Computation-transferable authenticated key agreement protocol for smart healthcare

被引:22
作者
Wang, Wenming [1 ,2 ]
Huang, Haiping [1 ,3 ]
Xiao, Fu [1 ,3 ]
Li, Qi [1 ,3 ]
Xue, Lingyan [1 ,3 ]
Jiang, Jiansheng [2 ]
机构
[1] Nanjing Univ Posts & Telecommun, Sch Comp Sci, Nanjing 210003, Jiangsu, Peoples R China
[2] Anqing Normal Univ, Univ Key Lab Intelligent Percept & Comp Anhui Pro, Anqing 246011, Anhui, Peoples R China
[3] Jiangsu High Technol Res Key Lab Wireless Sensor, Nanjing 210003, Jiangsu, Peoples R China
基金
中国国家自然科学基金;
关键词
Smart healthcare; Authenticated key agreement (AKA); Security; Privacy; MUTUAL AUTHENTICATION; USER AUTHENTICATION; SCHEME; CRYPTOGRAPHY; INTERNET; THINGS;
D O I
10.1016/j.sysarc.2021.102215
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Smart healthcare plays an important role in contemporary society while its security and privacy issues remain inevitable challenges. Authenticated key agreement (AKA) mechanism, as the foundation of secure communication, has been recognized as an important measure for solving this problem. Most existing AKA protocols utilize cloud-based centralized architecture, data privacy and security can be exposed easily once the centralized authority is attacked. In addition, most past solutions require the online registration center to assist mutual authentication and consume considerable amounts of resources. To address these drawbacks, a computationtransferable authenticated key agreement protocol without an online registration center for smart healthcare is designed. Specifically, the proposed protocol can realize mutual authentication and key agreement without the need for an online registration center, as well as being able to satisfy security and privacy protection requirements. By transferring partial computation tasks to the server, the proposed scheme incurs lower computation and communication overhead on the user side. Moreover, the proposed scheme adopts certificateless public key cryptography, which can solve the problems of certificate management and key escrow. Performance analysis indicates that the proposal reduces 9.9% of the computation overhead on the resource-limited terminal, which is suitable for low-power IoT applications, including smart healthcare.
引用
收藏
页数:10
相关论文
共 45 条
[21]   Certificateless authenticated key agreement for blockchain-based WBANs [J].
Mwitende, Gervais ;
Ye, Yalan ;
Ali, Ikram ;
Li, Fagen .
JOURNAL OF SYSTEMS ARCHITECTURE, 2020, 110
[22]   Strongly secure identity-based authenticated key agreement protocols without bilinear pairings [J].
Ni, Liang ;
Chen, Gongliang ;
Li, Jianhua ;
Hao, Yanyan .
INFORMATION SCIENCES, 2016, 367 :176-193
[23]   A Secure Biometrics-Based Multi-Server Authentication Protocol Using Smart Cards [J].
Odelu, Vanga ;
Das, Ashok Kumar ;
Goswami, Adrijit .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2015, 10 (09) :1953-1966
[24]   Exploiting smart e-Health gateways at the edge of healthcare Internet-of-Things:A fog computing approach [J].
Rahmani, Amir M. ;
Gia, Tuan Nguyen ;
Negash, Behailu ;
Anzanpour, Arman ;
Azimi, Iman ;
Jiang, Mingzhe ;
Liljeberg, Pasi .
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2018, 78 :641-658
[25]  
Sakhreliya SC, 2014, IEEE I C COMP INT CO, P186
[26]  
Scott M., 2013, IACR CRYPTOL EPRINT
[27]  
Shamir A., 1985, ADV CRYPTOLOGY, P47, DOI [10.1007/3-540-39568-7_5, DOI 10.1007/3-540-39568-7_5]
[28]   An Efficient Elliptic Curve Cryptography-Based Without Pairing KPABE for Internet of Things [J].
Sowjanya, K. ;
Dasgupta, Mou ;
Ray, Sangram ;
Obaidat, Mohammad S. .
IEEE SYSTEMS JOURNAL, 2020, 14 (02) :2154-2163
[29]   A PUF-Based and Cloud-Assisted Lightweight Authentication for Multi-Hop Body Area Network [J].
Tan, Xiao ;
Zhang, Jiliang ;
Zhang, Yuanjing ;
Qin, Zheng ;
Ding, Yong ;
Wang, Xingwei .
TSINGHUA SCIENCE AND TECHNOLOGY, 2021, 26 (01) :36-47
[30]   A Privacy-Aware Authentication Scheme for Distributed Mobile Cloud Computing Services [J].
Tsai, Jia-Lun ;
Lo, Nai-Wei .
IEEE SYSTEMS JOURNAL, 2015, 9 (03) :805-815