A secure and lightweight hash-based mutual authentication scheme in fog-assisted healthcare network

被引:0
|
作者
Verma, Upendra [1 ]
Gianey, Hemant Kumar [1 ]
机构
[1] SVKMS NMIMS Univ, Mukesh Patel Sch Technol Management & Engn, Dept Comp Engn, Shirpur 425405, Maharashtra, India
关键词
fog-assisted healthcare networks; real-or-random; ROR model; mutual authentication; hash function; cryptographic attacks; PROTOCOL; INTERNET; DESIGN; SYSTEM; THINGS; IOT;
D O I
10.1504/IJES.2024.144360
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Security and privacy are considered the two main challenges in fog-assisted healthcare networks. Several authentication approaches have been presented in recent years to address the security issues in fog-assisted healthcare networks. To cope with these challenges and improve the safety of fog-assisted healthcare networks, we propose a secure and efficient mutual authentication scheme. In this paper, we design a lightweight hash-based authentication scheme for fog-assisted healthcare networks to provide security against various attacks. The informal security analysis illustrates that the proposed scheme has the capability to resist various security threats. In addition, the proposed scheme has been evaluated with a real-or-random (ROR) model to prove its resilience against cryptographic attacks. The performance study demonstrates that the proposed scheme is more effective and lightweight compared to existing schemes. Moreover, a comprehensive comparison analysis has been undertaken, which shows the proposed scheme provides better security features than existing schemes.
引用
收藏
页码:200 / 212
页数:14
相关论文
共 50 条
  • [1] DePass: A Secure Hash-based Authentication Scheme
    Benzekki, Kamal
    El Fergougui, Abdeslam
    ElAlaoui, Abdelbaki ElBelrhiti
    2017 INTELLIGENT SYSTEMS AND COMPUTER VISION (ISCV), 2017,
  • [2] A Lightweight Hash-Based Mutual Authentication Protocol for RFID
    Li, Zhangbing
    Zhong, Xiaoyong
    Chen, Xiaochun
    Liu, Jianxun
    MANAGEMENT OF INFORMATION, PROCESS AND COOPERATION, 2017, 686 : 87 - 98
  • [3] A secure and robust hash-based scheme for image authentication
    Ahmed, Fawad
    Siyal, M. Y.
    Abbas, Vali Uddin
    SIGNAL PROCESSING, 2010, 90 (05) : 1456 - 1470
  • [4] Hash-based RFID Mutual Authentication Protocol
    Liu, Yang
    Peng, Yu
    Wang, Bailing
    Qu, Yun
    Bai, Xuefengi
    Yuan, Xinling
    Yin, Zelong
    INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2013, 7 (03): : 183 - 194
  • [5] Lightweight Hardware Based Secure Authentication Scheme for Fog Computing
    Huang, Baiyi
    Cheng, Xiuzhen
    Cao, Yuan
    Zhang, Le
    2018 THIRD IEEE/ACM SYMPOSIUM ON EDGE COMPUTING (SEC), 2018, : 433 - 439
  • [6] A Simple Attack on a Recently Introduced Hash-Based Secure User Authentication Scheme
    Kim, Minho
    Koc, Cetin Kaya
    INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2006, 6 (5B): : 157 - 160
  • [7] Lightweight Hash-Based Authentication Protocol for Smart Grids
    Kook, Sangjin
    Kim, Keunok
    Ryu, Jihyeon
    Lee, Youngsook
    Won, Dongho
    SENSORS, 2024, 24 (10)
  • [8] Enhanced Hash-Based RFID Mutual Authentication Protocol
    Kim, Hyunsung
    COMPUTER APPLICATIONS FOR SECURITY, CONTROL AND SYSTEM ENGINEERING, 2012, 339 : 70 - 77
  • [9] Fog-assisted secure healthcare data aggregation scheme in IoT-enabled WSN
    Ata Ullah
    Ghawar Said
    Muhammad Sher
    Huansheng Ning
    Peer-to-Peer Networking and Applications, 2020, 13 : 163 - 174
  • [10] Fog-assisted secure healthcare data aggregation scheme in IoT-enabled WSN
    Ullah, Ata
    Said, Ghawar
    Sher, Muhammad
    Ning, Huansheng
    PEER-TO-PEER NETWORKING AND APPLICATIONS, 2020, 13 (01) : 163 - 174