbed experiments. Consequently, our scheme is better suited for practical WMSN-based medical systems because it provides greater security and efficiency than competing schemes.
引用
收藏
页码:20214 / 20228
页数:15
相关论文
共 37 条
[1]  
Abdalla M, 2005, LECT NOTES COMPUT SC, V3386, P65
[2]   Real-Time Remote Health-Monitoring Systems in a Medical Centre: A Review of the Provision of Healthcare Services-Based Body Sensor Information, Open Challenges and Methodological Aspects [J].
Albahri, O. S. ;
Zaidan, A. A. ;
Zaidan, B. B. ;
Hashim, M. ;
Albahri, A. S. ;
Alsalem, M. A. .
JOURNAL OF MEDICAL SYSTEMS, 2018, 42 (09)
[3]   HARCI: A Two-Way Authentication Protocol for Three Entity Healthcare IoT Networks [J].
Alladi, Tejasvi ;
Chamola, Vinay ;
Naren .
IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, 2021, 39 (02) :361-369
[4]   Mutual Authentication in IoT Systems Using Physical Unclonable Functions [J].
Aman, Muhammad Naveed ;
Chua, Kee Chaing ;
Sikdar, Biplab .
IEEE INTERNET OF THINGS JOURNAL, 2017, 4 (05) :1327-1340
[5]   A robust and anonymous patient monitoring system using wireless medical sensor networks [J].
Amin, Ruhul ;
Islam, S. K. Hafizul ;
Biswas, G. P. ;
Khan, Muhammad Khurram ;
Kumar, Neeraj .
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2018, 80 :483-495
[6]   A Novel User Authentication and Key Agreement Protocol for Accessing Multi-Medical Server Usable in TMIS [J].
Amin, Ruhul ;
Biswas, G. P. .
JOURNAL OF MEDICAL SYSTEMS, 2015, 39 (03)
[7]  
[Anonymous], AUT VAL INT SEC PROT
[8]  
[Anonymous], MIRACL CRYPTOGRAPHIC
[9]  
[Anonymous], Global Patient Safety Action Plan.
[10]  
Boyko V, 2000, LECT NOTES COMPUT SC, V1807, P156