Slight: A lightweight authentication scheme for smart healthcare services

被引:43
作者
Amintoosi, Haleh [1 ]
Nikooghadam, Mahdi [1 ]
Shojafar, Mohammad [2 ]
Kumari, Saru [3 ]
Alazab, Mamoun [4 ]
机构
[1] Ferdowsi Univ Mashhad, Fac Engn, Mashhad, Iran
[2] Univ Surrey, ICS 6GIC, Guildford GU2 7XH, Surrey, England
[3] Chaudhary Charan Singh Univ, Dept Math, Meerut 250004, India
[4] Charles Darwin Univ, Coll Engn IT & Environm, Casuarina, NT 0810, Australia
关键词
Critical Infrastructure; Internet of Medical Things; Authentication; Key agreement; Lightweight; KEY AGREEMENT SCHEME; MUTUAL AUTHENTICATION; SYSTEMS; ROBUST;
D O I
10.1016/j.compeleceng.2022.107803
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Critical infrastructures (CIs) include the vital resources for the country's economic and health systems and should be kept secure. We face improvements in the Internet of Things which brings benefits and, at the same time, dependency for CIs. Internet of Medical Things (IoMT) is among the CI sectors that gather health-related information from patients via sensors and provide healthcare services accordingly. However, research has highlighted that this large-scale system opens the door to the patients' private data disclosure. Recent work has concentrated on proposing authentication schemes to address this challenge. Motivated by this, in this paper, we introduce a secure and lightweight authentication and key agreement model named Slight. We informally prove Slight's security and robustness against attacks and formally by using the Scyther tool. We analyze Slight's performance to show it causes minimal computational overhead (0.0076 ms) and comparable communication overhead (1632 bits), making it suitable for IoMT.
引用
收藏
页数:18
相关论文
共 25 条
[1]   LACO: Lightweight Three-Factor Authentication, Access Control and Ownership Transfer Scheme for E-Health Systems in IoT [J].
Aghili, Seyed Farhad ;
Mala, Hamid ;
Shojafar, Mohammad ;
Peris-Lopez, Pedro .
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2019, 96 :410-424
[2]  
[Anonymous], J MED SYST
[3]   Context-aware anonymous authentication protocols in the internet of things dedicated to e-health applications [J].
Arfaoui, Amel ;
Kribeche, Ali ;
Senouci, Sidi-Mohammed .
COMPUTER NETWORKS, 2019, 159 :23-36
[4]   Three-Factor Anonymous Authentication and Key Agreement Scheme for Telecare Medicine Information Systems [J].
Arshad, Hamed ;
Nikooghadam, Morteza .
JOURNAL OF MEDICAL SYSTEMS, 2014, 38 (12)
[5]   An Improved Three-Factor User Authentication and Key Agreement Scheme for Wireless Medical Sensor Networks [J].
Chen, Ying ;
Ge, Yangming ;
Wang, Yerong ;
Zeng, Zhuang .
IEEE ACCESS, 2019, 7 :85440-85451
[6]  
Cremers C.J.F., 2006, Scyther: Semantics and verification of security protocols
[7]   A Web Service System Supporting Three-dimensional Post-processing of Medical Images Based on WADO Protocol [J].
He, Longjun ;
Xu, Lang ;
Ming, Xing ;
Liu, Qian .
JOURNAL OF MEDICAL SYSTEMS, 2015, 39 (02)
[8]   Security analysis and improvement of bio-hashing based three-factor authentication scheme for telecare medical information systems [J].
Jiang, Qi ;
Chen, Zhiren ;
Li, Bingyan ;
Shen, Jian ;
Yang, Li ;
Ma, Jianfeng .
JOURNAL OF AMBIENT INTELLIGENCE AND HUMANIZED COMPUTING, 2018, 9 (04) :1061-1073
[9]   Privacy-Preserved, Provable Secure, Mutually Authenticated Key Agreement Protocol for Healthcare in a Smart City Environment [J].
Khatoon, Shaheena ;
Rahman, S. K. Md Mizanur ;
Alrubaian, Majed ;
Alamri, Atif .
IEEE ACCESS, 2019, 7 :47962-47971
[10]   A robust and efficient mutual authentication and key agreement scheme with untraceability for WBANs [J].
Kompara, Marko ;
Islam, S. K. Hafizul ;
Holbl, Marko .
COMPUTER NETWORKS, 2019, 148 :196-213