Blockchain and PUF-Based Lightweight Authentication Protocol for Wireless Medical Sensor Networks

被引:188
作者
Wang, Weizheng [1 ]
Chen, Qiu [2 ]
Yin, Zhimeng [1 ]
Srivastava, Gautam [3 ,4 ]
Gadekallu, Thippa Reddy [5 ]
Alsolami, Fawaz [6 ]
Su, Chunhua [2 ]
机构
[1] City Univ Hong Kong, Dept Comp Sci, Hong Kong, Peoples R China
[2] Univ Aizu, Div Comp Sci, Aizu Wakamatsu, Fukushima 9658580, Japan
[3] Brandon Univ, Dept Math & Comp Sci, Brandon, MB R7A 6A9, Canada
[4] China Med Univ, Res Ctr Interneural Comp, Taichung 404, Taiwan
[5] Vellore Inst Technol, Sch Informat Technol, Vellore 632014, Tamil Nadu, India
[6] King Abdulaziz Univ, Dept Comp Sci, Jeddah 21341, Saudi Arabia
关键词
Authentication; Protocols; Security; Blockchains; Biometrics (access control); Medical diagnostic imaging; Internet of Things; Blockchain; mutual authentication protocol; physical unclonable functions (PUFs); security and privacy; wireless medical sensor networks (WMSNs); KEY AGREEMENT PROTOCOL; PROVABLY SECURE; DESIGN;
D O I
10.1109/JIOT.2021.3117762
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Due to the emergence of heterogeneous Internet of Medical Things (IoMT) (e.g., wearable health devices, smartwatch monitoring, and automated insulin delivery systems), large volumes of patient data are dispatched to central cloud servers for disease analysis and diagnosis. Although this direct mode brings a lot of convenience for both patients and medical professionals (MPs), the open communication channel between them also incurs several security and privacy issues, such as man-in-the-middle attacks, eavesdropping attacks, and tracking attacks. Based on the unsolved challenges in wireless medical sensor networks (WMSNs), several researchers have proposed various authentication and key agreement (AKA) protocols for this type of healthcare system recently. However, most of these protocols do not perceive physical-layer security and over-centralized server problem in WMSN. In this article, to address these two open problems, we propose a lightweight and reliable authentication protocol for WMSN, which is composed of cutting-edge blockchain technology and physically unclonable functions (PUFs). In addition, a fuzzy extractor scheme is introduced to deal with biometric information. Subsequently, two security evaluation methods are used to prove the high reliability of our proposed scheme. Finally, performance evaluation experiments illustrate that the proposed mutual authentication protocol requires the least computation and communication cost among the compared schemes.
引用
收藏
页码:8883 / 8891
页数:9
相关论文
共 22 条
[1]   HARCI: A Two-Way Authentication Protocol for Three Entity Healthcare IoT Networks [J].
Alladi, Tejasvi ;
Chamola, Vinay ;
Naren .
IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, 2021, 39 (02) :361-369
[2]   A robust and anonymous patient monitoring system using wireless medical sensor networks [J].
Amin, Ruhul ;
Islam, S. K. Hafizul ;
Biswas, G. P. ;
Khan, Muhammad Khurram ;
Kumar, Neeraj .
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2018, 80 :483-495
[3]   Cybersecurity for Cardiac Implantable Electronic Devices What Should You Know? [J].
Baranchuk, Adrian ;
Refaat, Marwan M. ;
Patton, Kristen K. ;
Chung, Mina K. ;
Krishnan, Kousik ;
Kutyifa, Valentina ;
Upadhyay, Gaurav ;
Fisher, John D. ;
Lakkireddy, Dhanunjaya R. .
JOURNAL OF THE AMERICAN COLLEGE OF CARDIOLOGY, 2018, 71 (11) :1284-1288
[4]   An efficient ECC-based provably secure three-factor user authentication and key agreement protocol for wireless healthcare sensor networks [J].
Challa, Sravani ;
Das, Ashok Kumar ;
Odelu, Vanga ;
Kumar, Neeraj ;
Kumari, Saru ;
Khan, Muhammad Khurram ;
Vasilakos, Athanasios V. .
COMPUTERS & ELECTRICAL ENGINEERING, 2018, 69 :534-554
[5]   A Secure Smartcard-Based Anonymous User Authentication Scheme for Healthcare Applications Using Wireless Medical Sensor Networks [J].
Das, Ashok Kumar ;
Sutrala, Anil Kumar ;
Odelu, Vanga ;
Goswami, Adrijit .
WIRELESS PERSONAL COMMUNICATIONS, 2017, 94 (03) :1899-1933
[6]   ON THE SECURITY OF PUBLIC KEY PROTOCOLS [J].
DOLEV, D ;
YAO, AC .
IEEE TRANSACTIONS ON INFORMATION THEORY, 1983, 29 (02) :198-208
[7]   A lightweight and secure two-factor authentication scheme for wireless body area networks in health-care IoT [J].
Fotouhi, Mahdi ;
Bayat, Majid ;
Das, Ashok Kumar ;
Far, Hossein Abdi Nasib ;
Pournaghi, S. Morteza ;
Doostari, M. A. .
COMPUTER NETWORKS, 2020, 177
[8]   Efficient end-to-end authentication protocol for wearable health monitoring systems [J].
Jiang, Qi ;
Ma, Jianfeng ;
Yang, Chao ;
Ma, Xindi ;
Shen, Jian ;
Chaudhry, Shehzad Ashraf .
COMPUTERS & ELECTRICAL ENGINEERING, 2017, 63 :182-195
[9]   PSL-MAAKA: Provably Secure and Lightweight Mutual Authentication and Key Agreement Protocol for Fully Public Channels in Internet of Medical Things [J].
Li, Jiliang ;
Su, Zhou ;
Guo, Deke ;
Choo, Kim-Kwang Raymond ;
Ji, Yusheng .
IEEE INTERNET OF THINGS JOURNAL, 2021, 8 (17) :13183-13195
[10]   A Secure Three-Factor User Authentication Protocol With Forward Secrecy for Wireless Medical Sensor Network Systems [J].
Li, Xiong ;
Peng, Jieyao ;
Obaidat, Mohammad S. ;
Wu, Fan ;
Khan, Muhammad Khurram ;
Chen, Chaoyang .
IEEE SYSTEMS JOURNAL, 2020, 14 (01) :39-50