SLMAS: A Secure and Light Weight Mutual Authentication Scheme for the Smart Wheelchair

被引:2
|
作者
Almazroi, Abdulwahab Ali [1 ]
Liaqat, Misbah [1 ]
Ali, Rana Liaqat [2 ]
Gani, Abdullah [3 ]
机构
[1] Univ Jeddah, Coll Comp & Informat Technol Khulais, Dept Informat Technol, Jeddah 21959, Saudi Arabia
[2] COMSATS Univ Islamabad, Dept Phys, Islamabad 45550, Pakistan
[3] Univ Malaya, Fac Comp Sci & Informat Technol, Kuala Lumpur 50603, Malaysia
来源
APPLIED SCIENCES-BASEL | 2023年 / 13卷 / 11期
关键词
AVISPA; smart city; smart wheelchair; edge and cloud computing; Internet of Things (IoT); sensors; authentication; protocols; security; KEY AGREEMENT SCHEME; 2-FACTOR USER AUTHENTICATION; PROTOCOL; INTERNET;
D O I
10.3390/app13116564
中图分类号
O6 [化学];
学科分类号
0703 ;
摘要
The modern innovation called the Internet of Things (IoT) empowers individuals to connect to anybody and anything at any point, wherever. The application of the IoT in smart cities concerning smart healthcare management can improve patient welfare, user acceptance, the standard of living, and accurate illness monitoring. Powered wheelchairs (PW) with sensors, computers, and other connected assistive technologies are called smart wheelchairs. Smart wheelchairs with sensing abilities are intended to offer universal connectivity using cloud and edge computing technology. Numerous outstanding people were impacted by paralyzing phenomena, including Stephen Hawking and Max Brito. The issue of legitimacy is one of the most important difficulties in e-health applications, because of how sensitive the technology is, and this needs to be appropriately handled. To safeguard the data transport, usage, and interchange between sensor nodes/smart wheelchairs and servers, e-health applications require an authentication method. As all conversations use wireless channels, e-health apps are exposed to various vulnerabilities. Additionally, the IoT has limited computational and power capacity limitations. To combat the various security risks, the present research offers a user authentication technique that is efficient and ensures anonymity. The suggested method creates a safe connection for the authorized entity and forbids unauthorized entities from accessing the Internet of Things sensor nodes. The suggested approach has lower communication and computation overheads than the traditional techniques, making it more effective. In addition, the security verification of the presented protocol is scrutinized through AVISPA. The proposed scheme, on average, requires only 12.4% more computation cost to execute. Compared to the existing approaches, the suggested protocol's extra computational cost can be compensated for by its enhanced security, while the suggested method's communication cost is 46.3% smaller.
引用
收藏
页数:18
相关论文
共 50 条
  • [41] Provably Secure Mutual Authentication and Key Agreement Scheme with User Anonymity
    Hwang, Tzonelih
    Gope, Prosanta
    2013 9TH INTERNATIONAL CONFERENCE ON INFORMATION, COMMUNICATIONS AND SIGNAL PROCESSING (ICICS), 2013,
  • [42] A study on secure RFID mutual authentication scheme in pervasive computing environment
    Kang, Soo-Young
    Lee, Deok-Gyu
    Lee, Im-Yeong
    COMPUTER COMMUNICATIONS, 2008, 31 (18) : 4248 - 4254
  • [43] A secure and efficient authentication scheme for vehicle to grid in smart grid
    Xiao, Nan
    Wang, Zhaoshun
    Sun, Xiaoxue
    FRONTIERS IN PHYSICS, 2025, 13
  • [44] Scalable and efficient authentication scheme for secure smart grid communication
    Hammami, Hamza
    Ben Yahia, Sadok
    Obaidat, Mohammad S.
    IET NETWORKS, 2020, 9 (04) : 165 - 169
  • [45] A New Secure Password Authentication Scheme Using Smart Cards
    WANG Bangju1
    2. School of Science
    3. College of Information Science and Engineering
    Zhengzhou 450001
    Wuhan University Journal of Natural Sciences, 2008, (06) : 739 - 743
  • [46] Breaking a smart card based secure password authentication scheme
    Yoon, Eun-Jun
    Yoo, Kee-Young
    PROCEEDINGS OF THE SECOND INTERNATIONAL CONFERENCE ON INFORMATION SECURITY AND ASSURANCE, 2008, : 83 - +
  • [47] A provably secure and anonymous message authentication scheme for smart grids
    Li, Xiong
    Wu, Fan
    Kumari, Saru
    Xu, Lili
    Sangaiah, Arun Kumar
    Choo, Kim-Kwang Raymond
    JOURNAL OF PARALLEL AND DISTRIBUTED COMPUTING, 2019, 132 : 242 - 249
  • [48] A secure demand response management authentication scheme for smart grid
    Irshad, Azeem
    Chaudhry, Shehzad Ashraf
    Alazab, Mamoun
    Kanwal, Ambrina
    Zia, M. Sultan
    Bin Zikria, Yousaf
    SUSTAINABLE ENERGY TECHNOLOGIES AND ASSESSMENTS, 2021, 48
  • [49] A new secure remote user authentication scheme with smart cards
    Kumar, Manoj
    International Journal of Network Security, 2010, 11 (02) : 88 - 93
  • [50] A mutual authentication scheme for establishing secure device-to-device communication sessions in the edge-enabled smart cities
    Zhang, Yanbin
    Cheng, Ke
    Khan, Fazlullah
    Alturki, Ryan
    Khan, Rahim
    Rehman, Ateeq Ur
    JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2021, 58 (58)