Enhanced ubiquitous system architecture for securing healthcare IoT using efficient authentication and encryption

被引:1
|
作者
Kulkarni, Chaitanya Shrikant [1 ]
Naniwadekar, Makarand Y. [2 ]
Mirzaxmatovna, Yuldasheva Minavar [3 ]
Athawale, Shashikant V. [4 ]
Bhadla, Mohit [5 ]
Byeon, Haewon [6 ]
机构
[1] Vidya Pratishthans Kamalnayan Bajaj Inst Engn & Te, Baramati, India
[2] Savitribai Phule Pune Univ, AISSMS COE, Dept Chem Engn, Pune, India
[3] Tashkent State Transport Univ, Dept Accounting & Business, Tashkent, Uzbekistan
[4] Savitribai Phule Pune Univ, AISSMS COE, Dept Comp Engn, Pune, India
[5] Swarnim Startup & Innovat Univ, Dept Comp Engn, Gandhinagar, India
[6] Inje Univ, Dept Digital Antiaging Healthcare, Gimhae 50834, South Korea
关键词
Ubiquitous system; Secure healthcare system; Efficient authentication; Homomorphism encryption; CHALLENGES; BLOCKCHAIN;
D O I
10.1007/s41060-023-00488-4
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
In the light of the ongoing development of IoT (Internet of Things) technology and the rise of Futuristic Smart Vertical Networks, its utilisation in diverse sectors is growing more widespread, resulting in heightened productivity and improved quality of life. The widespread implementation of the Internet of Things (IoT) in the medical field has multiple benefits. It enhances patient access to medical services and enables healthcare professionals to obtain timely and accurate information about patients' physical conditions. Consequently, this facilitates the development of more efficient and targeted treatment approaches. However, despite the enjoyment consumers experience from the conveniences offered by the Internet of Things (IoT) in the healthcare sector, it is crucial to priorities protecting patients' communication security and personal privacy. This study introduces a novel enhanced ubiquitous system architecture protocol to enhance user access to networks by implementing an efficient method for anonymous authentication and key exchange. The system is based on the principles of homomorphism encryption. This protocol aims to enable mutual authentication between medical devices and distant medical servers by utilising a passphrase with low entropy. This process ultimately results in generating a session key with high entropy. The scheme's security is verified inside the standard model, and simulated experimental outcomes highlight its enhanced efficiency compared to similar current alternatives.
引用
收藏
页数:11
相关论文
共 50 条
  • [21] A Secured Architecture for IoT Healthcare System
    Vijayalakshmi, A. Vithya
    Arockiam, L.
    PROCEEDING OF THE INTERNATIONAL CONFERENCE ON COMPUTER NETWORKS, BIG DATA AND IOT (ICCBI-2018), 2020, 31 : 904 - 911
  • [22] Robust user authentication model for securing electronic healthcare system using fingerprint biometrics
    Jahan S.
    Chowdhury M.
    Islam R.
    International Journal of Computers and Applications, 2019, 41 (03) : 233 - 242
  • [23] Energy efficient distributed lightweight authentication and encryption technique for IoT security
    Sudhakaran, Pradeep
    Malathy, C.
    INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2022, 35 (02)
  • [24] MEDICAL IMAGE ENCRYPTION INTO SMART HEALTHCARE IOT SYSTEM
    Khan, Jalaluddin
    Li, Jianping
    Ul Haq, Amin
    Parveen, Shadma
    Khan, Ghufran Ahmad
    Shahid, Mohammad
    Monday, Happy N.
    Ullah, Sana
    Sun Ruinan
    2019 16TH INTERNATIONAL COMPUTER CONFERENCE ON WAVELET ACTIVE MEDIA TECHNOLOGY AND INFORMATION PROCESSING (ICWAMTIP), 2019, : 378 - 382
  • [25] Securing ubiquitous and low-cost RFID using tiny encryption algorithm
    Israsena, P.
    INTERNATIONAL SYMPOSIUM ON WIRELESS PERVASIVE COMPUTING 2006, CONFERENCE PROGRAM, 2006, : 348 - 351
  • [26] Device Authentication Mechanism for IoT Enabled Healthcare System
    Joshitta, Shantha Mary R.
    Arockiam, L.
    2017 INTERNATIONAL CONFERENCE ON ALGORITHMS, METHODOLOGY, MODELS AND APPLICATIONS IN EMERGING TECHNOLOGIES (ICAMMAET), 2017,
  • [27] Efficient secure surveillance on smart healthcare IoT system through cosine-transform encryption
    Khan, Jalaluddin
    Li, Jian Ping
    Ul Haq, Amin
    Khan, Ghufran Ahmad
    Ahmad, Sultan
    Alghamdi, Abdulrahman Abdullah
    Golilarz, Noorbakhsh Amiri
    JOURNAL OF INTELLIGENT & FUZZY SYSTEMS, 2021, 40 (01) : 1417 - 1442
  • [28] A Lightweight Authentication Protocol using Implicit Certificates for Securing IoT Systems
    Siddhartha, Valmiki
    Gaba, Gurjot Singh
    Kansal, Lavish
    INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND DATA SCIENCE, 2020, 167 : 85 - 96
  • [29] Securing biometric authentication system using blockchain
    Lee, Youn Kyu
    Jeong, Jongwook
    ICT EXPRESS, 2021, 7 (03): : 322 - 326
  • [30] Unified ubiquitous healthcare system architecture with collaborative model
    Gelogo, Y. E. (yvette@cu.ac.kr), 1600, Science and Engineering Research Support Society, 20 Virginia Court, Sandy Bay, Tasmania, Australia (08):