An anonymous device to device access control based on secure certificate for internet of medical things systems

被引:40
作者
Chaudhry, Shehzad Ashraf [1 ]
Irshad, Azeem [2 ]
Nebhen, Jamel [3 ]
Bashir, Ali Kashif [4 ,5 ]
Moustafa, Nour [6 ]
Al-Otaibi, Yasser D. [7 ]
Bin Zikria, Yousaf [8 ]
机构
[1] Istanbul Gelisim Univ, Dept Comp Engn, Fac Engn & Architecture, Istanbul, Turkey
[2] Int Islamic Univ, Dept Comp Sci, Islamabad, Pakistan
[3] Prince Sattam bin Abdulaziz Univ, Coll Comp Engn & Sci, POB 151, Alkharj 11942, Saudi Arabia
[4] Manchester Metropolitan Univ, Dept Comp & Math, Manchester M15 6BH, Lancs, England
[5] Natl Univ Sci & Technol NUST, Sch Elect Engn & Comp Sci, Islamabad, Pakistan
[6] Univ New South Wales, Canberra, ACT 2610, Australia
[7] King Abdulaziz Univ, Fac Comp & Informat Technol Rabigh, Dept Informat Syst, Jeddah 21589, Saudi Arabia
[8] Yeungnam Univ, Dept Informat & Commun Engn, Gyongsan 38541, South Korea
关键词
IoMT; Key establishment; Device access control; Certificate; Stolen IoMT device; KEY AGREEMENT SCHEME; CONTROL PROTOCOL; PROVABLY SECURE; AUTHENTICATION;
D O I
10.1016/j.scs.2021.103322
中图分类号
TU [建筑科学];
学科分类号
0813 ;
摘要
The Internet of Medical Things (IoMT) is structured upon both the sensing and communication infrastructure and computation facilities. The IoMT provides the convenient and cheapest ways for healthcare by aiding the remote access to the patients' physiological data and using machine learning techniques for help in diagnosis. The communication delays in IoMT can be very harmful to healthcare. Device to device (D2D) secure communication is a vital area that can reduce communication delays; otherwise, caused due to the mediation of a third party. To substantiate a secure D2D communication framework, some schemes were recently proposed to secure D2D based communication infrastructure suitable for IoMT-based environments. However, the insecurities of some schemes against device physical capture attack and non-provision of anonymity along with related attacks are evident from the literature. This calls for a D2D secure access control system for realizing sustainable smart healthcare. In this article, using elliptic curve cryptography, a certificate based D2D access control scheme for IoMT systems (D2DAC-IoMT) is proposed. The security of the proposed D2DAC-IoMT is substantiated through formal and informal methods. Moreover, the performance analysis affirms that the proposed scheme provides a good trade-off between security and efficiency compared with some recent schemes.
引用
收藏
页数:9
相关论文
共 43 条
[1]  
Abdalla M, 2005, LECT NOTES COMPUT SC, V3386, P65
[2]   A clogging resistant secure authentication scheme for fog computing services [J].
Ali, Zeeshan ;
Chaudhry, Shehzad Ashraf ;
Mahmood, Khalid ;
Garg, Sahil ;
Lv, Zhihan ;
Bin Zikria, Yousaf .
COMPUTER NETWORKS, 2021, 185
[3]   A Quantum-Safe Key Hierarchy and Dynamic Security Association for LTESAE in 5G Scenario [J].
Arul, Rajakumar ;
Raja, Gunasekaran ;
Almagrabi, Alaa Omran ;
Alkatheiri, Mohammed Saeed ;
Chauhdary, Sajjad Hussain ;
Bashir, Ali Kashif .
IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2020, 16 (01) :681-690
[4]   Medical Diagnosis Using Machine Learning: A Statistical Review [J].
Bhavsar, Kaustubh Arun ;
Singla, Jimmy ;
Al-Otaibi, Yasser D. ;
Song, Oh-Young ;
Bin Zikriya, Yousaf ;
Bashir, Ali Kashif .
CMC-COMPUTERS MATERIALS & CONTINUA, 2021, 67 (01) :107-125
[5]   eDAAAS: Efficient distributed anonymous authentication and access in smart homes [J].
Braeken, An ;
Porambage, Pawani ;
Stojmenovic, Milos ;
Lambrinos, Lambros .
INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS, 2016, 12 (12)
[6]   Design and analysis of authenticated key agreement scheme in cloud-assisted cyber-physical systems [J].
Challa, Sravani ;
Das, Ashok Kumar ;
Gope, Prosanta ;
Kumar, Neeraj ;
Wu, Fan ;
Vasilakos, Athanasios V. .
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2020, 108 :1267-1286
[7]   Secure Signature-Based Authenticated Key Establishment Scheme for Future IoT Applications [J].
Challa, Sravani ;
Wazid, Mohammad ;
Das, Ashok Kumar ;
Kumar, Neeraj ;
Reddy, Alavalapati Goutham ;
Yoon, Eun-Jun ;
Yoo, Kee-Young .
IEEE ACCESS, 2017, 5 :3028-3043
[8]  
Chatterjee S, 2014, AD HOC SENS WIREL NE, V21, P121
[9]   PFLUA-DIoT: A Pairing Free Lightweight and Unlinkable User Access Control Scheme for Distributed IoT Environments [J].
Chaudhry, Shehzad Ashraf ;
Farash, Mohammad Sabzinejad ;
Kumar, Neeraj ;
Alsharif, Mohammed H. .
IEEE SYSTEMS JOURNAL, 2022, 16 (01) :309-316
[10]   Rotating behind Privacy: An Improved Lightweight Authentication Scheme for Cloud-based IoT Environment [J].
Chaudhry, Shehzad Ashraf ;
Irshad, Azeem ;
Yahya, Khalid ;
Kumar, Neeraj ;
Alazab, Mamoun ;
Bin Zikria, Yousaf .
ACM TRANSACTIONS ON INTERNET TECHNOLOGY, 2021, 21 (03)