A Lightweight and Robust User Authentication Protocol with User Anonymity for IoT-Based Healthcare

被引:12
作者
Chen, Chien-Ming [1 ]
Liu, Shuangshuang [1 ]
Chaudhry, Shehzad Ashraf [2 ]
Chen, Yeh-Cheng [3 ]
Khan, Muhammad Asghar [4 ]
机构
[1] Shandong Univ Sci & Technol, Coll Comp Sci & Engn, Qingdao 266590, Peoples R China
[2] Istanbul Gelisim Univ, Dept Comp Engn, TR-34310 Istanbul, Turkey
[3] Univ Calif Davis, Dept Comp Sci, Davis, CA 95616 USA
[4] Hamdard Univ, Dept Elect Engn, Islamabad 44000, Pakistan
来源
CMES-COMPUTER MODELING IN ENGINEERING & SCIENCES | 2022年 / 131卷 / 01期
关键词
IoT; intelligent medical; user authentication; KEY AGREEMENT SCHEME; EFFICIENT; SECURITY; INTERNET;
D O I
10.32604/cmes.2022.018749
中图分类号
T [工业技术];
学科分类号
08 ;
摘要
With the rise of the Internet of Things (IoT), the word "intelligent medical care" has increasingly become a major vision. Intelligent medicine adopts the most advanced IoT technology to realize the interaction between patients and people, medical institutions, and medical equipment. However, with the openness of network transmission, the security and privacy of information transmission have become a major problem. Recently, Masud et al. proposed a lightweight anonymous user authentication protocol for IoT medical treatment, claiming that their method can resist various attacks. However, through analysis of the protocol, we observed that their protocol cannot effectively resist privileged internal attacks, sensor node capture attacks, and stolen authentication attacks, and their protocol does not have perfect forward security. Therefore, we propose a new protocol to resolve the security vulnerabilities in Masudsprotocol and remove some redundant parameters, so as to make the protocol more compact and secure. In addition, we evaluate the security and performance of the new protocol and prove that the overall performance of the new protocol is better than that of other related protocols.
引用
收藏
页码:307 / 329
页数:23
相关论文
共 40 条
[1]  
Abdalla M, 2005, LECT NOTES COMPUT SC, V3386, P65
[2]   LAPTAS: lightweight anonymous privacy-preserving three-factor authentication scheme for WSN-based IIoT [J].
Abdi Nasib Far, Hossein ;
Bayat, Majid ;
Kumar Das, Ashok ;
Fotouhi, Mahdi ;
Pournaghi, S. Morteza ;
Doostari, M. A. .
WIRELESS NETWORKS, 2021, 27 (02) :1389-1412
[3]   Performance analyses of the IEEE 802.15.6 Wireless Body Area Network with heterogeneous traffic [J].
Benmansour, Tariq ;
Ahmed, Toufik ;
Moussaoui, Samira ;
Doukha, Zouina .
JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2020, 163
[4]  
Canetti R, 2002, LECT NOTES COMPUT SC, V2332, P337
[5]   Improved Dynamic ID-based Authentication Scheme for Telecare Medical Information Systems [J].
Cao, Tianjie ;
Zhai, Jingxuan .
JOURNAL OF MEDICAL SYSTEMS, 2013, 37 (02)
[6]   Secure Signature-Based Authenticated Key Establishment Scheme for Future IoT Applications [J].
Challa, Sravani ;
Wazid, Mohammad ;
Das, Ashok Kumar ;
Kumar, Neeraj ;
Reddy, Alavalapati Goutham ;
Yoon, Eun-Jun ;
Yoo, Kee-Young .
IEEE ACCESS, 2017, 5 :3028-3043
[7]   A Provable Secure Private Data Delegation Scheme for Mountaineering Events in Emergency System [J].
Chen, Chien-Ming ;
Li, Chun-Ta ;
Liu, Shuai ;
Wu, Tsu-Yang ;
Pan, Jeng-Shyang .
IEEE ACCESS, 2017, 5 :3410-3422
[8]  
Chen CM, 2002, IEICE T COMMUN, VE85B, P2519
[9]   An Efficient and Secure Dynamic ID-based Authentication Scheme for Telecare Medical Information Systems [J].
Chen, Hung-Ming ;
Lo, Jung-Wen ;
Yeh, Chang-Kuo .
JOURNAL OF MEDICAL SYSTEMS, 2012, 36 (06) :3907-3915
[10]   ON THE SECURITY OF PUBLIC KEY PROTOCOLS [J].
DOLEV, D ;
YAO, AC .
IEEE TRANSACTIONS ON INFORMATION THEORY, 1983, 29 (02) :198-208