An enhanced three-factor based authentication and key agreement protocol using PUF in IoMT

被引:0
|
作者
Wu, Tsu-Yang [1 ,2 ]
Wu, Haozhi [2 ]
Kumari, Saru [3 ]
Chen, Chien-Ming [1 ]
机构
[1] Nanjing Univ Informat Sci & Technol, Sch Artificial Intelligence, Nanjing 210044, Jiangsu, Peoples R China
[2] Shandong Univ Sci & Technol, Coll Comp Sci & Engn, Qingdao 266590, Shandong, Peoples R China
[3] Chaudhary Charan Singh Univ, Dept Math, Meerut 250004, Uttar Pradesh, India
关键词
Authentication; IoMT; PUF; Cryptanalysis; ANONYMOUS USER AUTHENTICATION; PROVABLY SECURE; MUTUAL AUTHENTICATION; EFFICIENT; SCHEME; LIGHTWEIGHT;
D O I
10.1007/s12083-024-01839-z
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
With the rapid development of Internet of Things (IoT) technology, Internet of Medical Things (IoMT) plays a huge important role in improving the quality of healthcare services. By using IoMT, doctors are able to remotely monitor real-time physiological information of patients automatically, thereby alleviating their burden. This approach is not only considered more efficient and cost-effective, but also provides support from medical experts for emergency treatment of patients. However, as these health data contain sensitive information related to patient privacy, any leakage or malicious tampering of information can lead to incorrect diagnosis by doctors, seriously endangering patient health. Therefore, ensuring the security of patients' health data has become particularly important. In 2023, Kim et al. proposed an improved lightweight user authentication protocol for IoMT. Unfortunately, we found that this protocol is vulnerable to security threats such as user device capture attacks, man-in-the-middle attacks. In response to the above security problems, we propose an enhanced three-factor based authentication and key agreement protocol. The protocol enhances security by utilizing both strong physical unclonable functions (PUF) and weak PUF. In terms of protocol security, we verify its properties using Real-or-Random (ROR) model, informal analysis, and AVISPA tool. Finally, this paper is compared with seven other protocols. We analyzed the security, computational cost, and communication cost of each scheme. The results show that our protocol has low computational and communication costs while ensuring security.
引用
收藏
页数:19
相关论文
共 50 条
  • [21] A secure three-factor authentication and biometrics-based key agreement scheme for TMIS with user anonymity
    Sammoud, Amal
    Chalouf, Mohamed Aymen
    Hamdi, Omessaad
    Montavont, Nicolas
    Bouallegue, Ammar
    2020 16TH INTERNATIONAL WIRELESS COMMUNICATIONS & MOBILE COMPUTING CONFERENCE, IWCMC, 2020, : 1916 - 1921
  • [22] Three-Factor Anonymous Authentication and Key Agreement Based on Fuzzy Biological Extraction for Industrial Internet of Things
    Xu, Hang
    Hsu, Chingfang
    Harn, Lein
    Cui, Janqun
    Zhao, Zhuo
    Zhang, Ze
    IEEE TRANSACTIONS ON SERVICES COMPUTING, 2023, 16 (04) : 3000 - 3013
  • [23] An efficient ECC-based provably secure three-factor user authentication and key agreement protocol for wireless healthcare sensor networks
    Challa, Sravani
    Das, Ashok Kumar
    Odelu, Vanga
    Kumar, Neeraj
    Kumari, Saru
    Khan, Muhammad Khurram
    Vasilakos, Athanasios V.
    COMPUTERS & ELECTRICAL ENGINEERING, 2018, 69 : 534 - 554
  • [24] Three-Factor Anonymous Authentication and Key Agreement Scheme for Telecare Medicine Information Systems
    Arshad, Hamed
    Nikooghadam, Morteza
    JOURNAL OF MEDICAL SYSTEMS, 2014, 38 (12)
  • [25] An Efficient Three-Factor Privacy-Preserving Authentication and Key Agreement Protocol for Vehicular Ad-Hoc Network
    Xu, Tao
    Xu, Cheng
    Xu, Zisang
    CHINA COMMUNICATIONS, 2021, 18 (12) : 315 - 331
  • [26] Robust three-factor remote user authentication scheme with key agreement for multimedia systems
    Li, Xiong
    Niu, Jianwei
    Khan, Muhammad Khurram
    Liao, Junguo
    Zhao, Xiaoke
    SECURITY AND COMMUNICATION NETWORKS, 2016, 9 (13) : 1916 - 1927
  • [27] Three-Factor Anonymous Authentication and Key Agreement Scheme for Telecare Medicine Information Systems
    Hamed Arshad
    Morteza Nikooghadam
    Journal of Medical Systems, 2014, 38
  • [28] Applying biometrics to design three-factor remote user authentication scheme with key agreement
    Li, Xiong
    Niu, Jianwei
    Wang, Zhibo
    Chen, Caisen
    SECURITY AND COMMUNICATION NETWORKS, 2014, 7 (10) : 1488 - 1497
  • [29] An Efficient Three-Factor Privacy-Preserving Authentication and Key Agreement Protocol for Vehicular Ad-Hoc Network
    Tao Xu
    Cheng Xu
    Zisang Xu
    China Communications, 2021, 18 (12) : 315 - 331
  • [30] A PUF-based lightweight authentication and key agreement protocol for smart UAV networks
    Zhang, Li
    Xu, Jianbo
    Obaidat, Mohammad S.
    Li, Xiong
    Vijayakumar, Pandi
    IET COMMUNICATIONS, 2022, 16 (10) : 1142 - 1159