A lightweight mutual authentication and key agreement protocol for remote surgery application in Tactile Internet environment

被引:37
作者
Kamil, Ismaila Adeniyi [1 ]
Ogundoyin, Sunday Oyinlola [1 ]
机构
[1] Univ Ibadan, Dept Elect & Elect Engn, Secur Privacy & Commun SPCOM Res Grp, Ibadan, Nigeria
关键词
Tactile Internet; Remote surgery; Authentication; AVISPA; Robotic arm; Real-Or-random (ROR); SECURE COMMUNICATION PROTOCOL; WIRELESS SENSOR NETWORKS; USER AUTHENTICATION; SCHEME; ROBUST; EXCHANGE;
D O I
10.1016/j.comcom.2021.01.025
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The emergence of the fifth generation (5G) networks has revolutionized the cyberspace due to its ultra-low latency, huge capacity, higher data rate, and more reliable connections. One of such technological innovations is Tactile Internet which means remotely transmitting a physical sense of touch. Tactile Internet supports a number of realtime interaction applications such as augmented reality, virtual reality, gaming, smart grid, and ehealthcare. In the context of ehealthcare, Tactile Internet allows a surgeon to remotely operate a patient by implementing some control actions via a robotic system and receiving a haptic feedback. Although, the ultimate goal of this auspicious technology is to safe human lives, the aim may be jeopardized if proper security measures are not implemented. Any unauthorized access to the robotic system may lead to wrong surgical procedures that can cause havoc or even result to death. To this end, we develop an ultraefficient mutual authentication and key agreement protocol for Tactile Internet-assisted remote surgery application. The protocol is designed using a few cryptographic hash function and exclusive-OR operations. The security of the proposed protocol is demonstrated formally using Real-Or-Random (ROR) model, formal security verification using Automated Verification of Internet Security Protocols and Applications (AVISPA) toolkit and the generally-acknowledged Burrows?Abadi?Nedham (BAN) Logic, and information security analysis to corroborate the results of the formal security analyses. The functionality comparison and numerical analysis show the superiority of the proposed protocol over the state-of-the-art schemes. The experimental simulation reveals that the protocol is very efficient and suitable for practical deployment.
引用
收藏
页码:1 / 18
页数:18
相关论文
共 59 条
[1]  
Abdalla M, 2005, LECT NOTES COMPUT SC, V3386, P65
[2]   SecLAP: Secure and lightweight RFID authentication protocol for Medical IoT [J].
Aghili, Seyed Farhad ;
Mala, Hamid ;
Kaliyar, Pallavi ;
Conti, Mauro .
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2019, 101 :621-634
[3]  
Aijaz A., 2016, 5G EN TECTL INT RAD, P1, DOI [10.1109/WCNC.2016, DOI 10.1109/WCNC.2016]
[4]  
Ali R., J AMB INTEL HUM COMP, DOI [10.1007/s12652-018-(2018)1015-9, DOI 10.1007/S12652-018-(2018)1015-9]
[5]   CFSec: Password based secure communication protocol in cloud-fog environment [J].
Amin, Ruhul ;
Kunal, Sourav ;
Saha, Arijit ;
Das, Debasis ;
Alamri, Atif .
JOURNAL OF PARALLEL AND DISTRIBUTED COMPUTING, 2020, 140 :52-62
[6]   A robust mutual authentication protocol for WSN with multiple base-stations [J].
Amin, Ruhul ;
Islam, S. K. Hafizul ;
Biswas, G. P. ;
Obaidat, Mohammad S. .
AD HOC NETWORKS, 2018, 75-76 :1-18
[7]   An untraceable and anonymous password authentication protocol for heterogeneous wireless sensor networks [J].
Amin, Ruhul ;
Islam, S. K. Hafizul ;
Kumar, Neeraj ;
Choo, Kim-Kwang Raymond .
JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2018, 104 :133-144
[8]   A robust and anonymous patient monitoring system using wireless medical sensor networks [J].
Amin, Ruhul ;
Islam, S. K. Hafizul ;
Biswas, G. P. ;
Khan, Muhammad Khurram ;
Kumar, Neeraj .
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2018, 80 :483-495
[9]   Design of an anonymity-preserving three-factor authenticated key exchange protocol for wireless sensor networks [J].
Amin, Ruhul ;
Islam, S. K. Hafizul ;
Biswas, G. P. ;
Khan, Muhammad Khurram ;
Leng, Lu ;
Kumar, Neeraj .
COMPUTER NETWORKS, 2016, 101 :42-62
[10]   A secure light weight scheme for user authentication and key agreement in multi-gateway based wireless sensor networks [J].
Amin, Ruhul ;
Biswas, G. P. .
AD HOC NETWORKS, 2016, 36 :58-80