An Analytic Model for Reducing Authentication Signaling Traffic in an End-to-End Authentication Scheme

被引:0
|
作者
Nashwan, Shadi [1 ]
Nashwan, Imad I. H. [2 ]
机构
[1] Jouf Univ, Comp Sci Dept, Sakaka 42421, Saudi Arabia
[2] Al Quds Open Univ, Fac Technol & Appl Sci, Gaza 860, Palestine
关键词
E2EA scheme; healthcare IoT system; WMSN; mutual authentication; Poisson process; probability distribution; PROTOCOL; KEY;
D O I
10.3390/s21154980
中图分类号
O65 [分析化学];
学科分类号
070302 ; 081704 ;
摘要
In an end-to-end authentication (E2EA) scheme, the physician, patient, and sensor nodes authenticate each other through the healthcare service provider in three phases: the long-term authentication phase (LAP), short-term authentication phase (SAP), and sensor authentication phase (WAP). Once the LAP is executed between all communication nodes, the SAP is executed (m) times between the physician and patient by deriving a new key from the PSij key generated by healthcare service provider during the LAP. In addition, the WAP is executed between the connected sensor and patient (m + 1) times without going back to the service provider. Thus, it is critical to determine an appropriate (m) value to maintain a specific security level and to minimize the cost of E2EA. Therefore, we proposed an analytic model in which the authentication signaling traffic is represented by a Poisson process to derive an authentication signaling traffic cost function for the (m) value. wherein the residence time of authentication has three distributions: gamma, hypo-exponential, and exponential. Finally, using the numerical analysis of the derived cost function, an optimal value (m) that minimizes the authentication signaling traffic cost of the E2EA scheme was determined.
引用
收藏
页数:15
相关论文
共 50 条
  • [41] END-TO-END PHOTOPLETHYSMOGRAPHY (PPG) BASED BIOMETRIC AUTHENTICATION BY USING CONVOLUTIONAL NEURAL NETWORKS
    Luque, Jordi
    Cortes, Guillem
    Segura, Carlos
    Maravilla, Alexandre
    Esteban, Javier
    Fabregat, Joan
    [J]. 2018 26TH EUROPEAN SIGNAL PROCESSING CONFERENCE (EUSIPCO), 2018, : 538 - 542
  • [42] TAES: Two-factor Authentication with End-to-End Security against VoIP Phishing
    Hou, Dai
    Han, Hao
    Novak, Ed
    [J]. 2020 IEEE/ACM SYMPOSIUM ON EDGE COMPUTING (SEC 2020), 2020, : 340 - 345
  • [43] An End-to-End Security Aware WSN Approach with Localization & Authentication and Data Exchange Security
    Priyanka, R.
    Reddy, K. Satyanarayan
    [J]. INTERNATIONAL TRANSACTION JOURNAL OF ENGINEERING MANAGEMENT & APPLIED SCIENCES & TECHNOLOGIES, 2022, 13 (07):
  • [44] End-to-end authentication based secure communication in vehicular ad hoc networks (VANET)
    Kumar, Ankit
    Sharma, Neeraj
    Kumar, Abhishek
    [J]. JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY, 2022, 25 (01): : 219 - 229
  • [45] A practical and flexible PUF-based end-to-end anonymous authentication protocol for IoT
    Li, Sensen
    Huang, Yicai
    Yu, Bin
    [J]. COMPUTER NETWORKS, 2024, 247
  • [46] Cooperative End-to-End Traffic Redundancy Elimination for Reducing Cloud Bandwidth Cost
    Yu, Lei
    Sapra, Karan
    Shen, Haiying
    Ye, Lin
    [J]. 2012 20TH IEEE INTERNATIONAL CONFERENCE ON NETWORK PROTOCOLS (ICNP), 2012,
  • [47] A DTLS Based End-To-End Security Architecture for the Internet of Things with Two-Way Authentication
    Kothmayr, Thomas
    Schmitt, Corinna
    Hu, Wen
    Bruenig, Michael
    Carle, Georg
    [J]. PROCEEDINGS OF THE 37TH ANNUAL IEEE CONFERENCE ON LOCAL COMPUTER NETWORKS WORKSHOPS (LCN 2012), 2012, : 956 - 963
  • [48] End-to-end Encryption based Biometric SaaS Using Raspberry Pi as a Remote Authentication Node
    Shah, Dhvani K.
    Bharadi, Vinayak A.
    Kaul, V. J.
    Amrutia, Sameer
    [J]. 1ST INTERNATIONAL CONFERENCE ON COMPUTING COMMUNICATION CONTROL AND AUTOMATION ICCUBEA 2015, 2015, : 52 - 59
  • [49] LNTP: An End-to-End Online Prediction Model for Network Traffic
    Zhang, Lianming
    Zhang, Huan
    Tang, Qian
    Dong, Pingping
    Zhao, Zhen
    Wei, Yehua
    Mei, Jing
    Xue, Kaiping
    [J]. IEEE NETWORK, 2021, 35 (01): : 226 - 233
  • [50] End-to-End Restorable Oblivious Routing of Hose Model Traffic
    Kodialam, M.
    Lakshman, T. V.
    Orlin, James B.
    Sengupta, Sudipta
    [J]. IEEE-ACM TRANSACTIONS ON NETWORKING, 2011, 19 (04) : 1223 - 1236