Blockchain and PUF-Based Lightweight Authentication Protocol for Wireless Medical Sensor Networks

被引:170
作者
Wang, Weizheng [1 ]
Chen, Qiu [2 ]
Yin, Zhimeng [1 ]
Srivastava, Gautam [3 ,4 ]
Gadekallu, Thippa Reddy [5 ]
Alsolami, Fawaz [6 ]
Su, Chunhua [2 ]
机构
[1] City Univ Hong Kong, Dept Comp Sci, Hong Kong, Peoples R China
[2] Univ Aizu, Div Comp Sci, Aizu Wakamatsu, Fukushima 9658580, Japan
[3] Brandon Univ, Dept Math & Comp Sci, Brandon, MB R7A 6A9, Canada
[4] China Med Univ, Res Ctr Interneural Comp, Taichung 404, Taiwan
[5] Vellore Inst Technol, Sch Informat Technol, Vellore 632014, Tamil Nadu, India
[6] King Abdulaziz Univ, Dept Comp Sci, Jeddah 21341, Saudi Arabia
关键词
Authentication; Protocols; Security; Blockchains; Biometrics (access control); Medical diagnostic imaging; Internet of Things; Blockchain; mutual authentication protocol; physical unclonable functions (PUFs); security and privacy; wireless medical sensor networks (WMSNs); KEY AGREEMENT PROTOCOL; PROVABLY SECURE; DESIGN;
D O I
10.1109/JIOT.2021.3117762
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Due to the emergence of heterogeneous Internet of Medical Things (IoMT) (e.g., wearable health devices, smartwatch monitoring, and automated insulin delivery systems), large volumes of patient data are dispatched to central cloud servers for disease analysis and diagnosis. Although this direct mode brings a lot of convenience for both patients and medical professionals (MPs), the open communication channel between them also incurs several security and privacy issues, such as man-in-the-middle attacks, eavesdropping attacks, and tracking attacks. Based on the unsolved challenges in wireless medical sensor networks (WMSNs), several researchers have proposed various authentication and key agreement (AKA) protocols for this type of healthcare system recently. However, most of these protocols do not perceive physical-layer security and over-centralized server problem in WMSN. In this article, to address these two open problems, we propose a lightweight and reliable authentication protocol for WMSN, which is composed of cutting-edge blockchain technology and physically unclonable functions (PUFs). In addition, a fuzzy extractor scheme is introduced to deal with biometric information. Subsequently, two security evaluation methods are used to prove the high reliability of our proposed scheme. Finally, performance evaluation experiments illustrate that the proposed mutual authentication protocol requires the least computation and communication cost among the compared schemes.
引用
收藏
页码:8883 / 8891
页数:9
相关论文
共 22 条
  • [1] HARCI: A Two-Way Authentication Protocol for Three Entity Healthcare IoT Networks
    Alladi, Tejasvi
    Chamola, Vinay
    Naren
    [J]. IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, 2021, 39 (02) : 361 - 369
  • [2] A robust and anonymous patient monitoring system using wireless medical sensor networks
    Amin, Ruhul
    Islam, S. K. Hafizul
    Biswas, G. P.
    Khan, Muhammad Khurram
    Kumar, Neeraj
    [J]. FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2018, 80 : 483 - 495
  • [3] Cybersecurity for Cardiac Implantable Electronic Devices What Should You Know?
    Baranchuk, Adrian
    Refaat, Marwan M.
    Patton, Kristen K.
    Chung, Mina K.
    Krishnan, Kousik
    Kutyifa, Valentina
    Upadhyay, Gaurav
    Fisher, John D.
    Lakkireddy, Dhanunjaya R.
    [J]. JOURNAL OF THE AMERICAN COLLEGE OF CARDIOLOGY, 2018, 71 (11) : 1284 - 1288
  • [4] An efficient ECC-based provably secure three-factor user authentication and key agreement protocol for wireless healthcare sensor networks
    Challa, Sravani
    Das, Ashok Kumar
    Odelu, Vanga
    Kumar, Neeraj
    Kumari, Saru
    Khan, Muhammad Khurram
    Vasilakos, Athanasios V.
    [J]. COMPUTERS & ELECTRICAL ENGINEERING, 2018, 69 : 534 - 554
  • [5] A Secure Smartcard-Based Anonymous User Authentication Scheme for Healthcare Applications Using Wireless Medical Sensor Networks
    Das, Ashok Kumar
    Sutrala, Anil Kumar
    Odelu, Vanga
    Goswami, Adrijit
    [J]. WIRELESS PERSONAL COMMUNICATIONS, 2017, 94 (03) : 1899 - 1933
  • [6] ON THE SECURITY OF PUBLIC KEY PROTOCOLS
    DOLEV, D
    YAO, AC
    [J]. IEEE TRANSACTIONS ON INFORMATION THEORY, 1983, 29 (02) : 198 - 208
  • [7] A lightweight and secure two-factor authentication scheme for wireless body area networks in health-care IoT
    Fotouhi, Mahdi
    Bayat, Majid
    Das, Ashok Kumar
    Far, Hossein Abdi Nasib
    Pournaghi, S. Morteza
    Doostari, M. A.
    [J]. COMPUTER NETWORKS, 2020, 177
  • [8] Efficient end-to-end authentication protocol for wearable health monitoring systems
    Jiang, Qi
    Ma, Jianfeng
    Yang, Chao
    Ma, Xindi
    Shen, Jian
    Chaudhry, Shehzad Ashraf
    [J]. COMPUTERS & ELECTRICAL ENGINEERING, 2017, 63 : 182 - 195
  • [9] PSL-MAAKA: Provably Secure and Lightweight Mutual Authentication and Key Agreement Protocol for Fully Public Channels in Internet of Medical Things
    Li, Jiliang
    Su, Zhou
    Guo, Deke
    Choo, Kim-Kwang Raymond
    Ji, Yusheng
    [J]. IEEE INTERNET OF THINGS JOURNAL, 2021, 8 (17) : 13183 - 13195
  • [10] A Secure Three-Factor User Authentication Protocol With Forward Secrecy for Wireless Medical Sensor Network Systems
    Li, Xiong
    Peng, Jieyao
    Obaidat, Mohammad S.
    Wu, Fan
    Khan, Muhammad Khurram
    Chen, Chaoyang
    [J]. IEEE SYSTEMS JOURNAL, 2020, 14 (01): : 39 - 50