A provably-secure authenticated key agreement protocol for remote patient monitoring IoMT

被引:30
|
作者
Chen, Chien-Ming [1 ]
Liu, Shuangshuang [1 ]
Li, Xuanang [1 ]
Islam, S. K. Hafizul [2 ]
Das, Ashok Kumar [3 ]
机构
[1] Shandong Univ Sci & Technol, Coll Comp Sci & Engn, Qingdao 266590, Peoples R China
[2] Indian Inst Informat Technol Kalyani, Dept Comp Sci & Engn, Kanchrapara 741235, West Bengal, India
[3] Int Inst Informat Technol, Ctr Secur Theory & Algorithm Res, Hyderabad 500032, India
关键词
Authentication; Internet-of-Medical-Things (IoMT); Security; Sensor; Wireless network; USER AUTHENTICATION; SCHEME; FRAMEWORK; INTERNET;
D O I
10.1016/j.sysarc.2023.102831
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
With the continuous improvement of the public medical system, the current medical service industry is more intelligent. The Internet-of-Medical-Things (IoMT) plays a significant role in smart medicine. The emergence of remote wireless monitoring platforms in the IoMT systems has significantly reduced the risk of virus infection among medical staff. However, data may be easily stolen by criminals during the transmission process. We propose a three-factor enhanced protocol to monitor patient body information and mitigate the issues. The proposed protocol can provide the confidentiality of transmitted data and the privacy of doctors and patients. The security of the proposed protocol is demonstrated in the Random Oracle Model (ROM) for computational security. In addition, by comparing the proposed protocol with other related works, our designed protocol has efficient performance both in execution time and communication costs.
引用
收藏
页数:11
相关论文
共 50 条
  • [1] A provably-secure password-authenticated group key agreement in the standard model
    Fu, Xiu
    Xu, Qiuliang
    Wang, Hao
    Journal of Networks, 2009, 4 (08) : 763 - 770
  • [2] A provably secure authenticated key agreement protocol for wireless communications
    Guo, Hua
    Xu, Chang
    Mu, Yi
    Li, Zhoujun
    COMPUTERS & ELECTRICAL ENGINEERING, 2012, 38 (03) : 563 - 572
  • [4] CDAKA: A Provably-Secure Heterogeneous Cross-Domain Authenticated Key Agreement Protocol with Symptoms-Matching in TMIS
    Xiaoxue Liu
    Wenping Ma
    Journal of Medical Systems, 2018, 42
  • [5] Provably secure and efficient certificateless authenticated tripartite key agreement protocol
    Xiong, Hu
    Chen, Zhong
    Li, Fagen
    MATHEMATICAL AND COMPUTER MODELLING, 2012, 55 (3-4) : 1213 - 1221
  • [6] Provably secure authenticated key agreement protocol based on hierarchical identity
    Cao, Chen-Lei
    Liu, Ming-Qi
    Zhang, Ru
    Yang, Yi-Xian
    Dianzi Yu Xinxi Xuebao/Journal of Electronics and Information Technology, 2014, 36 (12): : 2848 - 2854
  • [7] CDAKA: A Provably-Secure Heterogeneous Cross-Domain Authenticated Key Agreement Protocol with Symptoms-Matching in TMIS
    Liu, Xiaoxue
    Ma, Wenping
    JOURNAL OF MEDICAL SYSTEMS, 2018, 42 (08)
  • [8] A Provably-Secure Two-Factor Authenticated Key Exchange Protocol with Stronger Anonymity
    Yang, Xiaoyan
    Jiang, Han
    Hou, Mengbo
    Zheng, Zhihua
    Xu, Qiuliang
    Choo, Kim-Kwang Raymond
    NETWORK AND SYSTEM SECURITY (NSS 2018), 2018, 11058 : 111 - 124
  • [9] A provably secure authenticated key agreement protocol for industrial sensor network system
    Thakur, Garima
    Obaidat, Mohammad S.
    Sharma, Piyush
    Prajapat, Sunil
    Kumar, Pankaj
    CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2024, 36 (23):
  • [10] An Improved Provably Secure Identity-Based Authenticated Key Agreement Protocol
    Li, Yang
    Zhu, Jianming
    Zhang, Wei
    Yang, Xin
    2014 INTERNATIONAL CONFERENCE ON MANAGEMENT OF E-COMMERCE AND E-GOVERNMENT (ICMECG), 2014, : 98 - 103