An enhanced three-factor based authentication and key agreement protocol using PUF in IoMT

被引:0
|
作者
Wu, Tsu-Yang [1 ,2 ]
Wu, Haozhi [2 ]
Kumari, Saru [3 ]
Chen, Chien-Ming [1 ]
机构
[1] Nanjing Univ Informat Sci & Technol, Sch Artificial Intelligence, Nanjing 210044, Jiangsu, Peoples R China
[2] Shandong Univ Sci & Technol, Coll Comp Sci & Engn, Qingdao 266590, Shandong, Peoples R China
[3] Chaudhary Charan Singh Univ, Dept Math, Meerut 250004, Uttar Pradesh, India
关键词
Authentication; IoMT; PUF; Cryptanalysis; ANONYMOUS USER AUTHENTICATION; PROVABLY SECURE; MUTUAL AUTHENTICATION; EFFICIENT; SCHEME; LIGHTWEIGHT;
D O I
10.1007/s12083-024-01839-z
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
With the rapid development of Internet of Things (IoT) technology, Internet of Medical Things (IoMT) plays a huge important role in improving the quality of healthcare services. By using IoMT, doctors are able to remotely monitor real-time physiological information of patients automatically, thereby alleviating their burden. This approach is not only considered more efficient and cost-effective, but also provides support from medical experts for emergency treatment of patients. However, as these health data contain sensitive information related to patient privacy, any leakage or malicious tampering of information can lead to incorrect diagnosis by doctors, seriously endangering patient health. Therefore, ensuring the security of patients' health data has become particularly important. In 2023, Kim et al. proposed an improved lightweight user authentication protocol for IoMT. Unfortunately, we found that this protocol is vulnerable to security threats such as user device capture attacks, man-in-the-middle attacks. In response to the above security problems, we propose an enhanced three-factor based authentication and key agreement protocol. The protocol enhances security by utilizing both strong physical unclonable functions (PUF) and weak PUF. In terms of protocol security, we verify its properties using Real-or-Random (ROR) model, informal analysis, and AVISPA tool. Finally, this paper is compared with seven other protocols. We analyzed the security, computational cost, and communication cost of each scheme. The results show that our protocol has low computational and communication costs while ensuring security.
引用
收藏
页数:19
相关论文
共 50 条
  • [41] Privacy Protection for E-Health Systems by Means of Dynamic Authentication and Three-Factor Key Agreement
    Zhang, Liping
    Zhang, Yixin
    Tang, Shanyu
    Luo, He
    IEEE TRANSACTIONS ON INDUSTRIAL ELECTRONICS, 2018, 65 (03) : 2795 - 2805
  • [42] An independent three-factor mutual authentication and key agreement scheme with privacy preserving for multiserver environment and a survey
    Chuang, Yun-Hsin
    Lei, Chin-Laung
    INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2021, 34 (01)
  • [43] Design of three-factor secure and efficient authentication and key-sharing protocol for IoT devices
    Wang, Zhenyu
    Deng, Ding
    Hou, Shen
    Guo, Yang
    Li, Shaoqing
    COMPUTER COMMUNICATIONS, 2023, 203 : 1 - 14
  • [44] A Privacy Preserving three-factor authenticated key agreement protocol for client-server environment
    Reddy, Alavalapati Goutham
    Das, Ashok Kumar
    Odelu, Vanga
    Ahmad, Awais
    Shin, Ji Sun
    JOURNAL OF AMBIENT INTELLIGENCE AND HUMANIZED COMPUTING, 2019, 10 (02) : 661 - 680
  • [45] A secure three-factor-based authentication with key agreement protocol for e-Health clouds
    Yulei Chen
    Jianhua Chen
    The Journal of Supercomputing, 2021, 77 : 3359 - 3380
  • [46] A secure three-factor-based authentication with key agreement protocol for e-Health clouds
    Chen, Yulei
    Chen, Jianhua
    JOURNAL OF SUPERCOMPUTING, 2021, 77 (04): : 3359 - 3380
  • [47] A secure and efficient three-factor authentication protocol for IoT environments
    Li, Yi
    JOURNAL OF PARALLEL AND DISTRIBUTED COMPUTING, 2023, 179
  • [48] Robust three-factor authentication protocol for satellite communication systems
    Chen, Yulei
    Chen, Jianhua
    INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2020, 33 (15)
  • [49] Enhanced E-commerce application security using Three-factor Authentication
    Scaria, Binitha Ann
    Megalingam, Rajesh Kannan
    PROCEEDINGS OF THE 2018 SECOND INTERNATIONAL CONFERENCE ON INTELLIGENT COMPUTING AND CONTROL SYSTEMS (ICICCS), 2018, : 1588 - 1591
  • [50] P/Key: PUF based second factor authentication
    Uysal, Ertan
    Akguen, Mete
    PLOS ONE, 2023, 18 (02):