An enhanced three-factor based authentication and key agreement protocol using PUF in IoMT

被引:0
|
作者
Wu, Tsu-Yang [1 ,2 ]
Wu, Haozhi [2 ]
Kumari, Saru [3 ]
Chen, Chien-Ming [1 ]
机构
[1] Nanjing Univ Informat Sci & Technol, Sch Artificial Intelligence, Nanjing 210044, Jiangsu, Peoples R China
[2] Shandong Univ Sci & Technol, Coll Comp Sci & Engn, Qingdao 266590, Shandong, Peoples R China
[3] Chaudhary Charan Singh Univ, Dept Math, Meerut 250004, Uttar Pradesh, India
关键词
Authentication; IoMT; PUF; Cryptanalysis; ANONYMOUS USER AUTHENTICATION; PROVABLY SECURE; MUTUAL AUTHENTICATION; EFFICIENT; SCHEME; LIGHTWEIGHT;
D O I
10.1007/s12083-024-01839-z
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
With the rapid development of Internet of Things (IoT) technology, Internet of Medical Things (IoMT) plays a huge important role in improving the quality of healthcare services. By using IoMT, doctors are able to remotely monitor real-time physiological information of patients automatically, thereby alleviating their burden. This approach is not only considered more efficient and cost-effective, but also provides support from medical experts for emergency treatment of patients. However, as these health data contain sensitive information related to patient privacy, any leakage or malicious tampering of information can lead to incorrect diagnosis by doctors, seriously endangering patient health. Therefore, ensuring the security of patients' health data has become particularly important. In 2023, Kim et al. proposed an improved lightweight user authentication protocol for IoMT. Unfortunately, we found that this protocol is vulnerable to security threats such as user device capture attacks, man-in-the-middle attacks. In response to the above security problems, we propose an enhanced three-factor based authentication and key agreement protocol. The protocol enhances security by utilizing both strong physical unclonable functions (PUF) and weak PUF. In terms of protocol security, we verify its properties using Real-or-Random (ROR) model, informal analysis, and AVISPA tool. Finally, this paper is compared with seven other protocols. We analyzed the security, computational cost, and communication cost of each scheme. The results show that our protocol has low computational and communication costs while ensuring security.
引用
收藏
页数:19
相关论文
共 50 条
  • [31] PUFTAP-IoT: PUF-Based Three-Factor Authentication Protocol in IoT Environment Focused on Sensing Devices
    Lee, JoonYoung
    Oh, JiHyeon
    Kwon, DeokKyu
    Kim, MyeongHyun
    Yu, SungJin
    Jho, Nam-Su
    Park, Youngho
    SENSORS, 2022, 22 (18)
  • [32] Three-factor authentication protocol using physical unclonable function for IoV
    Jiang, Qi
    Zhang, Xin
    Zhang, Ning
    Tian, Youliang
    Ma, Xindi
    Ma, Jianfeng
    COMPUTER COMMUNICATIONS, 2021, 173 : 45 - 55
  • [33] An Improvement of Three-Factor Remote User Authentication Protocol Using ECC
    Hwang, Min-Shiang
    Lin, Cheng-Ying
    Wu, Chia-Chun
    International Journal of Network Security, 2024, 26 (03) : 528 - 534
  • [34] A novel three-factor authentication and key agreement scheme providing anonymity in global mobility networks
    Xu, Lili
    Wu, Fan
    SECURITY AND COMMUNICATION NETWORKS, 2016, 9 (16) : 3428 - 3443
  • [35] An Improved Three-Factor User Authentication and Key Agreement Scheme for Wireless Medical Sensor Networks
    Chen, Ying
    Ge, Yangming
    Wang, Yerong
    Zeng, Zhuang
    IEEE ACCESS, 2019, 7 : 85440 - 85451
  • [36] A Lightweight Three-Factor Authentication and Key Agreement Scheme in Wireless Sensor Networks for Smart Homes
    Shin, Sooyeon
    Kwon, Taekyoung
    SENSORS, 2019, 19 (09)
  • [37] A Privacy Preserving three-factor authenticated key agreement protocol for client–server environment
    Alavalapati Goutham Reddy
    Ashok Kumar Das
    Vanga Odelu
    Awais Ahmad
    Ji Sun Shin
    Journal of Ambient Intelligence and Humanized Computing, 2019, 10 : 661 - 680
  • [38] A secure three-factor authentication protocol for mobile networks
    Kumar, Devender
    Chand, Satish
    Kumar, Bijendra
    INTERNATIONAL JOURNAL OF INFORMATION AND COMPUTER SECURITY, 2024, 23 (02)
  • [39] A New Enhanced Authentication Mechanism Using Session Key Agreement Protocol
    Usha, S.
    Kuppuswami, S.
    Karthik, M.
    CYBERNETICS AND INFORMATION TECHNOLOGIES, 2018, 18 (04) : 61 - 74
  • [40] On the security of an enhanced UMTS authentication and key agreement protocol
    Hwang, Min-Shiang
    Chong, Song-Kong
    Ou, Hsia-Hung
    EUROPEAN TRANSACTIONS ON TELECOMMUNICATIONS, 2011, 22 (03): : 99 - 112