Computation-transferable authenticated key agreement protocol for smart healthcare

被引:21
作者
Wang, Wenming [1 ,2 ]
Huang, Haiping [1 ,3 ]
Xiao, Fu [1 ,3 ]
Li, Qi [1 ,3 ]
Xue, Lingyan [1 ,3 ]
Jiang, Jiansheng [2 ]
机构
[1] Nanjing Univ Posts & Telecommun, Sch Comp Sci, Nanjing 210003, Jiangsu, Peoples R China
[2] Anqing Normal Univ, Univ Key Lab Intelligent Percept & Comp Anhui Pro, Anqing 246011, Anhui, Peoples R China
[3] Jiangsu High Technol Res Key Lab Wireless Sensor, Nanjing 210003, Jiangsu, Peoples R China
基金
中国国家自然科学基金;
关键词
Smart healthcare; Authenticated key agreement (AKA); Security; Privacy; MUTUAL AUTHENTICATION; USER AUTHENTICATION; SCHEME; CRYPTOGRAPHY; INTERNET; THINGS;
D O I
10.1016/j.sysarc.2021.102215
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Smart healthcare plays an important role in contemporary society while its security and privacy issues remain inevitable challenges. Authenticated key agreement (AKA) mechanism, as the foundation of secure communication, has been recognized as an important measure for solving this problem. Most existing AKA protocols utilize cloud-based centralized architecture, data privacy and security can be exposed easily once the centralized authority is attacked. In addition, most past solutions require the online registration center to assist mutual authentication and consume considerable amounts of resources. To address these drawbacks, a computationtransferable authenticated key agreement protocol without an online registration center for smart healthcare is designed. Specifically, the proposed protocol can realize mutual authentication and key agreement without the need for an online registration center, as well as being able to satisfy security and privacy protection requirements. By transferring partial computation tasks to the server, the proposed scheme incurs lower computation and communication overhead on the user side. Moreover, the proposed scheme adopts certificateless public key cryptography, which can solve the problems of certificate management and key escrow. Performance analysis indicates that the proposal reduces 9.9% of the computation overhead on the resource-limited terminal, which is suitable for low-power IoT applications, including smart healthcare.
引用
收藏
页数:10
相关论文
共 45 条
[1]  
Al-Riyami SS, 2003, LECT NOTES COMPUT SC, V2894, P452
[2]   An efficient identity-based signature scheme without bilinear pairing for vehicle-to-vehicle communication in VANETs [J].
Ali, Ikram ;
Lawrence, Tandoh ;
Li, Fagen .
JOURNAL OF SYSTEMS ARCHITECTURE, 2020, 103 (103)
[3]   Internet of Things for Smart Healthcare: Technologies, Challenges, and Opportunities [J].
Baker, Stephanie B. ;
Xiang, Wei ;
Atkinson, Ian .
IEEE ACCESS, 2017, 5 :26521-26544
[4]   Extensible Conditional Privacy Protection Authentication Scheme for Secure Vehicular Networks in a Multi-Cloud Environment [J].
Cui, Jie ;
Zhang, Xiaoyu ;
Zhong, Hong ;
Zhang, Jing ;
Liu, Lu .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2020, 15 (15) :1654-1667
[5]   An Efficient Message-Authentication Scheme Based on Edge Computing for Vehicular Ad Hoc Networks [J].
Cui, Jie ;
Wei, Lu ;
Zhang, Jing ;
Xu, Yan ;
Zhong, Hong .
IEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS, 2019, 20 (05) :1621-1632
[6]   NEW DIRECTIONS IN CRYPTOGRAPHY [J].
DIFFIE, W ;
HELLMAN, ME .
IEEE TRANSACTIONS ON INFORMATION THEORY, 1976, 22 (06) :644-654
[7]   Lightweight Privacy-Preserving Identity-Based Verifiable IoT-Based Health Storage System [J].
Ding, Ran ;
Zhong, Hong ;
Ma, Jianfeng ;
Liu, Ximeng ;
Ning, Jianting .
IEEE INTERNET OF THINGS JOURNAL, 2019, 6 (05) :8393-8405
[8]   An efficient user authentication and key agreement scheme for heterogeneous wireless sensor network tailored for the Internet of Things environment [J].
Farash, Mohammad Sabzinejad ;
Turkanovic, Muhamed ;
Kumari, Saru ;
Hoelbi, Marko .
AD HOC NETWORKS, 2016, 36 :152-176
[9]   High-performance Implementation of Elliptic Curve Cryptography Using Vector Instructions [J].
Faz-Hernandez, Armando ;
Lopez, Julio ;
Dahab, Ricardo .
ACM TRANSACTIONS ON MATHEMATICAL SOFTWARE, 2019, 45 (03)
[10]   Efficient Privacy-Aware Authentication Scheme for Mobile Cloud Computing Services [J].
He, Debiao ;
Kumar, Neeraj ;
Khan, Muhammad Khurram ;
Wang, Lina ;
Shen, Jian .
IEEE SYSTEMS JOURNAL, 2018, 12 (02) :1621-1631