A Lightweight and Robust User Authentication Protocol with User Anonymity for IoT-Based Healthcare

被引:11
|
作者
Chen, Chien-Ming [1 ]
Liu, Shuangshuang [1 ]
Chaudhry, Shehzad Ashraf [2 ]
Chen, Yeh-Cheng [3 ]
Khan, Muhammad Asghar [4 ]
机构
[1] Shandong Univ Sci & Technol, Coll Comp Sci & Engn, Qingdao 266590, Peoples R China
[2] Istanbul Gelisim Univ, Dept Comp Engn, TR-34310 Istanbul, Turkey
[3] Univ Calif Davis, Dept Comp Sci, Davis, CA 95616 USA
[4] Hamdard Univ, Dept Elect Engn, Islamabad 44000, Pakistan
来源
关键词
IoT; intelligent medical; user authentication; KEY AGREEMENT SCHEME; EFFICIENT; SECURITY; INTERNET;
D O I
10.32604/cmes.2022.018749
中图分类号
T [工业技术];
学科分类号
08 ;
摘要
With the rise of the Internet of Things (IoT), the word "intelligent medical care" has increasingly become a major vision. Intelligent medicine adopts the most advanced IoT technology to realize the interaction between patients and people, medical institutions, and medical equipment. However, with the openness of network transmission, the security and privacy of information transmission have become a major problem. Recently, Masud et al. proposed a lightweight anonymous user authentication protocol for IoT medical treatment, claiming that their method can resist various attacks. However, through analysis of the protocol, we observed that their protocol cannot effectively resist privileged internal attacks, sensor node capture attacks, and stolen authentication attacks, and their protocol does not have perfect forward security. Therefore, we propose a new protocol to resolve the security vulnerabilities in Masudsprotocol and remove some redundant parameters, so as to make the protocol more compact and secure. In addition, we evaluate the security and performance of the new protocol and prove that the overall performance of the new protocol is better than that of other related protocols.
引用
收藏
页码:307 / 329
页数:23
相关论文
共 50 条
  • [41] User anonymity-based secure authentication protocol for telemedical server systems
    Gupta, Sunil
    Arya, Pradeep Kumar
    Sharma, Hitesh Kumar
    [J]. INTERNATIONAL JOURNAL OF INFORMATION AND COMPUTER SECURITY, 2023, 20 (1-2) : 199 - 219
  • [42] RFID-assisted Continuous User Authentication for IoT-based Smart Farming
    Bothe, Alexander
    Bauer, Jan
    Aschenbruck, Nils
    [J]. 2019 IEEE INTERNATIONAL CONFERENCE ON RFID TECHNOLOGY AND APPLICATIONS (IEEE RFID-TA 2019), 2019,
  • [43] A Biometrics-based Robust and Secure User Authentication Protocol for e-Healthcare Service
    Roy, Sandip
    Chatterjee, Santanu
    Chattopadhyay, Samiran
    Gupta, Amit Kumar
    [J]. 2016 INTERNATIONAL CONFERENCE ON ADVANCES IN COMPUTING, COMMUNICATIONS AND INFORMATICS (ICACCI), 2016, : 638 - 644
  • [44] Secure-user sign-in authentication for IoT-based eHealth systems
    B. D. Deebak
    Fadi Al-Turjman
    [J]. Complex & Intelligent Systems, 2023, 9 : 2629 - 2649
  • [45] New authentication protocol providing user anonymity in open network
    Kim, WH
    Yoon, EJ
    Yoo, KY
    [J]. INTERNET AND NETWORK ECONOMICS, PROCEEDINGS, 2005, 3828 : 414 - 423
  • [46] User Role in IoT-based Systems
    Victoria Moreno, M.
    Hernandez Ramos, Jose Luis
    Skarmeta, Antonio F.
    [J]. 2014 IEEE WORLD FORUM ON INTERNET OF THINGS (WF-IOT), 2014, : 141 - 146
  • [47] A novel wireless authentication protocol preserving user anonymity and untraceability
    Wei, Yongzhuang
    Qiu, Hongbing
    [J]. 2006 10TH INTERNATIONAL CONFERENCE ON COMMUNICATION TECHNOLOGY, VOLS 1 AND 2, PROCEEDINGS, 2006, : 575 - +
  • [48] Secure-user sign-in authentication for IoT-based eHealth systems
    Deebak, B. D.
    Al-Turjman, Fadi
    [J]. COMPLEX & INTELLIGENT SYSTEMS, 2023, 9 (03) : 2629 - 2649
  • [49] Lightweight and provably secure user authentication with anonymity for the global mobility network
    Chen, Chun
    He, Daojing
    Chan, Sammy
    Bu, Jiajun
    Gao, Yi
    Fan, Rong
    [J]. INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2011, 24 (03) : 347 - 362
  • [50] RRAM Based Lightweight User Authentication
    Arafin, Md Tanvir
    Qu, Gang
    [J]. 2015 IEEE/ACM INTERNATIONAL CONFERENCE ON COMPUTER-AIDED DESIGN (ICCAD), 2015, : 139 - 145