An enhanced three-factor based authentication and key agreement protocol using PUF in IoMT

被引:0
|
作者
Wu, Tsu-Yang [1 ,2 ]
Wu, Haozhi [2 ]
Kumari, Saru [3 ]
Chen, Chien-Ming [1 ]
机构
[1] Nanjing Univ Informat Sci & Technol, Sch Artificial Intelligence, Nanjing 210044, Jiangsu, Peoples R China
[2] Shandong Univ Sci & Technol, Coll Comp Sci & Engn, Qingdao 266590, Shandong, Peoples R China
[3] Chaudhary Charan Singh Univ, Dept Math, Meerut 250004, Uttar Pradesh, India
关键词
Authentication; IoMT; PUF; Cryptanalysis; ANONYMOUS USER AUTHENTICATION; PROVABLY SECURE; MUTUAL AUTHENTICATION; EFFICIENT; SCHEME; LIGHTWEIGHT;
D O I
10.1007/s12083-024-01839-z
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
With the rapid development of Internet of Things (IoT) technology, Internet of Medical Things (IoMT) plays a huge important role in improving the quality of healthcare services. By using IoMT, doctors are able to remotely monitor real-time physiological information of patients automatically, thereby alleviating their burden. This approach is not only considered more efficient and cost-effective, but also provides support from medical experts for emergency treatment of patients. However, as these health data contain sensitive information related to patient privacy, any leakage or malicious tampering of information can lead to incorrect diagnosis by doctors, seriously endangering patient health. Therefore, ensuring the security of patients' health data has become particularly important. In 2023, Kim et al. proposed an improved lightweight user authentication protocol for IoMT. Unfortunately, we found that this protocol is vulnerable to security threats such as user device capture attacks, man-in-the-middle attacks. In response to the above security problems, we propose an enhanced three-factor based authentication and key agreement protocol. The protocol enhances security by utilizing both strong physical unclonable functions (PUF) and weak PUF. In terms of protocol security, we verify its properties using Real-or-Random (ROR) model, informal analysis, and AVISPA tool. Finally, this paper is compared with seven other protocols. We analyzed the security, computational cost, and communication cost of each scheme. The results show that our protocol has low computational and communication costs while ensuring security.
引用
收藏
页数:19
相关论文
共 50 条
  • [1] An improved three-factor authentication and key agreement protocol for smart grid
    Qi M.
    Journal of Ambient Intelligence and Humanized Computing, 2023, 14 (12) : 16465 - 16476
  • [2] Three-factor authentication and key agreement protocol with collusion resistance in VANETs
    Pan, Guanlin
    Tan, Haowen
    Zheng, Wenying
    Vijayakumar, P.
    Wu, Q. M. Jonathan
    Sivaraman, Audithan
    JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2025, 90
  • [3] Provably secure three-factor authentication and key agreement scheme for session initiation protocol
    Challa, Sravani
    Das, Ashok Kumar
    Kumari, Saru
    Odelu, Vanga
    Wu, Fan
    Li, Xiong
    SECURITY AND COMMUNICATION NETWORKS, 2016, 9 (18) : 5412 - 5431
  • [4] A new three-factor authentication and key agreement protocol for multi-server environment
    T. Sudhakar
    V. Natarajan
    Wireless Networks, 2020, 26 : 4909 - 4920
  • [5] A new three-factor authentication and key agreement protocol for multi-server environment
    Sudhakar, T.
    Natarajan, V.
    WIRELESS NETWORKS, 2020, 26 (07) : 4909 - 4920
  • [6] A Secure Three-Factor User Authentication and Key Agreement Protocol for TMIS With User Anonymity
    Ruhul Amin
    G. P. Biswas
    Journal of Medical Systems, 2015, 39
  • [7] A Secure Three-Factor User Authentication and Key Agreement Protocol for TMIS With User Anonymity
    Amin, Ruhul
    Biswas, G. P.
    JOURNAL OF MEDICAL SYSTEMS, 2015, 39 (08)
  • [8] A Lightweight ECC-based Three-Factor Mutual Authentication and Key Agreement Protocol for WSNs in IoT
    Fariss, Meriam
    El Gafif, Hassan
    Toumanari, Ahmed
    International Journal of Advanced Computer Science and Applications, 2022, 13 (06): : 491 - 501
  • [9] A New PUF-Based Protocol for Mutual Authentication and Key Agreement Between Three Layers of Entities in Cloud-Based IoMT Networks
    Modarres, Amir Masoud Aminian
    Anzabi-Nezhad, Nima S.
    Zare, Maryam
    IEEE ACCESS, 2024, 12 : 21807 - 21824
  • [10] Trusted Authority Assisted Three-Factor Authentication and Key Agreement Protocol for the Implantable Medical System
    Mao, Deming
    Zhang, Ling
    Li, Xiaoyu
    Mu, Dejun
    WIRELESS COMMUNICATIONS & MOBILE COMPUTING, 2018,