Dynamically scalable privacy-preserving authentication protocol for distributed IoT based healthcare service providers

被引:0
|
作者
Trivedi, Hiral S. [1 ]
Patel, Sankita J. [1 ]
机构
[1] Sardar Vallabhbhai Natl Inst Technol, Dept Comp Sci & Engn, Surat 395007, Gujarat, India
关键词
Internet-of-Things (IoT); Privacy preservation; Selective encryption; Secure authentication; Scalability; ATTRIBUTE-BASED ENCRYPTION; SECURITY; INTERNET; SCHEME; LIGHTWEIGHT; EFFICIENT;
D O I
10.1007/s11276-022-03196-2
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Internet-of-Things (IoT) in digital healthcare service providers forms large-scale distributed networks where entities at the edge enable dynamic communication and collaboration. Rapid rise in connected devices generates a high volume of real-time data susceptible to various security and privacy attacks. Distributed IoT has escalated the requirement of dynamic scalability in smart healthcare service providers. Secure authentication for accessing healthcare data in distributed IoT becomes essential to prevent impersonation and confirm ethical medical information exchange. Several authors have proposed privacy-preserving authentication protocols over unsecured public networks. However, their protocols lack dynamic scalability concerning collective security and privacy requirements. We propose a privacy-preserving scalable authentication protocol solution jointly fulfilling robust security and achieving content and contextual privacy. We introduce a partially trusted third party (TTP) responsible only for dynamically performing new user authentication without restarting existing communication channels. The proposed protocol incorporates dynamic tokens and secret shared key updation to enable robust security while achieving dynamic scalability. Anonymity and untraceability are attained using selective encryption over partial personally identifiable information. This also achieves automatic fake identity rejection, protecting legitimate credentials on-the-fly and at the TTP storage. We illustrate formal security analysis using Real-or-Random oracle model and formal validation using a scyther security verification tool. Theoretical analysis demonstrates that our protocol is resilient against known security and privacy attacks. Finally, a performance evaluation with relatively similar modeled schemes is elucidated to validate the utility of our solution.
引用
收藏
页码:1385 / 1409
页数:25
相关论文
共 50 条
  • [21] A novel vector-space-based lightweight privacy-preserving RFID authentication protocol for IoT environment
    Mohd Shariq
    Karan Singh
    [J]. The Journal of Supercomputing, 2021, 77 : 8532 - 8562
  • [22] A Robust user authentication protocol with privacy-preserving for roaming service in mobility environments
    R. Shashidhara
    Sriramulu Bojjagani
    Anup Kumar Maurya
    Saru Kumari
    Hu Xiong
    [J]. Peer-to-Peer Networking and Applications, 2020, 13 : 1943 - 1966
  • [23] Light-Weight and Privacy-Preserving Authentication Protocol for Mobile Payments in the Context of IoT
    Chen, Yanan
    Xu, Weixiang
    Peng, Li
    Zhang, Hao
    [J]. IEEE ACCESS, 2019, 7 : 15210 - 15221
  • [24] A Robust user authentication protocol with privacy-preserving for roaming service in mobility environments
    Shashidhara, R.
    Bojjagani, Sriramulu
    Maurya, Anup Kumar
    Kumari, Saru
    Xiong, Hu
    [J]. PEER-TO-PEER NETWORKING AND APPLICATIONS, 2020, 13 (06) : 1943 - 1966
  • [25] Privacy-Preserving Mutual Authentication Protocol With Forward Secrecy for IoT-Edge-Cloud
    Seifelnasr, Mohamed
    AlTawy, Riham
    Youssef, Amr
    Ghadafi, Essam
    [J]. IEEE INTERNET OF THINGS JOURNAL, 2024, 11 (05): : 8105 - 8117
  • [26] A privacy-preserving and accountable authentication protocol for IoT end-devices with weaker identity
    Wang, Zhiwei
    [J]. FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2018, 82 : 342 - 348
  • [27] A user-centric privacy-preserving authentication protocol for IoT-AmI environments
    Masud, Mehedi
    Gaba, Gurjot Singh
    Kumar, Pardeep
    Gurtov, Andrei
    [J]. COMPUTER COMMUNICATIONS, 2022, 196 : 45 - 54
  • [28] TPM-Based Conditional Privacy-Preserving Authentication Protocol in VANETs
    Zhang, Mingwu
    Zhu, Boyao
    Li, Yumei
    Wang, Yuntao
    [J]. SYMMETRY-BASEL, 2022, 14 (06):
  • [29] A privacy-preserving code-based authentication protocol for Internet of Things
    Chikouche, Noureddine
    Cayrel, Pierre-Louis
    Mboup, El Hadji Modou
    Boidje, Brice Odilon
    [J]. JOURNAL OF SUPERCOMPUTING, 2019, 75 (12): : 8231 - 8261
  • [30] A privacy-preserving code-based authentication protocol for Internet of Things
    Noureddine Chikouche
    Pierre-Louis Cayrel
    El Hadji Modou Mboup
    Brice Odilon Boidje
    [J]. The Journal of Supercomputing, 2019, 75 : 8231 - 8261