Enhanced ubiquitous system architecture for securing healthcare IoT using efficient authentication and encryption

被引:1
|
作者
Kulkarni, Chaitanya Shrikant [1 ]
Naniwadekar, Makarand Y. [2 ]
Mirzaxmatovna, Yuldasheva Minavar [3 ]
Athawale, Shashikant V. [4 ]
Bhadla, Mohit [5 ]
Byeon, Haewon [6 ]
机构
[1] Vidya Pratishthans Kamalnayan Bajaj Inst Engn & Te, Baramati, India
[2] Savitribai Phule Pune Univ, AISSMS COE, Dept Chem Engn, Pune, India
[3] Tashkent State Transport Univ, Dept Accounting & Business, Tashkent, Uzbekistan
[4] Savitribai Phule Pune Univ, AISSMS COE, Dept Comp Engn, Pune, India
[5] Swarnim Startup & Innovat Univ, Dept Comp Engn, Gandhinagar, India
[6] Inje Univ, Dept Digital Antiaging Healthcare, Gimhae 50834, South Korea
关键词
Ubiquitous system; Secure healthcare system; Efficient authentication; Homomorphism encryption; CHALLENGES; BLOCKCHAIN;
D O I
10.1007/s41060-023-00488-4
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
In the light of the ongoing development of IoT (Internet of Things) technology and the rise of Futuristic Smart Vertical Networks, its utilisation in diverse sectors is growing more widespread, resulting in heightened productivity and improved quality of life. The widespread implementation of the Internet of Things (IoT) in the medical field has multiple benefits. It enhances patient access to medical services and enables healthcare professionals to obtain timely and accurate information about patients' physical conditions. Consequently, this facilitates the development of more efficient and targeted treatment approaches. However, despite the enjoyment consumers experience from the conveniences offered by the Internet of Things (IoT) in the healthcare sector, it is crucial to priorities protecting patients' communication security and personal privacy. This study introduces a novel enhanced ubiquitous system architecture protocol to enhance user access to networks by implementing an efficient method for anonymous authentication and key exchange. The system is based on the principles of homomorphism encryption. This protocol aims to enable mutual authentication between medical devices and distant medical servers by utilising a passphrase with low entropy. This process ultimately results in generating a session key with high entropy. The scheme's security is verified inside the standard model, and simulated experimental outcomes highlight its enhanced efficiency compared to similar current alternatives.
引用
收藏
页数:11
相关论文
共 50 条
  • [1] Shared-node IoT network architecture with ubiquitous homomorphic encryption for healthcare monitoring
    Talpur, Mir Sajjad Hussain
    Bhuiyan, Md Zakirul Alam
    Wang, Guojun
    INTERNATIONAL JOURNAL OF EMBEDDED SYSTEMS, 2015, 7 (01) : 43 - 54
  • [2] Enhanced identity authentication and context privacy preservation in ubiquitous healthcare system
    Kim, Hyunsung
    International Journal of Control and Automation, 2014, 7 (11): : 409 - 418
  • [3] Securing the IoT-enabled smart healthcare system: A PUF-based resource-efficient authentication mechanism
    Alruwaili, Omar
    Tanveer, Muhammad
    Alotaibi, Faisal Mohammed
    Abdelfattah, Waleed
    Armghan, Ammar
    Alserhani, Faeiz M.
    HELIYON, 2024, 10 (18)
  • [4] Securing IoT Healthcare Data: The Power of Blockchain and Homomorphic Encryption
    Sathishkumar, M.
    Raghavendran, V
    2ND INTERNATIONAL CONFERENCE ON SUSTAINABLE COMPUTING AND SMART SYSTEMS, ICSCSS 2024, 2024, : 309 - 314
  • [5] SEA: A Secure and Efficient Authentication and Authorization Architecture for IoT-Based Healthcare Using Smart Gateways
    Moosavi, Sanaz Rahimi
    Tuan Nguyen Gia
    Rahmani, Amir-Mohammad
    Nigussie, Ethiopia
    Virtanen, Seppo
    Isoaho, Jouni
    Tenhunen, Hannu
    6TH INTERNATIONAL CONFERENCE ON AMBIENT SYSTEMS, NETWORKS AND TECHNOLOGIES (ANT-2015), THE 5TH INTERNATIONAL CONFERENCE ON SUSTAINABLE ENERGY INFORMATION TECHNOLOGY (SEIT-2015), 2015, 52 : 452 - 459
  • [6] Securing Healthcare IoT (HIoT) Monitoring System Using Blockchain
    Siddiqui, Arsalan
    Qaddour, Jihad
    Ullah, Sameeh
    12TH INTERNATIONAL CONFERENCE ON UBIQUITOUS AND FUTURE NETWORKS (ICUFN 2021), 2021, : 60 - 66
  • [7] Securing E-Healthcare Images Using an Efficient Image Encryption Model
    Jain, Jaishree
    Jain, Arpit
    SCIENTIFIC PROGRAMMING, 2022, 2022
  • [8] Enhanced System for Securing Password Manager Using Honey Encryption
    AlMuhanna, Albatoul
    AlFaadhel, Afnan
    Ara, Anees
    2022 FIFTH INTERNATIONAL CONFERENCE OF WOMEN IN DATA SCIENCE AT PRINCE SULTAN UNIVERSITY (WIDS-PSU 2022), 2022, : 150 - 154
  • [9] LEOBAT: Lightweight encryption and OTP based authentication technique for securing IoT networks
    Goel, Aarti
    Sharma, Deepak Kumar
    Gupta, Koyel Datta
    EXPERT SYSTEMS, 2022, 39 (05)
  • [10] Securing Healthcare Data Using Biometric Authentication
    Jahan, Sharmin
    Chowdhury, Mozammel
    Islam, Rafiqul
    Chaudhry, Junaid
    SECURITY AND PRIVACY IN COMMUNICATION NETWORKS, SECURECOMM 2017, 2018, 239 : 123 - 132