A provably-secure authenticated key agreement protocol for remote patient monitoring IoMT

被引:30
|
作者
Chen, Chien-Ming [1 ]
Liu, Shuangshuang [1 ]
Li, Xuanang [1 ]
Islam, S. K. Hafizul [2 ]
Das, Ashok Kumar [3 ]
机构
[1] Shandong Univ Sci & Technol, Coll Comp Sci & Engn, Qingdao 266590, Peoples R China
[2] Indian Inst Informat Technol Kalyani, Dept Comp Sci & Engn, Kanchrapara 741235, West Bengal, India
[3] Int Inst Informat Technol, Ctr Secur Theory & Algorithm Res, Hyderabad 500032, India
关键词
Authentication; Internet-of-Medical-Things (IoMT); Security; Sensor; Wireless network; USER AUTHENTICATION; SCHEME; FRAMEWORK; INTERNET;
D O I
10.1016/j.sysarc.2023.102831
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
With the continuous improvement of the public medical system, the current medical service industry is more intelligent. The Internet-of-Medical-Things (IoMT) plays a significant role in smart medicine. The emergence of remote wireless monitoring platforms in the IoMT systems has significantly reduced the risk of virus infection among medical staff. However, data may be easily stolen by criminals during the transmission process. We propose a three-factor enhanced protocol to monitor patient body information and mitigate the issues. The proposed protocol can provide the confidentiality of transmitted data and the privacy of doctors and patients. The security of the proposed protocol is demonstrated in the Random Oracle Model (ROM) for computational security. In addition, by comparing the proposed protocol with other related works, our designed protocol has efficient performance both in execution time and communication costs.
引用
收藏
页数:11
相关论文
共 50 条
  • [21] Provably Secure Authenticated Key Agreement Scheme for Smart Grid
    Odelu, Vanga
    Das, Ashok Kumar
    Wazid, Mohammad
    Conti, Mauro
    IEEE TRANSACTIONS ON SMART GRID, 2018, 9 (03) : 1900 - 1910
  • [22] Provably secure three-party authenticated key agreement protocol using smart cards
    Yang, Haomin
    Zhang, Yaoxue
    Zhou, Yuezhi
    Fu, Xiaoming
    Liu, Hao
    Vasilakos, Athanasios V.
    COMPUTER NETWORKS, 2014, 58 : 29 - 38
  • [23] RYY++: A Novel Provably Secure Identity-Based Authenticated Key Agreement Protocol
    Li Yang
    Zhu Jianming
    Zhang Ning
    Wang Xiuli
    Zhang Yaoqi
    CHINESE JOURNAL OF ELECTRONICS, 2015, 24 (02) : 332 - 337
  • [24] RYY++: A Novel Provably Secure Identity-Based Authenticated Key Agreement Protocol
    LI Yang
    ZHU Jianming
    ZHANG Ning
    WANG Xiuli
    ZHANG Yaoqi
    ChineseJournalofElectronics, 2015, 24 (02) : 332 - 337
  • [25] An Efficient Provably Secure Password-Based Authenticated Key Agreement
    Xu, Hanqiu
    Wang, Qingping
    Zhou, Jing
    Ruan, Ou
    INNOVATIVE MOBILE AND INTERNET SERVICES IN UBIQUITOUS COMPUTING, IMIS-2017, 2018, 612 : 423 - 434
  • [26] Provably secure two-party authenticated key agreement protocol for post-quantum environments
    Islam, SK Hafizul
    Journal of Information Security and Applications, 2020, 52
  • [27] Provably secure two-party authenticated key agreement protocol for post-quantum environments
    Islam, S. K. Hafizul
    JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2020, 52
  • [28] A Biometric Authenticated Key Agreement Protocol for Secure Token
    Yoon, Eun-Jun
    Yoo, Kee-Young
    IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, 2010, E93D (08): : 2311 - 2315
  • [29] A Secure Certificateless Authenticated Group Key Agreement Protocol
    Geng, Manman
    Zhang, Futai
    Gao, Meng
    MINES 2009: FIRST INTERNATIONAL CONFERENCE ON MULTIMEDIA INFORMATION NETWORKING AND SECURITY, VOL 1, PROCEEDINGS, 2009, : 342 - 346
  • [30] Provably-secure programming languages for remote evaluation
    Volpano, D
    ACM SIGPLAN NOTICES, 1997, 32 (01) : 117 - 119