An Analytic Model for Reducing Authentication Signaling Traffic in an End-to-End Authentication Scheme

被引:0
|
作者
Nashwan, Shadi [1 ]
Nashwan, Imad I. H. [2 ]
机构
[1] Jouf Univ, Comp Sci Dept, Sakaka 42421, Saudi Arabia
[2] Al Quds Open Univ, Fac Technol & Appl Sci, Gaza 860, Palestine
关键词
E2EA scheme; healthcare IoT system; WMSN; mutual authentication; Poisson process; probability distribution; PROTOCOL; KEY;
D O I
10.3390/s21154980
中图分类号
O65 [分析化学];
学科分类号
070302 ; 081704 ;
摘要
In an end-to-end authentication (E2EA) scheme, the physician, patient, and sensor nodes authenticate each other through the healthcare service provider in three phases: the long-term authentication phase (LAP), short-term authentication phase (SAP), and sensor authentication phase (WAP). Once the LAP is executed between all communication nodes, the SAP is executed (m) times between the physician and patient by deriving a new key from the PSij key generated by healthcare service provider during the LAP. In addition, the WAP is executed between the connected sensor and patient (m + 1) times without going back to the service provider. Thus, it is critical to determine an appropriate (m) value to maintain a specific security level and to minimize the cost of E2EA. Therefore, we proposed an analytic model in which the authentication signaling traffic is represented by a Poisson process to derive an authentication signaling traffic cost function for the (m) value. wherein the residence time of authentication has three distributions: gamma, hypo-exponential, and exponential. Finally, using the numerical analysis of the derived cost function, an optimal value (m) that minimizes the authentication signaling traffic cost of the E2EA scheme was determined.
引用
收藏
页数:15
相关论文
共 50 条
  • [1] An End-to-End Authentication Scheme for Healthcare IoT Systems Using WMSN
    Nashwan, Shadi
    [J]. CMC-COMPUTERS MATERIALS & CONTINUA, 2021, 68 (01): : 607 - 642
  • [2] Secure End-To-End Authentication for Mobile Banking
    Singh, Basudeo
    Jasmine, K. S.
    [J]. SOFTWARE ENGINEERING IN INTELLIGENT SYSTEMS (CSOC2015), VOL 3, 2015, 349 : 223 - 232
  • [3] Authentication for the Web of Things: Secure End-to-End Authentication Between CoAP and HTTP
    Buschsieweke, Marian
    Guenes, Mesut
    [J]. 2017 IEEE 28TH ANNUAL INTERNATIONAL SYMPOSIUM ON PERSONAL, INDOOR, AND MOBILE RADIO COMMUNICATIONS (PIMRC), 2017,
  • [4] An Efficient End-to-End Mutual Authentication Scheme for 2G-GSM System
    Ramadan, Mohammed
    Li, Fagen
    Xu, Chun Xiang
    Abdalla, Ahmed
    Abdalla, Hisham
    [J]. PROCEEDINGS OF 2016 IEEE INTERNATIONAL CONFERENCE ON BIG DATA ANALYSIS (ICBDA), 2016, : 319 - 324
  • [5] A lightweight key generation scheme for end-to-end data authentication in Industrial Control Systems
    Genge, Bela
    Haller, Piroska
    Duka, Adrian-Vasile
    Sandor, Hunor
    [J]. AT-AUTOMATISIERUNGSTECHNIK, 2019, 67 (05) : 417 - 428
  • [6] End-to-end security scheme for Machine Type Communication based on Generic Authentication Architecture
    Wujun Zhang
    Yueyu Zhang
    Jie Chen
    Hui Li
    Yumin Wang
    [J]. Cluster Computing, 2013, 16 : 861 - 871
  • [7] End-to-end security scheme for Machine Type Communication based on Generic Authentication Architecture
    Zhang, Wujun
    Zhang, Yueyu
    Chen, Jie
    Li, Hui
    Wang, Yumin
    [J]. CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2013, 16 (04): : 861 - 871
  • [8] A provably secure and practical end-to-end authentication scheme for tactile Industrial Internet of Things
    Guo, Yimin
    Guo, Yajun
    Xiong, Ping
    Yang, Fan
    Zhang, Chengde
    [J]. PERVASIVE AND MOBILE COMPUTING, 2024, 98
  • [9] Efficient end-to-end authentication protocols for mobile networks
    Chang, CH
    Tu, K
    Chen, KC
    [J]. PIMRC'96 - THE SEVENTH IEEE INTERNATIONAL SYMPOSIUM ON PERSONAL, INDOOR AND MOBILE RADIO COMMUNICATIONS, PROCEEDINGS, VOLS 1-3, 1996, : 1252 - 1256
  • [10] An end-to-end authentication protocol in wireless application protocol
    Yang, JP
    Shin, W
    Rhee, KH
    [J]. INFORMATION SECURITY AND PRIVACY, PROCEEDINGS, 2001, 2119 : 247 - 259