An Authentication Protocol for the Medical Internet of Things

被引:4
|
作者
El-Meniawy, Nagwa [1 ]
Rizk, Mohamed R. M. [2 ]
Ahmed, Magdy A. [3 ]
Saleh, Mohamed [4 ]
机构
[1] Pharos Univ, Dept Comp Engn, Alexandria 21649, Egypt
[2] Alexandria Univ, Dept Elect Engn, Alexandria 21544, Egypt
[3] Alexandria Univ, Dept Comp Engn, Alexandria 21544, Egypt
[4] Pharos Univ, Dept Elect Engn, Alexandria 21649, Egypt
来源
SYMMETRY-BASEL | 2022年 / 14卷 / 07期
关键词
authentication; body sensor networks; communication system security; cryptographic protocols; Internet of Things; KEY AGREEMENT SCHEME; HEALTH;
D O I
10.3390/sym14071483
中图分类号
O [数理科学和化学]; P [天文学、地球科学]; Q [生物科学]; N [自然科学总论];
学科分类号
07 ; 0710 ; 09 ;
摘要
The progress in biomedical sensors, Internet of Things technologies, big data, cloud computing, and artificial intelligence is leading the development of e-health medical systems, offering a range of new and innovative services. One such service is remote patient monitoring, where medical professionals are able to collect and examine a patient's medical data remotely. Of course, in these systems, security and privacy are of utmost importance and we need to verify the identities of system users before granting them access to sensitive patient-related data. To this end, several authentication protocols have been recently designed specifically for e-health systems. We survey several of these protocols and report on flaws and shortcomings we discovered. Moreover, we propose an authentication protocol that enables a medical professional and the network of sensors used by a patient to authenticate each other and share a cryptographic key to be used for security in a communication session. The protocol also enables the dynamic assignment of patients to doctors in order to control access to patients' data. We perform a security analysis of the protocol both formally, using the ProVerif protocol analysis tool, and informally, demonstrating its security features. We show that our protocol achieves mutual authentication, secret key establishment, forward secrecy, and anonymity. In terms of performance, the protocol is computationally lightweight, as it relies on symmetric key cryptography. This is demonstrated by comparing the computational cost of our protocol (in terms of execution time) with that of other similar protocols.
引用
下载
收藏
页数:21
相关论文
共 50 条
  • [1] PAMI-Anonymous Password Authentication Protocol for Medical Internet of Things
    Zhou, Yousheng
    Luo, Yang
    Obaidat, Mohammad S.
    Vijayakumar, P.
    Wang, Xiaojun
    2021 IEEE GLOBAL COMMUNICATIONS CONFERENCE (GLOBECOM), 2021,
  • [2] A Lightweight Authentication Protocol for Internet of Things
    Lee, Jun-Ya
    Lin, Wei-Cheng
    Huang, Yu-Hung
    2014 INTERNATIONAL SYMPOSIUM ON NEXT-GENERATION ELECTRONICS (ISNE), 2014,
  • [3] Authentication Protocol for Securing Internet of Things
    Maarof, Ahmed
    Senhadji, Mohamed
    Labbi, Zouheir
    Belkasmi, Mostafa
    ICEMIS'18: PROCEEDINGS OF THE FOURTH INTERNATIONAL CONFERENCE ON ENGINEERING AND MIS, 2018,
  • [4] A provably secure RFID authentication protocol based on ECQV for the medical internet of things
    Abhay Kumar Agrahari
    Shirshu Varma
    Peer-to-Peer Networking and Applications, 2021, 14 : 1277 - 1289
  • [5] A provably secure RFID authentication protocol based on ECQV for the medical internet of things
    Agrahari, Abhay Kumar
    Varma, Shirshu
    PEER-TO-PEER NETWORKING AND APPLICATIONS, 2021, 14 (03) : 1277 - 1289
  • [6] A privacy preserving four-factor authentication protocol for internet of medical things
    Guo, Ping
    Liang, Wenfeng
    Xu, Shuilong
    COMPUTERS & SECURITY, 2024, 137
  • [7] New Enhanced Authentication Protocol for Internet of Things
    Azrour, Mourade
    Mabrouki, Jamal
    Guezzaz, Azedine
    Farhaoui, Yousef
    BIG DATA MINING AND ANALYTICS, 2021, 4 (01): : 1 - 9
  • [8] New Enhanced Authentication Protocol for Internet of Things
    Mourade Azrour
    Jamal Mabrouki
    Azedine Guezzaz
    Yousef Farhaoui
    Big Data Mining and Analytics, 2021, 4 (01) : 1 - 9
  • [9] Enhanced Authentication Protocol for the Internet of Things Environment
    Chen, Chien-Ming
    Li, Xuanang
    Liu, Shuangshuang
    Wu, Mu-En
    Kumari, Saru
    SECURITY AND COMMUNICATION NETWORKS, 2022, 2022
  • [10] A Lightweight Continuous Authentication Protocol for the Internet of Things
    Chuang, Yo-Hsuan
    Lo, Nai-Wei
    Yang, Cheng-Ying
    Tang, Ssu-Wei
    SENSORS, 2018, 18 (04)