An Analytic Model for Reducing Authentication Signaling Traffic in an End-to-End Authentication Scheme

被引:0
|
作者
Nashwan, Shadi [1 ]
Nashwan, Imad I. H. [2 ]
机构
[1] Jouf Univ, Comp Sci Dept, Sakaka 42421, Saudi Arabia
[2] Al Quds Open Univ, Fac Technol & Appl Sci, Gaza 860, Palestine
关键词
E2EA scheme; healthcare IoT system; WMSN; mutual authentication; Poisson process; probability distribution; PROTOCOL; KEY;
D O I
10.3390/s21154980
中图分类号
O65 [分析化学];
学科分类号
070302 ; 081704 ;
摘要
In an end-to-end authentication (E2EA) scheme, the physician, patient, and sensor nodes authenticate each other through the healthcare service provider in three phases: the long-term authentication phase (LAP), short-term authentication phase (SAP), and sensor authentication phase (WAP). Once the LAP is executed between all communication nodes, the SAP is executed (m) times between the physician and patient by deriving a new key from the PSij key generated by healthcare service provider during the LAP. In addition, the WAP is executed between the connected sensor and patient (m + 1) times without going back to the service provider. Thus, it is critical to determine an appropriate (m) value to maintain a specific security level and to minimize the cost of E2EA. Therefore, we proposed an analytic model in which the authentication signaling traffic is represented by a Poisson process to derive an authentication signaling traffic cost function for the (m) value. wherein the residence time of authentication has three distributions: gamma, hypo-exponential, and exponential. Finally, using the numerical analysis of the derived cost function, an optimal value (m) that minimizes the authentication signaling traffic cost of the E2EA scheme was determined.
引用
收藏
页数:15
相关论文
共 50 条
  • [11] A system for end-to-end authentication of adaptive multimedia content
    Suzuki, T
    Ramzan, Z
    Fujimoto, H
    Gentry, C
    Nakayama, T
    Jain, R
    [J]. COMMUNICATIONS AND MULTIMEDIA SECURITY, 2005, 175 : 237 - 249
  • [12] End-to-End Data Authentication Deep Learning Model for Securing IoT Configurations
    Hammad, Mohamed
    Iliyasu, Abdullah M.
    Elgendy, Ibrahim A.
    Abd El-Latif, Ahmed A.
    [J]. HUMAN-CENTRIC COMPUTING AND INFORMATION SCIENCES, 2022, 12
  • [13] A new privacy and authentication protocol for end-to-end mobile users
    Lee, CC
    Yang, CC
    Hwang, MS
    [J]. INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2003, 16 (09) : 799 - 808
  • [14] Two-Factor Authentication with End-to-End Password Security
    Jarecki, Stanislaw
    Krawczyk, Hugo
    Shirvanian, Maliheh
    Saxena, Nitesh
    [J]. PUBLIC-KEY CRYPTOGRAPHY - PKC 2018, PT II, 2018, 10770 : 431 - 461
  • [15] End-to-End Message Authentication Using CoAP Over IoT
    Singhal, Prateek
    Sharma, Puneet
    Hazela, Bramah
    [J]. INTERNATIONAL CONFERENCE ON INNOVATIVE COMPUTING AND COMMUNICATIONS, VOL 1, 2019, 55 : 279 - 288
  • [16] Efficient Key Authentication Service for Secure End-to-End Communications
    Etemad, Mohammad
    Kupcu, Alptekin
    [J]. PROVABLE SECURITY, PROVSEC 2015, 2015, 9451 : 183 - 197
  • [17] Integrating end-to-end encryption and authentication technology into broadband networks
    Pierson, LG
    [J]. INTEGRATION ISSUES IN LARGE COMMERCIAL MEDIA DELIVERY SYSTEMS, 1996, 2615 : 260 - 269
  • [18] End-to-End Authentication in Under-Water Sensor Networks
    Souza, Evaldo
    Wong, Hao Chi
    Cunha, Italo
    Loureiro, A. A. F.
    Vieira, L. F. M.
    Oliveira, Leonardo B.
    [J]. 2013 IEEE SYMPOSIUM ON COMPUTERS AND COMMUNICATIONS (ISCC), 2013,
  • [19] Efficient end-to-end authentication protocol for wearable health monitoring systems
    Jiang, Qi
    Ma, Jianfeng
    Yang, Chao
    Ma, Xindi
    Shen, Jian
    Chaudhry, Shehzad Ashraf
    [J]. COMPUTERS & ELECTRICAL ENGINEERING, 2017, 63 : 182 - 195
  • [20] END-TO-END LEARNING OF SECURE WIRELESS COMMUNICATIONS: CONFIDENTIAL TRANSMISSION AND AUTHENTICATION
    Sun, Zhuo
    Wu, Hengmiao
    Zhao, Chenglin
    Yue, Gang
    [J]. IEEE WIRELESS COMMUNICATIONS, 2020, 27 (05) : 88 - 95