An Analytic Model for Reducing Authentication Signaling Traffic in an End-to-End Authentication Scheme

被引:0
|
作者
Nashwan, Shadi [1 ]
Nashwan, Imad I. H. [2 ]
机构
[1] Jouf Univ, Comp Sci Dept, Sakaka 42421, Saudi Arabia
[2] Al Quds Open Univ, Fac Technol & Appl Sci, Gaza 860, Palestine
关键词
E2EA scheme; healthcare IoT system; WMSN; mutual authentication; Poisson process; probability distribution; PROTOCOL; KEY;
D O I
10.3390/s21154980
中图分类号
O65 [分析化学];
学科分类号
070302 ; 081704 ;
摘要
In an end-to-end authentication (E2EA) scheme, the physician, patient, and sensor nodes authenticate each other through the healthcare service provider in three phases: the long-term authentication phase (LAP), short-term authentication phase (SAP), and sensor authentication phase (WAP). Once the LAP is executed between all communication nodes, the SAP is executed (m) times between the physician and patient by deriving a new key from the PSij key generated by healthcare service provider during the LAP. In addition, the WAP is executed between the connected sensor and patient (m + 1) times without going back to the service provider. Thus, it is critical to determine an appropriate (m) value to maintain a specific security level and to minimize the cost of E2EA. Therefore, we proposed an analytic model in which the authentication signaling traffic is represented by a Poisson process to derive an authentication signaling traffic cost function for the (m) value. wherein the residence time of authentication has three distributions: gamma, hypo-exponential, and exponential. Finally, using the numerical analysis of the derived cost function, an optimal value (m) that minimizes the authentication signaling traffic cost of the E2EA scheme was determined.
引用
收藏
页数:15
相关论文
共 50 条
  • [31] A Collaborative PHY-Aided Technique For End-to-End IoT Device Authentication
    Hao, Peng
    Wang, Xianbin
    Shen, Weiming
    [J]. IEEE ACCESS, 2018, 6 : 42279 - 42293
  • [32] Achieving end-to-end authentication in intermediary-enabled multimedia delivery systems
    Deng, Robert H.
    Yang, Yanjiang
    [J]. INFORMATION SECURITY PRACTICE AND EXPERIENCE, PROCEEDINGS, 2007, 4464 : 284 - +
  • [33] A decentralized scalable security framework for end-to-end authentication of future IoT communication
    Sheron, P. S. Febin
    Sridhar, K. P.
    Baskar, S.
    Shakeel, P. Mohamed
    [J]. TRANSACTIONS ON EMERGING TELECOMMUNICATIONS TECHNOLOGIES, 2020, 31 (12):
  • [34] AuthLoop: Practical End-to-End Cryptographic Authentication for Telephony over Voice Channels
    Reaves, Bradley
    Blue, Logan
    Traynor, Patrick
    [J]. PROCEEDINGS OF THE 25TH USENIX SECURITY SYMPOSIUM, 2016, : 963 - 978
  • [35] A new end-to-end authentication protocol for mobile users to access internet services
    He, LS
    Zhang, N
    He, LR
    [J]. SECURITY IN THE INFORMATION SOCIETY: VISIONS AND PERSPECTIVES, 2002, 86 : 239 - 250
  • [36] An End-to-End e-Election System Based on Multimodal Identification and Authentication
    Ayo, Charles
    Daramola, Justine
    Gabriel, Obi
    Sofoluwe, Adetokunbo
    [J]. PROCEEDINGS OF THE 6TH INTERNATIONAL CONFERENCE ON E-GOVERNMENT, 2010, : 10 - 17
  • [37] End-To-End Design of a PUF-Based Privacy Preserving Authentication Protocol
    Aysu, Aydin
    Gulcan, Ege
    Moriyama, Daisuke
    Schaumont, Patrick
    Yung, Moti
    [J]. CRYPTOGRAPHIC HARDWARE AND EMBEDDED SYSTEMS - CHES 2015, 2015, 9293 : 556 - 576
  • [38] Cryptanalysis of the end-to-end security protocol for mobile communications with end-user identification/authentication
    Zhou, YB
    Zhang, ZF
    Feng, DG
    [J]. IEEE COMMUNICATIONS LETTERS, 2005, 9 (04) : 372 - 374
  • [39] A Multiple End-Devices Authentication Scheme for LoRaWAN
    Fan, Chun-, I
    Zhuang, Er-Shuo
    Karati, Arijit
    Su, Chun-Hui
    [J]. ELECTRONICS, 2022, 11 (05)
  • [40] End-to-End Authentication Protocols for Personal/Portable Devices over Cognitive Radio Networks
    Kim, Hyunsung
    [J]. INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2014, 8 (04): : 123 - 138