Security-Enhanced Lightweight and Anonymity-Preserving User Authentication Scheme for IoT-Based Healthcare

被引:2
|
作者
Zhou, Xin [1 ,2 ]
Wang, Shengbao [1 ,2 ]
Wen, Kang [1 ,2 ]
Hu, Bin [1 ,2 ]
Tan, Xiao [1 ,2 ]
Xie, Qi [3 ,4 ,5 ]
机构
[1] Hangzhou Normal Univ, Sch Informat Sci & Technol, Hangzhou 311121, Peoples R China
[2] Hangzhou Normal Univ, Key Lab Cryptog Zhejiang Prov, Hangzhou 311121, Peoples R China
[3] Fujian Normal Univ, Sch Math & Stat, Fuzhou 350007, Peoples R China
[4] Hangzhou Normal Univ, Sch Math, Hangzhou 311121, Peoples R China
[5] Hangzhou Normal Univ, Key Lab Cryptog Zhejiang Prov, Hangzhou 311121, Peoples R China
基金
中国国家自然科学基金;
关键词
Protocols; Security; Authentication; Medical services; Physical unclonable function; Passwords; Hash functions; Authenticated key exchange; BAN logic; fuzzy extractor; Internet of Medical Things (IoMT); physical unclonable function (PUF); ProVerif; INTERNET;
D O I
10.1109/JIOT.2023.3323614
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Ensuring trust within the healthcare system and addressing privacy and security challenges in the Internet of Medical Things (IoMT) is of paramount importance. Based on our preliminary analysis results of Masud et al.'s authentication protocol, we propose an improved solution building upon their protocol. Our improved protocol incorporates various security measures to enhance its security. To validate the effectiveness of our improved protocol, we employ a comprehensive range of heuristic and formal security analysis methods. Comparative evaluations with other relevant protocols reveal that our proposed solution achieves satisfactory operational performance in resource-constrained IoMT scenarios.
引用
收藏
页码:9599 / 9609
页数:11
相关论文
共 50 条
  • [21] Secure anonymity-preserving password-based user authentication and session key agreement scheme for telecare medicine information systems
    Sutrala, Anil Kumar
    Das, Ashok Kumar
    Odelu, Vanga
    Wazid, Mohammad
    Kumari, Saru
    [J]. COMPUTER METHODS AND PROGRAMS IN BIOMEDICINE, 2016, 135 : 167 - 185
  • [22] User authentication scheme preserving anonymity for ubiquitous devices
    Djellali, Benchaa
    Belarbi, Kheira
    Chouarfia, Abdallah
    Lorenz, Pascal
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2015, 8 (17) : 3131 - 3141
  • [23] A lightweight authentication and key agreement protocol preserving user anonymity
    Morteza Nikooghadam
    Reza Jahantigh
    Hamed Arshad
    [J]. Multimedia Tools and Applications, 2017, 76 : 13401 - 13423
  • [24] A lightweight authentication and key agreement protocol preserving user anonymity
    Nikooghadam, Morteza
    Jahantigh, Reza
    Arshad, Hamed
    [J]. MULTIMEDIA TOOLS AND APPLICATIONS, 2017, 76 (11) : 13401 - 13423
  • [25] Joint Heterogeneous PUF-Based Security-Enhanced IoT Authentication
    Yoon, Seungwook
    Han, Seungnam
    Hwang, Euiseok
    [J]. IEEE INTERNET OF THINGS JOURNAL, 2023, 10 (20) : 18082 - 18096
  • [26] An Energy Efficient Remote User Authentication Scheme Preserving User Anonymity
    Bapana, Surekha
    Narayana, K. Lakshmi
    Vorugunti, Chandra Sekhar
    [J]. 2014 INTERNATIONAL CONFERENCE ON CONTEMPORARY COMPUTING AND INFORMATICS (IC3I), 2014, : 1296 - 1301
  • [27] Design of anonymity-preserving user authentication and key agreement protocol for ubiquitous computing environments
    Kang, MH
    Ryou, HB
    Choi, W
    [J]. INTERNET AND NETWORK ECONOMICS, PROCEEDINGS, 2005, 3828 : 491 - 499
  • [28] Cryptanalysis on Improved Remote User Authentication Scheme Preserving User Anonymity
    Lee, Sung-Woon
    Kwon, Hyuck-Jin
    Kim, Hyun-Sung
    [J]. INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2008, 8 (10): : 21 - 24
  • [29] An enhanced privacy preserving remote user authentication scheme with provable security
    Chaudhry, Shehzad Ashraf
    Farash, Mohammad Sabzinejad
    Naqvi, Husnain
    Kumari, Saru
    Khan, Muhammad Khurram
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2015, 8 (18) : 3782 - 3795
  • [30] Proposing and verifying a security-enhanced protocol for IoT-based communication for medical devices
    Kun-Hee Han
    Woo-Sik Bae
    [J]. Cluster Computing, 2016, 19 : 2335 - 2341