Lightweight authentication protocol for connected medical IoT through privacy-preserving access

被引:2
|
作者
Tanveer, Muhammad [1 ]
Chelloug, Samia Allaoua [2 ]
Alabdulhafith, Maali [2 ]
Abd El-Latif, Ahmed A. [3 ,4 ,5 ]
机构
[1] Univ Management & Technol, Dept Comp Sci, Lahore 54770, Pakistan
[2] Princess Nourah bint Abdulrahman Univ, Coll Comp & Informat Sci, Dept Informat Technol, POB 84428, Riyadh 11671, Saudi Arabia
[3] Prince Sultan Univ, Coll Comp & Informat Sci, EIAS Data Sci Lab, Riyadh 11586, Saudi Arabia
[4] Prince Sultan Univ, Ctr Excellence Quantum & Intelligent Comp, Riyadh 11586, Saudi Arabia
[5] Menoufia Univ, Fac Sci, Dept Math & Comp Sci, Menoufia 32511, Egypt
关键词
Smart healthcare system; Security; Privacy; Authentication; Encryption; SCHEME;
D O I
10.1016/j.eij.2024.100474
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
With the rapid progress of communication technology, the Internet of Things (IoT) has emerged as an essential element in our daily lives. Given that the IoT encompasses diverse devices that often have limited resources in terms of communication, computation, and storage. Consequently, the National Institute of Standards and Technology (NIST) has standardized several lightweight cryptographic algorithms for encryption and decryption, specifically designed to meet the needs of resource -constrained IoT devices. These cryptographic algorithms, known as authenticated encryption with associated data (AEAD), offer more than just confidentiality-they also guarantee information integrity and authentication. Unlike conventional encryption algorithms like AES, which solely provide confidentiality, AEAD algorithms encompass additional functionality to achieve authenticity. This eliminates the need for separate algorithms like message authentication codes to ensure authenticity. Therefore, by leveraging the characteristics of an AEAD protocol, it is possible to develop a lightweight authentication framework to mitigate the security risks inherent in public communication channels. Therefore, in this work, we designed the lightweight authentication protocol for the smart healthcare system (BLAP-SHS) using an AEAD mechanism. In order to do this, a session key must first be created for encrypted communication. This is done via a method called mutual authentication, which verifies the legitimacy of both the user and the server. The random -or -real methodology ensures the security of the derived session key, and the Scyther tool is used to assess BLAP-SHS' resistance to man -in -the -middle and replay attacks. Through using the technique of informal security analysis, the resilience of BLAP-SHS against denial of service, and password -guessing threats are evaluated. By juxtaposing BLAP-SHS with other prominent authentication techniques, the usefulness of BLAP-SHS is also assessed in terms of computing and communication costs. We illustrate that the BLAP-SHS requires a reduction in computation cost ranging from [70.11% to 95.21%] and a reduction in communication resources ranging from [3.85% to 9.09%], as evidenced by our comparative study.
引用
收藏
页数:12
相关论文
共 50 条
  • [1] A Lightweight and Privacy-Preserving Authentication Protocol for Healthcare in an IoT Environment
    Xie, Qingyun
    Ding, Zixuan
    Xie, Qi
    [J]. MATHEMATICS, 2023, 11 (18)
  • [2] A Lightweight Privacy-Preserving Authentication Protocol for VANETs
    Li, Xiong
    Liu, Tian
    Obaidat, Mohammad S.
    Wu, Fan
    Vijayakumar, Pandi
    Kumar, Neeraj
    [J]. IEEE SYSTEMS JOURNAL, 2020, 14 (03): : 3547 - 3557
  • [3] A Lightweight Privacy-Preserving Mutual Authentication Protocol for RFID Systems
    Fan, Xinxin
    Gong, Guang
    Engels, Daniel W.
    Smith, Eric M.
    [J]. 2011 IEEE GLOBECOM WORKSHOPS (GC WKSHPS), 2011, : 1083 - 1087
  • [4] A Lightweight and Privacy-Preserving Authentication Protocol for Mobile Edge Computing
    Kaur, Kuljeet
    Garg, Sahil
    Kaddoum, Georges
    Guizani, Mohsen
    Jayakody, Dushantha Nalin K.
    [J]. 2019 IEEE GLOBAL COMMUNICATIONS CONFERENCE (GLOBECOM), 2019,
  • [5] A secure and privacy-preserving lightweight authentication protocol for wireless communications
    [J]. Ogundoyin, Sunday Oyinlola (honsybee@yahoo.com), 2017, Bellwether Publishing, Ltd. (26):
  • [6] A Lightweight Privacy-Preserving Communication Protocol for Heterogeneous IoT Environment
    Luo, Xi
    Yin, Lihua
    Li, Chao
    Wang, Chonghua
    Fang, Fuyang
    Zhu, Chunsheng
    Tian, Zhihong
    [J]. IEEE ACCESS, 2020, 8 : 67192 - 67204
  • [7] A novel vector-space-based lightweight privacy-preserving RFID authentication protocol for IoT environment
    Shariq, Mohd
    Singh, Karan
    [J]. JOURNAL OF SUPERCOMPUTING, 2021, 77 (08): : 8532 - 8562
  • [8] A novel vector-space-based lightweight privacy-preserving RFID authentication protocol for IoT environment
    Mohd Shariq
    Karan Singh
    [J]. The Journal of Supercomputing, 2021, 77 : 8532 - 8562
  • [9] Collusion-resistant, Lightweight and Privacy-preserving Authentication Protocol for IoV
    Lalouani, Wassila
    Younis, Mohamed
    [J]. 2023 IEEE 20TH CONSUMER COMMUNICATIONS & NETWORKING CONFERENCE, CCNC, 2023,
  • [10] Privacy-Preserving and Verifiable Outsourcing Message Transmission and Authentication Protocol in IoT
    Li, Hongjun
    Kong, Fanyu
    Yu, Jia
    Zhang, Hanlin
    Diao, Luhong
    Tao, Yunting
    [J]. 2022 IEEE INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS, TRUSTCOM, 2022, : 556 - 564