An anonymous device to device access control based on secure certificate for internet of medical things systems

被引:35
|
作者
Chaudhry, Shehzad Ashraf [1 ]
Irshad, Azeem [2 ]
Nebhen, Jamel [3 ]
Bashir, Ali Kashif [4 ,5 ]
Moustafa, Nour [6 ]
Al-Otaibi, Yasser D. [7 ]
Bin Zikria, Yousaf [8 ]
机构
[1] Istanbul Gelisim Univ, Dept Comp Engn, Fac Engn & Architecture, Istanbul, Turkey
[2] Int Islamic Univ, Dept Comp Sci, Islamabad, Pakistan
[3] Prince Sattam bin Abdulaziz Univ, Coll Comp Engn & Sci, POB 151, Alkharj 11942, Saudi Arabia
[4] Manchester Metropolitan Univ, Dept Comp & Math, Manchester M15 6BH, Lancs, England
[5] Natl Univ Sci & Technol NUST, Sch Elect Engn & Comp Sci, Islamabad, Pakistan
[6] Univ New South Wales, Canberra, ACT 2610, Australia
[7] King Abdulaziz Univ, Fac Comp & Informat Technol Rabigh, Dept Informat Syst, Jeddah 21589, Saudi Arabia
[8] Yeungnam Univ, Dept Informat & Commun Engn, Gyongsan 38541, South Korea
关键词
IoMT; Key establishment; Device access control; Certificate; Stolen IoMT device; KEY AGREEMENT SCHEME; CONTROL PROTOCOL; PROVABLY SECURE; AUTHENTICATION;
D O I
10.1016/j.scs.2021.103322
中图分类号
TU [建筑科学];
学科分类号
0813 ;
摘要
The Internet of Medical Things (IoMT) is structured upon both the sensing and communication infrastructure and computation facilities. The IoMT provides the convenient and cheapest ways for healthcare by aiding the remote access to the patients' physiological data and using machine learning techniques for help in diagnosis. The communication delays in IoMT can be very harmful to healthcare. Device to device (D2D) secure communication is a vital area that can reduce communication delays; otherwise, caused due to the mediation of a third party. To substantiate a secure D2D communication framework, some schemes were recently proposed to secure D2D based communication infrastructure suitable for IoMT-based environments. However, the insecurities of some schemes against device physical capture attack and non-provision of anonymity along with related attacks are evident from the literature. This calls for a D2D secure access control system for realizing sustainable smart healthcare. In this article, using elliptic curve cryptography, a certificate based D2D access control scheme for IoMT systems (D2DAC-IoMT) is proposed. The security of the proposed D2DAC-IoMT is substantiated through formal and informal methods. Moreover, the performance analysis affirms that the proposed scheme provides a good trade-off between security and efficiency compared with some recent schemes.
引用
收藏
页数:9
相关论文
共 50 条
  • [1] An anonymous device to device access control based on secure certificate for internet of medical things systems: An anonymous D2D access control scheme for IoMT
    Chaudhry, Shehzad Ashraf
    Irshad, Azeem
    Nebhen, Jamel
    Bashir, Ali Kashif
    Moustafa, Nour
    Al-Otaibi, Yasser D.
    Zikria, Yousaf Bin
    Sustainable Cities and Society, 2021, 75
  • [2] Certificate-Based Anonymous Device Access Control Scheme for IoT Environment
    Malani, Saurav
    Srinivas, Jangirala
    Das, Ashok Kumar
    Srinathan, Kannan
    Jo, Minho
    IEEE INTERNET OF THINGS JOURNAL, 2019, 6 (06): : 9762 - 9773
  • [3] Fine-grained Device and Data Access Control of Community Medical Internet of Things
    Huang, Cheng
    Zhang, Ziyang
    Huang, Jing
    Chen, Fulong
    2020 16TH INTERNATIONAL CONFERENCE ON MOBILITY, SENSING AND NETWORKING (MSN 2020), 2020, : 236 - 243
  • [4] Towards Secure and Usable Certificate-Based Authentication System Using a Secondary Device for an Industrial Internet of Things
    Choi, Jusop
    Cho, Junsung
    Kim, Hyoungshick
    Hyun, Sangwon
    APPLIED SCIENCES-BASEL, 2020, 10 (06):
  • [5] Blockchain based security protocol for device to device secure communication in internet of things networks
    Chandrakar, Palak
    Bagga, Rashi
    Kumar, Yogesh
    Dwivedi, Sanjeev Kumar
    Amin, Ruhul
    SECURITY AND PRIVACY, 2023, 6 (01)
  • [6] Medical device integration model based on the internet of things
    Hao, Aiyu
    Wang, Ling
    Open Biomedical Engineering Journal, 2015, 9 : 256 - 261
  • [7] Rogue Device Mitigation in the Internet of Things: A Blockchain-Based Access Control Approach
    Javaid, Uzair
    Jameel, Furqan
    Javaid, Umair
    Khan, Muhammad Toaha Raza
    Jantti, Riku
    MOBILE INFORMATION SYSTEMS, 2020, 2020 (2020)
  • [8] A Key Management Protocol for Secure Device-to-Device Communication in the Internet of Things
    Kandi, Mohamed Ali
    Lakhlef, Hicham
    Bouabdallah, Abdelmadjid
    Challal, Yacine
    2019 IEEE GLOBAL COMMUNICATIONS CONFERENCE (GLOBECOM), 2019,
  • [9] A UAV-assisted Blockchain Based Secure Device-to-Device Communication in Internet of Military Things
    Golam, Mohtasin
    Lee, Jae-Min
    Kim, Dong-Seong
    11TH INTERNATIONAL CONFERENCE ON ICT CONVERGENCE: DATA, NETWORK, AND AI IN THE AGE OF UNTACT (ICTC 2020), 2020, : 1896 - 1898
  • [10] IBA: A secure and efficient device-to-device interaction-based authentication scheme for Internet of Things
    Yang, Shuo
    Zheng, Xinran
    Liu, Guining
    Wang, Xingjun
    COMPUTER COMMUNICATIONS, 2023, 200 : 171 - 181