Zero knowledge proofs based authenticated key agreement protocol for sustainable healthcare

被引:36
作者
Gaba, Gurjot Singh [1 ]
Hedabou, Mustapha [1 ]
Kumar, Pardeep [2 ]
Braeken, An [3 ]
Liyanage, Madhusanka [4 ,5 ]
Alazab, Mamoun [6 ]
机构
[1] Mohammed VI Polytech Univ UM6P, Sch Comp Sci, Ben Guerir 43150, Morocco
[2] Swansea Univ, Dept Comp Sci, Swansea SA1 8EN, W Glam, Wales
[3] Vrije Univ, Fac Engn, B-1050 Brussels, Belgium
[4] Univ Coll Dublin, Sch Comp Sci, Dublin, Ireland
[5] Univ Oulu, Ctr Wireless Commun, Oulu, Finland
[6] Charles Darwin Univ, Coll Engn IT & Environm, Casuarina, NT, Australia
关键词
Sustainable healthcare; Internet of Things; Mutual authentication; Physically unclonable function; Security; Zero knowledge proofs; WIRELESS SENSOR NETWORKS; USER AUTHENTICATION; INDUSTRIAL INTERNET; PRIVACY PROTECTION; SCHEME; SECURE; ROBUST;
D O I
10.1016/j.scs.2022.103766
中图分类号
TU [建筑科学];
学科分类号
0813 ;
摘要
Upgradation of technologies for sustainable smart cities has led to rapid growth in Internet of Things (IoT) applications, including e-healthcare services wherein smart devices collect patient data and deliver it remotely to the servers in real-time. Despite its enormous benefits, IoT in healthcare has not received much attention primarily due to the risk of unauthorized access to confidential medical information enabled by the vulnerable wireless channel for communication. Besides, tiny IoT devices have limited computing power and storage capabilities that prevent administrators from using complex and resource-hungry security protocols. The cyber attacks on the Internet of Healthcare applications (IoHA) could result in fatalities, decreased revenue, and reputation loss, hence endangering sustainability. The existing security protocols are unsuitable due to the cost complexities that necessitate developing new security protocols for resource-constrained and heterogeneous IoT networks. We introduce a confidentiality and anonymity-preserving scheme for critical infrastructures of IoT to conquer cyber threats for sustainable healthcare. This paper proposes Zero-Knowledge Proofs (ZKP) based Authenticated Key Agreement (AKA) protocol for IoHA. ZKP-AKA uses zero-knowledge proofs, physically unclonable function, biometrics, symmetric cryptography, message digest, etc., for accomplishing the protocol's objective at minimal computation, storage, and communication expenses. ZKP-AKA retains data integrity, confidentiality, anonymity, and safety from significant cyber threats.
引用
收藏
页数:12
相关论文
共 50 条
[1]   A lightweight cyber security framework with context-awareness for pervasive computing environments [J].
Al-Muhtadi, Jalal ;
Saleem, Kashif ;
Al-Rabiaah, Sumayah ;
Imran, Muhammad ;
Gawanmeh, Amjad ;
Rodrigues, Joel J. P. C. .
SUSTAINABLE CITIES AND SOCIETY, 2021, 66
[2]   A Multidirectional LSTM Model for Predicting the Stability of a Smart Grid [J].
Alazab, Mamoun ;
Khan, Suleman ;
Krishnan, Somayaji Siva Rama ;
Quoc-Viet Pham ;
Reddy, M. Praveen Kumar ;
Gadekallu, Thippa Reddy .
IEEE ACCESS, 2020, 8 :85454-85463
[3]  
Alazab M, 2016, TRENDS ISS CRIME CRI
[4]   Anonymity Preserving and Lightweight Multimedical Server Authentication Protocol for Telecare Medical Information System [J].
Amin, Ruhul ;
Islam, S. K. Hafizul ;
Gope, Prosanta ;
Choo, Kim-Kwang Raymond ;
Tapas, Nachiket .
IEEE JOURNAL OF BIOMEDICAL AND HEALTH INFORMATICS, 2019, 23 (04) :1749-1759
[5]  
[Anonymous], 2021, Healthcare Data Breach Report for 2021
[6]  
Armando A, 2005, LECT NOTES COMPUT SC, V3576, P281
[7]   Blockchain-Envisioned Secure Data Delivery and Collection Scheme for 5G-Based IoT-Enabled Internet of Drones Environment [J].
Bera, Basudeb ;
Saha, Sourav ;
Das, Ashok Kumar ;
Kumar, Neeraj ;
Lorenz, Pascal ;
Alazab, Mamoun .
IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2020, 69 (08) :9097-9111
[8]   A Provably Secure, Efficient, and Flexible Authentication Scheme for Ad hoc Wireless Sensor Networks [J].
Chang, Chin-Chen ;
Le, Hai-Duong .
IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 2016, 15 (01) :357-366
[9]   A Robust Mutual Authentication Protocol for Wireless Sensor Networks [J].
Chen, Tien-Ho ;
Shih, Wei-Kuan .
ETRI JOURNAL, 2010, 32 (05) :704-712
[10]   Security and Privacy-Preserving Challenges of e-Health Solutions in Cloud Computing [J].
Chenthara, Shekha ;
Ahmed, Khandakar ;
Wang, Hua ;
Whittaker, Frank .
IEEE ACCESS, 2019, 7 :74361-74382